SALTO Systems, a globally renowned manufacturer of electronic access control solutions, has released the SALTO Neo Cylinder, a new electronic cylinder that offers more features and better functionality than any other cylinder on the market. The compact SALTO Neo Cylinder is designed for doors where fitting an electronic escutcheon is not possible or required and can be installed on standard doors, server racks, gates, cabinets, electric switches, sliding doors and more. It’s available in...
Researchers at Check Point have identified security flaws in Apache Guacamole, one of the world’s most popular IT infrastructures for remote work. With over 10 million downloads, the free open-source software enables remote workers to access their company’s computer network from anywhere, by using only a web browser. Apache Guacamole software Apache Guacamole runs on many devices, including mobile phones and tablets, giving remote workers ‘constant, world-wide, unfettered acc...
The 2020 Tech Trailblazers Awards opened for entries, beginning a process which by November will result in the recognition of outstanding early-stage companies from around the world, across 12 major enterprise technology categories and three special categories. Only for smaller businesses and startups less than six years old and at C-series funding or below, the Awards celebrate innovation in: AI Big data Blockchain Cloud Containers Developer tools Fintech IoT Mobile technology Netwo...
Pulse Secure, the provider of software-defined Secure Access solutions, announced that Pulse Secure was recognized among Representative Vendors within Gartner’s Market Guide for Zero Trust Network Access (ZTNA). Pulse SDP provides direct device-to-application trusted connectivity only after successful user, device and security state verification. The solution offers enterprises the only dual-mode VPN and SDP architecture that yields single-pane-of-glass management with unified policy admi...
SecurityHQ, formerly known as Si Consult, the globally renowned provider in managed security services, has announced the launch of their new brand identity with a redesign of their company logo and official website, as part of their rebranding strategy. Managed Security Service Provider Over recent years, SecurityHQ has evolved into one of the most renowned and advanced Managed Security Service Provider (MSSP) in the world, with six Security Operation Centers spread across the United Kingdom,...
Exabeam, the Smarter SIEM company, has revealed the results of a new survey of UK security practitioners, which tracks the adoption and use of cloud-based security tools. This latest survey showed a marked increase in the adoption of these security tools compared to an earlier study carried out in March 2020 prior to the COVID-19 lockdown. Eighty-eight (88) percent of recent respondents said the accelerated move to the cloud was driven by the need to support a remote workforce. Among the concer...
Videonetics announces that it has joined the Qualcomm® Smart Cities Accelerator Program to provide their AI and Deep Learning powered Unified Video Computing Platform™ (UVCP) to diverse industries such as smart cities, aviation, enterprise and manufacturing to name a few. To exhibit their features and functionalities, Videonetics will be implementing their end-to-end video management system and AI enabled video analytics in conjunction with Qualcomm Technologies enabled smart cameras for use at Qualcomm Technologies’ San Diego Morehouse campus. Delivering greater efficiencies As part of the Qualcomm® Advantage Network, the Qualcomm Smart Cities Accelerator Program is designed to connect cities, municipalities, government agencies, and enterprises with an ecosystem of providers to help deliver greater efficiencies, cost savings, safety, and sustainability. With proven expertise in commercially deployed solutions, it provides members with end-to-end smart city solutions, which are essential for the transformation of city infrastructure. The Qualcomm Smart Cities Accelerator Program includes Qualcomm Technologies’ portfolio of IoT solutions with advancements in mobile connectivity, edge computing and AI capabilities to address a diverse range of smart city needs and provides priority access of co-marketing opportunities to its member companies. Unified video computing platform Videonetics has secured more than 140 cities, 80+ airports, and 100+ large enterprises across many geographies Videonetics will leverage participation in the Qualcomm Smart Cities Accelerator Program to deploy advanced technologies across cities, municipalities, industries, aviation, mass transportation, education, and healthcare for a well-connected infrastructure. Acclaimed as a market pioneer, Videonetics has secured more than 140 cities, 80+ airports, and 100+ large enterprises across many geographies. Powered by its patented and awarded AI and Deep Learning framework, Videonetics Unified Video Computing Platform encompasses Intelligent VMS, Video Analytics, Intelligent Traffic Management System, Facial Recognition, Video Computing Platform as a Service (VCPaaS™) and Video Command Control Center. Intelligent network connectivity “We are excited to have Videonetics join the Qualcomm Smart Cities Accelerator Program and share their solutions as their participation and expertise in AI and Deep Learning. Both companies working together, with Qualcomm’s experience in wireless and AI, will facilitate an end-to-end solution for a variety of applications across multiple verticals and industries,” said Sanjeet Pandit, Senior Director, Business Development, Qualcomm Technologies, Inc. Avinash Trivedi, VP - Business Development, Videonetics expressed, “We are excited to join the Qualcomm Smart Cities Accelerator Program. Our platform has been field-proven in providing end-to-end solutions from edge devices to cloud hosted services, globally. As a member of the program, I am assured that Qualcomm Technologies’ remarkable intelligent network connectivity, combined with Videonetics’s state-of-the-art solutions will cater to growing demand for truly unified solutions in different verticals.”
Dahua Technology, a globally renowned video-centric smart IoT solutions and services provider, has announced the release of DMSS, its newly designed mobile client. DMSS can connect Dahua products via the Internet or Ethernet through P2P or IP, and can also be operated remotely. It supports all kinds of product types, including NVR, XVR, IPC, TPC, VTO, Alarm Hub, and Access Control, etc. Remote operations DMSS can work in an environment with multiple internet connections. It connects Dahua products through both Internet and Ethernet. P2P enabled internet connection features great simplicity, while IP or domain name enabled Ethernet connection guarantees strong stability. Through its global network coverage, DMSS can be operated remotely to quickly and stably control specific devices all around the world. Numerous functions including PTZ controlling, video image adjustment (such as White Balance, focus, etc.), alarm subscription, video preview and playback, voice intercom, etc. can be done remotely. Enhanced data security DMSS adopts multiple layers of data encryption protection to provide better data security to users From a product to the platform and then to the mobile client, DMSS adopts multiple layers of data encryption protection to provide better data security to users. DMSS has also been certified by TÜV Rheinland, meaning the product complies with the GDPR (EU, 2016/679), and meets the TÜV Rheinland 2PfG 2624/06.17 standards, offering state-of-the-art information security and privacy protection. Featuring more detailed interaction design, DMSS offers smoother user experience. In addition, a version that supports both day mode and night mode will be released soon. Supports thermal products To provide better support towards the global efforts in pandemic prevention and control, DMSS also supports thermal products, including thermal cameras and access control and temperature monitoring terminals. It enables the operators to remotely control thermal products and perform their duty in a much safer manner. In the future, DMSS will extend its application scope to support more SMB solutions, providing installers and small and medium-sized businesses with more user-friendly solutions. With its mission of ‘Enabling a Safer Society and Smarter Living’, Dahua Technology will continue to focus on ‘Innovation, Quality and Service’ to better serve its partners and customers around the world.
Badger Technologies®, a product division of Jabil, introduces the Badger PatrolBot™ autonomous robot tailored for the security guard industry. The PatrolBot autonomous robot extends security workforce operations by automatically verifying that windows and doors are secured, fire extinguishers and defibrillators are properly stored, and floors are free of debris and potential hazards. The robot also can investigate alarms and areas not supported by surveillance cameras. The Badger PatrolBot autonomous robot empowers security guard management companies and their customers to prioritise personnel deployment while automating manual security checks. Reducing operational costs This is especially relevant now that security guard companies are being called upon to support COVID-19 security requirements, including enforcing social distancing, taking temperatures and performing worker welfare checks. “The PatrolBot autonomous robot is a workforce multiplier, continuously patrolling stores, warehouses and office buildings for 12 hours on a single charge,” said Tim Rowland, CEO of Badger Technologies. “Our robots automate the most mundane inspections and share real-time data, enabling guard services companies to expand their service offerings, extend shift coverage and reduce operational costs.” Workforce management platforms Our strategic partnership will help customers’ realize greater business value from their security investments" As part of a total security solution, Badger Technologies is working with established providers of workforce management platforms to ensure seamless integration with security operations. The first partner in this growing ecosystem is Montreal-based TrackTik Software Inc., an innovator in cloud-based security workforce management focused on maximising operational efficiencies. The companies are developing Application Programming Interfaces (APIs), enabling the PatrolBot autonomous robot to use TrackTik’s cloud-based software to streamline security guard tour scheduling, real-time checkpoint logging, incident reporting, GPS tracking, messaging and alerts. “TrackTik Software is thrilled to partner with Badger Technologies in using robotics to transform security guard operations,” said Simon Ferragne, CEO of TrackTik Software. “Our strategic partnership will help customers’ realize greater business value from their security investments and allow them to take on more non-traditional security roles in a post-pandemic world.” Streaming video cameras Equipped with streaming video cameras, the PatrolBot autonomous robot lets command-center staff view the robot’s exact location as well as access a live video feed. In addition, fixed-position cameras are programmed to take pictures of doors, windows, fire extinguishers and any blockages during the robot’s patrol tour. If needed, a robot can automatically modify its routes to avoid obstacles while performing inspection duties safely around people. Actionable data and analytics offer vital insights for improving service delivery while lowering costs Actionable data and analytics offer vital insights for improving service delivery while lowering costs. Badger Technologies also is working to accelerate integration of its Software Development Kit (SDK) with other security workforce management software as well as customer-specific security solutions. Floor-Scanning robot As the latest Badger Technologies’ offering, the PatrolBot autonomous robot leverages AI and Machine Learning to produce actionable business insights to elevate security guard Service Level Agreements (SLAs) while meeting growing compliance demands. This newest robot joins Badger Technologies’ retail robots, which have traveled more than 500,000 miles safely alongside employees and shoppers at more than 500 grocery stores throughout the U.S. and Australia. The PatrolBot autonomous robot extends the capabilities of this existing line-up, which includes Badger® Retail inSight, a shelf-scanning robot that addresses out-of-stock, planogram compliance and price integrity issues; and Badger® Retail inSpect, a floor-scanning robot that automates hazard detections, such as spilled liquids and other debris.
Pulse Secure, the provider of software-defined Secure Access solutions, announced successful integration and joint compatibility testing between Gigamon and Pulse Secure to ensure customers that Pulse Secure’s Network Access Control (NAC) solution, Pulse Policy Secure, can fully leverage the endpoint contextual information received from Gigamon as remote workers return back to their office. The combination of Gigamon and Pulse provides organizations real-time visibility of network-connected devices and Zero Trust control leveraging adaptive authentication and User and Entity Behavior Analytics (UEBA) to detect anomalies and mitigate unauthorized and malicious access to network applications and resources. Traffic information with dynamic filtering Pulse Policy Secure is a full-featured Network Access Control solution that is easy to deploy, manage, integrate and scale. Gigamon, sends consolidated traffic information with dynamic filtering to Pulse Policy Secure to enhance endpoint visibility across distributed networks and more automated endpoint security compliance. Ensure that critical security analytic data flows seamlessly across solutions to provide the visibility and control" Leveraging Pule Secure UEBA features, Pulse Policy Secure can identify and respond to anomalous activity such as suspicious IoT activity, DGA attacks and MAC spoofing as part of the solution’s adaptive authentication capabilities aligning to Zero Trust control. “The growing adoption of Zero Trust makes it essential that the security vendor community works in concert to ensure that critical security analytic data flows seamlessly across solutions to provide the visibility and control enterprises need to make better informed secure access decision in real time,” said Alex Thurber, Chief Revenue Officer for Pulse Secure. “We have worked closely with Gigamon at a technical level to create a smooth integration process with capabilities that will ensure our joint customers gain tangible benefits in deploying our technologies together to aid both network management and secure access in support of Zero Trust.” Granting network access according to security posture Joint Solution Benefits include: Support Zero Trust strategies. Discover, profile and authenticate users and devices prior to granting access according to their security posture. Define security posture policies for user roles and endpoints. Then automatically enforce access rules on all endpoints (based on identity, role, device class and security posture) before they are allowed on the network. Improve overall security. Enforce dynamic network segmentation of devices at the network edge to prevent threats from spreading laterally, and enable bidirectional integration with the security infrastructure (SIEM and NGFW, for example) for expedited threat response. 360-degree endpoint insight. Pulse Policy Secure captures in-depth endpoint intelligence and continuously monitors for suspicious state changes to provide reports about access issues and trends. Behavioral Analytics. Correlation of user access, device contextual information, and system logs in a new analytics engine to find anomalies and mitigate threat risks. Monitoring all network traffic for suspicious behavior Pulse Policy Secure captures in-depth endpoint intelligence and continuously monitors for suspicious changes Pulse Policy Secure integrates with the Gigamon Visibility and Analytics Fabric, which is used to monitor all network traffic - including east-west data center traffic and private and public cloud workloads - so all traffic can be analyzed together in order to reduce blind spots and increase the likelihood of spotting suspicious behavior. “Ecosystem partnerships are essential to the adoption of Zero Trust initiatives and working closely with key Secure Access vendors, such as Pulse Secure, to help ensure seamless integration is vital for customers to maximize their return on investment,” said Gigamon President and Chief Operating Officer Shane Buckley. “As organizations strive to do more with fewer resources, they often turn to automation to help realize benefits that are greater than the sum of their contributing parts.” Additional benefits of using Gigamon alongside Pulse Secure include traffic aggregation to minimize port utilization. In cases where network links have low traffic volumes, the Gigamon Visibility and Analytics Fabric can aggregate these together before sending them to the Pulse Policy Secure NAC solution in order to minimize the number of ports that need to be used. By tagging the traffic, the Fabric ensures the source of traffic can be easily identified. Where network links have low traffic volumes, the Gigamon Visibility and Analytics Fabric can aggregate these together Endpoint information and fortified security analytics In addition, Gigamon Visibility and Analytics Fabric offers enhanced control of asymmetric routing to ensure session information is kept together. Pulse Policy Secure gains the complete context of an endpoint’s connections and fortified security analytics. “Based on the principle of ‘never trust, always verify,’ Zero Trust Networking (ZTN) requires the coordination of various security technologies to enable perimeter enforcement, network segmentation and adaptive access control,” said Tony Massimini, senior industry analyst at Frost & Sullivan. “Vendor collaboration, such as that between Gigamon and Pulse Secure, demonstrates the value of interoperability that supports customers advancing Zero Trust initiatives.” The enhanced integration capability is freely available as part of the standard licensing model for both platforms, as part of Pulse Policy Secure and Gigamon Visibility and Analytics Fabric. Pulse Secure Partners also offers Gigamon solutions to its client base, making the partnership of particular relevance to the security channel community.
Connect ONE by Connected Technologies presents a new cloud badge printing integration with the InstantCard ID Card Service, allowing dealers to easily expand into offering customized identification badging and credentialing as part of their menu of services while earning additional revenue. API with InstantCard Connected Technologies developed the Application Programming Interface (API) with InstantCard so dealers can use the powerful cloud-hosted Connect ONE security management platform to create customized badge templates for users and their facilities in a wide range of vertical markets. All the latest identification technologies, including barcode, magnetic stripe, smart card, QR and RFID can be created, printed and shipped by InstantCard directly to the dealer’s Connect ONE customer. "This integration checks all the boxes for dealers,” said Dan Simon, Co-Founder and Managing Partner, Connected Technologies. Integration with Connect ONE The integration with Connect ONE allows customers to associate users with a badge template Dan adds, “It gives them the option to offer a convenient service for user badge management while removing the cost and burden of onsite printer maintenance as dealers continue to build additional recurring monthly revenue (RMR) and add value to their business." Once dealers become a dealer/distributor, they can easily create card templates while InstantCard handles printing and shipping badges to customers. The integration with Connect ONE allows customers to associate users with a badge template, automatically supplying the user information and image to the template at InstantCard and then ordering a badge for print online. Mobile Badge with Connect ONE After the badge is ordered, the same template will also become the Mobile Badge with Connect ONE so the user can display it via the Connect ONE app as well as physically in person. Integration into Connect ONE, the platform that allows dealers to view, manage and control all their services to their customers through a single interface, gives dealers the opportunity to add to their offerings and start receiving RMR from both the customer and InstantCard.
A healthcare facility or hospital is unlike any other organization. It’s generally open to the public 24 hours a day, seven days a week. There is expensive equipment in many areas, patient records and confidentiality that needs constant protection, in addition to parking facilities and door access control needs and medicines that need to be kept secure. Hospital and healthcare settings use video surveillance in many ways, as the security needs of these institutions reflect the life-or-death work they do and also a volatile environment where emotions can run high. Recent technology advances are well-suited for the hospital and healthcare setting, expanding the video surveillance capabilities needed to protect patients, staff and visitors. Chris Sessa, Director of Key Accounts, for Salient Systems, sees three unique trends in the way that hospitals and healthcare facilities are using video surveillance and a video management solution (VMS) to secure their facilities, patients, visitors and staff. Faster access to multiple video feeds “Many hospitals and healthcare facilities are already using a VMS to pull in different video feeds to manage patient safety and to monitor employees, but with higher-resolution, networked cameras and new VMS features, security can pull up video faster than ever before,” Sessa says. “Technology such as dynamic resolution scaling also allows security in a monitoring center to pull of data from other sites.” A major benefit is increased awareness, which can also result in increased risk mitigation. Adoption of cloud services Results of a 2014 HIMSS Analytics Cloud Survey show the widespread adoption of cloud services among healthcare organizations across the US, with 80 percent of 150 participants reporting they currently use cloud services. The survey also shows a positive growth outlook for cloud services – almost all healthcare organizations currently video footage on-site. Beyond security measures Hospital and healthcare security continues to recognize the potential of using video surveillance for more than just security, to include operational efficiency, situational awareness, risk mitigation and even marketing and merchandising. One example of operational efficiency that’s also tied into patient safety, says Sessa, is viewing activities in large areas. For example, a VMS can pull video from a large area to not only monitor a security guard’s movements and activities, but also to view the activities on a hospital’s Pyxis™ MedStation™ automated medication dispensing system. “Security can monitor if the guard is on his phone or if he’s sleeping while also monitoring medication that’s being dispensed to patients,” Sessa explains. Another application could include tying video surveillance, via a VMS, into HVAC and electrical systems so that when it senses that one area of a building is not in use, it can shut down the systems to reduce energy and lighting costs.
Tragically, in the world we now live, mass shootings and gun violence are epic concerns not only in schools, but Big Box retail, hospitals, municipal buildings, festivals, sporting events, concert venues, and just about anywhere crowds gather or work. The number of incidents is not acceptable and is truly startling. There are many societal and mental health issues that can cause these events and their importance in solving this issue is critical. However, this article will be focussed on the technology side of preventing mass shooting events. Going beyond metal detectors The best way to eliminate mass shootings is to detect weapons before they ever enter, or as they enter, a building. Metal detectors have been effectively dispatched and used to identify weapons on a person entering a building. The major drawbacks of metal detectors are the cost to operate them, several security guards per machine, and the resultant bottlenecks which cause limited throughput at the entrances. The technology eliminates the need to empty pockets and allows backpacks, luggage bags, and purses to be scanned New technology on the market uses millimeter wave detection to quickly scan someone walking through a portal. The technology eliminates the need to empty pockets and allows backpacks, luggage bags, and purses to be scanned at the same time as the person. People can walk through the portals side by side to reduce bottlenecks. Additionally, the technology reduces the number of guards needed, reducing overall costs. Taking out the human element The first step in surviving a mass shooting is being situationally aware. Immediately accepting and understanding the sounds as gunshots is paramount. Just a few seconds can mean the difference between life and death during an active shooter situation. Gunshot detection can eliminate the fear factor, which in many cases temporarily paralyzes those involved and causes precious seconds to pass before action is taken. By using a trusted, effective gunshot detection solution properly partnered with a monitoring system can eliminate the human factor of indecision and delay. Further, coupled with a VMS camera system, it can visually verify the situation as an emergency, identify the shooter, and provide valuable, accurate information to First Responders—all within just a few seconds. The state of gunshot detection technology Gunshot detection technology has been explored and developed by the military since WWI, but commercially it has only been around for a few years. Such detection systems range from wide area coverage to room-to-room coverage. Most are acoustic based (using microphones) to listen for the sound of a gunshot, record the sound, then analyze it with sophisticated software to determine if it is, indeed, a gunshot. Many years have been invested fine-tuning the software to differentiate between a gunshot and other loud noises. Eliminating ambient noise is very difficult during this process. The locations and venues mentioned at the outset of this article inherently have loud, ambient noise. This, in most cases, causes systems to give a false-positive or to even fail to detect the gunshot. In turn, it can send unverified or wrong information to First Responders and Security and cause havoc of unwarranted fear and actions. To help increase the accuracy of the detection of an actual gunshot, many systems have added infrared sensors. Many systems use backroom or cloud servers to run the necessary analysis In addition to the challenge of false positives, many systems use backroom or cloud servers to run the necessary analysis. This not only increases the cost of the system but may increase the notification time of the actual gunshot. Integration of this data to alarm, notification, and camera systems is difficult and costly. And experts say none of these systems are yet 100 percent effective. Enter ultrasonic sensor technology Fortunately, new technology is emerging in the industry. Technology which can eliminate the false-positives and reduce the cost by doing away with the expensive software, servers, cloud servers, and human intervention. This technology uses non-acoustical ultrasonic sensors to detect the frequency of a gunshot concussive wave created by a bullet, leaving the chamber along with the explosion wave force. Because these sensors are not acoustic (microphone), they will not pick up the ambient noise like other systems. In addition, the ultrasonic sensors only detect the gunshot concussive wave within the determined frequency. This also helps eliminate confusion caused by loud noises such as thunder, cars backfiring, large boxes being dropped, etc. An added bonus is ultrasonic sensors are not acoustic, therefore they are never listening or recording, the sensors only operate when there is an actual gunshot; hence, they’re completely non-invasive. The ultrasonic sensors only detect the gunshot concussive wave within the determined frequency Finally, these non-acoustic sensors do much of the work through an onboard processor, no backroom or cloud servers are needed. Integration to systems such as VMS, Access Control, Alarm Panels, etc. requires minimal effort. This allows existing security systems to be integrated with gunshot detection, creating a low-cost, highly effective overall solution. Protecting our children, loved ones, employees, and customers is a monumental challenge for any security professional. Using newly available technology, combined with existing security infrastructure, we have the ability to add on layers of safety to help reduce the tragedy of gun violence and mass shootings. This article was co-written by Brad McMullen, General Manager at 3xLOGIC, and Brad Jarrett, CTO at Active Guardian.
With the postponement of tradeshows and events due to the effects of COVID-19, Vanderbilt and ComNet have taken their high quality, innovative solutions online, directly to their customer base. Through an Online Events and Training resource, you can stay connected with the brands’ top resources and products, as well as join upcoming product webinars hosted by their in-house experts. With a majority of the world currently working from home, businesses must respond to this changing landscape. As such, Vanderbilt and ComNet have turned to online resources to share new product demonstrations and other company news. One cornerstone of the ACRE brands approach was the launch of their Online Events and Training resource page. Ross Wilks, Head of Marketing Communications at Vanderbilt, credits this online resource as the anchor to their communicative success with customers at present. “Through weekly webinars delivered by our in-house experts, Vanderbilt and ComNet have embraced more virtual opportunities to continuously communicate to our customers regarding our latest and most relevant products,” he says. “To date, our webinars have covered a wide range of industry topics such as Why Physical Security and Cloud go together, and The most recent developments in card cloning and reader hacking. Attendance to these online events has proved popular and effective in keeping communication with our customer base open and engaging.” Each webinar ends with a Q&A section, as well as follow-up articles on the most asked questions, plus recordings of the webinars being made available to attendees. As such, the webinar approach has proven a receptive approach for Vanderbilt and ComNet. The Online Events and Training resource acts as a one-stop-shop for all virtual information. Overall, the page outlines the brands’ value-added resources for customers, including the ability to request a remote product demonstration, the availability of free online training, 24/7 access to the Vanderbilt webshop, plus the aforementioned weekly webinars. Vanderbilt and ComNet’s business mantra is built on a foundation of customer-focused core values such as empowerment, collaboration, and high performance and Wilks credits this mentality with their ability to keep information flowing to their base during the present pandemic. “The ACRE brands moved early to kick-start online webinars and ramp up awareness of their already existing online training and shopping options. Now more than ever, it is important to keep customers up to date on the latest offerings,” Wilks explains. “Our commitment has always been to make their customer’s security journey the best possible experience, and that is what this Online Events and Learning page primarily focuses on,” he concludes.
The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorization and the appropriate credentials. The access control business, like many industries before it, is undergoing its own digital transformation But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customized and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms powers continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.
The next step in the journey of digital transformation, the fifth generation of wireless communications technologies (5G) will have an enormous impact on mankind, and on every industry including security. In short, 5G will disrupt the way we live and work. To discuss the changes, we presented our questions to Benoît Jouffrey, VP 5G Expertise at Thales, which is at the forefront of the transformation with an emphasis on trust and security. Following are his responses. Q: In layman's terms, what is the difference between 4G and 5G ecosystems as they relate to opportunity, flexibility and choice in networking tools? Jouffrey: Compared with largely one-size-fits-all 4G services, the 5G ecosystem will provide organizations with much greater choice and flexibility in the way they communicate over mobile networks. The network slicing capabilities of 5G means that business can have their own independent networks, with each one customized to their unique requirements and backed up by service-level agreements (SLA). Another aspect of 5G will be the ability to drive latency between UE (User Equipment) and network down to below a few milliseconds, which will massively boost the performance and scalability of enterprise applications. Q: How can these capabilities drive a company's digital operations? 5G will allow enterprises to be connected more efficiently Jouffrey: 5G will allow enterprises to be connected more efficiently: they can rely on a higher density of connected devices exchanging more information in a better timeframe. Due to these slicing capabilities, 5G networks allow for much greater personalization than 4G networks. This means that businesses could benefit from this personalized network, tailored to their portfolio of Internet of Things (IoT) use cases, and not be necessarily expected to rely on a one-size-fits-all network. By combining the unique capabilities of 5G with the insights derived from analytics, machine learning, and artificial intelligence, enterprises will be in much better stead to run their operations efficiently and securely. Q: How might 5G impact the use of cloud systems? Jouffrey: 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have a small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate. Q: How can one provide trustworthy 5G lifecycle management for IoT devices? Jouffrey: Trustworthy IoT lifecycle management is an end-to-end approach from the secure provisioning of keys within the devices, to the proper identification of the users, from the authentication on the network or the network slice, to the secure handling of the data either at stored or in motion. Resources need to be invested long before this to qualify the business model, in prototyping, as well as prototype testing. Most organizations don’t have the resources to counter all the security challenges of their 5G IoT deployments. Businesses will often end up choosing between navigating a risk-laden 5G environment, with inadequate or incomplete trust mechanisms, or outsourcing these requirements. When looking at outsourcing, companies must choose a provider with expertise in digital security, ensuring 5G IoT deployments have data protection and connectivity credentials built in, together with end-to-end data protection solutions such as encryption – protecting data in the device, network, and cloud at rest and in transit. Q: How can wireless modules address new 5G IoT use cases? Wireless modules can be expected to play a bigger role than in previous generations of cellular Jouffrey: As IoT considerations are integrated into the 5G ecosystem, wireless modules can be expected to play a bigger role than in previous generations of cellular. 5G modules support different characteristics to earlier generations – the 5G use cases are much more complex, varied, from high-end use cases requiring high data usage and throughput, such as for industrial routers, to low-throughput, energy consumption optimized devices, as required for some IoT sensors. At the end, compared to the largely one-size-fits-all approach that preceded it, 5G will increase the demand for vertical-tailored wireless modules. Importantly, these wireless modules need to support new data protection and security features that go well beyond conventional compliance to 3rd Generation Partnership Project (3GPP) standards. Due to the extent of personalization within 5G networks, wireless modules must also offer providers and customers greater security as well as agility all along the device lifespan. Q: What are the new data protection challenges posed by 5G, and how can they be addressed? Jouffrey: The 5G era presents exciting opportunities, as well as security challenges. The greatest risks to enterprise data on 5G networks – including eavesdropping, man-in the middle attacks, denial of services, loss or compromisation of data – were already known in 4G. The 5G standards have looked at providing answers to these threats and come with some noticeable improvements, such as the encryption of the international mobile subscriber identity (IMSI), otherwise known as the Subscription Permanent Identifier in 5G. But what’s different with 5G is the threat surface area, due notably to the variety of devices that will be used over these 5G networks and the underlying technologies used for the deployment of the networks, such as cloud native virtualization. On top of this, it’s the first generation of cellular to launch in an era of global cyber-crime, funded by organized crime and states alike. So, whilst enterprises should look to the ecosystem of telecom operators and cloud providers, vendors, and system operators to help understand the opportunities presented by 5G – this same ecosystem needs to guide them in countering any new risks that the 5G architecture may pose. The key to securing 5G enabled devices is to build security into devices from the outset using encryption. The key to securing 5G enabled devices is to build security into devices from the outset Q: What new roles can the 5G embedded universal integrated circuit card (eSIM) endorse in network authentication? Jouffrey: 5G is the first generation of cellular to launch in a buoyant eSIM market. The eSIM will be key in supporting network slicing authentication and security, enabling enterprises to leverage their credentials to pre-select network slices. However, to support secure authentication for mobile networks that may require the usage of different authentication algorithms over time, these 5G eSIMs must support this flexibility of usage of multiple authentication and authorization credentials. With this capability built into these eSIMs from the start, mobile operators can remotely swap the authentication algorithm either for a dedicated primary authentication, or in a definitive way, thanks to key rotation management, thus maintaining a trusted environment.
Even though ISC West 2020 was canceled, many of the product introductions planned for the trade show still happened. For example, physical security and secure identification company Identiv introduced the Hirsch Velocity Cirrus and MobilisID. Hirsch Velocity Cirrus is a cloud-based Access Control as a Service (ACaaS) solution. It is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. Smart mobile physical access control solution Identiv’s MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. We caught up with Jason Spielfogel, Identiv’s Director of Product Management, to discuss the new products and other topics. Q: How is Identiv positioned in the market as a whole? What philosophy drives your product offerings? What vertical markets do you target? Every customer needs every one of these components Spielfogel: Identiv provides a total solution. Our platforms provide access control hardware and software, video surveillance and analytics, door access readers, and ID credentials, both cards and mobile, for a variety of vertical markets: Federal government, state, local and education government agencies (SLED), healthcare, schools, banks/financial services, retail, airports and transportation, and infrastructure. Every customer needs every one of these components in every physical security deployment, and we ensure that all parts are working together at all times, even as technology continues to evolve. With that said, our philosophy is very customer-centric, and we position ourselves as a trusted partner. Our products and technology platform always strive to reflect and anticipate the environment our customers are facing, both in terms of technical requirements and functional capabilities. Q: How does the MobilisID system eliminate "friction?" Spielfogel: Identiv’s MobilisID eliminates the “friction” of access control by forgiving the user from presenting a physical credential to the reader. A simple wave of their hand over the MobilisID reader establishes a connection, and the reader reads their mobile device’s credential from the MobilisID app. No badge or access card to read, and no contact with the reader, makes this a frictionless access control experience. Administrative friction is also eliminated because there is no physical credential to issue or withdraw; it’s all done via the MobilisID Manager. Hirsch Velocity Cirrus is a cloud-based Access Control as a Service (ACaaS) solution Q: Discuss the advantages of Bluetooth over competing technologies. Bluetooth offers a blend of reliability and specificity Spielfogel: There are two primary competing technologies: WiFi and Near Field Communication (NFC). The problem with WiFi is that it’s not location-specific. In other words, the WiFi router can’t tell which door the user is near. NFC has the opposite problem in that it’s impossible to get credential reads unless the phone is presented within an inch or two of the reader. Bluetooth offers a blend of reliability and specificity to create frictionless access. Q: "Touchless" has always been a big selling point. Doesn't the coronavirus improve the outlook for these systems even more? Spielfogel: The coronavirus certainly highlights the value of frictionless access. But the vast majority of access systems today use proximity which was already touchless. But for systems using touchpads or contact-based credentialing, certainly frictionless is offering some alternatives that would help keep employees and visitors safer in the current climate. Q: How else might the current pandemic change the security market forever (i.e., more teleworking?) Spielfogel: Permanent changes are not likely, but it does force security directors to rethink how their employees interact physically with systems for both physical and logical access. As a result, we might see accelerated adoption of some emerging technologies, such as greater use of mobile logical access solutions, as well as frictionless physical access control. We’ve already seen an uptick in our smart card reader and token line and our Thursby enterprise and personal mobility offering during the coronavirus pandemic. Q: There are a lot of cloud systems in the access control space. How is your Cirrus cloud product different? Velocity already has all those features Spielfogel: Cirrus is different from many others in that it’s built on one of the most mature, feature-rich, secure physical access solutions available today – Hirsch hardware and Velocity Software. While many competitors are scrambling to add features to their relatively new ACaaS platforms, Velocity already has all those features. While they are building up their encryption capabilities and cybersecurity testing, we’ve already been doing that for two decades. We certainly have some more development ahead of us for Cirrus, but most of it is just surfacing features we already have into the Cirrus interface. Q: How do you guide customers as their needs change? Spielfogel: Whether users want solutions that are on-prem, in the cloud, or anything in between, Identiv’s full architecture ensures that customers can adopt and migrate to new solutions as they see fit. No two customers are alike, so providing the flexibility to gradually update or change systems is a real differentiator. Our competitors either want customers to jump all at once to the cloud or push to keep everything on-prem/legacy. CSOs and CISOs live in a different world: They've got it all to deal with. We're there with them across all of it, because that's the true reality.
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy" Smart home market on the forefront The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.” “The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.” Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com. Focus on Cybersecurity In 2020, companies will continue to focus on solutions for protecting consumer data" Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates. “Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.” “At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds. Smart access control Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology. Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighborhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighborhood security. Homeguard offers a range of affordable CCTV solutions for home and small business DIY CCTV demonstrations DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits. Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing. AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customized central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities. Security and automation solutions D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access. Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring. Personal safety mobile application Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens" WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features. “Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.” “Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”
Invixium, a global provider of innovative touchless biometric solutions, has been contracted by Fine Hygienic Holding (FHH), one of the provider Wellness Groups and manufacturer of hygienic paper products, to deploy IXM TITAN devices and integrate Invixium’s workforce management solution with FHH’s Oracle HR cloud as part of its corporate digital transformation initiative. Businesses like FHH that have many operating locations require a workforce management solution where data from all facilities is readily available. Invixium’s IXM WEB is a web-based, cloud-ready biometric access control and workforce management software that the TITAN devices installed at FHH’s sites in Jordan, the UAE, Saudi Arabia, and Egypt constantly share data with. This data, including time tracking, is visualized in IXM WEB’s playful interface through interactive dashboards and intuitive reports showing employee data and the overall health of the biometric system. Payroll and employee time management FHH’s existing ORACLE Fusion time management system created a unique challenge for all stakeholders, including Invixium and their partner ElectroSec, from an implementation and support perspective to cover all FHH’s operations across the MENA region. For the TITAN installation to be effective, employee clock-ins (i.e. punches) needed to be immediately exported to ORACLE Fusion, where FHH’s Human Resources could manage payroll and employee time. Invixium’s team of experts worked with FHH and ORACLE to bridge IXM WEB with Fusion, allowing TITAN to seamlessly share data with FHH’s existing human capital cloud. After three consecutive pay periods with 100% time accuracy, Invixium and FHH share that this custom digital transformation implementation was a complete success. Zero human intervention “We had very tight timelines in 2019 to ensure we go live in 2020 for all our Phase 1 Cloud transformation programmes, where the core focus was on Human Resource processes, technology and improvements. Working with Invixium, Oracle, FHH’s technical team, supported by the HR team, we were able to implement a system that is 100% accurate on employee records for Time and Attendance and then integrated it into the Oracle platform. This leaves very little room for fraud and zero human intervention, and provides FHH with a foundation for the future for all HR related systems and processes," said FHH’s CIO Yahyah Pandor. “Invixium is very proud of what we accomplished with Fine Hygienic Holding,” said Shiraz Kapadia, President and CEO of Invixium. “Our products are made to be highly customizable, so we accepted this challenge knowing that TITAN and IXM WEB were the right fit for FHH’s unique needs. IXM WEB especially is designed with the end-user in mind; we want our customers to have the freedom to build their system around their business needs. Our engineers worked tirelessly with FHH and ORACLE to make this digital transformation happen, and the results have been incredibly positive.”
Kingfisher Sec, a West London-based security specialist, has adopted SmartTask to support the rapid growth of the business by streamlining and automating critical business processes. The company will use the cloud-based software to handle employee scheduling, proof of attendance and operational reporting across a team of up to 50 security guards. As a result, Kingfisher Sec has already reduced administration by around 17.5 hours a month, with further improvements expected moving forward. “We wanted an employee scheduling and workforce that would mitigate any growing pains we experience as the business continues to expand as well as helping us achieve our aim of creating a paperless operation,” explains Filipi Nascimento, Operations Manager at Kingfisher Sec. “SmartTask is allowing us to automate many of our manual processes in a phased approach to maximize benefit realization, without losing focus on our core operational priorities.” Electronic communication tool SmartTask was selected following a tender process based on its feature-rich and easy-to-use functionality. Kingfisher Sec is using the software to provide a simple tool to the company’s team of security guards, via a smartphone app, so they can simply book on and off shifts, accept schedules and book holidays. Meanwhile, the advanced rostering system allows Kingfisher Sec to quickly create monthly work plans and communicate them direct to staff for electronic confirmation. Kingfisher Sec is also looking to replace a paper-based DOB system at around 40 customer sites with SmartTask’s Daily Occurrence Log (DOL). The electronic communication tool will enable security guards to quickly create entries and upload details regarding any on-site occurrence, providing online visibility of all incident data and supporting photo evidence. Capturing accurate data The software is capturing accurate data about the performance of our team and the business" As well as reducing the administrative burden, both on-site and centrally, the DOL will also remove the cost of providing, distributing and archiving a paper-based log. “SmartTask is streamlining our business and operational procedures, so we can save both time and money while providing a better service to our customers. The software is capturing accurate data about the performance of our team and the business, which we simply did not have access to previously. This is allowing us to better manage staff, eliminate human error and quickly respond to any issues,” adds Nascimento. Cloud-based software Paul Ridden, CEO of SmartTask commented: “Our cloud-based software is a highly-advanced and easy-to-use guard management, monitoring and reporting solution that typically reduces costs and improves efficiency by 30 per cent. As a result, a growing range of security businesses are using SmartTask to plan, manage, conduct and measure workforce activities more effectively.”
Check Point has introduced CloudGuard Cloud Native Security, a fully-automated cloud platform that enables customers to seamlessly protect all of their cloud deployments and workloads, and manage security through a single pane of glass. CloudGuard streamlines and simplifies cloud security, preventing the most advanced 6th generation cyber-attacks from impacting organizations’ cloud environments, and enables them to take full advantage of the speed and agility of cloud. Rapid migration to the cloud is the biggest cause of breakages in enterprise security architectures, according to the SANS 2020 Cybersecurity Spending Survey, with over half of respondents citing increased use of public clouds as the leading cause of security disruption. The COVID-19 pandemic has magnified this, as companies scramble to support mass remote working. Their current security controls cannot cope with the speed, scale and complexity of cloud deployments, leaving them vulnerable to attacks and breaches. Security across cloud implementations “Cloud security can be challenging; however, the real challenge is multi-cloud, as IDC data continually shows that over 80% of organizations have multiple cloud providers. The goal is one set of policies to rule them all,” said Frank Dickson, Program Vice President, Security & Trust at IDC. “Check Point's multi-cloud security platform looks to unify security across private and public cloud implementations, essentially making cloud security agnostic of the resident software define compute environment.” Check Point CloudGuard addresses these challenges, delivering comprehensive and easy to manage cloud security platform. It gives frictionless deployment and control of the advanced security protections to any cloud environment and workload, and enables security processes to be automated to meet DevOps’ demands for rapid deployment and agility. “Security is continually cited as a barrier to enterprise cloud deployments, because traditional security controls are not agile enough to handle the cloud’s speed and scale,” said Itai Greenberg, VP of Product Management, Check Point. “CloudGuard solves this problem, giving organizations the advanced cloud-native security across their cloud estates, together with holistic visibility and easy, automated management and enforcement of security policies.” CloudGuard’s Unified Cloud Native Security Fully integrated security with advanced threat prevention: Prevents APTs and zero-days from infecting clouds and workloads with unified security, and workload runtime protection, including firewalling, IPS, Application Control, IPsec VPN, Antivirus and Anti-Bot, powered by the industry’s real-time, cloud-based threat intelligence. High-fidelity cloud security posture management: CloudGuard gives unified, at-a-glance visibility across organizations’ multi-cloud environments, enabling continuous analysis and control of their cloud security posture from CI/CD to production environments. Automated security for any workload in any cloud: CloudGuard delivers true cloud-agnostic security, enabling organizations to automatically secure any workload, anywhere with auto-provisioning, auto-scaling and automated policy updates. It enables holistic, single-console security management as well as run time protection for serverless and container-based applications, in multi-cloud environments. Supporting Partner and customer quotes: “Check Point CloudGuard has been a saving grace for Gas South. It is the only solution that gives us secure, stable, complete access to our critical applications and services in Azure,” said Rajiv Thomas, Senior Systems Engineer, Gas South. “When deploying a multi-cloud environment, you need to have a consistent tool that plays across all the platforms,” said Sreeni Kancharla, VP & Chief Information Security Officer, Cadence. “Using the cloud-agnostic CloudGuard service, I only need to train an individual on one set of tools and he can manage our total cloud environment very effectively.” Ann Johnson, Corporate Vice President, Cybersecurity Solutions Group at Microsoft Corp. said, “Where people often thought about security as a solution to deploy on top of existing infrastructure, events like COVID-19 showcase the critical need for truly integrated cloud security for organizations of all sizes. Solutions like CloudGuard running on Microsoft Azure help to empower our customers through a unified platform which has become a business imperative as more organizations embrace cloud-based protections.”
The world is constantly changing, with people, data and goods moving more fluidly than ever before. The security solution needs to move with it. New Incedo Business connects all security software and hardware within one platform. One can easily scale it up or down, based on one’s needs, to keep people moving and business growing. Together. People need different access times and entry points, and the access and security requirements change day to day – so, a static solution is no longer an option. Instead, a single, all-encompassing security platform should deliver connectivity, convenience and simplicity, keeping one’s premises secure and filtering access to manage the ever-changing movement of people. This is where Incedo Business comes in: a new solution for all types of premises, handling security while leaving one free to focus on growing the business. Incedo ensures employees, customers and goods are where they need to be. Incedo makes life and tasks easier and more efficient for everyone, from installers to end users. Facility managers enjoy more control and flexibility than they ever thought possible, maximizing return on investment, with Incedo Business able to scale quickly when needed. System administrators can do more within available budgets: initiating, cancelling or amending access profiles, and monitoring movement around their site in real time. Building users, meanwhile, get the individual access times and entry permissions they need. They can move freely without compromising the security of other people and equipment. Integrators can upgrade connected technologies and systems quickly, minimizing risk and meeting customers’ raised expectations of modern technology. Installers no longer need to wrestle with incompatible systems: easy interoperability is built into Incedo, meaning no more delays or unnecessary complexity. With Incedo’s modular platform approach, one simply chooses the security hardware and credentials one needs and the appropriate management system option. One can set exactly who can access which doors, and when, from the user-friendly Incedo Business software interface. When Incedo Business launches, one can pick the most suitable options from a growing range of Incedo-enabled security and access control hardware. Road-tested, award-winning ASSA ABLOY wireless digital locks and wired ASSA ABLOY wall readers secure all interior and exterior doors. Also already available, a choice of card and token credentials helps users enjoy safe and convenient access to, and movement around, the premises. Incedo mobile keys add the flexibility to open doors with a smartphone. Incedo’s system management options, Lite, Plus and Cloud, scale from entry level up to cloud-based administration. One can manage multiple sites and third-party integrations, including security solutions like CCTV. Scale up and down, add or remove hardware and credentials on demand, or switch system management options, all within a single environment. Migration between Lite, Plus and Cloud options is always seamless in any direction, ensuring total flexibility for the business. Incedo moves with you, today and in the future However your business moves, an Incedo system moves along. Having a flexible platform, able to adapt as the organization changes, reduces total cost of ownership: one never needs to retrain staff or start over from scratch. New Incedo-enabled hardware from ASSA ABLOY and third-party providers will continue to be connected to, and made available within, the evolving Incedo platform. One picks the hardware and software configuration one wants, and can change one’s mind as often as one likes. Incedo guarantees flexibility and scalability in every way, to meet the security needs today and in the future. And because the security and operational challenges at a university, small hotel or hospital are not the same as those faced by a public building or corporate HQ, the Incedo ecosystem will introduce new, advanced user interfaces for the specific industry. “Incedo Business transforms the experience of using and managing a building. It is also the seed from which our revolutionary Incedo ecosystem will grow in the months and years ahead,” says Stephanie Ordan, VP Digital and Access Solutions at ASSA ABLOY Opening Solutions EMEA. “A future where doors are smarter, connectivity and movement are seamless, and access management is genuinely intelligent. This is our vision for Incedo and for those who will be using it.” Incedo™ Business embodies ASSA ABLOY’s vision to create a safer and more open world, keeping everyone on the move. Together. To learn more and download a free solution guide, visit https://campaigns.assaabloyopeningsolutions.eu/Incedo-business
The Office for Students (OfS) is the independent regulator of higher education in England, responsible for ensuring that all undergraduate and postgraduate students, whatever their backgrounds, have a fulfilling experience of higher education which enriches their lives and careers and delivers value for money. They are headquartered in Bristol, United Kingdom with a workforce of around 450 people. GDPR Data Privacy Management Higher Education Funding Council for England (HEFCE), Office for Students’ predecessor, became a client of SureCloud back in 2017, implementing the GDPR Data Privacy Management Suite to support and enhance their GDPR program. As a new organization and a successor of HEFCE, Office for Students has been looking to mature its approach to risk management. The focus of this for the team was initially to improve risk policies and procedures, to develop internal capability, enhance reporting to show transparency and allow challenge, and to identify and manage risks enterprise-wide systematically. Effective Risk Management approach Office for Students needed a single, seamless, enterprise-wide solution to manage all aspects of risk management These improvements established a highly effective risk management approach, but the organization soon hit the ceiling in terms of their process supporting risk systems, with technology being a limiting factor rather than an enabler. The organization was relying on numerous disparate spreadsheets to assess and monitor different types of risk, these were inconsistent, time-consuming and error-prone. Office for Students needed a single, seamless, enterprise-wide solution to manage and monitor all aspects of risk management. Data privacy Risk Management solution Office for Students has been a SureCloud client for cybersecurity services since March 2017 and began deploying SureCloud’s governance, risk and compliance (GRC) solution in July 2017 to assist with their responsibilities under GDPR. Knowing that SureCloud also offered a comprehensive risk management solution (recognized on Gartner’s IRM Magic Quadrant), which could be tailored to their precise needs, Office for Students opened a conversation with SureCloud about how best to configure their existing SureCloud Data Privacy Risk Management solution to enable enterprise risk management. SureCloud’s Risk Management solution delivers: A central view of risk across the organization via a single intuitive dashboard Risks organized across divisions, legal entities, business functions, and geographies The ability to provide a central repository for enterprise risk, allow the organization to show the entirety of the risk environment and consider overlaps and interdependences A range of risk management methodologies to understand the likelihood, impact and overall risk rating Configurable drillable dashboards and reports to provide a real-time snapshot of risk at any time Centralized, cloud-based platform SureCloud’s centralized, cloud-based platform underpins the Risk Management product SureCloud’s centralized, cloud-based platform underpins the Risk Management product, allowing anyone from across an organization deploying the application to add information at any time, from anywhere. Office for Students worked with SureCloud to configure the Risk Management application to their precise needs and was ready for rollout ahead of schedule. Rapid implementation services “SureCloud got to grips with our requirements incredibly quickly,” said Ben Whitestone, Head of Governance at the Office for Students, adding “As the only independent regulator for higher education in England, we regulate in the interests of hundreds of thousands of students, and we take that responsibility very seriously.” Ben adds, “Managing the risks we face is an important part of our governance. But with our legacy systems, we were focused more on updating spreadsheets than actually managing risk. SureCloud’s platform is enabling us to take a far more agile approach to risk management, focusing on taking action to mitigate threats and exploit opportunities, with substantial time and cost savings as a result.” Streamlined, centralized Risk Management “SureCloud’s Platform has moved us away from using a series of disparate spreadsheets and countless emails for recording risk, with all of the potentials for errors that entails, to a single, centralized source of risk information for every member of staff,” said Whitestone. He further adds, “It’s dynamic and agile, if we want to get a snapshot of risk for a particular department or function, we can.” Intuitive, user-friendly platform We are very pleased with how quickly staff can get to grips with the SureCloud Platform" “Despite us being at the start of our risk management journey, we are very pleased with how quickly staff can get to grips with the SureCloud Platform, this was a key factor for us” commented Whitestone. Whitestone adds, “They can more or less log on and go – it’s extremely intuitive and easy-to-use. In turn, this means that it frees up a huge amount of time spent manually inputting or transferring information, which is a great advantage for us.” Systems and culture working in-sync “We undertook a great deal of work to evolve our culture of risk management, to one that was far more consistent and proactive.” stated Whitestone He adds, “With SureCloud’s Risk Management solution in place, we have the systems to underpin that culture, and enable us to take a far more streamlined, agile and accurate approach to help manage risk across the organization.”
Rishikul Vidyapeeth is a reputed residential school built across 43 acres of land located in Sonepat, Haryana with separate hostels facilities. It is one of the best CBSE boarding schools in Delhi/NCR with international faculty and tie-ups. Rishikul Vidyapeeth is an eco-friendly residential school, housed in well-defined infrastructure rich with architectural extras including well-furnished and well-ventilated modern buildings, smart classrooms and sophisticated labs to suffice the needs of 21st-century learners and educators. The school is big on quality teaching and on helping the students to reach their full potential. Managing attendance data Rishikul Vidyapeeth has its presence in three places - Sonepat, Jagos Bhaghpat and Alipur. Managing the attendance data of various locations from a central place was a major challenge for the organization. The system they used was inefficient to address their challenges. The officials were looking for a comprehensive time-attendance solution for efficiently tracking the movement of its staff situated at different locations from a central place. Moreover, they required an effective solution that would notify on exceptions - missing in/out punch, attendance summary, etc. Fingerprint-based time-attendance solution Matrix has installed a total of 10 fingerprint-based time-attendance terminals at three different locations After a comprehensive discussion with their team, Matrix has proposed a comprehensive time-attendance solution for managing their attendance and tracking their staff movement from a centralized location. Matrix has installed a total of 10 fingerprint-based time-attendance terminals at three different locations. These devices are connected via LAN with the COSEC CENTRA server installed at Rishikul Vidyapeeth, Sonepat. COSEC CENTRA server integrated with SMS web server Moreover, with the help of the solution, they could generate customized reports in different file formats. Matrix has integrated COSEC CENTRA server with an SMS web server for instant notification on exceptions. With that, the users were instantly updated on occurrences of such events. Results include: Efficient time-attendance management Improved accuracy in attendance calculation with SMS notification Proper user database management Centralized monitoring and control Increased productivity Customized reports as and when required Products and solutions offered: COSEC DOOR FOT - Optical fingerprint and card-based time-attendance terminal COSEC LE PLATFORM - COSEC software platform for up to 1000 users COSEC LE TAM - Time-attendance and leave management module for COSEC software platform
Round table discussion
The first half of 2020 has been full of surprises, to say the least, and many of them directly impacted the physical security market. The COVID-19 pandemic created endless new challenges, and the physical security market has done our part to meet those challenges by adapting technology solutions such as thermal cameras and access control systems. In the second half of 2020, we can all hope for a return to normalcy, even if it is a “new normal.” In any case, technology will continue to play a big role. We asked this week’s Expert Panel Roundtable: Which technologies have the greatest potential to disrupt the security industry in the second half of 2020?
Cloud systems are among the fastest-growing segments of the physical security industry. The fortunes of integrators can improve when they embrace a recurring monthly revenue (RMR) model, and cloud systems are expanding the services and features manufacturers can provide, from remote diagnostics to simplified system design. But for all the success of cloud systems, there remains confusion in the market about the exact definition of “cloud.” Or does there? We asked this week’s Expert Panel Roundtable: What is “the cloud?” Is there agreement in the market about what the term means?
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload