AlgoSec, globally renowned provider of business-driven network security management solutions, has released the version A30.10 update of its core Network Security Management Suite, which offers new cloud security management capabilities and a range of enhanced features that further extend its technology ecosystem integrations. ASMS A30.10 The AlgoSec Security Management Suite (ASMS) A30.10 builds on A30’s market renowned automation capabilities to enable seamless, zero-touch security mana...
Pulse Secure, a renowned provider of Zero Trust Secure Access solutions, announced that analyst firm Frost & Sullivan recognized Pulse Secure among the top ten NAC vendors by global revenue market share and one of six leading vendors to show market share gain. Frost and Sullivan market report identifies Pulse Secure among top 10 Network Access Control (NAC) vendors by global revenue market share. The 2020 Frost & Sullivan Network Access Control (NAC) Market, Forecast to 2024 report stat...
SureCloud, the provider of Gartner-recognized Integrated Risk Management solutions and cybersecurity services, has partnered with Secure Controls Framework (SCF), granting all its customers access to SCF’s control set through its cloud-based Compliance solution. SCF aims to provide cybersecurity and privacy control guidelines to organisations of any size and across any sector, helping them to implement best-practice controls to protect their data and processes, and respond to evolvi...
Ping Identity, the Intelligent Identity solution for the enterprise, announced the availability of PingID multi-factor authentication (MFA) in AWS Marketplace. Customers can now quickly procure and deploy PingID to secure work from home while adding an additional layer of security to their AWS infrastructure. Ping’s Intelligent IdentityTM platform provides enterprises a digital identity solution for securely accessing services, applications, and APIs from virtually any device or location....
System Surveyor has upgraded its intelligent system design platform created to digitize and streamline the industry’s historically manual approach to site surveys and design. Driven by customer feedback, these upgrades include expanded product catalog capabilities and enhanced Google Earth functionality. Expanded product catalog Both updates augment the virtual, collaborative elements central to System Surveyor and used by security professionals, deemed “essential critic...
With the Government directives brought into action earlier this week, Security Systems and Alarms Inspection Board (SSAIB) has had to change certain aspects of their working practices, while also ensuring that it doesn’t impact negatively on the registered firms and the level of service that the company provides to customers. UKAS accreditation SSAIB is fully aware of the uncertainty and worry that our firms will be facing at this difficult time" Security Systems and Alarms Inspection B...
IDIS has further enhanced its IDIS Center VMS, adding new features and functions targeted at small to mid-sized enterprises and multi-site customers. Organizations can build powerful centralized monitoring solutions, quickly and easily, when implementing IDIS Center together with the wide selection of IDIS DirectIP cameras and powerful NVRs. These deliver customer lifecycle savings of 50% or more compared with server-based solutions, thanks to reduced installation time, no upfront or ongoing license fees, easier maintenance, and the industry-beating IDIS Ultimate Warranty. IDIS Center VMS Important new features now included with the cost-free, license-free IDIS Center VMS include MapVue Important new features now included with the cost-free, license-free IDIS Center VMS include MapVue, an easy-to-use search function that speeds up operator navigation across building layouts and floor plans. Its intuitive interface helps users to view live and play back video streams across multi-camera systems, while maintaining an overview perspective of their facilities’ layouts and camera positions. MapVue also provides easy bookmarking, allowing operators to search the recorded data for persons and activity of interest. Bookmarked footage can then be saved in an Excel file, creating a library of video clips. Instant Meta Filtering (IMF) capabilities IDIS Center users can also now benefit from IDIS Instant Meta Filtering (IMF) capabilities without any licensing or maintenance fees when using the new range of IDIS 6000 Series Edge VA (EVA) cameras. IMF speeds up incident investigations from days or hours to mere minutes. It allows operators to easily collate footage and scan hours of recorded video, from multiple streams, to pinpoint the movements and last-known locations of persons or vehicles of interest. “With these innovative features, IDIS Center is delivering great new benefits and further improving value for our customers,” says Andrew Myung, President, IDIS America. IDIS For Every Network (FEN) technology Surveillance configured with IDIS Center at its heart also ensures greater cyber security Surveillance configured with IDIS Center at its heart also ensures greater cyber security, because devices mutually authenticate and eliminate the need to for passwords to be entered manually. In addition, IDIS For Every Network (FEN) technology lets engineers connect sites to a control room or other centralized monitoring environment with one-click configuration. IDIS Center gives users all the essential features they need to centrally and locally manage surveillance operations. These include live video and remote playback, real-time notifications of events, panic recordings, device system logs, and authority access set by individuals or groups. User-friendly interface Plus, its user-friendly interface is not only appreciated by security operatives but also praised by non-specialists, including teaching staff, healthcare professionals, and store managers who regularly need to access surveillance to investigate incidents quickly and efficiently. “Thousands of customers worldwide are benefitting from the low cost of ownership that IDIS Center offers,” Myung adds. “With the ability to register up to 1024 devices, IDIS Center is powerful enough for medium to large sites. It’s particularly beneficial to multi-site retailers that are tasked with the dual challenge of reducing shrinkage while keeping operating costs low.”
Interface Security Systems, globally renowned managed services provider delivering managed network, interactive alarm monitoring, video surveillance and business intelligence solutions to distributed enterprises, has announced a new strategic partnership with OpenEye, international provider of cloud-managed solutions for video security, business intelligence, and loss prevention. OpenEye – Interface Security strategic partnership The strategic partnership will combine the proven solutions of both companies — Interface’s interactive monitoring service with OpenEye’s innovative Web Services Platform (OWS) — to deliver a powerful remote video surveillance solution with seamless cloud video management to retailers, restaurants, and distributed enterprises. “This partnership brings together the best of breed solutions from the two companies with deep market experience,” says Lee Doyle, Principal Analyst at Doyle Research. “Interface has a powerful interactive video monitoring solution for enterprise customers in the retail, restaurant and hospitality space. Combining that with OpenEye’s very popular and easy-to-use cloud-based video management platform is a great fit for asset management teams looking for a fully-managed and scalable video surveillance as a service.” Enhanced asset protection “Today’s sophisticated asset protection teams demand a broad suite of functionality, and our state-of-the-art interactive monitoring solutions must be supported by an easy to use cloud-based video management platform that gives the customer a full complement of reporting and administrative capabilities,” says Michael Shaw, CEO of Interface Security Systems. Marrying OWS to the Interface solution set makes for a truly potent combination" Michael adds, “Our decision to partner with OpenEye was based on their advanced platform meeting the demands of our enterprise customer base. Marrying OWS to the Interface solution set makes for a truly potent combination. Our customers will benefit tremendously from having a single managed services provider to deliver alarm monitoring, remote video surveillance, video verified alarms, and the supporting network infrastructure with a simple and scalable cloud video management system with one invoice.” 24/7 virtual monitoring Enterprises can now leverage the power of the Interface Central Command Center’s 24/7 virtual monitoring and the ease of use of accessing and managing video on the OWS platform. The combined solution offers several key benefits to enterprises, including: 24/7 advanced video and audio monitoring by life safety experts Real-time intelligence with actionable insights Streamlined investigation capabilities Advanced mobile features for Loss Prevention teams on the go Easy to use Video Management Systems “Our combined solution helps enterprises innovate and stay ahead of the rapidly changing video surveillance needs,” said Ed Solt, Executive Vice President, OpenEye, adding “We’re excited about the successful integration of our offerings and look forward to winning
Hanwha Techwin America, global supplier of IP and analog video surveillance solutions, has announced that Hanwha’s Wisenet L series cameras are now compatible with the Genetec Stratocast cloud-based video surveillance-as-a-service (VSaaS). Through this technology partnership, customers across a broad range of industries will now be able to reap the benefits of an easy to install true-cloud solution whether they want to support hybrid-cloud deployments, add new cameras in remote locations, or serve the needs of small and mid-sized installations in a cost-effective way. Integration with Stratocast cloud-based VSaaS Stratocast cloud-based video surveillance-as-a-service (VSaaS) requires no software installation, port forwarding or network setup, and allows organizations to significantly reduce installation and on-going maintenance costs, making it an ideal solution for sites where IT staff, resources, and budget are limited. To make the enrolment process easier than ever before, customers can simply scan a QR code to bring L series cameras into the Stratocast portal in one simple step instead of logging into multiple webpages. Enhanced cyber security We are offering a solution that is cyber secure, cost-effective and easy to install" "We are pleased that Hanwha is first to market with a Stratocast-ready QR code enrollment option,” said Oktay Yildiz, Product Line Manager for Genetec Stratocast. “At Genetec, we believe strongly in building a network of trusted partners that have our customers’ cyber security best interests at heart. By extending our deep strategic partnership with Hanwha into the cloud, we are offering a solution that is cyber secure, cost-effective and easy to install.” Wisenet L series cameras The Wisenet L series cameras are very affordable surveillance cameras with essential features ideally suited for the needs of small and mid-size installations. The broad line-up includes fixed and varifocal lens, and bullet, dome and vandal-resistant dome cameras that are designed for both indoor and outdoor use. “With the L series now Stratocast-ready, and other camera families soon to follow, we will be offering our joint customers a comprehensive line-up of video surveillance solutions, that satisfy the needs of projects across a wide range of market sectors, from small/medium businesses and retail chains to city-wide surveillance,” said Ray Cooke, Vice President – Products, Solutions and Integrations at Hanwha Techwin America.
PerpetuityARC Training, part of Linx International Group - the world’s renowned provider of accredited security systems training courses, is responding to a surge in demand, for its portfolio of online training courses. The company is experiencing unprecedented international demand from organizations of all sizes, operating across a wide range of sectors, as they look to ensure they have the skills in-house to coordinate their response to the rapidly changing coronavirus (COVID-19) situation. Demand for online training course Director of Sales and Marketing at the Linx International Group, Sarah Hayward-Turton stated, “Even the very well-prepared organizations with extensive contingency plans, based on thorough risk assessments, have been stunned by the scale and speed of the situation we currently face.” Effective risk, crisis & disaster management begins with preparation for the worst case scenario" She adds, “Key personnel off sick or isolated, travel restrictions, offices and stores shutdown, supply-chain issues affected by manufacturing shortfalls, import delays, and panic-buying. These are just some of the issues impacting organizations right now. The scale is unprecedented, but effective risk, crisis and disaster management begins with preparation for the worst case scenario.” Latest methodologies and best practices Hayward-Turton further said, “We are helping small businesses with no continuity strategy, through to large multi-national organizations who want to train more employees on the latest methodologies and best practice, to ensure that expertise resides in-house, to help manage their response to this crisis, as well as being as ready as possible for what the future may bring.” Crucially, the accredited training courses provided by PerpetuityARC Training are available online and all offer CPD points. Courses range from bite-size introductions, through to formal accredited security risk management programmes. PerpetuityARC Training online training courses available now include: Security Risk Management – Learn how to identify threats, risks and vulnerabilities, and create a comprehensive plan that will enable practical measures to be applied to mitigate the impact. Crisis Management & Business Continuity - Learn about risk assessments, how to identify threats, and how to build a crisis management team. Risk, Crisis and Disaster Management – BTEC Level 4 qualification of immediate benefit to those working as security managers, intended to introduce and develop security and risk management to the highest level. The syllabus includes: risk communications, business impact analysis, continuity planning and crisis management, forming and operating a crisis management team, command and control structure and liaison with the emergency services. Managing Security Risk in the Oil and Gas Sector – IQ Level 4 qualification addressing some of the more complex risks associated with the oil and gas industry in a range of environments and examines the risks in upstream and downstream operations. Topics covered include: security risk analysis, corporate social responsibility, human rights, and community management, managing activism risk, managing acts of militancy and terrorism against the oil and gas sector, oilfield and pipeline security, refinery security, maritime and offshore security and downstream (retail security). Hayward-Turton concludes, “Whilst there is no precedent in modern times for the global situation we are facing, there are tried and tested tools, techniques and methodologies that every organization can put in place today that will help.”
Quantum Corporation today announced new product lines and capabilities which significantly expand its video surveillance and physical security product portfolio. The expanded portfolio includes: A new line of network video recording servers A new line of servers for building management systems and GPU-based video analytics New capabilities for the VS-HCI Series, which the company launched in 2019 to provide hyperconverged infrastructure (HCI) for surveillance recording, video management, and building operations. These expanded product offerings add to Quantum’s existing solutions for shared archive storage for surveillance, based on its StorNext® file system and the recently announced acquisition of the ActiveScale™ object storage solutions. The result is one of the broadest security infrastructure solution portfolios available from any single vendor. With new NVR servers, building management and video analytics QuantumCorp offers the broadest security infrastructure portfolio available. New Network Video Recording Server Line These expanded product offerings add to Quantum’s existing solutions for shared archive storage for surveillanceQuantum’s new line of Network Video Recording (NVR) servers complement the company’s VS-HCI Series and are offered in both mini-tower and rack-mounted form factors to provide customers with a range of affordable, reliable, and high-performance options for surveillance recording and video management. Quantum’s VST mini-tower NVRs are designed to support the surveillance of retail stores, gas stations, small buildings and campuses, and other small implementations, while Quantum’s VS4160 NVR is one of the most dense and highest capacity NVRs available for environments with large retention requirements. New Analytics and Application Servers To support the extreme graphics processing and parallel workload demands of video analytics, Quantum has introduced the VS2108-A analytics server. The VS2108-A can be configured with up to six GPUs in a compact 2U chassis and will accelerate results with leading video analytics software platforms. For access control and building management applications that require a highly available architecture, Quantum is introducing a new highly available application server, the VS1110-A. Quantum’s new VS1110-A Enterprise application server utilizes the same virtual machine (VM) failover capability found in Quantum’s VS-HCI series. Like the VS-HCI series, the VS1110-A server can be monitored remotely via a secure web-based portal, enabling facilities managers, integrators and Quantum support to proactively monitor this system anytime, anywhere. Monitor VS-HCI Series Health Remotely via Secure Web-Based Portal To support the extreme graphics processing and parallel workload demands of video analytics, Quantum has introduced the VS2108-A analytics serverQuantum has enhanced the capabilities of the VS-HCI series with secure, remote monitoring via a web-based portal. The Quantum VS-HCI series provides hyperconverged infrastructure for surveillance recording, video management, and building operations. The highly available architecture scales out as video camera counts increase and makes it easy to manage operations by running multiple physical security workloads on a single platform. Quantum StorNext and ActiveScale Storage for Large Surveillance Archives On March 16, 2020, Quantum announced that it had completed the acquisition of the ActiveScale object storage business from Western Digital. Object storage can be used as a tier for multi-petabyte surveillance infrastructure. Video is typically captured and recorded on higher-performance servers, then archived on object storage-based systems. The combination of Quantum’s StorNext file system and ActiveScale object storage can be a valuable solution for shared archive storage in many surveillance environments. Supporting Quotes “The most important message from Quantum to all of our customers and partners during this unprecedented time is that our top priority is the health and safety of our society, our employees, our communities and all of you. Our next priority is to ensure business continuity and site security,” said Jamie Lerner, President and CEO, Quantum. “Video surveillance plays a vital role in securing infrastructure and critical assets, and in protecting citizens. We’ve applied our years of expertise to build a comprehensive portfolio for surveillance, and we are responding quickly to the needs of our customers.” “Kepler Networks customers are on the front line of change in the surveillance industry, and as video surveillance technology has evolved it has placed unprecedented strain on storage,” said Gavin Bortles, President, Kepler Networks. “Customers who adopt intelligent, scalable storage as the foundation of their new surveillance and security system leave more budget for cameras, analytics, and other tools dedicated to protecting people and property.
Focused on Revenue, Knowledge and Branding, whether its profitable new cloud services, specialist ‘how to’ training or simply making a company stand out from the competition, GAP has what a business needs for success. Pyronix has launched their ‘GAP’ initiative, in an effort to help installers and their businesses grow, by working smarter and building their brand. Key areas Providing free tools to make an installer’s business grow faster, GAP focuses on taking a smarter approach to business performance, identifying three key areas: Revenue - ‘Not all clouds are gray’ With an emphasis on providing superior tools for installers, in order to develop and grow their business, with offerings including PyronixCloud, an evolving product range, and additional value-added services; there’s something that all installers can benefit from with GAP. Built with businesses in mind, Pyronix can help installers grow and excel. Knowledge - ‘Knowledge is Power’ Pyronix believes knowledge within the industry is key to being a leader, which is why they devised a knowledge-focused branch of GAP. Focusing on installation and product knowledge, and how installers can gain and use this to their advantage. Enabling them to accelerate ahead of the competition and be the best. Brand - ‘Make Yourself Famous’ GAP guides installers by providing brand focused tools and tricks, to make their brand stand out. Encouraging installers to look at customized products and sales tools, GAP will soon also introduce the new Pyronix Personal Print Portal. Providing a one-stop solution for designing and ordering promotional materials, Pyronix is set to demonstrate the importance of an installer’s brand and presence within the market. Helping installers grow business Laurence Kenny, Pyronix Marketing Manager commented, “This new initiative highlights the additional commitment Pyronix wants to make to installers. We want to help them grow their business and thrive within the industry.” We feel that this is a really positive step towards helping installers of Pyronix intruder systems" “This initiative is flexible and built with several interchangeable drivers, all designed to suit an installer’s business needs, whether they’re an experienced installer or just starting out.” Brand marketing tools He continued, “We feel that this is a really positive step towards helping installers of Pyronix intruder systems, guiding them through multiple aspects for business success, including recurring revenue business models, branding and training elements within their business. This initiative will provide practical tools installers need, to help them go that little bit further and realize their potential.” “We’re very excited to see the uptake in GAP and showcase our revenue, knowledge and brand marketing tools, providing the best platform to both new and existing installer businesses within the industry.” For any installers who would like to develop their brand and business, GAP has the needed tools.
Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data center, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. CV-19 means that huge numbers of people are getting access to the same desktop and files, and collaborative communication toolsBut as we know, CV-19 means that huge numbers of people are getting access to the same desktop and files, applications and collaborative communication tools that they do on a regular basis from the office or on the train. Indeed, the new generation of video conferencing technologies come very close to providing an “almost there” feeling. Hackers lie in wait Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical servers. Less than a month ago, we emerged from a period of chaos. For months hackers had been exploiting a vulnerability in VPN products from Pulse Secure, Fortinet, Palo Alto Networks, and Citrix. Patches were provided by vendors, and either companies applied the patch or withdrew remote access. As a result, the problem of attacks died back. But as companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on. That’s because remote desktop protocol (RDP) has been for the most part of 2019, and continues to be, the most important attack vector for ransomware. Managing a ransomware attack on top of everything else would certainly give you sleepless nights. As companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical serversExposing new services makes them also susceptible to denial of service attacks. Such attacks create large volumes of fake traffic to saturate the available capacity of the internet connection. They can also be used to attack the intricacies of the VPN protocol. A flow as little as 1Mbps can perturbate the VPN service and knock it offline. CIOs, therefore, need to acknowledge that introducing or extending home working broadens the attack surface. So now more than ever it’s vital to adapt risk models. You can’t roll out new services with an emphasis on access and usability and not consider security. You simply won’t survive otherwise. Social engineering Aside from securing VPNs, what else should CIO and CTOs be doing to ensure security? The first thing to do is to look at employee behavior, starting with passwords. It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposed. Best practice would be to get all employees to reset their passwords as they connect remotely and force them to choose a new password that complies with strong password complexity guidelines. As we know, people have a habit of reusing their passwords for one or more online services – services that might have fallen victim to a breach. Hackers will happily It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposedleverage these breaches because it is such easy and rich pickings. Secondly, the inherent fear of the virus makes for perfect conditions for hackers. Sadly, a lot of phishing campaigns are already luring people in with the promise of important or breaking information on COVID-19. In the UK alone, coronavirus scams cost victims over £800,000 in February 2020. A staggering number that can only go up. That’s why CIOs need to remind everyone in the company of the risks of clickbait and comment spamming - the most popular and obvious bot techniques for infiltrating a network. Notorious hacking attempts And as any security specialist will tell you, some people have no ethics and will exploit the horrendous repercussions of CV-19. In January we saw just how unscrupulous hackers are when they started leveraging public fear of the virus to spread the notorious Emotet malware. Emotet, first detected in 2014, is a banking trojan that primarily spreads through ‘malspam’ and attempts to sneak into computers to steal sensitive and private information. In addition, in early February the Maze ransomware crippled more than 230 workstations of the New Jersey Medical Diagnostics Lab and when they refused to pay, the vicious attackers leaked 9.5GB or research data in an attempt to force negotiations. And in March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHO and healthcare organizations in general since the pandemic broke. We’ll see lots more opportunist attacks like this in the coming months. More speed less haste In March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHOFinally, we also have bots to contend with. We’ve yet to see reports of fake news content generated by machines, but we know there’s a high probability it will happen. Spambots are already creating pharmaceutical spam campaigns thriving on the buying behavior of people in times of fear from infection. Using comment spamming – where comments are tactically placed in the comments following an update or news story - the bots take advantage of the popularity of the Google search term ‘Coronavirus’ to increase the visibility and ranking of sites and products in search results. There is clearly much for CIOs to think about, but it is possible to secure a network by applying some well thought through tactics. I believe it comes down to having a ‘more speed, less haste’ approach to rolling out, scaling up and integrating technologies for home working, but above all, it should be mixed with an employee education program. As in reality, great technology and a coherent security strategy will never work if it is undermined by the poor practices
Morphean’s CEO, Rodrigue Zbinden, explores the benefits of hosted video surveillance and access control, and what the growing interest from the IT community might mean for the physical security sector. Digital transformation continues to have an impact on every industry. In the physical security sphere, traditional CCTV and access control systems that once sat outside the connected world, are being replaced by their intelligent, cloud-enabled equivalents. The tired stand-alone legacy solutions of the past are increasingly being overhauled in favour of the smarter, customizable and scalable digital versions of these technologies. The question then is this: does this represent a new horizon for the physical security industry, or is it an existential threat in the form of a land-grab from the IT sector? Digital transformation continues to have an impact on every industry As the tectonic plates, as represented by the physical security and IT industries, continue to converge, it is clear that the underlying responsibility for physical security systems will be questioned. Conscious of the rapidly growing adoption of IoT devices, such as a surveillance camera, and their connection to IT networks and hosted data centres, Morphean commissioned an independent survey into the attitudes and behaviors of 1000 IT decision makers across the UK and Europe. We wanted to gain a better understanding of purchasing intent for evolving security provision in the 2020s. Landscape Report: Hosted Security adoption in Europe Our results revealed that as many as 84% of IT managers are currently using, or considering using, cloud-based video surveillance (VSaaS) or access control (ACaaS) systems. This points to an appreciation of the convergence of the physical and cyber security realms, and a willingness to embrace the merging of physical devices, connected through the IoT, with existing IT and cloud infrastructure. Of those considering such solutions, nearly 8 in 10 respondents said that integration with existing platforms or emerging technologies would also accelerate VSaaS and ACaaS adoption. The growing confidence in cloud seems to translate into more positive purchasing intentions around hosted security solutions with 77% of IT managers reporting that physical security is not currently optimized and one in five identifying it as a priority for 2020. Of those considering hosted security solutions, 4 in 5 (79%) anticipate introducing them to their business within a year. Our survey also revealed that 36% of IT managers identified operational performance as a priority for improvement within the next year. When we consider the many aspects of operational performance, productivity will always be a key measure, and cloud facilitates leaner decision-making, being more adaptable to the changing business landscape as required. Business application: unlocking intelligence Cloud-enabled physical security has much potential beyond security Cloud-enabled physical security has much potential beyond security. The data collected by network cameras and other physical security devices, combined with other sources of intelligence, can be used for a multitude of different purposes. For example, real-time analysis of visitor numbers, gender and age demographic in a retail store could be cross-referenced with promotional campaigns to gauge effectiveness, or used to identify insights into customer behavior patterns, such as hot and cold zones. The same platform might ‘learn’ to predict the behaviours that cause queue build-ups, and trigger alerts more readily to advise management that more till staff are needed. In the transportation industry, intelligent analytics can be used to improve operations across a small fleet of vehicles or an entire transport hub. Cameras and sensors can be integrated on board buses and trains to provide instant images and video footage to control centre personnel, while proactive intruder and loitering alarms employed at busy stations and depots, can deter suspected troublemakers before an incident occurs. People counting technology provides insights which can be used to increase or decrease security provision according to the amount of footfall, or to predict when additional turnstiles should be opened to more effectively manage queuing customers. The existential threat For the IT security professional already working with cloud systems and services, the growth in connected digital devices through the IoT is resulting in a growing appetite for physical security, such as network cameras, to enhance existing IT systems and assist business intelligence gathering. And, it is perhaps because of its digital DNA that the IT department is increasingly responsible for physical security purchasing decisions, a relationship historically managed by the fire and security professional who has been slow to adopt digital transformation practices and cloud-based business models. But we know there is an opportunity for the physical security provider because the IT manager who is well versed in computing protocols may have scant knowledge around maximising the full potential of physical security systems. The challenge is that IT will already have an existing relationship with their own IT solution providers, to whom they may naturally turn to help them with their physical security requirements. It is imperative, therefore, that the physical security provider of today becomes well versed in not only cybersecurity principles but is also able to speak the language of IT in order to successfully compete. The challenge is that IT will already have an existing relationship with their own IT solution providers Establishing partnerships One approach, given the nature of the shifting security landscape, is for IT and physical security vendors to unite in the delivery of a mutually beneficial and overarching solution. This would enable them to pull together their combined expertise to not only offer comprehensive protection of software and systems from a cybersecurity standpoint, but also take care of access control, perimeter protection, surveillance and all aspects of physical security too. For the IT manager, confident about the security of their cloud provision and committed to optimising physical security within their business, the bringing together of physical and cybersecurity solutions, provided by IT and physical security providers who speak the same language, can only be beneficial, enabling them to meet all of their security requirements. As the threat, both cyber and physical, continues to evolve, vendor partnerships and a joined up strategic approach could well prove to be the best line of defense for today’s businesses.
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change program, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programs continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessaccess to valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasize the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programs. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programs.
Even though ISC West 2020 was canceled, many of the product introductions planned for the trade show still happened. For example, physical security and secure identification company Identiv introduced the Hirsch Velocity Cirrus and MobilisID. Hirsch Velocity Cirrus is a cloud-based Access Control as a Service (ACaaS) solution. It is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. Smart mobile physical access control solution Identiv’s MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. We caught up with Jason Spielfogel, Identiv’s Director of Product Management, to discuss the new products and other topics. Q: How is Identiv positioned in the market as a whole? What philosophy drives your product offerings? What vertical markets do you target? Every customer needs every one of these components Spielfogel: Identiv provides a total solution. Our platforms provide access control hardware and software, video surveillance and analytics, door access readers, and ID credentials, both cards and mobile, for a variety of vertical markets: Federal government, state, local and education government agencies (SLED), healthcare, schools, banks/financial services, retail, airports and transportation, and infrastructure. Every customer needs every one of these components in every physical security deployment, and we ensure that all parts are working together at all times, even as technology continues to evolve. With that said, our philosophy is very customer-centric, and we position ourselves as a trusted partner. Our products and technology platform always strive to reflect and anticipate the environment our customers are facing, both in terms of technical requirements and functional capabilities. Q: How does the MobilisID system eliminate "friction?" Spielfogel: Identiv’s MobilisID eliminates the “friction” of access control by forgiving the user from presenting a physical credential to the reader. A simple wave of their hand over the MobilisID reader establishes a connection, and the reader reads their mobile device’s credential from the MobilisID app. No badge or access card to read, and no contact with the reader, makes this a frictionless access control experience. Administrative friction is also eliminated because there is no physical credential to issue or withdraw; it’s all done via the MobilisID Manager. Hirsch Velocity Cirrus is a cloud-based Access Control as a Service (ACaaS) solution Q: Discuss the advantages of Bluetooth over competing technologies. Bluetooth offers a blend of reliability and specificity Spielfogel: There are two primary competing technologies: WiFi and Near Field Communication (NFC). The problem with WiFi is that it’s not location-specific. In other words, the WiFi router can’t tell which door the user is near. NFC has the opposite problem in that it’s impossible to get credential reads unless the phone is presented within an inch or two of the reader. Bluetooth offers a blend of reliability and specificity to create frictionless access. Q: "Touchless" has always been a big selling point. Doesn't the coronavirus improve the outlook for these systems even more? Spielfogel: The coronavirus certainly highlights the value of frictionless access. But the vast majority of access systems today use proximity which was already touchless. But for systems using touchpads or contact-based credentialing, certainly frictionless is offering some alternatives that would help keep employees and visitors safer in the current climate. Q: How else might the current pandemic change the security market forever (i.e., more teleworking?) Spielfogel: Permanent changes are not likely, but it does force security directors to rethink how their employees interact physically with systems for both physical and logical access. As a result, we might see accelerated adoption of some emerging technologies, such as greater use of mobile logical access solutions, as well as frictionless physical access control. We’ve already seen an uptick in our smart card reader and token line and our Thursby enterprise and personal mobility offering during the coronavirus pandemic. Q: There are a lot of cloud systems in the access control space. How is your Cirrus cloud product different? Velocity already has all those features Spielfogel: Cirrus is different from many others in that it’s built on one of the most mature, feature-rich, secure physical access solutions available today – Hirsch hardware and Velocity Software. While many competitors are scrambling to add features to their relatively new ACaaS platforms, Velocity already has all those features. While they are building up their encryption capabilities and cybersecurity testing, we’ve already been doing that for two decades. We certainly have some more development ahead of us for Cirrus, but most of it is just surfacing features we already have into the Cirrus interface. Q: How do you guide customers as their needs change? Spielfogel: Whether users want solutions that are on-prem, in the cloud, or anything in between, Identiv’s full architecture ensures that customers can adopt and migrate to new solutions as they see fit. No two customers are alike, so providing the flexibility to gradually update or change systems is a real differentiator. Our competitors either want customers to jump all at once to the cloud or push to keep everything on-prem/legacy. CSOs and CISOs live in a different world: They've got it all to deal with. We're there with them across all of it, because that's the true reality.
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy" Smart home market on the forefront The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.” “The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.” Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com. Focus on Cybersecurity In 2020, companies will continue to focus on solutions for protecting consumer data" Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates. “Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.” “At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds. Smart access control Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology. Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighborhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighborhood security. Homeguard offers a range of affordable CCTV solutions for home and small business DIY CCTV demonstrations DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits. Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing. AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customized central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities. Security and automation solutions D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access. Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring. Personal safety mobile application Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens" WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features. “Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.” “Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organizations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organization’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetize the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organization. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organizations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organizations, not technology. If we truly understand the risks to the organization, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organizations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organizations.
ExtraHop, a renowned provider of cloud-native network detection and response, announced that Wizards of the Coast is using ExtraHop Reveal(x) Cloud to provide frictionless security for agile game development and delivery in Amazon Web Services. As the makers of popular titles including “Dungeons & Dragons” and “Magic: The Gathering,” international adventure game makers Wizards of the Coast (“Wizards”) entertain tens of millions of fans around the globe. In the highly competitive arena of online gaming, speed is key, and Wizards’ game development teams need to be able to roll out updates several times a day. That means security has to protect business applications and customer data without compromising speed or agility. With its online gaming platform built on Amazon Web Services, Wizards needed a way to provide frictionless security across its cloud development and production environments. Saas-based network detection With Reveal(x), we’re removing friction associated with security and becoming part of their development cycle To address this challenge, they chose ExtraHop Reveal(x) Cloud. When Wizards added Saas-based network detection and response (NDR) from Reveal(x) Cloud to their security suite, they empowered their security and development teams to work better together. “Developers aren’t anti-security; what they are is anti-friction,” said Dan McDaniel, Chief Architect and Information Security Officer at Wizards of the Coast. “With Reveal(x), we’re removing that friction traditionally associated with security and becoming part of their development cycle. That's a win-win across the board.” Cloud-native solution Reveal(x) Cloud is a fully cloud-native solution that leverages Amazon VPC Traffic Mirroring to provide the agentless visibility and packet-level granularity that security analysts and developers need to understand risk, as well as detect, investigate, and respond to threats. Reveal(x) Cloud also makes it easy for multiple parts of the IT organization to see and understand what’s happening in their environment, driving alignment between development, security, and IT operations, reducing tool sprawl, and making the development process more efficient. “What ExtraHop allows me to do is to provide security without validating the architecture of their games before they go live,” McDaniel said. “It gives (developers) the freedom to create and go, but I still have visibility and transparency into my risk.” A detailed case study of the implementation of ExtraHop Reveal(x) Cloud at Wizards of the Coast is available on ExtraHop’s official website.
Link11, renowned European firm in the field of cyber-resilience and cyber security, is offering its DDoS protection solutions free of charge to public sector health, government and public education organizations during the highly contagious phase of COVID-19. Public sector organizations are particularly vulnerable to cyber-attacks, and the availability of critical public infrastructures is more important than ever as people look for genuine sources of information related to the virus outbreak. Remote working policies Governments all over the world have taken necessary actions to lower COVID-19’s spreading curve, including implementing remote working policies, resulting in significant growth in internet traffic, leading to an increased risk of social engineering, business email compromise, ransomware and DDoS attacks. According to Link11’s research, during the three-week period Monday 17 February to Monday 9 March, Link11’s Security Operation Center (LSOC) defended 20,349 minutes of attacks (over 2,860 hours), which is more than 30% up compared to the 15,612 minutes of attacks mitigated during the same period in 2019. Link11 Cloud Protection Platform Marc Wilczek, Chief Operations Officer (COO) of Link11 said, “It takes only a small effort these days to overload servers and online services, and organizations need to protect their infrastructures. To help them deal with the evolving threat landscape, Link11 is offering government, public health and education organizations a solution that proactively identifies, blocks, and mitigates DDoS attacks within the Link11 Cloud Protection Platform, free of charge until September 2020.” Link11’s integrated Cloud Security Platform ensures cyber-resilience of the entire IT infrastructure On Sunday 15 March, the U.S. Department of Health and Human Services (HHS) suffered a cyber-attack, designed to slow the agency’s services amid the government’s rollout of a response to coronavirus, with the aim of overloading HHS servers. Officials assume a hostile foreign actor was behind this campaign. Cloud-based DDoS protection Traditional on-premise DDoS defenses, which are still widely used, and load-balancing products, are not able to protect individual websites, APIs or cloud applications against Layer-7 attacks, as these malicious data tsunamis can create big damage with little total bandwidth, bringing everything to a standstill instantly. Cloud-based DDoS protection, such as Link11’s integrated Cloud Security Platform, uses artificial intelligence, machine learning, strict automation and real-time analytics to ensure cyber-resilience of the entire IT infrastructure and application landscape supporting hybrid as well as cloud-native deployments.
Doncaster Culture and Leisure Trust (DCLT) is a registered charity delivering premier leisure provision venues across Doncaster. DCLT offers a diverse range of health, fitness, leisure, and entertainment activities to customers to help to achieve a healthier community across Doncaster. DCLT’s premier venue, The Dome, required a new solution that would protect several areas, including one of the largest gym’s in Doncaster, The Fitness Village. DCLT had a specific brief for this project that specified enhancing the staff and customer experience, while simultaneously providing access control solutions to restricted areas from the general public, members, and staff alike. Alongside interfacing the onsite gym membership system to enable a single source of data to populate the access control and automate the process, the Trust was also in a transition period of moving members from barcode to RFID badges. Advanced fast-acting swing speed gates Moreover, the entrance to The Fitness Village gym was also under renovation. The access control system would also need to feature advanced fast-acting swing speed gates and slim lanes. Advanced user obstacle protection also had to be kept in consideration to keep members safe during peak times when there would be a high level of footfall from visitors. Solutions Provided: Oliver Law Security (OLS) did not hesitate to recommend the Vanderbilt ACT365 system. ACT365 is not only a fully cloud-based product; it offers a flexible solution for installation and management that OLS identified as a key ingredient to meet DCLT’s project brief. In addition to DCLT’s security requirement, OLS also realized ACT365 as an ideal solution for this task, given the product’s very focused API integration. Thanks to the ACT365 interface, OLS was able to integrate DCLT’s gym management system to enable single-source data to be used to populate the access control system, keep records up-to-date, and enhance customer experience. For instance, previously, the older system had taken up to 3-5 seconds to validate members and open the entry turnstiles. Once the API interface had been achieved, this validation is now done instantly through ACT365 and allows members with active memberships through the entry points without any minimal delay. The scope of this project, although not significant in the number of doors, was a very technical project with integration into SQL server and a third-party membership system with the potential for thousands of would-be users. Key Highlights: According to OLS, using ACT365 and its API interface is a game-changer for this type of project. With multiple updates per day, the access control system is always fully populated with the correct, validated members ensuring DCLT’s premier venue, The Dome, is protected against memberships that have lapsed. The system is very user-friendly and can grow with DCLT’s plan for the future, and adding further developed integration for other areas within the near future. The system is entirely cloud-based offers an off-premise solution with no additional new servers required or PC’s running software. Through the ACT365 app, DCLT’s site administrators can manage the system for staff. The solution that OLS has implemented has removed the need for old, antiquated technologies and moved DCLT’s security system forward to the cloud and future-proof solutions. The beauty of the interface is once the schedule runs, all information is autonomously sent to the ACT365 database, meaning adding new memberships, updating memberships, or revoking access is seamless, not tying up staff verifying and administering the membership/access control systems respectively.
The Government of Jersey has appointed SureCloud to manage its government-wide cyber security transformation program, which aims to maintain the reputation of Jersey as a safe place to work and live. The new two-year deal forms part of the government’s Cyber Security Strategy, announced in 2017, to enhance its cyber resilience during its period of modernization. Cyber Security Strategy The Government of Jersey provides key operational services to more than 106,000 citizens and 7,000 businesses in Jersey. All of its services, including tax, healthcare, waste management, social services and education, depend on the security and availability of IT and Operational Technology (OT) systems. The financial services and tourism industries also heavily rely on the availability and security of the government’s services. Cyber Security Program Management Service SureCloud to deliver a Cyber Security Program Management Service, includes establishing governance SureCloud will deliver a Cyber Security Program Management Service which includes establishing governance and reporting processes for all elements of the government’s cyber security program. This will involve providing risk and issue management, program governance, information security processes as well as financial, quality and information management. It will also coordinate, lead and communicate business change across cyber security projects. This will be led by a dedicated Program Director who will proactively manage the day-to-day management of the government’s cyber security program and proactively monitor overall progress, as well as resolving any risks and issues that may arise. Cyber Security solutions “The Government of Jersey wants the island to remain a stable and attractive place to live and do business, in both the physical and digital world,” comments Ben Jepson, Vice President of Risk Advisory at SureCloud. “Cyber security is a prerequisite for this, which is why the government is investing in this cyber security programme. With our experience, knowledge and hands-on team, we are confident we can help them enhance their cyber security and move their transformation programme forwards.” The Cyber Security Program Management Service, which launches on 3rd March, will be delivered in two 12-month tranches. The first is split into six distinct projects: Program Management, Managed Security Service Provider (MSSP), Governance Improvement, Identity and Access Management, Asset Management and People Security. The second includes preparing for, and developing, procurement documentation for tranche two projects. Cyber Security expert Stuart Powell, CISO at Government of Jersey, concludes, “As we embark on a period of extensive change and modernization, cyber security is a critical enabler for delivering government services to the citizens and businesses of Jersey. We were impressed with SureCloud’s offering for improving our cyber security capability in quality and scale as well as their Program Director who we are looking forward to working with.”
Openpath, a provider of modern mobile access control, is announcing a partnership with Lincoln Property Company (LPC), one of the diversified real estate service firms in the United States. Openpath has been selected as LPC’s technology partner to standardize and bring best-in-class technology solutions across its current portfolio and planned developments of commercial spaces. Openpath’s platform focuses on integrated technology to provide frictionless mobile access and scalable cloud-based solutions that can also integrate with legacy systems. This collaboration future-proofs LPC’s security offerings for modern commercial development. The partnership marks a shift in the commercial real estate market, as operators and tenants demand technology-capable properties that provide ease, efficiency and advancement to address high-risk security challenges. Already deployed in a number of LPC’s Los Angeles properties, Openpath will continue to outfit buildings across the country, providing state-of-the-art, personalized security plans and solutions for individually customized building needs. Integrated security solution LPC is one of the ten largest commercial property developers in the nation, managing or leasing over 403 million square feet and $76 billion in assets. As the first developer to choose an access control and technology partner, LPC is now leading the charge for tenant experience and innovation. With the built world becoming more technology-reliant, an integrated security solution is critical to making an environment attractive for LPC’s tenants and employees. This partnership provides a future-proofed solution for LPC properties, as Openpath’s cloud access control technology provides a standardized solution that can be integrated across LPC’s current and future technology needs. In addition to mobile access control, Openpath offers LPC buildings a broad range of first-to-market services including Lockdown and Tailgating Prevention to address current workplace security concerns. While required integrations will continue to evolve, Openpath and LPC’s strategic relationship enhances and ensures the property's attractiveness years down the line. Customization capabilities “This partnership provides an opportunity for us to continue to develop and personalize our solutions tailored towards Lincoln Property Company’s unique portfolio of commercial spaces,” said James Segil, co-founder and President of Openpath. LPC is focusing on the future of how we integrate better solutions" “Our mobile platform provides necessary customization capabilities while giving LPC’s tenants the freedom of control in their daily security. LPC is focusing on the future of how we integrate better solutions and we’re excited to see this next stage of development as we continue to design products that meet evolving property needs.” “Our goal is to ensure that every building provides the highest quality experience for our tenants,” said Eric Roseman, VP of Innovation & Technology Ventures, Lincoln Property Company. “We are excited to be the first major real estate firm to partner with Openpath to bring this technology to a nationwide commercial portfolio, and to spearhead the movement of tenant experience by providing our buildings with state-of-the-art security and mobile access control.”
SALTO Systems has been selected to provide a smart access control solution for Venture X, a modern workspace community located in Chiswick Park, West London. This business hub, with great transport links into Central London and Heathrow Airport is home to some of the best companies working in the oil and gas, media, entertainment, technology, food and drink, and health and beauty markets. It comprises 1.8 million sq. ft of award winning accommodation, arranged as a necklace of 12 office buildings. Each building faces the Park's 'inner garden' with a featured two-tier lake, waterfall, decked boardwalk, pathways, events space and landscaping. Chiswick Park also houses over 45,000 sq. ft of retail including the on-site Virgin Active gym, restaurants, convenience stores and an ever-changing array of pop-up traders and street-food vendors. Cutting edge sustainable building development Hot desks offer 24/7 access to common working areas (hubs) including phone booths and high speed Wi-Fi Part of the globally renowned, Venture X United Franchise Group, Venture X provides a brand new inspiring, diverse, and collaborative working environment that is so much more than just shared office space. Housed in a cutting edge sustainable building development, which includes solar fins, it offers a place where individuals and businesses can lease hot desks, private desks or private offices. Hot desks offer 24/7 access to common working areas (hubs) including phone booths and high speed Wi-Fi. Private desks add a Cat 6 Ethernet port, meeting and board room access, a business address with incoming mail handling, lockable office space and a private locker. Private offices top the package by proving all the previous offerings but in a fully furnished office space including SALTO access control. Modern locking solution With some 30 internal office and meeting room doors to secure, Venture X was looking for a technologically modern locking solution that would satisfy the needs of both the business and its customers. Key requirements were the ability to grant access rights instantly for new customers and revoke them in real-time for former customers. No hassle, costs or security issues with mechanical keys were wanted. They needed an audit-trail overview of who accessed which door at which time. Flexibility allocating office space, meeting rooms etc on a day to day basis as required. Easy meeting and conference room access, and finally, easy, wire-free installation without software installation and IT configuration. SALTO KS Keys as a Service cloud locking To meet these needs, SALTO’s KS ‘Keys as a Service’ cloud based locking solution was recommended. This provides a flexible access control management system that requires no software installation or the added expense of a fully-wired electronic product. All that is needed is an online device with an Internet connection. Providing end users with cloud-based SALTO KS Keys as a Service reduces cost and almost eliminates the need for maintenance. Highly secure, thanks to its 2-factor-authentication and 128 bit AES encryption; it provides flexibility, scalability, reliability, and the ability to manage access control from any Internet platform. Remote door locking solution One of the key need was a product that offered both a card and mobile app solution to remotely open doors" Venture X Director Andrew Ross comments “When you’re providing a working and meeting environment for entrepreneurs, and business people and large corporates, many of whom will be involved with technology businesses, security, efficiency and design were all essential aspects of the brief when we selected our preferred access control solution”. He adds, “One of their key requirements was a product that offered both a card and mobile app solution that would enable the members to remotely open doors, i.e. for customers, tradespersons or postal deliveries to gain access for example without the need for a staff member to be physically present in the building." Electronic access control Ross added, “Another feature wanted was office mode, so instead of having to present an access card or smart phone app to a door every time someone used it, the door would function just like a normal door during pre-set times but auto lock when required." Andrew further said, “The SALTO KS now installed meets those requirements and gives comprehensive 24/7 access control that covers our entire property. They are looking forward to utilizing SALTO KS across the new Venture X locations that are in development for 2020 and 2021.”
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
The new year comes with new opportunities for the security industry, but what technologies will dominate our discussions in 2020? Topics such as artificial intelligence (AI) and HCI (hyperconverged infrastructure) became familiar in conversations during 2019, and they are likely to dominate our thoughts again in the new year. But other buzzwords are also gaining steam, such as “blockchain” and “frictionless access control.” Connectivity and the cloud will also be timely technology topics as the industry evolves. We asked this week’s Expert Panel Roundtable: What technology buzz will dominate the security industry in 2020?
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals