ExtraHop, the provider of cloud-native network detection and response, announces a suite of new features designed to streamline the secure adoption and implementation of IoT in the enterprise. ExtraHop® Reveal(x)™ now provides advanced discovery, classification, and behavior profiling for enterprise IoT devices, providing visibility from the device to the service layer. These latest enhancements extend Reveal(x) capabilities to the enterprise IoT device edge, providing complete visibi...
Ping Identity, a pioneer in intelligent identity solutions, announced its partnership with e92cloud. The partnership is a key distribution agreement for Ping Identity in Europe and allows for broader reach in the lower enterprise market following the Ping Intelligent IdentityTM platform’s expansion of cloud-based identity security solutions. According to a recent Grand View Research report, the global identity and access management (IAM) market size is expected to reach USD 24.12 billion...
Pulse Secure, the renowned provider of software-defined Secure Access solutions, announced a successful project with Interdata, as the first Pulse Secure Elite partner to launch a pay-as-you-grow, managed secure access service within France. The Interdata EasyConnect service is aimed at enterprise customers and utilizes initially Pulse Connect Secure, the industry known TLS and cellphone VPN platform, then Pulse Policy Secure next-generation NAC solution, and Pulse SDP (Software Defined Perimet...
EZVIZ Inc., the global smart home security brand, is sharing the news that it launches the Full HD Wi-Fi Outdoor Turret wall-mounted camera in the UK. With full HD 1080p resolution video, the camera delivers crystal clear monitoring all day and super night vision so that images still remain visible in full clarity no matter the time of day. The Outdoor Turret Camera also uses active defense including a strobe light, customized voice alerts and 100db alarm for full peace of mind when away from t...
PSA, the internationally renowned security and systems integrator consortium, and the Security Industry Association (SIA), global trade association for global security solution providers, has announced CyberTEC powered by SIA, an exclusive cyber security track for PSA TEC 2020. CyberTEC will feature sessions on cyber-attack risk mitigation, cyber security managed services, cyber hygiene compliance and more. PSA TEC 2020 PSA also announced TEC 2020 keynote speaker Alec Ross, a New York Times be...
Technology company Ocucon has developed a lighter version of their VSaaS product, Cloud by Ocucon, allowing retailers to now benefit from innovative cloud technology for a select number of cameras. Cirrus Cloud by Ocucon is a lightweight, highly flexible version of Cloud by Ocucon. It will have all the features of its bigger brother but, in response to retailer demand, it has been optimized to work in a modular fashion for up to eight cameras per store. In-store surveillance and storage Resear...
Nukleas Ltd. is slated to exhibit the Nukleas Integrated Security Solutions (NISS) consortium, a one stop UK security industry solution for command and control/surveillance requirements, at Security and Policing 2020 security event, taking place in the Farnborough International Exhibition and Conference Center from 3 - 5 March, 2020 on stand E49. Nukleas solutions The NISS consortium combines British industry excellence to provide complementary solutions for a coordinated approach on all types of security projects. This single integrated solution combines, command and control systems, robust camera surveillance solutions, secure wireless transmission and networking, integrated communication hubs, incident management, perimeter protection, intrusion detection, mobile devices, live streaming of images, video analytics (including globally renowned facial recognition) and multiple other security and safety solutions, which are scalable and tailored to each unique project requirement. NISS consortium combines British industry excellence to provide integrated solutions for a coordinated approach Richard Freeman, Director of Nukleas Limited said, “We are looking forward to exhibiting at Security and Policing and welcome UK and international visitors to stand E49, next to the UK Government zone, at the center of the event. Together, the NISS consortium has a track record of well over 140 years of providing UK manufactured products, software and services for complex site security designs and budget cycles. NISS can offer turnkey solutions with innovative and cost-effective solutions, supported by world leading training and we are actively seeking to build joint venture partnerships”. Critical national infrastructure protection The UK’s critical national infrastructure protection and emergency services are considered amongst the best in the world and this reputation has been built by working in partnership with the UK security industry and includes the deployment of Nukleas solutions. NISS experience and expertise ensures the safety and security of people and infrastructure across the globe, providing assurance through UK standards including those set by the Center for the Protection of National Infrastructure (CPNI). The consortium concept is also advocated by the UK Government’s Department for International Trade’s Security Export Strategy and can be supported by UK export finance.
Thales announced that its Cloud Hardware Security Modules (HSM) and Key Management solutions have been chosen by Fujitsu, a popular Japanese information and communication technology (ICT) company, offering a full range of technology products, solutions, and services, to support its new managed PKI security and enterprise data encryption offerings available across Europe. Fujitsu has integrated Thales’s Cloud HSM service, Data Protection On Demand, with its managed Microsoft Certificate Authority (CA) service to provide a highly secure and convenient end-to-end service for enterprise Public Key Infrastructure (PKI). In addition, Fujitsu has integrated Thales’s Key Management platform with its new enterprise data encryption service to offer secure lifecycle management of customers’ cryptographic keys. Cloud-based key management service Driven by a need from its customers to increase the security level of their PKI infrastructure and remain compliant with regulations, Fujitsu is leveraging Thales’s Cloud HSM service, Data Protection On Demand, within its core security infrastructure to deliver a secure cloud-based key management service and HSM as-a-service offering. Fujitsu recognized that the Thales Cloud HSM service provides an easy, cost-effective way to offer companies access to Microsoft CA-based PKI technology with secure key management for broad range of use cases. “We’re always looking to ensure our customers have access to the very best security solutions on the market and this partnership with Thales offers exactly that,” said Petri Heinälä, Security Offering Architect at Fujitsu. Enterprise Data Encryption Fujitsu has also extended its relationship with Thales by launching an enterprise data encryption offering “One of our customers, a popular European pharmaceutical company, is already benefitting from our adoption of Data Protection On Demand. The client needed to shore up their key management practices, with increased healthcare regulations related to data protection, data privacy and audit controls. We worked with Thales closely across several options to find the solution that fit best for them. Data Protection On Demand delivers that enhanced security and compliance many of our customers need, in the convenient and cost-effective way they want.” Fujitsu has also extended its relationship with Thales by launching an enterprise data encryption offering that leverages Thales’s key management platform. Effective and compliant data protection is provided by implementing a strong method of encryption as well as securing the data with a Key Management System capable of protecting cryptographic keys throughout their operational lifecycle. The new service is part of Fujitsu’s Data Protection portfolio and will be available to customers to secure data across on-premises, hybrid and multi-cloud environments. Data Protection On Demand service “Data protection is a clear priority for many businesses as they fight to prevent breaches and comply with increasing regulatory requirements. Protecting core assets such as identities and data using encryption and PKI management should now be the minimum security posture for every organization”, said Todd Moore, Vice President for Encryption solutions at Thales. “It’s vital that managed services providers are able to respond to the changes quickly, efficiently and affordably, while meeting the security requirements head on. We’re delighted to be working side by side with a global IT player in Fujitsu to ensure their customers have access to the solutions they need through our Data Protection On Demand service, whenever and wherever they need.”
The average cost of a malware and web-based attack on a business is US$ 1.4 million (Accenture study), yet even with destructive malware attacks up 200% in 2019, thousands of business websites remain vulnerable to attacks. Sectigo, globally renowned commercial Certificate Authority (CA), is taking a giant step to help businesses protect themselves from new and emerging web-based threats with the introduction of Sectigo Web Security Platform. Sectigo Web Security Platform With this release, Sectigo is the first CA to introduce an all-in-one; cloud-based solution bundled with TLS/SSL certificates so that customers can easily identify threats and quickly patch vulnerabilities for their CMS from an all-new comprehensive management portal. Through the platform, customers can automate daily scanning for vulnerabilities, receive proactive notifications, and instantly remove the malware found within the code, database, or files on the web server. In addition, the platform automates daily website backups so that customers can restore their sites when needed with a single click. Coming in future releases are advanced features to accelerate website performance with a global Content Delivery Network (CDN) and Domain Name System (DNS), and to increase protection with a Web Application Firewall (WAF). Cloud security Research points to security as the number one area of concern for companies working to optimize their cloud presence" "Our research consistently points to security as the number one area of concern for companies working to optimize their cloud presence," said Fernando Montenegro, Principal Analyst at 451 Research. He adds, "Expanding security coverage, leveraging automation, and consolidating web security functionality into fewer vendors are strategies that many organizations, particularly those with significant resource constraints, may benefit from exploring. Sectigo's move into offering additional services beyond traditional certificate services fits well into this narrative." Enhanced capabilities for SSL customers The new Sectigo Web Security Platform brings new capabilities to SSL customers, reflecting the increasing requirement for companies to move beyond basic encryption to ensure complete website security. Sectigo has enabled customers to easily select the functionality they need from product bundles available through Sectigo retail sites, hosting partners, and other resellers. The new product bundles include: Sectigo Web Monitor – Available with all SectigoSSL, PositiveSSL, and InstantSSL certificates, includes: Sectigo Web Detect – Automatically scans up to five website pages once daily for critical security issues such as malicious infections, spam listings, vulnerabilities, blacklisting, and more. Malware Detection – Stops search engines from blacklisting a website by proactively sending alerts about security issues before crawlers detect them. Vulnerability Detection – Monitors a website daily for security vulnerabilities found n the following Content Management Systems (CMS): WordPress, Joomla!, Drupal, WooCommerce, PrestaShop, and Magento. SPAM and Blacklist Monitoring – Scans a website’s IP address and domain name daily against multiple spam databases and delivers alerts about potential email blacklisting. Sectigo Web Remediate – Available with the all-new SectigoSSL Pro certificates, includes: Enhanced Sectigo Web Detect – Increases scanning for up to 500 website pages and databases. Sectigo Web Clean – Safeguards a website against cybercriminals and other online security threats, automatically removing active infections from website files and any MySQL database without disrupting site functionality. Sectigo Web Patch – Scans daily to automatically detect critical weaknesses found in the company’s content management system (CMS) or database and proactively patches these vulnerabilities before cybercriminals can exploit them. Security patches are automatically deployed when new CMS versions are released for 7 of the most popular WordPress plugins, enabling website owners to complete full-version updates within their designated timelines. Plugins include: tact Form 7, Yoast SEO, Jetpack, All-in-one SEO Pack, TinyMCE, Google XML Sitemaps, WordPress Importer, and Easy WP SMTP. Sectigo Web Patch also protects a company’s most valuable online assets from cybercriminals by automatically patching security vulnerabilities found in leading ecommerce platforms, including WooCommerce, Magento, and PrestaShop. Sectigo Web Backup and Restore – Reverses damage caused to a website through a one-click restore option. Utilizing sophisticated version control software, Web Backup and Restore provides incremental agent-less backups and empowers users to oversee their network of websites—with any mix of CMSs—all in one place. "Website owners and organizations of all sizes must look beyond an SSL certificate to protect against new and emerging threats. With this launch, our certificates provide more value to customers and give the world a new way to think about Certificate Authorities and the security offerings provided to our channel partners and collective customers," said Michael Fowler, President of Channel Partners, Sectigo. Easy-to-use single API “Sectigo’s new Web Security Platform also offers opportunities for our partners around the world to differentiate themselves from competitors, while increasing revenue and maintaining customer retention by offering multiple solutions via an easy-to-use, single API,” added Mr. Fowler.
SALTO Systems, a manufacturer of electronic access control solutions, will showcase the latest in technologically-advanced electronic locks and access control management – including a new line of residential smart lock solutions–at ISC West this March in Las Vegas. “SALTO is always excited to share the latest electronic access control innovations with our peers in the security industry at ISC West. We have some great products to highlight this year including residential smart lock solutions that meet the growing demand in that market segment,” said Michael J. Mahon, SALTO Systems Senior Vice President Commercial Sales. “We hope those needing secure, reliable, and easy-to-install and use electronic access control will stop by Booth 25071 at this year’s show to see our solutions.” Access control management software ISC West is the largest converged security industry trade show in the United States, hosting more than 30,000 global security product manufacturers and professionals. This year, ISC West will be held at the Sands Expo Center, March 17-20. Highlights at SALTO Systems Booth 25071 will include: ProAccess SPACE 6.0 – The latest version of SALTO ProAccess SPACE 6.0 access control management software allows systems administrators to utilize the latest SALTO SPACE features and security enhancements on SALTO BLUEnet smart locks. Other new features include time tracking of employee hours, capacity management, and more user-friendly event monitoring. SALTO KS – The latest version of SALTO KS Keys as a Service cloud-based access control management software includes cellphone check-in capability and PIN entry mode. Secure real-time management SALTO NEO Cylinder – The SALTO NEO Cylinder is an electronic lock that offers more features and better functionality than any other cylinder on the market. The re-engineered clutch system design makes efficient use of energy, dropping consumption to impressively low levels resulting in 110,000 cycles with just one set of batteries. It’s compatible with SALTO SVN, SALTO BLUEnet Wireless, and SALTO KS Keys as a Service cloud-based technology. The NEO can be switched to any of SALTO’s technology platforms at any time without changing the hardware. SALTO BLUEnet Wireless - It offers easy and secure real-time management that is networked through Bluetooth RF and is especially designed for doors where real-time control is required. BLUEnet can be installed as an independent system or can complement SALTO Virtual Network (SVN-Flex). One gateway can communicate with 7 nodes. Each node can operate up to 16 doors with a maximum distance of 15 feet between the lock and the node (with just one IP address). SALTO BLUnet Wireless has three peripherals for wireless connection: gateway, node, and repeater. This provides greater flexibility to a project without the need for cables. Electronic access control XS4 MINI – The XS4 Mini escutcheon is easy-to-install on new or retrofit doors which makes it simple for security professionals to upgrade and replace mechanical key-operated locks with the latest in electronic access control. With SVN-Flex (based on SALTO’s BLUEnet wireless technology), you can extend and increase the number of updating points directly to the battery-operated door. This results in an exponential increase in security, control, effectiveness, and convenience for users and system managers as the communication between devices flow in real-time on wireless online access points and much faster on offline points. The XS4 MINI is now available for SALTO SPACE on-premises smart technology and with the SALTO KS Keys as a Service cloud technology platform. SALTO NCoder – The new NCoder has a new modern black design that follows SALTO’s line of stylish products. The SALTO NCoder integrates encoding capabilities of a powerful updated design with a built-in desktop reader function and is compatible with BLE cellphone keys. The new NCoder 3G device has been added to the SVN platform and provides increased security for keys and access. Additionally, the NCoder records information from the Portable Programming Device (PPD) in the NCoder itself.
GlobalPlatform has hailed its 20th year as a strategic milestone in its mission to create collaborative and open ecosystems in which stakeholders can efficiently deliver innovative digital services, while providing greater security, privacy, simplicity and convenience for users. Kevin Gillick, Executive Director of GlobalPlatform, comments: “Twenty years ago, we set out to create an environment for experts to develop the foundations for innovative digital services and devices. Billions of GlobalPlatform-compliant Secure Elements and Trusted Execution Environments are deployed around the world, protecting devices, data and services for identity, payments, telecoms, and transportation and we are now extending this experience with a comprehensive approach to IoT device security. It is fitting that our anniversary year should be pivotal for the organization and wider industry.” Addressing the needs of the IoT ecosystem The organization also appointed a Strategic Director to accelerate the association’s work on IoT security Building on GlobalPlatform’s previous work to secure the internet of things (IoT), the organization launched IoTopia in October 2019. It proposes a common framework for standardizing the design, certification, deployment and management of IoT devices. IoTopia device security will be testable and meet vertical and geographical market requirements by building upon four foundational pillars: Security by Design; Device Intent; Autonomous, Scalable, Secure Device Onboarding (SDO); and Device Lifecycle Management. The organization also appointed a Strategic Director to accelerate the association’s work on IoT security. Chris Steck, Head of Standardization, IoT & Industries at Cisco, is providing strategic guidance to the Board of Directors on GlobalPlatform’s IoT initiatives, the security requirements of cloud and edge devices and the use of GlobalPlatform technologies to bring trust to the IoT ecosystem. Security Evaluation Standard for IoT Platforms The GlobalPlatform Board has also been monitoring the rapid growth of the secure microcontroller unit (MCU) market. With IoT device manufacturers looking for ever greater security and a range of secure component choices, GlobalPlatform has taken the decision to begin standardization work to support the integration of greater security within IoT MCUs. GlobalPlatform will also support the IoT device security certification ecosystem with the adoption of the Security Evaluation Standard for IoT Platforms (SESIP) methodology. The objective is to build consistency across IoT certification schemes (regional or vertical) to facilitate product evaluation and certificate recognition. The organization will share further updates on these activities later this year. 2020 Board of Directors GlobalPlatform has announced its Board of Directors for fiscal year 2020. Five seats were open and after member voting, the following candidates have each been re-elected to serve a two-year term on the GlobalPlatform Board: Rob Coombs – Arm Stéphanie El Rhomri – FIME Rémi de Fouchier – Gemalto, a Thales company Sebastian Hans – Oracle Olivier Van Nieuwenhuyze – STMicroelectronics Secure, scalable and interoperable way Nils Gerhardt of G+D Mobile Security will continue as Chairman of the Board. Rob Coombs retains his position as Vice Chairman and Stéphanie El Rhomri will continue in her role as Treasurer and Secretary. “Through the expertise and collaboration of our members, board and strategic director, our work will enable the IoT ecosystem to evolve with trust and security at its core and assure that users can manage risk in-line with their needs” adds Kevin. “Our successes wouldn’t be possible without the commitment, vision and expertise of our membership. For 20 years we have solved technical and business challenges to ensure technologies deliver value in a secure, scalable and interoperable way.”
ExtraHop, a pioneer in cloud-native network detection and response, announces new products and services designed to help midsize enterprises address security maturity, reduce tool complexity, and increase efficiency to better protect their organizations. The new ExtraHop® Spotlight™ service leverages the deep domain expertise of the ExtraHop security analysts and combines it with rich insights derived across customer environments to provide targeted threat investigation guidance for lean security and IT operations teams. The new ExtraHop Reveal(x)™ 5Gbps subscription package provides cost-effective network detection and response (NDR) that delivers complete visibility, detection, and response capabilities for midsize enterprises. Sophisticated security threats ExtraHop customers can now augment their teams with the deep security domain expertise of ExtraHop analysts Midsize organizations face the same sophisticated security threats – from ransomware to insider threats – as large enterprises, but often lack the resources and security domain expertise to combat these threats at scale. With the latest offerings, ExtraHop is helping these organizations mature their security operations, keeping them focused on critical threats while aligning IT operations and security operations teams around common datasets and workflows. According to the 2019 SANS Incident Response Survey, the top two impediments to successful incident response were ‘shortage of staffing and skills’ and ‘lack of budget for tools and technology.’ With Spotlight, ExtraHop customers can now augment their teams with the deep security domain expertise of ExtraHop analysts, providing targeted education and investigation guidance for specific Reveal(x) detections, helping them maximize the value of their investment. Adding another layer of intelligence The Spotlight service also adds another layer of intelligence by leveraging visibility into the most common threats across customer environments to speed detection and scale response for multiple organizations. Midsize enterprises are subject to the same malicious activity as larger organizations" When combined with the cloud-scale machine learning of Reveal(x), this collective insight across customer environments helps customers save time and resources by surfacing only the most pressing threats. "Midsize enterprises are subject to the same malicious activity as larger organizations, but often lack the resources that help large enterprises maintain an upper hand," said Sri Sundaralingam, VP of Product and Solutions Marketing at ExtraHop. Cloud-Native network detection “Competition for scarce security talent is fierce, and budget constraints often slow tool modernization, leaving existing IT and security teams under-resourced. This new offering enables medium-sized enterprises who want to scale their business with a cloud-native network detection and response solution to efficiently cover a wide breadth of use cases.” "For 40 years, our mission has been to provide our customers with innovative solutions that reduce costs, increase productivity, and mitigate risk," said Chris Pyle, CEO at Champion Solutions Group. "As security threats become more and more sophisticated, we are seeing businesses of all sizes looking for solutions to address these security concerns. ExtraHop's expansion into the midsize enterprise will allow us to bring Reveal(x) to a whole new market." Midsize enterprise security solution The new midsize enterprise security solution will open new doors for us to expand our offerings" "At Exclusive Networks, we choose to partner with companies like ExtraHop that provide best-of-breed solutions such as Reveal(x)," said Gilbert de Rijke, New Business Director at Exclusive Networks Netherlands. "We share a joint purpose with ExtraHop to bring industry-leading network detection and response to enterprises of various sizes around the globe and the new midsize enterprise security solution will open new doors for us to expand our offerings.” Enterprise-Grade threat detection "The new ExtraHop Reveal(x) subscription offering is a perfect fit for the APAC midsize enterprise market," said Dan Suto, General Manager of Managed Services at DXC Connect. "This enterprise-grade threat detection and response with complete visibility represents a huge opportunity for our go-to-market strategy with ExtraHop and our managed services clients." The ExtraHop Reveal(x) 4200 (5Gbps solution) will be available globally in March 2020. ExtraHop Spotlight service is now available in North America and will be available for specific global regions in the second half of 2020.
How can security system integrators not just survive but thrive in today’s IT-led market? The key seems to be in training. As increasingly more clients look to integrate access control with IT environments, they want integrators with the specialist skills to achieve this. For integrators that don’t invest in training, the risk is being left behind. Because many security system integrators aren’t providing specialist IT support, manufacturers are now offering services to make implementations and integrations easier. This isn’t a scalable or desirable option for many manufacturers though, they don’t want to become integrators. The result? Manufacturers will be pushed into developing products that can be integrated with IT networks off the shelf. And this isn’t necessarily the best option for end user, manufacturer or integrator. With a growing number of cloud-based security solutions, integrators also face the threat of clients opting for installation-only services. How security system integrators can survive and thrive today It’s not all doom and gloom for security system integrators though. To avoid becoming redundant, or being downgraded to simple access control installers, there’s lots you can do to strengthen your position. Listen carefully Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience One of the first ways you can distinguish yourself from your competitors is by really listening to what your clients want and need. You can then translate this into a security or access control application tailored carefully to them. Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience and product knowledge. It’s far superior to carrying out a standard implementation, which can leave clients feeling they’ve not been listened to or given good value. Up your IT knowledge TCP/IP has become the standard for communication between devices and central server applications in access control and security in general. So every technician now needs to know how to connect IP devices to networks and configure them in the central application. This is only the tip of the iceberg though, there’s so much more that integrators now need to be proficient in when it comes to IT. From understanding a client’s WAN, LAN and VPN networks to back-up systems, encryption technologies, key management and transparent communication. It’s also important to know how to integrate applications at server level, whether you’re integrating two or more security systems or a HR database. Most integrators have begun to invest in one or two IT experts, but this usually isn’t enough to meet clients’ needs. To really stay ahead, it’s crucial to invest more heavily in IT training and expertise. Choose your portfolio carefully When considering your portfolio, ensure you check the background of each product’s manufacturer Ideally, your portfolio should be small but rich, which is more difficult than it sounds. Choosing products that will scale easily is complex, and you need to consider the potential for increased functionality or connectivity as well as scalability. When considering your portfolio, make sure you check the background and outlook of each product’s manufacturer. You don’t want to select items that are likely to be discontinued in the near future, which can often happen after a manufacturer is acquired, for example. Get in the cloud In the security market, the mid and low segments are already shifting to cloud-based solutions that need neither integration nor IT skills. This leaves you with opportunities for just installation and maintenance services, where profit opportunities are reduced. An alternative is to begin selling cloud-based security services yourself to help you attract and retain clients for the long-term. Give clients added commercial value As competition increases and budgets shrink, offering added value, to new and existing clients, is a vital way to differentiate your business. This will help you to not just defend against competitors but to grow your business and increase your profitability. Configuring access control reports for clients is just one example. It’s relatively straightforward to do but provides really valuable insight into visitor flow. This can then enable them to, for example, staff reception adequately and provide sufficient catering, which all improves the experience for visitors and employees. Providing this kind of consultative service, instantly pushes you up the value chain. Stay agile and well informed To survive and grow as a security system integrator today, the upshot is that it’s crucial to keep pace with the market’s ever-changing trends, technology and client needs. And, to make sure you’re ready to adapt and give clients the services they want, it’s vital to give your people the in-depth training they need.
It seems that only a few days pass between cyber security stories of concern to the public such as personal data leaks and DIY home camera hacks. With this in mind and the need for increased connectivity, the industry is in need for guidance in cyber security. 2020 is set to be a year of change for the physical security industry. Here are the top four predictions to stay head of market trends in the year ahead. 1. There will be more clarity for installers about industry-standard for cyber security The professional security industry will next year see the launch of a new set of cybersecurity guidelines Through the work being conducted by the BSIA Cyber Security Product Assurance Group (CySPAG), the professional security industry will next year see the launch of a new set of cybersecurity guidelines. This will provide the industry with the guidance and clarity that is currently missing. A key area of clarification is the chain of responsibility. It is not just the responsibility of the manufacturer to keep everything secure from a cyber-perspective. The whole supply chain is responsible - once a product leaves the lab where they’re manufactured, conditions change. Those who maintain, install and operate the product have a shared responsibility to ensure that a product or system remains cyber secure. As the sector develops and more cyber-enabled products become available to the market, this cyber security approach will become more important, and a key differentiator to the DIY market, which can only be a good thing. 2. Cloud and 4G connectivity are giving end-customers better physical security The percentage of panels connected to cloud services is now increasing every year Manufactures have been producing cloud-ready products for several years. Initially, not all installers had been taking advantage of benefits of cloud-connected panels, however the percentage of panels connected to cloud services is now increasing every year. Trust and education have improved, meaning that installers and end-users have realised that connectivity is positive, enabling consumers to check on their properties remotely and allow installer to remotely support their customers. However, one area of constraint has been the dependency on customers networks which may, or may not, offer the level of performance that a robust and resilient security system demands. With the introduction of mobile data connectivity to connected products over the past few years, and as connectivity becomes more widespread across physical security products there will also be a greater shift toward mobile technologies such as 4G, either as a back up to a router connection or for complete network independence. 3. Connectivity is changing the way installers work Installers are a vital part of the chain of when a new alarm system is fitted into a property Installers are a vital part of the chain of when a new alarm system is fitted into a property, providing both installation and maintenance services. Traditionally maintenance activities have always been delivered on-site. With the increased ease of connectivity for security systems and the advancements in how these systems are used, installers are provided further opportunity to enhance customer service around the delivery of maintenance. It is no longer a requirement to have a customer wait until an engineer can attend a property to remedy a fault, as many can now be addressed within minutes from any location in the world. This ability allows installation businesses to focus their engineers on more critical tasks while delivering an overall higher level of customer service. Indeed, some installation businesses are moving to a model of having dedicated remote support engineers in addition to the road-based team. 4. Manufacturers are ready for IP-only alarms, ahead of the 2025 analog switch off The PSTN switch off being conducted by BT and other service providers is due to be completed in 2025 The PSTN switch off being conducted by BT and other service providers is due to be completed in 2025 as part of the move to Next Generation Networks, ending the use of analog phone lines and moves communications technology into an all IP-only space. Although some service providers have indicated that there may be some type of initial PSTN simulation, those providers that are doing this are also making it clear that this is only a temporary solution. The switch off will be a huge change for the security industry. Where heritage, analog alarm systems are in use, installers will need to plan to reconfigure existing systems to use the temporary PSTN simulation functions (where available) or upgrade systems to an all IP solution. Although 2025 feels a long way off, installers and end-users need to start planning now and taking the necessary action. In our sector, manufacturers are ready for IP-only alarms through the provision of cloud-based solutions and the use of techniques such as SIA IP for ARC monitoring.
As we surpass 2019, it’s high time we realize that by merging the digital and physical realm, IoT is destined to change the way we live and work. I have always been interested in the intersection between business and technology, and today it seems that the brave new technological world we have been dreaming over centuries has arrived. With everything from home appliances to smart vehicles, portable devices are connected to the internet and exchange crucial data. According to the statistics, there are 26.66 billion IoT connected devices around the globe. Which statistically leaves every citizen of the world with at least 3 devices. IoT in every day life I must say the numbers are quite mind-boggling! And this leaves a lot of room for improvement by incorporating the Internet of Things in software development; whether it’s a cellphone app or web. According to the statistics, there are 26.66 billion IoT connected devices around the globe. Which statistically leaves every citizen of the world with at least 3 devices It may interest you to know that the Internet of Things has the potential to touch every domain and nearly every aspect of human life. According to sources, impact on IoT leads to: By 2020, 50 billion devices are expected to connect to the internet In 2015, 3.5 connected devices per person have now reached almost 7 8 billion cellphone broadband access points by 2019 5 million IoT jobs by 2020 70 percent a year growth through 2018 in total sales of clothing and accessories incorporating computer technology, rising from $3 billion today to $42.5 billion $3.3 trillion market for ‘Smart City’ applications and services by 2025 The impact of smart homes Instead of saying the home is where our heart is; a home is where a bot is. However, IoT hasn’t entirely arrived in our homes. I mean, we are still required to order groceries the minute we run out of eggs and Greek yogurt. Slowly and steadily we are getting there; it seems the latest advancements in artificial intelligence and big data analytics will definitely work wonders for us. Smart homes are no longer a dream project; we can soon expect everything to be governed by the “brain” or a central platform. Moreover, bots will be seen tackling a certain set of functions related to more difficult tasks, and lastly niche bots, in charge of single tasks such as vacuuming the house or addressing more complex duties like accounting, coaching or household managing. Tech giants, or should I call them current development frontrunners like Amazon, Google, Samsung and Apple are expected to come up with something nerve-cracking. The benefits of IoT Other than this, with IoT, you will be able to work smarter and not harder. Artificial intelligence and advanced analytics can help create a more intelligent work environment. For example, the right AC temperature in shared office spaces help us book the most convenient meeting room, and moreover, take into account the room preference by setting the right temperature, lighting, and can automatically restock office supplies. This simply leads to: More efficient office operations Energy savings Comfortable work environments Consequently increased employee productivity The dark side of the Internet of Things The potential risks Every technology indeed comes as a boom, but that doesn’t mean the grass will be greener on the other side. Furthermore, we will uncover how even after offering so much convenience why IoT poses so much risk. Like I said before, IoT can be integrated into anything from coffee machines to fitness watches leading to make our lives more convenient. But what happens if they turn bad? When being unwillingly infected or hacked, these blessings can certainly turn into huge threats. IoT can be integrated into anything, leading to make our lives more convenient Devices, systems and the lack of security It may interest you to know that IoT devices can become bots that blindly follow commands to commit crimes as part of a botnet. What is a botnet, you may ask? Well, it is a network of infected devices that are mainly abused by the attacker to perform tasks such as carrying out DDoS attacks, Bitcoin mining and spreading spam emails. Mainly being used to carry out DDoS attacks and to mine for cryptocurrencies, these botnets have the potential to have a larger impact by making IoT devices do much more, such as send spam messages featuring dangerous malware. Botnets can also carry out click-jacking campaigns, distribute fake advertisements, and even worse, infect other IoT devices. Botnets can also carry out click-jacking campaigns, distribute fake advertisements, and even worse, infect other IoT devices Much like most malware, botnets can be found on dark marketplaces. The source code can be purchased and leaked, depending on the type of service. In case, an IoT device is already infected, another bot can attempt to replace the infection with its code and in some cases also "repair" the security vulnerability. But most of the time it fails! No matter how innocent these proof-of-concept attacks may seem, one cannot deny the fact that IoT devices and systems aren’t properly secured. Hackers can easily gain control of them and cause complete chaos like never before. Collecting information at a cost But how much information can an IoT device collect? What I mean is that by hacking a webcam, one can see what they are pointed at without you even knowing it, smart TVs and personal assistants can pick up sound, and smart cars can give clues to whether or not someone is home. Honestly, the amount of information collected on these IoT devices cannot be determined at any cost. And with everything in the cloud, such information can be intercepted or rerouted to a malicious server and be abused if not properly secured. The more we surround ourselves with IoT devices, the more motivation cybercriminals receive to target us! With the time passing by, let’s simply hope that connected device security will dramatically improve.
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy" Smart home market on the forefront The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.” “The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.” Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com. Focus on Cybersecurity In 2020, companies will continue to focus on solutions for protecting consumer data" Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates. “Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.” “At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds. Smart access control Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology. Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighborhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighborhood security. Homeguard offers a range of affordable CCTV solutions for home and small business DIY CCTV demonstrations DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits. Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing. AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customized central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities. Security and automation solutions D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access. Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring. Personal safety mobile application Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens" WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features. “Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.” “Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organizations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organization’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetize the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organization. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organizations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organizations, not technology. If we truly understand the risks to the organization, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organizations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organizations.
As security embraces IT-centric solutions, it can provide business value over and above security. Now in charge of managing a variety of data – e.g., from video platforms – a company’s security function has access to a range of new metrics. While security may use video to analyze a security event, machine learning can analyze the same data for other business capabilities, such as quality control or when a policy has been breached. “It’s the same camera, but with dual purpose,” says Matt Kushner, President of STANLEY Security. STANLEY Security, one of the largest integrators with a global footprint, has positioned itself at the center of the industry’s transformation by information technology (IT) and the Internet of Things. “Security will become an expanded business partner with corporations,” Kushner comments. In response to the trend, STANLEY is hiring more IT-oriented technicians and salespeople within the IT community and who can “speak at the C-level,” Kushner comments. Sonitrol is the most recognised brand by law enforcement for verified response Data centers, higher education and logistics STANLEY manages very large, multi-national clients. As a consequence, the STANLEY security organization has some of the best and brightest minds for enterprise-class security. To maintain that level of talent, STANLEY is committed to education. “We bring them into the family and focus on education, such as IT and IoT training. That’s critical in a world where unemployment is less than 3%. Finding good people, growing good people, and retaining good people – we do that exceptionally well at STANLEY,” says Kushner. STANLEY’s strong vertical markets including data centers, higher education, and logistics. They are also strong in multi-location installations (such as banking.) STANLEY has a big footprint throughout North America and Europe. PACOM access control and 3xLOGIC cloud-based solutions In addition to STANLEY’s core integrator business, the company also manages several manufacturing brands such as PACOM access control and 3xLOGIC cloud-based solutions. Mergers and acquisitions have been commonplace in the integrator spaceBeyond its company-owned integrator locations under the STANLEY brand, the company also owns Sonitrol, the strongest brand in the market for verified response with 65 franchises in North America. Sonitrol is the most recognized brand by law enforcement for verified response. Mergers and acquisitions have been commonplace in the integrator space, and Kushner says that STANLEY is “open and actively looking for properties that fit our commercial growth strategy.” He notes that STANLEY focuses on the commercial side of the market, where there are good margins and continuing growth. They pay less attention to the residential side which is “being heavily disrupted.” Strong partnerships with manufacturers STANLEY has strong partnerships with several manufacturer partners, through which they bring new breakout technologies to market from emerging companies. An example is Evolv Technology, a manufacturer of gun and bomb detection technology. “We see them as a leading provider of the technology, and they are, in my mind, a very disruptive provider,” says Kushner. STANLEY is also collaborating with a company – to be announced – that provides a unique gunshot detection technology, he says. STANLEY is also cooperating with dormakaba to implement Switch Tech, a Bluetooth wireless core that can replace any standard mechanical lock core. Existing locks can be transformed into electromechanical locks in minutes. STANLEY is also developing a tight integration with Lenel’s mobile credentialing system. STANLEY is also cooperating with dormakaba to implement Switch Tech GSX 2019 and ISC West 2020 At the recent GSX 2019 show in Chicago, Kushner says STANLEY heard a lot about cybersecurity, especially customers wanting to make sure they are investing in cyber-hygiene and who are looking to expand into providing cyber protection. “In concert with cyber-hygiene, they are looking for health monitoring or assurance that network devices are operating properly,” he says. “They want to ensure their security platforms are cyber-secure and up to date with the latest software versions.” STANLEY is also a big proponent of cloud offerings, and Kushner hints at a big announcement at the upcoming ISC West show in Las Vegas of additional cloud offerings and/or partnerships. “There will be a variety of new solutions to be introduced, including hosted solutions and applications that benefit both security and that add new value to businesses overall.”
SALTO Systems has been selected to provide a smart access control solution for Venture X, a modern workspace community located in Chiswick Park, West London. This business hub, with great transport links into Central London and Heathrow Airport is home to some of the best companies working in the oil and gas, media, entertainment, technology, food and drink, and health and beauty markets. It comprises 1.8 million sq. ft of award winning accommodation, arranged as a necklace of 12 office buildings. Each building faces the Park's 'inner garden' with a featured two-tier lake, waterfall, decked boardwalk, pathways, events space and landscaping. Chiswick Park also houses over 45,000 sq. ft of retail including the on-site Virgin Active gym, restaurants, convenience stores and an ever-changing array of pop-up traders and street-food vendors. Cutting edge sustainable building development Hot desks offer 24/7 access to common working areas (hubs) including phone booths and high speed Wi-Fi Part of the globally renowned, Venture X United Franchise Group, Venture X provides a brand new inspiring, diverse, and collaborative working environment that is so much more than just shared office space. Housed in a cutting edge sustainable building development, which includes solar fins, it offers a place where individuals and businesses can lease hot desks, private desks or private offices. Hot desks offer 24/7 access to common working areas (hubs) including phone booths and high speed Wi-Fi. Private desks add a Cat 6 Ethernet port, meeting and board room access, a business address with incoming mail handling, lockable office space and a private locker. Private offices top the package by proving all the previous offerings but in a fully furnished office space including SALTO access control. Modern locking solution With some 30 internal office and meeting room doors to secure, Venture X was looking for a technologically modern locking solution that would satisfy the needs of both the business and its customers. Key requirements were the ability to grant access rights instantly for new customers and revoke them in real-time for former customers. No hassle, costs or security issues with mechanical keys were wanted. They needed an audit-trail overview of who accessed which door at which time. Flexibility allocating office space, meeting rooms etc on a day to day basis as required. Easy meeting and conference room access, and finally, easy, wire-free installation without software installation and IT configuration. SALTO KS Keys as a Service cloud locking To meet these needs, SALTO’s KS ‘Keys as a Service’ cloud based locking solution was recommended. This provides a flexible access control management system that requires no software installation or the added expense of a fully-wired electronic product. All that is needed is an online device with an Internet connection. Providing end users with cloud-based SALTO KS Keys as a Service reduces cost and almost eliminates the need for maintenance. Highly secure, thanks to its 2-factor-authentication and 128 bit AES encryption; it provides flexibility, scalability, reliability, and the ability to manage access control from any Internet platform. Remote door locking solution One of the key need was a product that offered both a card and mobile app solution to remotely open doors" Venture X Director Andrew Ross comments “When you’re providing a working and meeting environment for entrepreneurs, and business people and large corporates, many of whom will be involved with technology businesses, security, efficiency and design were all essential aspects of the brief when we selected our preferred access control solution”. He adds, “One of their key requirements was a product that offered both a card and mobile app solution that would enable the members to remotely open doors, i.e. for customers, tradespersons or postal deliveries to gain access for example without the need for a staff member to be physically present in the building." Electronic access control Ross added, “Another feature wanted was office mode, so instead of having to present an access card or smart phone app to a door every time someone used it, the door would function just like a normal door during pre-set times but auto lock when required." Andrew further said, “The SALTO KS now installed meets those requirements and gives comprehensive 24/7 access control that covers our entire property. They are looking forward to utilizing SALTO KS across the new Venture X locations that are in development for 2020 and 2021.”
C-TEC’s powerful new Quantec Surveyor2 Cloud-based data management software has been installed at Croft House Care Home in Yorkshire. With its capacity to generate reports on busiest shifts, call response times, most frequently visited rooms and more, the owners and managers of the facility, Victoria and Giles Bateman say that Surveyor2 has revolutionized operations at their family-run residential care home, recently rated outstanding in care by the Care Quality Commission (CQC). Covering different time periods Said Victoria Bateman: “Providing outstanding care is fundamental to our core values and we are constantly asking for feedback from our residents. One area we identified as being vital to our residents feeling safe in their environment is their use of our Quantec addressable call system. The ability to make a call to a carer for help and be responded to in a timely fashion is very important to them and therefore very important to us too.” We’ve been able to monitor and analyze the use of our call system on a daily, weekly and monthly basis" “Since Surveyor2 was installed, we’ve been able to monitor and analyze the use of our call system on a daily, weekly and monthly basis. We can print a variety of reports, covering different time periods, so we can see which of our 29 residents are calling, at what times of the day and, most importantly, our response times to those calls. We can also see, via the user dashboard, all live call system activity so we are aware of any potential issues before they become a problem.” Secure cloud-Based system “Minimum and maximum response times have been set for each type of call, via the KPI (Key Performance Indicator) settings facility, to allow us to pinpoint where we need extra staff at busy times or identify areas where further training is required. We can also see which residents require more time, again allowing us to plan and allocate staff in the most effective way.” “Reports highlighting how often individual residents call has helped us identify times when they feel more anxious and we have been able to address those concerns.” A secure Cloud-based system, Surveyor2 also allows email notifications to be sent to Croft House’s management team so they can monitor response times when not on site. Recognizing areas of improvement As the system has remote access capabilities and displays ‘real-time’, call, reset and room occupancy information, the senior member of staff on shift can view the status of all current calls and respond accordingly if a call is taking too long to be answered. Our staff are all aware that we monitor response times and that they are accountable for their actions" Says Giles Bateman: “Our staff are all aware that we monitor response times and that they are accountable for their actions. Teams and different shifts are rewarded for excellent response times and areas of improvement recognized. Overall the system allows us to feel confident that our residents are receiving timely help when they ask for it.” Easy-To-Use addressable call system Says Kelly Flaherty, Deputy Manager at the home: “Surveyor2 has proved invaluable to us in reassuring patients, their relatives and regulatory authorities that we are delivering the highest standards of care and, during future inspections, will provide vital evidence that we are responsive, effective and caring, that all our residents are safe and that our facility is extremely well led and organized.” Surveyor2 is designed to work with Quantec, C-TEC’s powerful yet easy-to-use addressable call system. With its flexible call routing, multiple call levels and laptop programmable systems controller, the system can be tailored to suit the exact operational needs of any building.
Fast-growing Spanish menswear brand Álvaro Moreno has selected ID Cloud, Nedap’s renowned RFID-based inventory visibility platform. The deployment of the RFID solution at source of production, in the distribution center and throughout the 50 stores across Spain started in June 2019 and was completed in September 2019. RFID inventory visibility platform Álvaro Moreno leverages RFID for complete traceability within the supply chain. “We believe RFID is a main pillar in our digitalization strategy as this allows us to close the gap between online and brick-and-mortar store experience”, says Álvaro Moreno, CEO of the menswear brand. Ultimate customer satisfaction is very important for our current and future success" “Ultimate customer satisfaction is very important for our current and future success. That is why we recently implemented omni-channel services such as BOPIS (Buy Online, Pick up in Store) and BORIS (Buy Online, Return in Store). In order to do this successfully, inventory accuracy as provided by RFID is key. For the future, we are considering to offer services like ship-from-store, mobile payment and self-checkout as well”, he continues. ID Cloud software suite Álvaro Moreno wanted to roll-out nationwide at a fast pace and was looking for a reliable partner. He said, “We selected Nedap because of their extensive experience within RFID projects. This enabled us to quickly deploy this technology throughout our 50 stores in just three months.” Nedap’s ID Cloud software suite is a Software-as-a-Service solution specifically developed for retail RFID applications. It offers retailers the quickest route to implement RFID and improve their in-store inventory accuracy to over 98%. Álvaro Moreno integrates ID Cloud with the Comerzzia POS-system. This enables seamless data transfer and provides the most accurate real-time business information.
Allot Ltd., globally renowned provider of innovative network intelligence and security-as-a-service solutions for communication service providers and enterprises, has announced that Altice Portugal’s MEO, the country’s largest fixed broadband and mobile service provider, has chosen Allot Secure, a unified Security-as-a-Service (SECaaS) solution to protect the company’s mobile users against a broad range of cyber threats and to provide parental control both on and off-network. Allot NetworkSecure security platform Allot Secure solution is a first-of-its-kind multi-layered platform that integrates network-based and endpoint security The Allot Secure solution is a first-of-its-kind multi-layered platform that integrates network-based and endpoint security. The Allot Secure solution to be implemented by MEO includes the Allot NetworkSecure mass-market network security platform, coupled with endpoint security provided by Allot EndpointSecure. The combined solution enables rapid mass-market user onboarding for cyber security that will protect MEO users anytime and on any network. Subscribers to the Allot cyber security solution will pay a monthly fee which is shared between Altice MEO and Allot. Protection against cyber security threats Enabled by the unified Allot Secure solution, Altice MEO will offer its customers a security service to protect them against emerging cyber security threats, including malware, phishing, ransomware and crypto-mining. Traditional security add-on solutions offered by operators never gained much traction because they rely on customers to install the protection themselves. Allot unified network-based and endpoint cyber security delivers effortless, device-independent end-user security, making it easy for operators like Altice MEO to deliver these security services directly to customers. Allot has reported that other telecom customers have achieved double-digit penetration rates with Allot Secure. Network and data security NetworkSecure, part of the Allot Secure solution suite, is a globally renowned company in the growing network-based, mass-market cyber security category, protecting more than 23M subscribers globally. Coupled with Allot consumer marketing services, the NetworkSecure solution has been proven to achieve penetration rates up to 50%. “Our millions of mobile users are in need of a proven and hassle-free security solution,” said Tiago Silva Lopes, Director Consumer Products at Altice Portugal/MEO. “With this in mind, we selected Allot to offer a mobile service that cannot be bypassed and removes the burden from our customers by protecting them wherever they are. This solution also enables parents to be worry-free about how their children are using their devices.” Unified Allot Secure solution “Altice MEO required a mature, unified solution that combined network and endpoint cyber security for their customers,” said Hagay Katz, VP Strategic Accounts, Cyber Security at Allot. “Our unified Allot Secure solution is a perfect fit. With our revenue sharing partnership, MEO can maximize their ARPU while strengthening their brand and increasing loyalty.”
BI-City Tokyo is located in Nur-Sultan (Astana), the capital city of Kazakhstan. It is a high-end residential complex of BI Group – a renowned construction holding company in the Kazakhstan real estate market. At present, three apartment buildings with public areas and more than 400 apartment units have been completed. Aiming to create modern high-end intelligent buildings and residential areas, the BI Group wanted to upgrade the existing analog video intercom system of BI-City Tokyo. Replacing analog intercom system The original analog intercom system in this community is outdated and cannot meet the diverse security requirements of high-end residential areas. First, the original analog intercom does not support retaining images and leaving messages. Second, this system only supports access cards to open doors, which is inconvenient for residents in case they forgot their card. Third, the original system cannot add IP cameras to monitor public areas such as children's playground, fitness areas, etc. Fourth, the cold winter temperature in Nur-Sultan requires high-performance equipment capable of operating in extreme environments. Faced with the abovementioned challenges, BI Group was also looking for a trustworthy brand that can provide not only modern smart system but also technical support and reliable after-sales service. Meeting all the above requirements, Dahua smart residential solution was chosen to be the security solution provider of BI-City Tokyo. Dahua Smart Residential Security Solution The complete solution deployed more than 300 pieces of Dahua equipment, including IP cameras The complete solution deployed more than 300 pieces of Dahua equipment, including Indoor Monitor, Apartment Outdoor Station, IP Camera, Access ANPR Camera, Video Recorder, etc. The solution supports two-way audio intercom, real-time video and messaging feature. In addition, a variety of door opening methods were also implemented: door opening via remote calling, door opening using access card, and remote door opening via APP. Additionally, all the equipment can be visualized and integrated in the Dahua DSS platform for centralized management, operation and maintenance. Moreover, the temperature in Nur-Sultan can reach up to negative 40 degrees in winter season. This requires high-performance outdoor devices featuring dust and water resistance, and explosion-roof capability. In response to this pressing challenge, Dahua apartment outdoor station VTO1210C-X-S1 and access ANPR camera ITC237-PW1B-IRZ that support wide working temperature were installed at the entrance of the apartment building for a more effective visitor and vehicle management. ANPR and IP cameras installed When a visitor arrives at the entrance of the apartment building and dials a resident’s room number through the Dahua apartment outdoor station, the camera installed at the entrance will synchronize the video with the visitor’s image captured in the resident’s indoor monitor. Once the visitor’s identity is confirmed, the resident just needs to press the button on the indoor monitor to open the door remotely. With Dahua app, users can even answer calls and open doors remotely when they are out for work or traveling. As for vehicles, Dahua access ANPR camera ITC237-PW1B-IRZ is designed for extreme temperature environments (temperature range of -40°C to +60°C). With built-in intelligent video analytics, the camera has the ability to detect and recognize moving vehicle's plate number within low speed. Vehicle tracking and identification For both approaching and departing vehicles, the access ANPR camera takes a snapshot of the number plate and vehicle overview picture, as well as records corresponding surveillance videos. By setting a whitelist, the camera can automatically control the barrier or gate to open if a plate number recorded in the whitelist has been recognized. The public areas including children's playground, fitness areas, as well as the lobby are covered by 2MP IR Mini Dome Network Camera IPC-HDBW4231E-ASE, 2MP and 3MP IR Mini-Bullet Network Camera. The Starlight Ultra-low Light Technology of IPC-HDBW4231E-ASE offers industry-leading light sensitivity, capturing color details under low light condition up to 0.002lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. Integrated management platform Dahua smart residential solution provides an integrated management platform for the personnel of BI-City Tokyo Dahua smart residential solution provides an integrated management platform for the management personnel of BI-City Tokyo. It assists in the remote and visual management of the property and improves the services and facilities they offer. Security guard at the entrance is not needed anymore to manage entering and exiting vehicles, which saves labor costs, reduces the waiting time of vehicles and improves traffic efficiency. In addition, the all-round monitoring of the public areas within BI-City Tokyo greatly improves the safety level of the entire community. The video intercom system of the building provides a variety of convenient door opening methods, enhancing the resident’s living experience. IP video intercom solution “We adopted analog solution in the first phase. From the second phase, we replaced all of analog system with Dahua’s IP video intercom solution. We hope that Dahua will help us complete the solution planning of the three, four, five, and six phases,” said Arman Lesbekov, General Manager of BI Group. Dahua Technology is an internationally renowned video surveillance and security solutions provider with more than 6000 professionals in their R&D team, dedicated to providing cutting-edge products in technologies like AI, IoT, Cloud services, video, cyber security, and software reliability with high quality and performance. Video surveillance systems expert Since 2014, Dahua has ranked second in the global video surveillance equipment market according to an IHS report, and in 2017 Dahua ranked third in the A&S International "Security 50". The company believes in investing and building strong R&D capabilities for new technology and innovation.
Device and application security solutions provider, Trustonic has announced that OPTOLANE has selected Trustonic Secured Platform (TSP) to bring security and trust to the company’s new connected medical diagnostic device. The product is primarily used at the point-of-care for early diagnosis and preventative healthcare, particularly for diagnosing cancer, infectious diseases and congenital abnormalities. Healthcare devices have become top targets for cybercriminals due to their critical nature, the valuable intellectual property they employ and the sensitive personal information that they collect and store. Research shows that there were 8.2 attempted cyber-attacks per connected healthcare endpoint in each month of 2018. Smart diagnostic platform OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform To ensure security, privacy and high performance, OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform, which integrates Trustonic’s Trusted Execution Environment (TEE). OPTOLANE’s in vitro diagnostic (IVD) platform, called LOAA (Lab on an Array) Analyzer, examines blood and tissue samples for multiple targets, including DNA, RNA, proteins and metabolites, in real-time. It was developed to satisfy market demand for ‘sample to answer’ IVD tools and enables sample extraction through to analysis with a single cartridge. “Investment in connected healthtech is increasing and IVD is an important segment in the global diagnostics industry,” comments Ben Cade, CEO of Trustonic. “These solutions add significant value to diagnosis and treatment, enhancing the well-being of the general public while increasing productivity and reducing costs. But, where personal data this sensitive is being captured, processed, and transmitted, the appropriate steps must be taken to protect it from malicious actors.” Trustonic security platform Trustonic’s hardware-backed security platform, TSP, enables secure and private data extraction, processing, storage and transmission. The technology: Enables a secure image processing channel from the sensor to the application processor; Provides cryptographic tools to protect individuals’ sensitive medical data; Ensures data integrity; Creates a secure environment to run algorithms analyzing raw data from the sensor; Encrypts sensitive data when being shared with the cloud. Do Young Lee, CEO of OPTOLANE, says “There is clear demand for innovative new diagnostics solutions that go from ‘sample-to-answer’ in real-time. Importantly, though, we fully understand our responsibility to protect patient data." Enhanced data security To deliver connectivity while protecting the sensitive personal data collected by diagnostic devices, we needed a proven hardware-backed security foundation. Trustonic’s experience protecting smartphones, wearables and IoT hardware, and securing critical mobile applications in the financial and automotive sectors, is assurance that our devices and patient data are secured to the highest standard.” OPTOLANE expects to receive FDA certification for the new device in the first quarter of 2020. Once certification is achieved the product will be available to clinicians in healthcare facilities around the world.
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
The new year comes with new opportunities for the security industry, but what technologies will dominate our discussions in 2020? Topics such as artificial intelligence (AI) and HCI (hyperconverged infrastructure) became familiar in conversations during 2019, and they are likely to dominate our thoughts again in the new year. But other buzzwords are also gaining steam, such as “blockchain” and “frictionless access control.” Connectivity and the cloud will also be timely technology topics as the industry evolves. We asked this week’s Expert Panel Roundtable: What technology buzz will dominate the security industry in 2020?
3 Reasons To Migrate To A New Access Control SystemDownload
Schooling the Market on Education SecurityDownload
Lawrence, Massachusetts Deploys FLIR Video System For SafetyDownload