Managing keys and high value assets can now be used seamlessly within centralized management platforms, following the integration of Maxxess eFusion with Traka from ASSA ABLOY Global Solutions, globally renowned provider of intelligent management solutions for keys and equipment. Traka solutions “With Traka solutions globally deployed in many market sectors such as critical infrastructure, retail, logistics, hospitality and corporate environments - and increasingly integrated with access...
Ojo Technology, a Northern California security systems integrator, has named Chris Krajewski its vice president of services. Previously, he was general manager for the company’s Central Valley office located in Stockton, California. In his expanded role Krajewski will oversee the organization’s service offerings included training, maintenance and managed and cloud services. His team will work with customers to make sure their systems remain up and running while providing maximum valu...
SureCloud, the provider of cloud-based, Integrated Risk Management solutions and Cybersecurity and Risk Advisory services, has appointed Paul Zeila as Vice-President of GRC Sales for EMEA. He will be instrumental in driving business growth and developing service lines, as well as having overall responsibility for SureCloud’s suite of GRC products. Paul brings nearly 20 years of experience working in the GRC space with global organizations such as IBM, ACL, SAP and most recently, Deloitte....
Two of the most familiar names in the physical security market – Pelco and Panasonic – underwent ownership changes during 2019. Consolidation continued on multiple other fronts. Security service companies, video companies and access control companies were all among the entities involved in merger and acquisition (M&A) activity during the last 12 months. In short, the industry landscape continues to transform in response to a changing market. Here's a look at the Top 10 M&A s...
360 Vision Technology, globally renowned UK-based CCTV manufacturer, has announced that they will showcase their latest range of high-performance surveillance cameras on the Nukleas Integrated Security Solutions booth, Sheikh Saeed 2, G35, at Intersec 2020, 19-21 January, Dubai. ‘TX’ video transmission cameras For those looking for a reliable 3G/4G/LTE ‘wireless’ camera video solution, 360 Vision will be showing the ultimate performance Predator, Invictus and lightweigh...
ProdataKey (PDK), manufacturer of the cloud access control platform built for cellphone, announced that its revolutionary “touch io” Bluetooth reader is now shipping. When installed as part of a pdk io access control system, the new readers allow users who have installed a cellphone credential on their smart phone to enter a controlled door by simply touching their hand to the reader, making it the most convenient cellphone solution on the market. There’s no need to unlock the...
Bird Home Automation Group, a provider of IP video intercom technology, announces a partnership with SIP solution provider AV LinkPro. Through this strategic partnership, Bird Home Automation now offers an easily deployed option for its DoorBird product line, specifically its MDU video intercom stations, to make calls to IP, cellular and landline phones. Since its founding in 2014, Bird Home Automation has formed partnerships with many other industry pioneers to meet the demands of its customers. Pairing with AV LinkPro, Bird Home Automation can now deliver an app-based intercom solution that sends alerts, live video and 2-way audio communication via smart devices while also calling up to 5 IP, cellular or traditional landline phone numbers. Dedicated indoor stations This all-in-one solution comes without the need to rewire the building or the hassle of looking for and implementing a new SIP service provider. Thus, door communication becomes easier and more comfortable than ever before in multi-tenant, commercial and single-family residences. What makes this solution the first of its kind is the flexibility and scalability with which it can be deployed" “What makes this solution the first of its kind is the flexibility and scalability with which it can be deployed. In one apartment building, tenants can be communicating with visitors using the DoorBird app, phone calls and our dedicated indoor stations in any combination,” said Andrew Knuesel, Head of Sales, DoorBird US. AV LinkPro provides a unique platform bridge for connecting a combined SIP, IP and TCP/IP integration into a seamless, fully functional solution. Commercial and residential applications AV LinkPro systems were designed and developed to assist installers and integrators with the task of connecting IP intercom systems with VoIP telephony solutions for a variety of commercial and residential applications. The solution is designed to bridge connectivity with a variety of products to create a unified, fully connected communication solution. “We are pleased to partner with DoorBird in order to provide our SIP intercom to telephone bridge allowing a cloud-based point of management for both the building administrator and the individual residents in order to be able to enhance their intercom experience with the addition of telephone communication from the front door,” said Jon Miller, Product Manager, AV LinkPro.
AAEON Atlas helps increase safety, energy efficiency, and cut costs for Smart Cities thanks to the power of Intel Movidius Myriad X. AAEON, globally renowned provider of Smart City solutions, announces AAEON Atlas, a rugged outdoor edge node built to provide cities with flexible solutions for AI and edge computing. Featuring the Intel Movidius Myriad X, AAEON Atlas offers real-time processing for a range of Smart City applications. AAEON NanoCOM-APL board AAEON Atlas is based on the compact AAEON NanoCOM-APL board, featuring the Intel Atom x7 AAEON Atlas is based on the compact AAEON NanoCOM-APL board, featuring the Intel Atom x7, providing efficient computing with low power consumption. Designed with an IP66 rated fanless chassis, it can be installed onto any streetlamp, making it easy to quickly setup and deploy. It also features connectivity with WIFI, Gigabit Ethernet, or even 4G/LTE for flexible communication within an edge network or with a central cloud server. The AAEON Atlas also features built-in cameras and sensors for data collection and analysis. The key feature of AAEON Atlas is the embedded Intel Movidius Myriad X vision processing unit (VPU). The Intel Movidius Myriad X provides a low-power, high-performance solution for on-device AI inference. AAEON Atlas is compatible with the Intel Distribution of OpenVINO toolkit, which includes built-in features such as model optimization, hardware acceleration and more designed to maximize the capabilities of the Intel Movidius Myriad X VPU. License plate recognition AI inference AAEON Atlas can be deployed in a wide range of edge computing applications. As an edge gateway, AAEON Atlas can connect with up to 200 smart street lights, providing intelligent control. With license plate recognition AI inference, AAEON Atlas can power applications such as Smart Street Parking or detecting traffic violations or accidents. With traffic and congestion monitoring, AAEON Atlas can optimize traffic signals in real time to help improve traffic flow. AAEON Atlas can also anonymously detect pedestrians in crowd control and flow monitoring applications. AAEON Atlas also comes with the full end-to-end support offered by AAEON. From concept to customization to setup and deployment, AAEON provides customers with full support to ensure their Smart City solution is ready to go from day one. AI analytics “With AAEON quality and expertise, AAEON Atlas is the solution built to carry the weight of Smart City applications,” said Kevin Ting, Senior Product Manager with AAEON’s New Business Development division. “Whether as an IoT/AIoT gateway or providing real time AI analytics, AAEON Atlas uses the latest in Intel Vision Products to provide invaluable edge computing processing for Smart Cities.”
ExtraHop, globally renowned provider of cloud-native network detection and response solutions, has announced a new integration with Amazon Web Services (AWS) that automates the isolation of compromised Amazon Elastic Compute Cloud (EC2) instances and empowers security operations teams to create a wide range of customizable response automations, from quarantining and blocking to ticketing and tagging. ExtraHop Reveal(x) Cloud Alongside the new automation capability, ExtraHop Reveal(x) Cloud offers continuous packet capture in AWS Alongside the new automation capability, ExtraHop Reveal(x) Cloud now offers continuous packet capture in AWS. That reduces the amount of time, effort, and money required to perform packet-level analysis while providing security teams with the forensic detail they need to get to root cause or to fulfill chain-of-custody requirements. Response automation is considered the Holy Grail for many security operations, allowing teams to snuff out threats before they further infiltrate or damage the organization. But when done at a tool level instead of a system level, response automation too often results in devices being quarantined or systems being shut down based on unreliable data or incomplete information. ExtraHop integration with AWS Lengthy investigation time compounds the challenge, leaving critical systems idle until the threat can be remediated, and potentially resulting in business downtime and lost revenue. The latest ExtraHop integration with AWS brings precision to both response automation and investigation workflows in the cloud. The AWS quarantine integration combines high-fidelity detections from Reveal(x) Cloud with AWS security group policies to automatically quarantine compromised EC2 instances, enabling timely and targeted response. Streamline investigations in cloud and hybrid environments Security teams can also modify the trigger, or write a new trigger, to take different actions when detection violates policies. With right-sized continuous packet capture, Reveal(x) Cloud takes an analytics-first approach to investigation, allowing security operations teams to go from detection to associated packets in a matter of clicks, keeping investigations fast and focused. Reveal(x) Cloud also includes new features that streamline investigation in cloud and hybrid environments, enabling analysts to rapidly identify and respond to the highest priority threats. 1G, 5G, and 10G SaaS offerings with Continuous Packet Capture within AWS environments support streamlined and guided investigation for any incident. Customers can begin purchasing the Reveal(x) Cloud PCAP for AWS offering in early 2020. Related Detections reduce response time by automatically surfacing similar threats across architectures in a Reveal(x) Cloud investigation workflow. This provides SecOps teams with a unified view of attack patterns happening in the environment. Enhanced reporting capability provides executive-level overviews of security posture at the touch of a button. Reports zero in on critical threats while also delivering high-level insight into compliance across hybrid and cloud environments. Advanced visibility and detection “Though AWS supports strong controls, companies are responsible for securing their own workloads, which is a daunting task with the current cyber security skills shortage and nascent cloud security market,” said Jesse Rothstein, CTO and co-founder, ExtraHop. Jesse adds, “Our Reveal(x) solution provides SecOps teams with advanced visibility, detection, and response for hybrid environments. We are constantly working to expand our capabilities, and this integration with AWS is another step towards winning the arms race in enterprise security.”
ONVIF, a global standardization initiative for IP-based physical security products, held its annual membership meeting in November, providing ONVIF members with an overview of important activities of 2019 and plans for the year ahead. Attendees heard presentations on the growth of ONVIF, as well as plans for new profile development. ONVIF Chairman Per Björkdahl highlighted the forum’s achievements over the past year, particularly the market’s continued support for the profile concept, with the number of conformant products surpassing 13,000 earlier this year. With six profiles to choose from and additional ones in development, ONVIF profiles have increasingly been included in various bid and specification processes in projects around the world, making it the de-facto interface in the industry. Björkdahl also noted the continued involvement of ONVIF in the International Electrotechnical Commission’s work on international standardization, in addition to new proposals for cloud connectivity and interoperability between multiple systems. Video Enhancement Working Group The overarching goal of ONVIF is to provide to the market a single interface through which every system can operate As is tradition, ONVIF recognized the contributions of multiple individuals from various ONVIF committees. Steve Wolf, who served on several ONVIF committees on behalf of Pelco, received the ONVIF Service Award, which acknowledges individuals who have provided a long-term commitment to the organization. While serving on the Technical Committee, Wolf led the Security Working Group, and was also an active participant in the Video Enhancement Working Group, contributing to a number of improvements in how ONVIF approaches video. Andreas Schneider of Sony received the ONVIF Distinguished Service Award, which recognizes individuals who have made significant contributions to ONVIF over many years in multiple functions. Schneider’s long-term service to the Technical Services Committee has positioned him as a major facilitator of the ONVIF organization, with contributions to multiple ONVIF profiles. Physical access control standards “The overarching goal of ONVIF is to provide to the market a single interface through which every system can operate,” said Björkdahl. “Our honorees have shown significant and long-term commitment to our organization, in turn making this goal a reality one profile at a time. We thank both of our recipients for their innovation, hard work and service.” ONVIF Technical Committee Chairman, Hans Busch of Bosch, spoke to members about the specification development roadmap, which highlights plans for future profile development, as well as the continued alignment to the standardization activities within the IEC TC 79 working groups for video surveillance and physical access control standards. Specifically, Busch covered what specifications are being examined for future profiles, and how they complement and further enhance existing ONVIF profiles. IP-based physical security products ONVIF continues to work with its members to expand the number of IP interoperability solutionsAs chair of the Technical Services Committee, Sony’s Schneider gave an overview of the committee’s work on new and existing profiles, client and device test tools, updates to the conformance process and tools, and the Developers’ Plugfest. Shi-lin Chan of Axis Communications, who serves as chair of the ONVIF Communication Committee, provided a recap of ONVIF communication efforts in 2019, and discussed ONVIF’s plans for the launch of a Mandarin website later this year. Founded in 2008, ONVIF is a well-recognized industry forum driving interoperability for IP-based physical security products. The organization has a global member base of established camera, video management system and access control companies and more than 13,000 profile conformant products. IP interoperability solutions ONVIF offers Profile S for streaming video; Profile G for recording and storage; Profile C for physical access control; Profile Q for improved out-of-the-box functionality, Profile A for broader access control configuration and Profile T for advanced streaming. ONVIF continues to work with its members to expand the number of IP interoperability solutions ONVIF conformant products can provide.
SureCloud, the provider of cloud-based, Integrated Risk Management solutions, has been placed on Gartner’s Magic Quadrant for IT Vendor Risk Management Tools for the first time after being recognized on Gartner’s Magic Quadrant for Integrated Risk Management Solutions back in July 2019. The quadrant names 16 key solution vendors identified by Gartner as offering vendor risk management (VRM) solutions. VRM solutions enable organizations to accurately ascertain the security and compliance risks associated with their IT third-parties, creating a centralized register of these parties and integrating this with wider risk management processes. Highly configurable software-As-A-Service We think it underlines our ability to offer a truly comprehensive third-party risk management solution" Richard Hibbert, CEO and Co-Founder at SureCloud, said: “We are delighted that SureCloud has been included in the Magic Quadrant for IT Vendor Risk Management Tools; we think it underlines our ability to offer a truly comprehensive third-party risk management solution.” “Our flexible, scalable and highly configurable software-as-a-service (SaaS) delivery model, combined with managed service options, is proving particularly attractive to organizations looking to build a robust, central view of their vendor assurance program.” Security and risk management Third-party risk management is a vital part of any organization’s cybersecurity posture, with many third parties having access to highly sensitive data and offering criminals a potential route into their organizations. Demonstrating a clear awareness of each third party’s approach to security and risk management is also an increasingly significant element of privacy regulations such as the GDPR. In response, SureCloud’s Vendor Risk Management solution is designed to offer a smooth and scalable means for organizations to assess and review all their IT third party vendors for potential risks. IT risk management processes The SureCloud Vendor Risk Management solution offers: A centralized register of all third-party IT vendors, giving a holistic view of risk A dynamically generated risk-assessment for each third party, ensuring they are only asked questions which apply to them Automated third party notifications and response reporting. Full integration with wider IT risk management processes and data privacy programs.
LenelS2, a provider of advanced security systems, introduces OnGuard version 7.6, its latest enterprise security management system that offers rich feature and operability enhancements to its access control platform, while also extending its cloud compatibility, integration capabilities and convenience. LenelS2 is a part of Carrier, a global provider of innovative heating, ventilating and air conditioning (HVAC), refrigeration, fire, security and building automation technologies. “With the technology enhancements in OnGuard 7.6, our valued-added resellers and growing customer base will be able to leverage operability improvements as well as enhanced cybersecurity, cloud and cellphone features to experience a more scalable, accessible and cloud-compatible enterprise security platform,” said Jeff Stanek, president, LenelS2. “OnGuard 7.6 demonstrates our ongoing investment in the platform while continuing our progress in browser-based application usability.” Manage privacy or safety concerns OnGuard 7.6 browser-based client applications enable system administrators to more easily deploy and operate the system. End user customers who monitor alarms, manage visitors and approve access requests will appreciate the convenience of cellphone browser-based clients as part of the standard installation process. In addition, an enhanced setting in OnGuard Surveillance and OnGuard Monitor browser clients enables role-based restrictions. OnGuard 7.6 also includes a dynamic new reader/alarm panel interface, the LNL-1324e An operator is able to view recorded video beyond a specified timeframe to manage privacy or safety concerns. Both clients feature new options that enhance video viewing and simplify navigation. Cybersecurity and compliance enhancements include use of the TLS 1.2 protocol to encrypt OnGuard 7.6 communications, including email and browser client use; elimination of default passwords for compliance; as well as an updated OnGuard Hardening Guide. Expanded cloud compatibility OnGuard 7.6 also includes a dynamic new reader/alarm panel interface, the LNL-1324e. This I/O module, with AES 256 encryption, enables doors to be conveniently connected to an OnGuard platform using either structured cabling or via the onboard Ethernet for easier installation. Additional OnGuard 7.6 enhancements include: OnGuard Visitor Management support of PDF417 barcode technology, providing greater scalability and reliability. Expanded cloud compatibility that leverages Amazon Web Services virtual machine images or Amazon Machine Images. A new BlueDiamond Active Credentials option that enables administrators to see the quantity of currently active cellphone credentials to better plan their purchasing decisions. Updated integration with Bosch and Digital Monitoring Products (DMP) intrusion panels and improved integrations with Otis Elevator CompassPlus controllers.
Video surveillance is commonly associated with security. But in most cases, it's used to record incidents and assist in investigations after the fact rather than prevent undesirable events. Artificial intelligence–powered video analytics is a highly promising trend that fundamentally changes the way things work. Extracting manageable data from a video stream can help recognize risky situations early on, minimizing damage and, ideally, completely avoid emergencies. At the same time, AI significantly expands the areas of application of video surveillance beyond security systems. AI significantly expands the areas of application of video surveillance beyond security systems However, the hype around this new, trendy technology prevents the potential user from choosing quality solutions in a wide variety of products. This often leads to over-expectation, followed by a complete let-down. Can AI-powered video analytics really be the key to a technological breakthrough in video surveillance? We'll take a look at what the technology can do, what it can't, and where it can go from here. Technological breakthrough or just another bubble? It's often said that the video management software (VMS) market is becoming increasingly commoditized and widely available. A lot of products with similar features (or, at least, similar promises from the manufacturer) make it hard to choose. As a result, vendor names and reputations are turning into one of their primary selling points. Manufacturers have two choices available: get wrapped up in a price war and rely on cutting expenses, or offer a product that's truly innovative and revolutionary. Manufacturers have two choices available: get wrapped up in a price war, or offer a product that's truly innovative and revolutionary VMS developers who choose the second route are gravitating towards creating products that use artificial intelligence based on neural networks and deep learning. Emerging two or three years ago, the AI video analytics market is experiencing a boom in growth. This new tech wave has stirred the still, stagnant backwaters of the VMS world and gave small, ambitious developers something to be optimistic about. It seems they now have a chance to emerge as market leaders in the next few years. However, the hype around this popular trend is raising reasonable concerns among experienced security industry professionals. These concerns come from clients looking for a solution to their problems, and from suppliers building a long-term development strategy. This largely resembles another tech bubble, like the one built up around pre-AI video analytics and burst when it became clear that the sensational promises around it were pure marketing hype (and rather unscrupulously so). However, there are a lot of factors that indicate that AI-powered video surveillance systems aren't another bubble. The three factors The first — and the main one — comes from systems already in place on customers' sites. They fulfill the same promises made during the previous bubble by hotheads in a rush to teach the computer to analyze events in real time using a classical algorithmic approach. The second is the fact that this new technology has seen investment from not only software and cloud startups, but also established VMS developers. Even giants like Intel, which has presented a full line of neural network accelerator hardware and a set of software tools that streamlines working with them, specifically in the field of computer vision. This new technology has seen investment from not only software and cloud startups, but also established VMS developers The third factor lies in artificial intelligence's abilities. AI plays chess, drives cars, and works wonders in many other fields. Why shouldn't it be applied to video monitoring and analysis? What AI can do Just what can artificial intelligence do in video surveillance systems at this stage of development? It can't quite analyze a sequence of events and understand the "logic" of what's happening in the cameras' field of view. At least not yet. But it's probable that AI will learn to do this in the next few years. But neural network analytics can already detect, classify, and track objects very well, providing high accuracy even in busy scenes. Artificial intelligence can be used in the real world to: detect smoke and flames for early fire warning at open areas (forest, open warehouse, parking lot, etc.); distinguish people/vehicles from animals and other moving objects, e.g. to protect the perimeter of a nature park from poachers; distinguish a person in a helmet and protective clothing from a person without them to prevent accidents at a dangerous production facility or construction site; count objects of a specific type, e.g. cars in a parking lot, people in the sales floor, wares moving on a conveyor belt, etc. in non-security-related solutions. Those are just a few examples. After training a neural network, it can tackle other, similar tasks, too. Generally, a neural network trained in specific conditions isn't replicable. In other words, it won't work as well under different conditions. On the other hand, developers have learned how to quickly train AI for the needs of a specific project. The most important requirement is having enough video footage. Somewhat apart from that is the use of neural networks in facial and automatic number-plate recognition. This is an example of reproducible neural networks (train once, deploy everywhere), which makes them more appealing commercially. If non-reproducible neural networks have only recently become economically feasible due to the rapid evolution of specialized hardware (aforementioned Intel's product, for example), then the use of AI in facial recognition and ANPR has been well established for a long time. The use of AI in facial recognition and ANPR has been well established for a long time Another kind of AI analytics that we'll explore is behavior analytics. This function, probably more than any other, is bringing video surveillance systems closer to understanding what's happening on camera. Its potential is vast. How Behavior Analytics Works From a technical point of view, behavior analytics combines artificial intelligence with a classic algorithmic approach. A neural network trained on a multitude of scenarios can determine the position of the bodies, heads, and limbs of humans in the camera's field of view. The algorithm outputs an array of data containing descriptions of their poses. Conditions can be set for data to detect a specific pose, such as raised hands, prostrated or crouching persons. Developers can use this to quickly create new detection tools to identify potentially dangerous behavior specified by a government or business client. There's no need for additional training of the neural network. How Behavior Analytics Can Be Deployed Someone crouched down next to an ATM could be a technician, CIT guard, or burglar. Bank security should be notified in any of the cases. A person in shooter position, together with a bank employee or cashier with their hands raised could indicate a robbery. The system can be configured to automatically send alerts with a surveillance snapshot to the police so they can assess the threat and take action if needed. It's vital that the police receive the alert, even if the employee is unable to activate the alarm. In many cases, attention should be directed to a prostrate individual. This could be somebody who needs immediate help, or it could be someone sleeping in an inappropriate public place, for example, a 24/7 ATM space. Behavioral analytics can also be used to ensure workplace safety. For example, tracking whether employees are holding the handrails when using the stairs at a manufacturing facility or a construction site. What Now? Behavior analytics can be deployed wherever your clients' imagination takes them. With this feature, practically any pose that indicates potentially dangerous behavior can be detected. Timely response to an alarm helps avoid material damages or, in other situations, casualties. Practically any pose that indicates potentially dangerous behavior can be detected An area of potential development for behavior analytics is the ability to analyze a sequence of poses by the same person or a combination of poses and relative positions of several individuals. That will be the next level of evolution in AI's use in video surveillance: moving from "detecting" to "understanding" behavior in real time. In its most basic form, this type of analytics can be deployed to detect deviations from the search procedure in correctional facilities when a person being inspected must assume a pre-defined sequence of poses. A more advanced form allows it to detect any kind of abnormal behavior, such as a brawl breaking out in a public space. Ideally, behavior analytics can predict dangerous situations based on nearly imperceptible cues gleaned from collected statistics and a Big Data analysis. At the moment, this sounds like pure fantasy, but what seemed like whimsy not too long ago is now a reality with AI. It's already beaten humans in chess and the game of Go (Weiqi). Will artificial intelligence be able to outplay humans at charades one day? It's entirely possible that we'll soon see for ourselves.
It’s hard to believe that we’re in the final quarter of 2019. It’s time to wrap up goals and make new ones that will guide us into another decade. As we look forward, we can’t help but look back at some of the key trends that emerged in the last couple of years, and their continued presence in the product road maps and plans that so many security industry leaders and manufacturers are creating. Some of these trends have enhanced the efficacy of security systems, whereas others have the potential of having adverse impacts. Cybersecurity Cyber-attacks of all kinds have become, and will continue to be, a major threat, making this one of the most important initiatives that today’s businesses embrace. From a manufacturer’s perspective, building cybersecurity into the product from its inception is critical, with integrators beginning to demand this level of consideration from the products they sell. As a result of a rise in the convergence of IT applications alongside security investments, end users are now seeking out solutions designed with data security top-of-mind. All network connected devices such as DVRs/NVRs, servers, IP cameras, access controllers, intrusion alarms, smart sensors, are vulnerable, which is why this added step in developing cybersecurity protocols and applying them across the organization is critical. Building cybersecurity into the product from its inception is critical More connected devices The Internet of Things (IoT) has been a major trend for the past few years in many industries, and this will continue as we integrate sensors of all kinds into the network. The collection and analysis of the data collected by these sensors is giving rise to a plethora of applications such as industrial applications, intelligent building management, event management, and much more. The physical security industry benefits by having additional intelligence for situational awareness and emergency management, as well as opportunities to provide additional value-added services and business insights. Being deployed in an increasing number of scenarios and with continued improvements in computing capabilities, video has the opportunity to become the eye of IoT. AI-enabled devices Software manufacturers are looking toward artificial intelligence to help propel advanced analytics in an effort to deliver more situational awareness to operators, and an increased ability to proactively assess threats or anomalies. While video and data analytic capabilities have been around for quite some time, some would argue they were rudimentary in comparison to software that uses AI to make existing applications such as facial recognition much more accurate, and to create new ways to detect anomalies. In addition, AI continues to be used to make sense of the large amounts of data that are being generated by intelligent sensors and by analyzing the growing amount of video. 5G connectivity It’s safe to say that 5G will revolutionize the way people stay connected to the internet. Extra speed, extra bandwidth are going to make our mobile devices faster, more powerful and hyperconnected, with the same thing happening to IoT connected devices such as cameras. This is going completely change the way we think about smart cities: More powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas. More powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas Privacy concerns In most advanced economies around the globe, citizens are increasingly concerned with privacy of their data, and many governments have put – or are in the process of doing so – stringent data protection laws in place. The EU has lead the way in using these concerns to develop privacy regulations that govern the development of data-driven applications. This trend is starting to impact the entire globe, as we shift toward more data autonomy and privacy. Since most physical security applications involve the collection of video and data about people and assets, privacy regulations will continue to have a significant impact on the industry well into the future. Cloud and mobile capabilities Mobility is critical for physical security and is emerging through the development and use of cloud-based services, as well as the ability to access security devices through a smart phone or Web-based browser. That’s why there’s been such an influx of mobile apps created to manage cameras, receive automatic alerts for the most diverse event, and giving users the ability to grant or restrict access to a facility. All of this demonstrates the world’s demand for mobility, connectivity and ease-of-use. More video — everywhere Video is the cornerstone of security, providing both real-time and forensic coverage for emerging threats and incidents, which is why it’s one of the fastest growing segments of the marketplace. The use of video for traditional applications in new markets, as well as for use in newer applications that are not necessary security related is poised to see the most movement. In some industries such as oil and gas, there is a trend towards extending video coverage into extremely harsh and hazardous environments, so manufacturers are challenged to develop appropriately certified equipment to meet a more stringent demand. Manufacturing facilities such as food processing plants are also increasing their use of video for training and compliance purposes to prevent incidents such as food recalls that can be extremely costly for the business. It’s an exciting time to be a part of the security market, as we’re really just beginning to see that, when it comes to technology advancements, the sky is the limit. I would argue at the core of these innovations is the video data being collected, and as we work to build technologies that can harness the power of these applications, we will continue to be at the forefront of this movement toward greater intelligence and business insights.
The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus. This change hasn’t come easily. Some are still holding out and waiting for the “fad” to pass. However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers. An “as-a-service” model shifts the burden of data maintenance and infrastructure spending to an integrator/dealer partner or service provider. This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date. Traditional security systems Additionally, end users demand solid customer service. For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training. This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary. The cloud has proven to be highly functional, flexible, and convenient for organizations Everyone also wants convenience. In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month. This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded. The Role of the Cloud The cloud has proven to be a highly functional, flexible, and convenient method for organizations to leverage as part of their strategies to protect and modernize their facilities. And the service-based nature lends itself well; forward-thinking integrators and dealers can diversify their product arsenal while still capitalizing on a recurring monthly revenue model (RMR). But then why has there been so much resistance to this change? Over the last 10 to 15 years, the cloud has gotten a bad rap for a myriad of reasons, including usability, management, and unreliability. However, that view of the cloud is changing for the positive as the technology becomes more advanced and innovators learn more about what it means to design a product or service with security at its core. "As-a-service” platform For example, one of the biggest misconceptions that plagues the cloud is the idea that it is not secure. However, the security of public cloud service providers is integral to their success because their business depends on it. Developing an ongoing and trustworthy relationship with customers can only be made possible through the assurance that their services are safe and the customer’s data is protected. As such, they’ve embraced the service-based model that is, at its core, the future of the business world as we know it. There isn’t a person, manufacturer, or integrator partner out there today who isn’t somehow touched or influenced by an “as-a-service” platform. And it’s about time the service-based model that leverages the public cloud reaches the masses.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organizations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organization’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetize the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organization. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organizations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organizations, not technology. If we truly understand the risks to the organization, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organizations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organizations.
As security embraces IT-centric solutions, it can provide business value over and above security. Now in charge of managing a variety of data – e.g., from video platforms – a company’s security function has access to a range of new metrics. While security may use video to analyze a security event, machine learning can analyze the same data for other business capabilities, such as quality control or when a policy has been breached. “It’s the same camera, but with dual purpose,” says Matt Kushner, President of STANLEY Security. STANLEY Security, one of the largest integrators with a global footprint, has positioned itself at the center of the industry’s transformation by information technology (IT) and the Internet of Things. “Security will become an expanded business partner with corporations,” Kushner comments. In response to the trend, STANLEY is hiring more IT-oriented technicians and salespeople within the IT community and who can “speak at the C-level,” Kushner comments. Sonitrol is the most recognised brand by law enforcement for verified response Data centers, higher education and logistics STANLEY manages very large, multi-national clients. As a consequence, the STANLEY security organization has some of the best and brightest minds for enterprise-class security. To maintain that level of talent, STANLEY is committed to education. “We bring them into the family and focus on education, such as IT and IoT training. That’s critical in a world where unemployment is less than 3%. Finding good people, growing good people, and retaining good people – we do that exceptionally well at STANLEY,” says Kushner. STANLEY’s strong vertical markets including data centers, higher education, and logistics. They are also strong in multi-location installations (such as banking.) STANLEY has a big footprint throughout North America and Europe. PACOM access control and 3xLOGIC cloud-based solutions In addition to STANLEY’s core integrator business, the company also manages several manufacturing brands such as PACOM access control and 3xLOGIC cloud-based solutions. Mergers and acquisitions have been commonplace in the integrator spaceBeyond its company-owned integrator locations under the STANLEY brand, the company also owns Sonitrol, the strongest brand in the market for verified response with 65 franchises in North America. Sonitrol is the most recognized brand by law enforcement for verified response. Mergers and acquisitions have been commonplace in the integrator space, and Kushner says that STANLEY is “open and actively looking for properties that fit our commercial growth strategy.” He notes that STANLEY focuses on the commercial side of the market, where there are good margins and continuing growth. They pay less attention to the residential side which is “being heavily disrupted.” Strong partnerships with manufacturers STANLEY has strong partnerships with several manufacturer partners, through which they bring new breakout technologies to market from emerging companies. An example is Evolv Technology, a manufacturer of gun and bomb detection technology. “We see them as a leading provider of the technology, and they are, in my mind, a very disruptive provider,” says Kushner. STANLEY is also collaborating with a company – to be announced – that provides a unique gunshot detection technology, he says. STANLEY is also cooperating with dormakaba to implement Switch Tech, a Bluetooth wireless core that can replace any standard mechanical lock core. Existing locks can be transformed into electromechanical locks in minutes. STANLEY is also developing a tight integration with Lenel’s mobile credentialing system. STANLEY is also cooperating with dormakaba to implement Switch Tech GSX 2019 and ISC West 2020 At the recent GSX 2019 show in Chicago, Kushner says STANLEY heard a lot about cybersecurity, especially customers wanting to make sure they are investing in cyber-hygiene and who are looking to expand into providing cyber protection. “In concert with cyber-hygiene, they are looking for health monitoring or assurance that network devices are operating properly,” he says. “They want to ensure their security platforms are cyber-secure and up to date with the latest software versions.” STANLEY is also a big proponent of cloud offerings, and Kushner hints at a big announcement at the upcoming ISC West show in Las Vegas of additional cloud offerings and/or partnerships. “There will be a variety of new solutions to be introduced, including hosted solutions and applications that benefit both security and that add new value to businesses overall.”
Honeywell Commercial Security is among the companies working to develop security systems that are more proactive than reactive. “Our biggest opportunity moving forward is the ability to have security solutions that do a better job of detecting and predicting threats,” says Tim Baker, Global Marketing Director, Honeywell Commercial Security. Greater use of analytics and intelligence can reduce human error and simplify processes by providing a more unified view for greater situational awareness. Artificial intelligence and deep learning "We’re reaching a maturity level in terms of algorithms and hardware to drive new capabilities in a cost-effective way,” he says. Baker sees a continuing interest in artificial intelligence (AI) and deep learning in the physical security market, used in video analytics and also for intrusion and access control. "We have challenged ourselves to move from reactive solutions to develop a set of proactive solutions that determine potential security threats before they happen,” he says. An overarching theme is the need to focus operator attention on “what matters” rather than requiring operators to keep track of the growing number of sensors in newer systems. A remaining hurdle is to streamline the deployment of analytics systems, which can require expensive customization during the commissioning phase. Credential-enabled access control reader The reader can support any card format and also enables “frictionless” access control That’s where Honeywell is investing and focusing its attention, seeking when possible to “pre-teach” algorithms based on data gleaned from a large installed base. Fortunately, there will be plenty of data from a growing variety of sites to build from. Honeywell offers a full ecosystem built around enterprise security needs and a second ecosystem built around the needs of small- and medium-sized businesses (SMBs). In the enterprise space, the trend is toward smarter edge devices, such as Honeywell’s OmniAssure Touch, a cellphone credential-enabled access control reader. The reader can support any card format and also enables “frictionless” access control. A user can gain access by touching the reader, with no need to take his or her smart phone (which has the credential) out of their pocket. The reader is fully backwards compatible, which is a Honeywell hallmark. Honeywell’s OmniAssure Touch can support any card format and also enables “frictionless” access control. Designed to be cloud-enabled On the enterprise software side, Honeywell has invested in further development of their Pro-Watch access control system and MAXPRO VMS (video management system), tying them together into a single security console, along with intrusion and other systems such as human resources (HR) data. For the SMB market, Honeywell is building and expanding their MAXPRO Cloud system. As existing hardware has evolved to be cloud-enabled, the company has also been introducing new control products that are designed from the ground up to be cloud-enabled. Honeywell’s biggest vertical markets include banking, healthcare, gaming, energy infrastructure and airports The new MAXPRO Intrusion system, which can be configured over the cloud, will be introduced in the first quarter. MAXPRO Access, to be introduced in late November, can be deployed using an embedded web interface, a cloud interface, or as an on-premise solution. On the NVR side, an embedded NVR works alongside Honeywell’s new 30 Series video cameras, providing secure and encrypted end-to-end connection. Networked security system A challenge for Honeywell is to keep up with broader trends happening in the industry, whether geopolitical (e.g., relations between China and the United States) or regulatory such as General Data Protection Regulation (GDPR). Baker acknowledges an industry-wide increase in awareness about cybersecurity, driven largely by the enterprise market. IT departments are getting more involved in the purchasing decision; indeed, the chief information officer (CIO) is often the ultimate decision-maker. In response, Honeywell is emphasizing “cybersecurity by design” from the beginning to the end of a project. Also, they are using white-hat hackers to test products before they are released into a live environment. “We are doing everything we can to make sure products are cybersecure,” says Baker. Honeywell’s biggest vertical markets include banking, pharmaceutical, healthcare, gaming, energy infrastructure and airports. NDAA-compliant video cameras Compliance is a common thread throughout the verticals. Honeywell sells to the government mostly in the access control and intrusion space and built around their Vindicator networked security system. (They also introduced the line of NDAA-compliant video cameras, made in Taiwan, at the recent GSX show.)
Device and application security solutions provider, Trustonic has announced that OPTOLANE has selected Trustonic Secured Platform (TSP) to bring security and trust to the company’s new connected medical diagnostic device. The product is primarily used at the point-of-care for early diagnosis and preventative healthcare, particularly for diagnosing cancer, infectious diseases and congenital abnormalities. Healthcare devices have become top targets for cybercriminals due to their critical nature, the valuable intellectual property they employ and the sensitive personal information that they collect and store. Research shows that there were 8.2 attempted cyber-attacks per connected healthcare endpoint in each month of 2018. Smart diagnostic platform OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform To ensure security, privacy and high performance, OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform, which integrates Trustonic’s Trusted Execution Environment (TEE). OPTOLANE’s in vitro diagnostic (IVD) platform, called LOAA (Lab on an Array) Analyzer, examines blood and tissue samples for multiple targets, including DNA, RNA, proteins and metabolites, in real-time. It was developed to satisfy market demand for ‘sample to answer’ IVD tools and enables sample extraction through to analysis with a single cartridge. “Investment in connected healthtech is increasing and IVD is an important segment in the global diagnostics industry,” comments Ben Cade, CEO of Trustonic. “These solutions add significant value to diagnosis and treatment, enhancing the well-being of the general public while increasing productivity and reducing costs. But, where personal data this sensitive is being captured, processed, and transmitted, the appropriate steps must be taken to protect it from malicious actors.” Trustonic security platform Trustonic’s hardware-backed security platform, TSP, enables secure and private data extraction, processing, storage and transmission. The technology: Enables a secure image processing channel from the sensor to the application processor; Provides cryptographic tools to protect individuals’ sensitive medical data; Ensures data integrity; Creates a secure environment to run algorithms analyzing raw data from the sensor; Encrypts sensitive data when being shared with the cloud. Do Young Lee, CEO of OPTOLANE, says “There is clear demand for innovative new diagnostics solutions that go from ‘sample-to-answer’ in real-time. Importantly, though, we fully understand our responsibility to protect patient data." Enhanced data security To deliver connectivity while protecting the sensitive personal data collected by diagnostic devices, we needed a proven hardware-backed security foundation. Trustonic’s experience protecting smartphones, wearables and IoT hardware, and securing critical mobile applications in the financial and automotive sectors, is assurance that our devices and patient data are secured to the highest standard.” OPTOLANE expects to receive FDA certification for the new device in the first quarter of 2020. Once certification is achieved the product will be available to clinicians in healthcare facilities around the world.
Idesco devised a transparent reader to simplify Infobric’s construction site system management, making it powerfully adaptable to widely different market needs and technology standards. For a while, construction sites have provided a textbook example of how much electronic access control systems can benefit managers. Controlling access to a site, including restricted zones, machinery access (such as lifts and elevators), increases both security and safety, while also helping track authorized personnel and even equipment utilization. Ensuring regulatory compliance Infobric Ease possesses a wide range of functionality, from site access to energy control and much more An automatic, electric system, with that much functionality combined in a single service meets a high-value need in the construction industry. Today, Infobric provides a cloud-based digital platform, Infobric Ease, to help construction site managers monitor and secure key elements, such as site safety, while increasing worker productivity and ensuring regulatory compliance. Infobric Ease possesses a wide range of functionality, from site access to energy control and much more. In addition to simplifying site management and boosting worker productivity, it simplifies sites’ compliance with staff ledger regulation across a number of European countries. Worker productivity has been enhanced by the elimination of queues to register new staff on site and attendance. Lastly, controlled access increases worker safety while reducing theft and vandalism. Simplifying worker attendance monitoring Cloud management contributes even more to time and labor cost savings while also letting site owners conveniently fulfill their law-mandated employer obligations. To prevent tax avoidance and illegal workers, some European countries require construction site managers to upload the employee data registered in their staff ledgers – which Infobric Ease also provides, thereby also simplifying worker attendance monitoring. In short, the digital tracking of all this data saves significant time and money. The RFID industry commonly labels this type of reader ‘transparent’, because it seamlessly transmits transponder data Infobric integrated Idesco’s 9 CD 2.0 Slim Pin T reader into Infobric Ease as its vital front-end interface with construction workers. The RFID industry commonly labels this type of reader ‘transparent’, because it seamlessly transmits transponder data – fully-encrypted to ANSSI Level 1 Architecture specification – directly to a system, without any mediating keys. This lets systems themselves directly control all aspects of transactions – including data collection and reader response – resulting in both a highly secure and a cost-effective solution. Several identification card standards For integrators like Infobric, 9 CD 2.0 Slim Pin T’s direct, ‘transparent’, interaction between transponder and system not only simplifies transactions. It also lets them use more of the available features in the chips in workers’ transponders. This further benefits site owners and security managers because system updates can be implemented with greater agility and cost savings. “There are several identification card standards we adapt our products and systems to work with. So, we really wanted a card reader we could use in all our markets, without needing different hardware updates after a system upgrade or launching a new functionality across our different markets. The ‘transparent’ reader from Idesco turned out to be the perfect solution”, says Björn Hilliges, IT & Electronics Director at Infobric. Product design and expertise Every month, the Infobric Ease system handles approx. 11,000,000 card readings" “Infobric and Idesco have been co-operating for more than 10 years and through several product development projects. Over the years, Idesco repeatedly demonstrated their excellent quality in both product design and expertise, always providing us with products and solutions that reliably withstood very rough, inclement conditions amid frequent use at our customers’ construction sites,” says Björn Hilliges, IT & Electronics Director at Infobric. “Every month, the Infobric Ease system handles approx. 11,000,000 card readings. So, Idesco is a key partner for Infobric, and each day their readers fill a vital role at approx. 15,000 construction sites,” says Björn Hilliges, IT & Electronics Director at Infobric. Convenient regulatory compliance Infobric ease benefits for construction sites Convenient regulatory compliance on staff ledger registration in numerous European countries Increased productivity by reducing administrative tasks Time savings from agile system updating (despite differing card standards in different markets) because reader updates are no longer needed Enhanced reader functionality for workers with included keypads Reliability of Scandinavian-designed readers that are robust, weather-proof, maintenance-free Sites can now substantively help prevent undocumented labor and unprofessional contractors Infobric Ease features: Cloud-mediated service Seamless data collection Energy control Regulatory-compliant staff ledger Automated electronic access Mobile attendance & access Staff access control Vehicle access control Machine control Smart locks Making construction sites safer Infobric designs systems that make construction sites safer, more productive and reduce costs. Infobric’s solutions ensure the right people are in the right place at the right time at the site. Infobric provides with the best-working solution for the worksite, for both work hours and after, in packages that have been serving successfully on European construction sites large and small. Their goal is to become the digitization partner for the construction industry in the Nordics. With 30 years of experience, RFID technology pioneer Idesco Oy makes RFID readers, transponders, controllers and touch screen devices. Every day, for customers around the world, their devices collect data and enhance security for a variety of access control, vehicle identification, logistics and inventory systems.
Being a property management and home security service provider, DOM UK Ltd. considers specialized door security solutions for different premises such as holiday homes, serviced apartments and other temporary accommodations. By implemented keyless solutions on a rented property or serviced apartment provides effortless access granted by property managers and ease of control. Guests can also benefit as the last thing they want to worry about is looking after an extra set of keys. DOM Tapkey cloud-based smart locks DOM Tapkey, is a cloud-based smart lock, which diminishes the problem of remotely managing property access, including the expense and hassle of constant key exchanges, the disruption of early check-ins and overstays, and minimize the security risks of unauthorized access. A similar issue was put across to DOM UK by a popular AirBnB situated in Oxford. Pillow Talks are a specialist property management business based within Oxfordshire. Both Pillow Talks and their tenant, Ginger Video, who are renting premises for their business needs, wanted to replace their existing mechanical locks with an alternate, safe and secure digital locking solution. Allowing them full management and control of the premises. Digital locking system With DOM Tapkey, users can use the same ID on several smartphones and tablets simultaneously that works for temporary tenants or small business owners renting premise, allowing multiple access at any one time. DOM Tapkey is a revolutionary way to lock and unlock the doors to homes and offices The revolutionary digital locking system allows users to manage access and security of their home or office environment with the easy-to-use Tapkey app. They can add or remove users with smartphones and transponders on their smartphone conveniently. Whether at work or a meeting, it’s a quick and easy process. This locking system offers an innovative plug-and-play solution for all security needs. Home and Corporate Security National Sales Manager, DOM UK Ltd, Mr. Lloyd Chitty states “The project itself had been installed by one of our trusted partner and security expert, Oxford SMS (now J.Priest&Son), the tenant was highly impressed by the product and service provided by Mr. Jason Priest, they requested for a digital cylinder to be installed within their private home and labeled the locking cylinder as a new 21st Century system.” DOM Tapkey access control solution is more than just a digital door opener. It’s also a smart management tool that allows homeowners to remotely program electronic keys, send authorizations to other users, share access and receive event notifications. DOM Tapkey is a revolutionary way to lock and unlock the doors to homes and offices. Simply place the smartphone against the digital cylinder and avail instant access.
TCIEXPRESS, a customer-oriented, multi-technology transport system in the Indian and International markets, has announced using Matrix Time-Attendance solution for increasing productivity and streamlining salary processing. This high-tech transport system pursuit value-based policies to satisfy the aspirations of society, customers, vendors, employees, shareholders and the transport industry. Speed is the essence of all the services of TCIEXPRESS whether through land or air, anywhere in India and the world. TCIEXPRESS multi-technology transport system TCIEXPRESS is actively engaged at 500 locations across India. To manage entire attendance, diverse shifts and leave policies for the various locations and numerous workers at a central place was a very tedious task for them. Moreover, this leads to complex computation for salary based on the absent-present report. So, their requirement of timely and error-free payroll processing was arisen to improve overall productivity. Ultimately, they were facing challenges over various matters like manual paperwork, lack of productivity and discipline, remote access of all the locations for Time-Attendance and payment process. Matrix offered COSEC VYOM for people mobility management for TCIEXPRESS's 3000 employees at 500 locations COSEC VYOM cloud-based system After a comprehensive discussion regarding problems and requirements, Matrix has offered COSEC VYOM for people mobility management for their 3000 employees at 500 different locations. COSEC VYOM is a cloud-based Time-Attendance system that addresses solutions to the outlined issues of productivity and efficiency. It provides ubiquitous, cost-effective, secure and on-demand network access. Moreover, Matrix Time-Attendance solution is integrated with HR1 and HRMS software for easy salary processing and speedy HR process of TCIEXPRESS. COSEC VYOM cloud-enabled Time-Attendance system provides the following results - Quick salary processing Improves productivity Reduce paperwork Secure and on-demand network access Eliminates server cost, infrastructure cost, and maintenance cost Products Offered: COSEC DOOR FOT
Pulse Secure advances remote access to web applications such as Microsoft Office 365 and network resources to help 3,000 staff enjoy a better work-life balance leveraging Pulse Secure. Pulse Secure, a provider of software-defined Secure Access solutions, has announced the delivery of a successful project at one of Italy’s largest media organizations designed to help foster mobile workforce productivity while ensuring protected, compliant access to cloud and data center applications. RCS MediaGroup is one of the leading multimedia publishing groups, active mainly in Italy and Spain across all publishing fields, spanning from newspapers to magazines, from digital to books, from TV to new media, and to training. It is also one of the top players in the advertising market and in the organization of iconic events and major sporting formats, such as the Giro d’Italia. Protecting against cyber-attack We maintain several security controls across our network, as well as regularly cyber-security training" The RCS Group publishes the daily newspapers Corriere della Sera, La Gazzetta dello Sport, El Mundo, Marca and Expansion, as well as numerous magazines, the most popular including Oggi, Amica, Io Donna, 7, YO Dona and Telva. Like many other popular enterprises, being an integral part region’s culture and communications has made RCS Group a target for cyber threat actors. “Protecting our systems against cyber-attack is a critical requirement as is ensuring our staff and journalists have easy, flexible and secure access to their work,” says Monica Venanzetti, Network Manager for RCS MediaGroup in Milan. “To meet this need, we maintain several security controls across our network, as well as regularly conduct cybersecurity training. We deployed our first VPN solution in 2006 to enable secure access to our systems and it was time to progress our capabilities.” New cloud services RCS MediaGroup employs over 3,000 staff including 700 journalists and as Giandomenico Oldano, Director of IT operations for RCS MediaGroup, explains, “As a group, we have an ongoing strategy to help our staff embrace smart working. This is part of an initiative to improve the work-life balance of our employees and reduce their traveling time, which in a busy city like Milan can be very time consuming.” As part of this work-life balance strategy, RCS MediaGroup has invested in more remote, mobile and cloud technologies and recently moved its staff onto Microsoft Office 365 to encourage this transition. “To meet this need and as part of our commitment to ensuring best practice secure access, we decided to upgrade our legacy VPN to provide more capacity and to better integrate with new cloud services such as Office 365,” says Venanzetti. Cloud single-sign on The simplified management interface allows RCS MediaGroup to set up enterprise-wide policies" “We examined several options and Pulse Secure provided us a modernized platform with more advanced features including endpoint compliance and cloud single-sign on. We found the tool comparatively simpler to administer, very interoperable and with a broader feature-set.” The upgrade process was straightforward, and the simplified management interface allows RCS MediaGroup to set up enterprise-wide policies that make it easy for its remote users to connect to its critical publishing systems. The solution also incorporates client checking technology that ensures that its users’ devices, both corporate and personally owned endpoints, are running the right system and security patches before they can attach to the corporate network. “One of the most important features was deep support for our users’ devices including tablets, laptops and PCs across both Apple and Microsoft environments,” says Oldano. Cloud-based applications “Our upgrade has been a success and provides a lot of potential for future projects that will allow us to offer secure access for more cloud-based applications. Pulse Secure has been with us throughout this process and its technology is helping us to deliver on our commitment towards smarter working for all our staff.” Pulse Secure enables enterprises to centrally manage Zero Trust Secure Access to applications, resources and services that are delivered on-premise, in private cloud and public cloud environments. The Pulse Access Suite delivers protected connectivity, operational intelligence and threat response across mobile, network and multi-cloud environments in order to provide easy, compliant access for end users and single-pane-of-glass management for administrators. “Enterprises are fortifying capabilities to accelerate mobile workforce productivity and take advantage of cloud computing.” Comprehensive and integrated Pulse Secure offers a proven, comprehensive and integrated suite that works with an enterprises hybrid IT infrastructure to enable a simpler, more manageable and scalable approach to secure access,” said Paul Donovan, vice president of EMEA sales at Pulse Secure. “We are pleased to have been selected by RCS MediaGroup, a prominent and progressive market leader in multimedia publishing and look forward to supporting their on-going digital transformation initiatives.”
Located in Eastern China, Hangzhou is the capital and most populous city of Zhejiang Province. It has registered population of 9,800,000, with total area of 16,596 km². Jianggan District is one of the five main urban areas of Hangzhou. With a floating population of about 1.06 million, Jianggan District ranks first among Hangzhou's main urban areas. As the new administrative center of Hangzhou, it boasts the most important CBD and the largest train station and car hub in Hangzhou, bringing together various traffic elements such as highway junctions and bridges across the river. The entire Jianggan District is promoting vital transformation in urban areas Intelligent surveillance system Covering 8 streets, 141 communities and 4 villages, the entire Jianggan District is promoting vital transformation in urban areas. Nevertheless, the non-registered population, accounted for about 40% of the total population, makes it hard for the local government to improve urban management in the district. Every policeman needs to manage 1,700 citizens on average. The shortage of police force affected their work precision and led to difficulties in providing timely police response. In addition, insufficient surveillance coverage and limited intelligence system in the area resulted in inactive security measures, making it difficult for the police to achieve their goals Integrating DoT, IoT and the internet Based on the Dahua Heart of City (HOC) architecture supported by "Full Sensing, Full Intelligence, Full Computing and Full Ecosystem (4 Full) capabilities, Dahua Technology firmly focused on the construction needs of the area and built the overall plan of establishing an ‘online police’. Integrating the Internet, DoT and IoT, Dahua Technology has successfully assisted the Hangzhou Jianggan Public Security in building a multi-dimensional network that targets customer value, and combines AI, big data, and cloud computing in order to obtain accurate real-time data and strengthen the current technology of “online police” operations. Sensors and monitoring products Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network Moreover, Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network. It also set up 46 actual police investigation models to provide accurate instructions for Jianggan police, including property crimes analysis, situation analysis, vehicle management, people management, psychiatric control, online apprehension of violators, as well as missing person search, etc. Compared with traditional police operation, Dahua HOC Safe City Solution has built an “Online Police” mechanism to obtain the most authentic real-time data through information technology, and carry out accurate computer applications for a more scientific service deployment, efficient police force and powerful security control. Dahua HOC Safe City Solution It ensures that the Jianggan police can perform properly at a given time. It also promotes the transformation of police affairs from passive to active, from extensive to subtle, from imprecise to accurate, and from offline to online, gradually carrying out the prediction, early-warning, and prevention measures of police operations. Since 2016, the Dahua HOC Safe City Solution has helped Jianggan Public Security achieve outstanding results including enhanced police intelligence, reduced crime cases, increase in case closure rate and efficiency, improvement in public service, and speedy recovery of missing individuals, opening a new chapter for intelligent police operations.
Round table discussion
Cloud applications are an everyday facet of business these days, exemplified by systems such as Office 365, Salesforce.com and Dropbox. The physical security market is also embracing the cloud after overcoming some initial concerns and thanks to improvements in cloud offerings. We asked this week’s Expert Panel Roundtable: Which security markets are likely to embrace the cloud?
Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?