Commercial security system
Michael Fogelman, retired Master Chief U.S. Navy SEAL with 32-years of special operations experience, will spearhead the new division, concentrating on military and law enforcement contracts. SENTRY Products Group, a renowned manufacturer and distributor of products focused on the military, law enforcement and shooting sports markets, is proud to announce the launch of the new Special Operations Division and the hiring of retired Navy SEAL Master Chief, Mike Fogelman, to grow military and law e...
Overview Ltd, renowned UK developers of high-precision, sensor and camera positioning technology, this week announced the release of their Hydra 3000 series of rugged PTZ surveillance cameras which offers a range of enhanced features. The Hydra 3000 has been designed to support operation in harsh, outdoor environments. Incorporating the same quality build synonymous with Overview’s existing Hydra family of high-performance Pan-Tilt-Zoom (PTZ) camera platforms, Hydra 3000 combines aestheti...
Acronis, a global provider of cyber protection, announced plans to expand its global network of cloud data centers, including new state-of-the-art facilities in Canada, New Zealand, and Bhutan. Announced at the Acronis Global Cyber Summit 2020, the expansion ensures that the full range of Acronis Cyber Protection Solutions will be available to partners and organizations around the world, which is critical now that an estimated two-thirds of employees work remotely and rely on cloud-based servic...
OPTEX has launched its new Intelligent Visual Monitoring solution in the UK and Ireland, powered by CHeKT - a hardware and software solution that takes separate intruder and CCTV technologies installed on the same site, but acting independently, and ‘bridges’ them to create one, seamless, integrated visual monitoring solution. Monitored intruder alarms can now be visually verified within seconds, without impacting the integrity of the technology installed, or its Grade. When an alar...
If one works in the technology industry, it’s likely one has been hearing about recent advancements in AI-based video analysis for years now. The tech has seemingly hit its stride, with new services and applications continually popping up to expand and support the ecosystem. For an example, one really has to look no further than Amazon Rekognition, which leverages Machine Learning (ML) to make it easy to identify things like objects, people, or text within videos and images. AI developmen...
ENCS, the European Network for Cyber Security, and E.DSO, the European Distribution System Operators’ Association, announced the launch of security requirements for Distribution Automation (DA) of Remote Terminal Units (RTUs). This is the third in a series of security guidelines for a smarter and more secure energy network, after ENCS and E.DSO previously released security requirements for electric vehicle charging points and smart meters. These requirements are an important tool in impro...
Network Utilities announced it has signed a channel partner agreement with Nokia. As a result of this relationship, Network Utilities will market, distribute and service Nokia’s product line of AAA services and cyber security products. Ashok Thomas, Chief Executive Officer, Network Utilities said: “Network Utilities is delighted to be partnering with Nokia to bring its AAA and cyber security solutions to our customers. We feel Nokia is the perfect partner to bring the breadth of experience and end-to-end solutions needed to help customers secure themselves against today’s ever evolving threats.” Phil Siveter, Head of Enterprise UK&I, Nokia said: “The Global Partner Program is important to Nokia as it gives us a route into new and exciting enterprise customers. We are pleased to welcome Network Utilities to the Nokia Global Partner Program to drive growth and establish new customer relationships together.”
Integrated security manufacturer TDSi is pleased to announce the appointment of Zara Taylor as Marketing Manager. Zara, who is based at the company’s global headquarters in Poole, Dorset, is overseeing the company’s ongoing and rapidly expanding digital and marketing strategies. TDSi’s Managing Director, John Davies commented, “We’re excited at the prospect of seeing Zara’s skills being put to work, as we take our marketing activity to the next level with a good dose of Millennial thinking and knowhow. Zara’s knowledge of the digital and social landscape will add fresh impetus to our marketing drive, as we bring new products out of our development pipeline and augment our sales channel strategies, both at home and abroad. I know that Zara will have a positive impact on our activities, and I’m delighted she’s now a part of the team.” Marketing industry experience Zara has worked in the marketing industry for three years for a variety of different industries Having graduated from the University of Northampton in 2017 with a First-Class BA in Fashion Marketing, Zara has worked in the marketing industry for three years for a variety of different industries including: hospitality, automotive, fashion, and now security. Commenting on her appointment, Zara stated, “I am very excited to be leading TDSi’s continued vanguard into the digital world, which is a vital part of the security industry’s continued growth and evolution. Security needs are universal across all industries and our customers and potential customers operate across all vertical sectors, so it is vital that we continue to deliver relevant and exciting messaging to all these audiences through all digital channels.” Embracing digital channels Zara adds, “We have many exciting developments taking place at TDSi which we will be unveiling over the coming months and into 2021, and I look forward to being a key part of this. As we all settle into the new normal, TDSi will be further embracing digital channels, as well as meeting our customers and partners at UK and International events, to showcase our solutions for an ever-evolving security world.” Alongside her marketing career, Zara likes to stay active and regularly plays netball (social distancing rules permitting!) and is currently training for a planned ultra-marathon in 2021. “It will be 100km, and I sometimes think I must be mad! But setting yourself exciting goals, working through any challenges, and achieving them, is just as important in your life as it is in your career. I am delighted to be part of the TDSi team, which shares this approach to being the best you can be.”
Navigate360 urges to identify the warning signs of stress in the employees and ultimately prevent violence with confidence and knowledge. If it is like most businesses, the business probably weren't at all prepared to deal with COVID-19, and the companies are still tirelessly adjusting operations to adapt and survive. Regardless, the urgency of another eclipsing issue is about to interrupt those efforts. Professionals have warned of a follow-up tsunami in the form of mental health issues. And it's about to make landfall in the workplace. Because modern workplace safety begins with prevention, Navigate360 created this important eBook for everyone’s use as a resource. Written by Joe Hendry, a certified Physical Security Professional (PSP) widely considered one of the top U.S. trainers in Violent Critical Incident response, this eBook details the startling research on behaviors of violent individuals and the impact of the pandemic on workplaces. Identify warning signs It's intended to help the users identify the warning signs of stress in an organization’s employees and ultimately, to prevent violence with confidence and knowledge. Readers can get vital information on: Current trends in stress and violence How to identify the warning signs in the employees What the organization and their team can do to help eliminate the stigma around mental health Workplaces thrive when people feel safe, both physically and emotionally.
Digital Guardian, a provider of data loss prevention and managed detection and response, has announced Tim Bandos will become Chief Information Security Officer (CISO). Bandos will bring more than 15 years of experience to the position, including his five years as VP of Cybersecurity at Digital Guardian. Prior to joining Digital Guardian, Bandos was Director of Cybersecurity for Dupont where he was responsible for overseeing internal controls, incident response and threat intelligence. In his new role, he will lead Digital Guardian’s global cybersecurity strategy, leveraging the latest technology and threat intelligence available. Evolving threat landscap We're excited to have Tim officially in this important role and I welcome him to my leadership team" "Tim's experience in cybersecurity has provided him a rich understanding of the evolving threat landscape and the strategies, techniques, and processes every company should deploy to mitigate the risk of data loss," said Mordecai Rosen, Chief Executive Officer, Digital Guardian. "We're excited to have Tim officially in this important role and I welcome him to my leadership team." Bandos joined Digital Guardian five years ago with the goal of successfully building the company’s Managed Detection & Response Service from the ground up. That service now manages and monitors more than one million endpoints and delivers best-of-breed threat hunting and incident response. specialized security analysts His other accomplishments while at Digital Guardian include: Building the Advanced Threat & Analysis Center Team (ATAC Team), a premier group of specialized security analysts, threat hunters, and incident responders that focus on breach detection and response. Guiding the development of the DG Endpoint Detection & Response (EDR) technology within the Digital Guardian Data Protection Platform. Directing the company’s efforts on adopting the NIST Cybersecurity Framework to continually improve the company’s security posture and programs. Spearheading Digital Guardian’s SOC 2 and other certification initiatives. Promoting security best practices to CISOs and other security executives at major security conferences around the world, including RSA, Black Hat and Infosecurity Europe. Vigilant and cyber-aware “I’m thrilled to be named CISO at Digital Guardian. DG has invested heavily in a robust and resilient environment but threats continue to evolve, so our program must as well,” said Tim Bandos, Chief Information Security Officer, Digital Guardian. “As CISO, I’ll continue to reinforce a company culture that puts security at the forefront. It’s critical that all of our employees do their part to stay vigilant and cyber-aware to protect our most valuable asset: data.”
At the official launch of CyberCenturion Vll, Nick Chaffey, Chief Executive, UK, Europe and Middle East, Northrop Grumman announced that the 2020/21 focus of the competition will be on encouraging greater diversity in the cybersecurity sector. CyberCenturion VII is open to all secondary school students in the UK, UK Crown Dependencies and UK Overseas Territories and starts in October 2020 with the national finals due to take place in April 2021. CyberCenturion is the UK edition of the global CyberPatriot program, sponsored and led by Northrop Grumman, designed by the U.S. Air Force Association and delivered in the UK in partnership with the Cyber Security Challenge UK. Cybersecurity teams “Our mission at Northrop Grumman is to recruit, develop and retain the most talented employees, and that means having access to the most diverse talent pool to ensure that our cybersecurity teams retain a vigor and dynamism that matches the challenges in our sector,” Chaffey said at the virtual launch. “We believe that continuing to create a work force and a workplace that is diverse and values diversity and fosters inclusion is both the right thing to do and pivotal to delivering innovation. It will take time for CyberCenturion to reach every school in every neighborhood, but we are asking for your support to achieve this important aim.” Crack cyber crime If COVID-19 restrictions prevent a face-to-face final in 2021, the final will take place as a virtual event CyberCenturion is a UK-wide competition which gives secondary school pupils the opportunity to develop and bring a myriad of skills into play to crack cyber crime. The multi-round event, for which there is no fee to participate, culminates in a national final for the highest scoring teams. If COVID-19 restrictions prevent a face-to-face final in 2021, in line with qualifying rounds, the final will take place as a virtual event. CyberCenturion VII is adopting the theme of space, to highlight the unlimited opportunity that young people from all backgrounds in cybersecurity have, linked to the pioneering work Northrop Grumman does in space. This ranges from the historic Lunar Module, the vehicle that landed men on the moon, to the Mission Extension Vehicle (MEV) and James Webb Space Telescope. Inspirational people Nitya Sri Adapala is a past winner of CyberCenturion: “It opened my eyes and those of my teammates to a whole world of inspirational people that we could talk to and learn from. As a direct result of entering CyberCenturion, the enrollment onto Computer Sciences at our school went from 3 people to 18 - it’s been fantastic and I do feel proud of myself and my teammates for encouraging girls into the industry.”
Multi-brand distributor, Oprema, are proud to announce the appointment of Natasha Owens as their new HR Director. Oprema are delighted to promote Natasha and welcome her to the Board of Directors in her new role. Natasha is the first female to join the Board, providing new angles to discussions. The decision to give HR a place at board level within Oprema reflects the value the company places on its people. Commenting on her appointment. Natasha said “At Oprema we pride ourselves on our excellent customer service and technical support. In order to deliver this level of service, you need the right people in your team. As HR Director it’s my responsibility to ensure we attract and retain the right people; people who have the drive and enthusiasm to go the extra mile.” Receive regular feedback Oprema support their employees to develop themselves both professionally and personally and where possible, offer opportunities for progression and career development. It’s part of Natasha’s remit to ensure team members receive regular feedback on performance and that Oprema’s rewards and benefits package is both competitive and fair. We are very proud to have achieved both Investors in People (IIP) and Real Living Wage accreditations in 2019" Natasha said, “We are very proud to have achieved both Investors in People (IIP) and Real Living Wage accreditations in 2019, demonstrating our commitment to our people and to paying a fair wage. As HR Director it’s my responsibility to ensure employee well-being is taken seriously and that we offer the appropriate support in response to the myriad of challenges that life can throw at us." Reviewing internal procedures "As well as reviewing our own internal procedures and support structures, we work with national and local partners, in order to offer professional support to our staff where it’s needed. It’s part of my remit to keep up to date with relevant legislation and guidance in relation to employment law, and in more recent days in relation to the global pandemic that is COVID-19." "It’s been an incredibly challenging year for us all, both personally and professionally, but the team at Oprema has come together to ensure we continue to deliver an excellent service to our customers, and we are stronger for it.” Continued development Matt Epps, Managing Director commented “Natasha has been as asset to the team at Oprema since the day she joined, 7 years ago. Always forward thinking and taking steps to develop our employee relations, it’s a pleasure to see her progress. Thanks to Natasha, we were proudly awarded Investors in People accreditation in 2019 and shortlisted for IIP Awards in 2019 and 2020. We congratulate Natasha on her new appointment and look forward to the continued development she brings for the company.”
Indoor positioning is, in many ways, an inside version of the satellite-navigation apps we rely on for outdoor navigation, but with an added twist – it can also be used to help locate people and things. Let’s say you’re at home and misplaced your car keys, or you’re in a grocery store and can’t find your favorite brand of coffee. Or maybe you’re working in a factory and need a particular tool from a storage bin, or you’re a site manager dealing with an emergency and need to make sure everyone’s exited the building. Indoor positioning helps in all these situations, because it can locate items and guide you to where they are. The importance of “where” Knowing where an asset is located in real time is useful in many ways. In industrial settings, it improves item utilization rates and saves time spent searching for things. It opens the door for a new level of “just in time” efficiency on factory floors, and for inventory management in warehouses and retail environments. Safety is another benefit of accurate location, because knowing where people, automatic guided vehicles, and robots are in real time can help prevent accidents and keep people out of harm’s way. Accurate location in real time also enables contextual decision-making, so your smart house adjusts your stereo automatically as you move from to room or lets you control objects by simply pointing at them. Lets you control objects by simply pointing at them Security authorisations based on location is another possibility. Precise real-time location is something that can be hard to fake, so it can be used to restrict access to an area or used to add protections based on where an asset sits, where a piece of data resides, or the origination point of a communication. Getting the technology right Developing an effective technology for indoor positioning requires several things. To begin with, location readings needs to be very precise, with accuracy down to as small an area as possible. The technology has to be secure, because location often needs to be kept private. The technology has to be reliable, even in harsh environments, and easily scalable, too, so it can address the thousands of people and assets in large venues. It has to be low power and affordable, so it can be embedded in everything from high-end, complex devices like smartphones to low-end, simple devices like asset tags. And, of course, the technology has to have latency low enough that it can track movement in real time. Various wireless technologies, including Bluetooth and Wi-Fi, are already used for indoor positioning, but they don’t deliver on the full set of requirements, especially in terms of accuracy. A different kind of wireless, called Ultra-Wideband (UWB) checks all the boxes. It has the potential to change the way we do all kinds of everyday tasks. What is UWB? UWB is based on the IEEE standard 802.15.4a/z, which has been optimized for micro-location and secure communication. UWB is highly accurate. It can pinpoint people and things to within just a few centimeters, making it 100 times more accurate than the current implementations of Bluetooth Low Energy (BLE) and Wi-Fi. UWB is reliable because it has high immunity to various types of interference, including multipath, which is when a wave from a transmitter traveling to a receiver by two or more paths causes interference. UWB also offers very low latency, with update rates of up to 1000 times per second and readings that are as much as 50 times faster than satellite navigation. UWB is also implemented using mainstream technology, so it’s both affordable and optimized for low power. Lastly, UWB leverages distance-bounding techniques defined by the IEEE to provide a level of security that makes it extremely difficult to hack. Ultra-Wideband (UWB) checks all the boxes How is all this possible? Physics! UWB out-performs other location technology because, unlike Bluetooth and Wi-Fi, which transmit narrowband signals and use Received Signal Strength Indicator (RSSI) to determine location, UWB transmits wideband signals (500 MHz) and uses Time-of-Flight to determine location. Already in 40+ verticals UWB is already bringing value to products and services in more than forty verticals covering the consumer, automotive, industrial, and commercial market segments. For example, it brings operational visibility to manufacturing and logistics, helps businesses protect workers, and reduces safety-management costs. UWB also lets robots and drones self-navigate, and enables secure, hands-free access to cars, front doors, and other secure locations. It even helps with contact tracing and social distancing in the fight against COVID-19. Now in smartphones Recent adoption in smartphones means UWB is ready to grow quickly. Developers are using UWB as part of new services, with an eye toward making various everyday activities more convenient and safer. With UWB as part of smartphone apps, purchases will be more secure, accessing your car will be possible without a key fob, and misplaced items won’t stay hidden for long. Retail outlets will use location for targeted marketing, and finding things on store shelves will be easier than ever. Home automation will become seamless, and friends and family will be easy to find even if they’re in a crowd. The question of interoperability Having UWB in smartphones is an important first step Having UWB in smartphones is an important first step toward making UWB an everyday part of life, but interoperability is another key factor, since smartphones have to interact with a wide range of other devices and services. That’s where the FiRa Consortium comes in. Launched just over a year ago, the FiRa Consortium is a member-driven organization of market leaders from the consumer, mobile, industrial, enterprise, and semiconductor industries. FiRa members work collectively to define the future standards that will make interoperability across UWB products a reality. With FiRa making it possible for developers to use UWB in all kinds of new ways, the future of indoor location is really only limited by the developer’s imagination.
In recent years, multinational corporations such as Cathay Pacific, Facebook, Uber and numerous others have been heavily fined due to security and data protection violations. This period has seen data protection laws increase as more and more information is gathered and shared online. As such, it becomes crucial to account for security capabilities when choosing an embedded device that touches potentially sensitive data. RFID readers very much belong to the ecosystem wherein personal or user identification data is transmitted either to a host system such as a PC or to an endpoint such as a Human Machine Interface (HMI). A passive RFID transponder, soft credential such as a mobile phone app using BLE/NFC or smart cards and other contact-based credentials all can carry sensitive data or personal information. In the case of smart card or contact-based credentials, the storage of personal information such as name, address or date of birth is more prevalent compared to contactless credential where an identification number may be used. Security as a concept RFID media may directly lead to a compromise in your intended application’s security In general, security as a concept is always related to the entire system that includes RFID media (contact/contactless credentials), RFID reader, the host system and any database or cloud server. While accounting for security across a system is needed it is more important to consider the application or use case that is in question. One should carefully evaluate the consequences of any security breaches and if there is any sensitive information being exchanged from the RFID media to the host. As an example, the simple choice of RFID media may directly lead to a compromise in your intended application’s security. There are numerous references on security vulnerabilities related to Low Frequency (125KHz) contactless transponder types. The references focus on using interceptors to access unprotected static card information. The adversaries may then clone this credential that may be used for triggering action such as granting access to a facility or unlocking a computer. Some references also highlight vulnerabilities in the Wiegand interface about intercepting the data signals to capture card value. Therefore, some older RFID transponders and communication interfaces that may be based on the aforementioned technology or have been subject to vulnerability hacks are now considered fundamentally compromised. As mentioned previously, the overall security depends on every component of the system that includes the RFID reader. This article will mainly focus on some of the basic security considerations that need to be accounted for when choosing an RFID reader but also whether or not your application requires these abilities. Some of the key security considerations are as follows: Does your application require encryption capabilities? If so, does the reader have the capability to execute cryptographic algorithms? In every application where RFID technologies are involved, there is a need to first assess whether encryption is required and if so, determine the exact channel where this needs to be enforced. It could be that the host interface requires the exchange of encrypted data or the air interface needs to transfer protected data. Once the requirements are established, one may then evaluate the strength of this security. Furthermore, many types of contactless transponders can store data within their memory segments and encrypt or lock these segments with cryptographic keys. An apt card reader is one that can not only decrypt the memory segments and access the data but also provides an easy means for the end-user to carry out this operation. In many instances, the end-users have their own customized cryptographic keys for their credentials and are unwilling to share these keys with the card reader provider. Therefore, having the capability to load custom keys by someone other than the card reader manufacturer becomes essential. This can be facilitated in multiple ways, such as implementing high-level APIs and allowing the user to write applications for the card reader, or it could be enabling the customer with agraphical user interface to enter keys used to access data sectors. Many types of contactless transponders can store data within their memory segments Do you require encrypted data exchange? If so, where and can the card reader support this? In a typical scenario, the card reader behaves as a medium to facilitate data collection and transfer between the contactless or contact-based transponder and the host system. The host system can either be an endpoint that locally validates the credential presented to it or it can be a microcontroller that sends data over the network to the cloud or a database for validation and authentication. As mentioned previously, assessing whether the need for encryption is between the RFID media and the reader or from the reader to the host is important. If the former, the appropriate credentials are required. Depending on this factor you may then consider choosing an appropriate RFID reader. There are use cases wherein personal information such as name, address, date of birth or biometric data can be stored within the credential, eg: smart cards or passports as credentials. Therefore, encrypting the exchange of such data both between the credential and the reader as well as the reader and the host becomes critical. Moreover, encryption algorithm engines such as AES, DES, 3DES, or the capability to implement custom algorithms, need to be present on the card reader as this enables ease of integration. In cases where smartcards or contact-based credentials are used, the host system typically drives the communication in its entirety. So, the card reader must also have: Software capabilities such as Personal Computer Smart Card (PCSC) or Chip Card Interface Device (CCID) mode of communication. The availability of drivers to facilitate communication with the host also enables easy software integration. Hardware support for communication standards such as ISO7816 and the presence of Secure Access Modules(SAM) slots and other contact-based interfaces. Does your application require MUTUAL authentication with Secure Access Modules (SAM) and RFID media? If so, does the reader support This? A Secure Access Module is a type of smart card that follows a contact-based communication standard to interact with a card reader. These modules ensure the protection of security keys as well as facilitate cryptographic operations. Typically, SAMs are used to generate application keys based on a specific master key or to generate session keys. They also enable secure messaging between the RFID media, the reader and the host system. Many contactless credentials hold memory segments/applications that are encrypted with cryptographic keys. These keys are often stored in SAMs and supplied to card reader manufacturers. This not only ensures the security of the keys but adds a step in the authentication process. The card reader in this case should first perform authentication operations with the SAM and then carry out a series of cryptographic and bit manipulation operations between the contactless card and the SAM. This can be further secured by adding a key diversification step. The card reader must be able to support such a scenario both in the hardware as well as in the software. Many end-users require the card reader to natively support such a scenario and have the ability to provide high-level API’s to help in their implementation. In addition to this, high-security applications demand the transfer of data in an encrypted format. One can ensure end-to-end encryption/security with the help of SAMs. In such an architecture, the reader facilitates mutual authentication with the RFID media and the SAM, thus transferring protected data over a Radio-Link and also ensuring the security of encryption keys. The reader can also transfer data encrypted by the SAM to the host system maintaining a high level of security across the system. Appropriate precautions are to be put in place to improve the overall security Note that the safety of distributing SAMs as well as administering the installation process within the reader should be treated as a separate issue and tackled accordingly. There is also an issue of the readers being stolen or the SAM modules being dismounted from the reader. The security considerations here do not indulge in these topics and appropriate precautions are to be put in place to improve the overall security of the system. Does the card reader have communication interfaces other than Wiegand such as RS485 or RS232? The Wiegand card as well as the Wiegand interface for data transmission is a 40-year old technology that originates from the Wiegand effect discovered by John R. Wiegand in the early 1970s. While the Wiegand cards are still in production, they have been largely replaced by newer and cheaper forms of access cards. However, these cards are still based on the Wiegand data format that is susceptible to interception as the data are available in plain text. Also, the Wiegand interface introduced in the 1980s remains prevalent across the logical access as well as the physical access control industry despite various security vulnerabilities. This technology no longer conforms to the current security standards. It is therefore important for integrators to choose a communication interface that can offer higher security from interception and support encrypted data exchange. Do you require tamper detection technologies? If so, can the reader meet this requirement? The need for tamper detection largely varies from one application to another so it is more important to consider whether this level of security is suitable for your respective use case. As an example, card readers attached to multi-function printers (MFPs) for releasing print jobs in an enterprise environment can be considered less critical since tampering with the reader can ultimately lead to the downtime of the printers but will not compromise the safety of your documents. Typically, in such scenarios, the card reader works hand in hand with the MFP and a print management solution that ensures the release of print jobs. Therefore, if the card reader is sabotaged or tampered with, the MFP or the solution simply prevents the release of any information. On the other hand, high-security environments such as data centers certainly need greater protection. One must thoroughly evaluate the consequences of any attempts directed towards compromising the device integrity or the data associated with the device. These topics need to be considered separately and are outside the scope of this article. In conclusion, depending on the application, the credentials involved as well as the data that is being exchanged with the card reader and eventually the host, tamper detection technologies can improve the security of the device. There are several technologies in the market such as mechanical and optical tamper detectors that can be embedded directly on the card reader for superior protection against threats. Do you require the reader's ronfiguration or firmware to be securely shared or loaded on the card reader? If so, can the reader meet this requirement? We are all aware of system and application software updates as at some point our phones have received security patches or app upgrades over the network. In the case of card readers, the process is quite similar except here the software or configuration updates might require encryption based on your use case. For example, if an end customer is reading static card numbers from an RFID media or isn’t using data protected by encryption keys this does not require the firmware or the configuration to be encryption for a simple reason that these files do not carry any sensitive information. The need to encrypt configuration/firmware files arises if the data that is being read by the reader contains any personal information or is part of a proprietary corporate format that is confidential, or should a customer wish to move to a higher security credential encrypted with keys. This means that either their existing card readers or new card readers must have a configuration that holds these keys. Configuration or firmware must also be encrypted since it holds sensitive information In such a scenario, the configuration or firmware must also be encrypted since it holds sensitive information. If the configuration or the firmware is encrypted, the file will no longer pose a security risk and can be shared with customers to perform updates to the existing readers or with the card reader manufacturers to load new readers with the configuration of firmware updates. This not only secures the sharing process but also the update process since the reader is now receiving an already encrypted file. After all, it is essential to choose a card reader that can carry out the aforementioned security considerations but more importantly the security features that are chosen need to be appropriate to the requirement of the customer. Any integrator first and foremost should thoroughly evaluate the respective application. They should work with subject matter experts in the field and establish requirements and objectives. After developing the concept, system architecture, data flow as well as various secure channels, only then can one begin to account for the security features needed. This process not only helps cement the end system’s overall security view but also elucidates the exact security requirements that correspond to the resulting application. In conclusion, choosing an RFID product that not only has the above security features but also has a flexible system design capable of accommodating future adaptions will prove to be the right choice for OEM’s and system integrators.
The security industry knows the value of recurring revenue, as it’s the foundation of the residential security monitoring market. Commercial systems integrators have traditionally taken a different approach, focused on one-time commodity-based sales that lack the financial benefits provided through long-term serviced-based agreements. Cash flow is one of the biggest challenges faced by security systems integrators. And the truth is, during economic uncertainty, businesses will find that companies that have adopted and implemented a sales model that incorporates a monthly-based service program will be more financially secure. Technology solutions TAMCO was founded in 1994 by Jack Thompson who had a unique background that included technology integration, finance, and sales. With this knowledge, he set out to build a company that would introduce a finance offering and business model that addressed the pitfalls within cash and traditional lease procurement methods. The design of this finance offering was under the premise that most technology solutions are non-revenue generating assets. Most technology solutions are non-revenue generating assets The goal was to give the end-user customer a better way to pay with more control and flexibility as they entered in and out of technology lifecycles. At the same time, this new offering would give integrators easier ways to sell services with those technologies while shortening the selling cycle. With changes in telecommunication solutions several years ago, we noticed typical voice integrator partners attempting to diversify their technology solution offerings. We explored providing payment options for these additional technologies and found several areas with significant interest in our approach. About two years ago we saw increasing interest from within the security industry and this is now one of our top growth sectors today. Being in control Historically integrators have done a great job of getting customers accustomed to cash purchase transactions. While owning technology solutions may have felt like a way to be in control, customers have begun to realize that ownership is really not a necessity. It is the use of the technology and what they can do with the use of the technology that is truly meaningful. Now add to that the fact that technology continues to change more quickly than ever and I think it makes sense that customers are looking for better ways to pay for and manage their technology needs. Integrators have begun to express an overwhelming interest in creating recurring revenue At the same time, integrators have begun to express an overwhelming interest in creating recurring revenue. They are looking for ways to complement their one-time project-based revenue business or shift to a model that is focused on a regular stream of revenue. However, many integrators are not sure how to implement this new approach. As-a-service is just another way of saying a subscription service. At the consumer level, we are all very familiar with subscription services, such as Netflix or Birchbox. Small to medium-size businesses and enterprise-level commercial customers are also familiar with equivalent type technology services from their hosted phone service subscriptions or software-as-a-service (SaaS) solutions. As-a-service security If an integrator can package their technology solution in the form of an as-a-service solution, they will have a much better chance of developing recurring revenue. A majority of as-a-service models involve the customer paying for hardware equipment upfront and then having a monthly payment only for monitoring or support services. Or, to avoid a large upfront capital outlay, the integrator may arrange for a traditional lease payment that gives the illusion of as-a-service but still results in the customer owning dated equipment at the end of the term. TAMCO takes a different approach because we help integrators create a very comprehensive and logical solution under a single, use-based monthly payment. The integrator still designs, configures, and recommends the technology solution appropriate for the customer. But TAMCO will take the cash sale price of hardware, software, installation, manufacturer warranty, multi-year maintenance and support, and convert all of that to a single all-inclusive monthly payment which the integrator can present to their customer. In addition, this as-a-service monthly payment also provides the customer with exclusive protection against technology obsolescence. Integrators have really been excited to learn of this approach and to convert to selling this way. Integrators can remove themselves from being a commodity sale and thereby maintain margins Integrators can remove themselves from being a commodity sale and thereby maintain margins. They become much more successful at selling multi-year maintenance and support agreements, thereby building recurring revenue which is valuable to help weather slow periods of sales activities and economic downturns. And following the market currents of subscription-based solutions helps create long term customer relationships. Whether an organization works with TAMCO or not, there are certain foundational elements they need to embrace in order to build and adopt a successful as-a-service sales model. Some form of payment alternative like we discussed is certainly one of those elements, but it is not necessarily the most important. The technical expertise to deliver on support has to be there for the customer. While sales training, mindset shift, and supporting marketing materials are all critical as well.
Honeywell Commercial Security is among the companies working to develop security systems that are more proactive than reactive. “Our biggest opportunity moving forward is the ability to have security solutions that do a better job of detecting and predicting threats,” says Tim Baker, Global Marketing Director, Honeywell Commercial Security. Greater use of analytics and intelligence can reduce human error and simplify processes by providing a more unified view for greater situational awareness. Artificial intelligence and deep learning "We’re reaching a maturity level in terms of algorithms and hardware to drive new capabilities in a cost-effective way,” he says. Baker sees a continuing interest in artificial intelligence (AI) and deep learning in the physical security market, used in video analytics and also for intrusion and access control. "We have challenged ourselves to move from reactive solutions to develop a set of proactive solutions that determine potential security threats before they happen,” he says. An overarching theme is the need to focus operator attention on “what matters” rather than requiring operators to keep track of the growing number of sensors in newer systems. A remaining hurdle is to streamline the deployment of analytics systems, which can require expensive customization during the commissioning phase. Credential-enabled access control reader The reader can support any card format and also enables “frictionless” access control That’s where Honeywell is investing and focusing its attention, seeking when possible to “pre-teach” algorithms based on data gleaned from a large installed base. Fortunately, there will be plenty of data from a growing variety of sites to build from. Honeywell offers a full ecosystem built around enterprise security needs and a second ecosystem built around the needs of small- and medium-sized businesses (SMBs). In the enterprise space, the trend is toward smarter edge devices, such as Honeywell’s OmniAssure Touch, a cellphone credential-enabled access control reader. The reader can support any card format and also enables “frictionless” access control. A user can gain access by touching the reader, with no need to take his or her smart phone (which has the credential) out of their pocket. The reader is fully backwards compatible, which is a Honeywell hallmark. Honeywell’s OmniAssure Touch can support any card format and also enables “frictionless” access control. Designed to be cloud-enabled On the enterprise software side, Honeywell has invested in further development of their Pro-Watch access control system and MAXPRO VMS (video management system), tying them together into a single security console, along with intrusion and other systems such as human resources (HR) data. For the SMB market, Honeywell is building and expanding their MAXPRO Cloud system. As existing hardware has evolved to be cloud-enabled, the company has also been introducing new control products that are designed from the ground up to be cloud-enabled. Honeywell’s biggest vertical markets include banking, healthcare, gaming, energy infrastructure and airports The new MAXPRO Intrusion system, which can be configured over the cloud, will be introduced in the first quarter. MAXPRO Access, to be introduced in late November, can be deployed using an embedded web interface, a cloud interface, or as an on-premise solution. On the NVR side, an embedded NVR works alongside Honeywell’s new 30 Series video cameras, providing secure and encrypted end-to-end connection. Networked security system A challenge for Honeywell is to keep up with broader trends happening in the industry, whether geopolitical (e.g., relations between China and the United States) or regulatory such as General Data Protection Regulation (GDPR). Baker acknowledges an industry-wide increase in awareness about cybersecurity, driven largely by the enterprise market. IT departments are getting more involved in the purchasing decision; indeed, the chief information officer (CIO) is often the ultimate decision-maker. In response, Honeywell is emphasizing “cybersecurity by design” from the beginning to the end of a project. Also, they are using white-hat hackers to test products before they are released into a live environment. “We are doing everything we can to make sure products are cybersecure,” says Baker. Honeywell’s biggest vertical markets include banking, pharmaceutical, healthcare, gaming, energy infrastructure and airports. NDAA-compliant video cameras Compliance is a common thread throughout the verticals. Honeywell sells to the government mostly in the access control and intrusion space and built around their Vindicator networked security system. (They also introduced the line of NDAA-compliant video cameras, made in Taiwan, at the recent GSX show.)
Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security agencies and personnel to protect assets and the public. Radio-Wave Signals Radar works as a deterrent by sending out a radio-wave signal using a transmitter antenna, and a small portion of that signal reflects off objects in its path and returns to a receiver antenna. The highest performing radars use an antenna technology called Active Electronically Scanning Array (AESA), which enables all-electronic reconfiguration of the antennas. When an AESA radar detects an object, it can ‘focus’ its antennas to track the object, in much the same way as the zoom on a camera does. Multiple objects can be tracked while continuing to scan. Kirkland, WA-based Echodyne offers a radar product that brings these ESA capabilities to non-military security applications at commercial price points. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array Echodyne’s ESA Radar Echodyne says they are reinventing radar price-performance for security applications in the ground (people, vehicles) or air (counter-UAS) domains. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array (ESA) radar that is affordable for commercial, law enforcement, and governmental customers. The company is backed by high profile investors, including Bill Gates, Madrona Venture Group, Vulcan Capital, NEA, and Lux Capital. “Radar is a sensor,” says Leo McCloskey, Echodyne VP Marketing. “It is most applicable when security professionals can both understand its capabilities and define risk assessment and deployment requirements that call for those capabilities. Our customers are primarily security system integrators and consultancies, which integrate the performance of radar into a sensor array that meets mission requirements.” Radar Technology For Border Surveillance Echodyne was selected by the Science and Technology Directorate of the Department of Homeland Security (DHS) for its Silicon Valley Innovation Program (SVIP) to demonstrate the performance of its radar technology for border surveillance applications. The radar was deployed both in fixed remote surveillance towers and as a lightweight rapid deployment kit for field agents. Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities. “We set out to build the world’s best compact, solid-state ESA radar sensor, and we are demonstrating that we’ve reached that objective,” says McCloskey. “We’re excited to introduce these capabilities for other security applications.” Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities MESA Technology Echodyne’s proprietary technology provides a small true electronically scanning array (ESA) radar. Unlike expensive Active ESA (AESA) phased array radars, MESA requires no physical phase shifters, thus reducing the cost, size, weight, and power by several orders of magnitude while maintaining all the benefits of fast ESA radar. Echodyne combines its MESA technology with an intelligent software suite, Acuity, to produce a configurable, software-defined radar for commercial, law enforcement, and governmental security applications. The capability is also useful for temporary events such as rallies and marathons, and many other market applications “Technology seems to make everything more available to more people over time,” says McCloskey. “What is a retail product today will be a purchased self-assembly kit tomorrow and an improvised self-made drone the following day. The Federal Aviation Administration (FAA) is diligently at work on creating rules for safe UAV operation, though any final rules remain some distance off. As drone volumes increase, delineating friend from foe in the airspace requires clear legal and regulatory frameworks, which are nascent but would help distinguish the threat of nuisance flyers from illegal overflight.” Radar Sensor For Security Applications “Detecting and tracking airspace objects of interest is imperative for airports, chemical plants, oil and gas installations, refineries, water and energy utilities, stadiums and other public spaces”, says McCloskey. The capability is also useful for temporary events such as rallies and marathons, and many other market applications. “As with any product, our applicability will depend on variables like location, terrain, risk assessment, and existing security technologies,” says McCloskey. “Our mission is to deliver the very best radar sensor for security applications.”
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm Biometrics Integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative Security Technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud? PowerSeries Pro Intrusion Portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping To Cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalize on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight Hosted Managed Service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarize system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.
Car theft is a huge risk for car sales offices, and this is especially an issue for the premium brands. Luxury car giant Eden Auto Premium BMW built a new site in Bordeaux, France, where they house and sell new and second-hand cars, as well as having a car park for customers. That amounts to a lot of cars that need protecting. They researched and compared different technologies and selected Hikvision products to meet their needs. These were then ably installed by reseller Faurie Telecom (Group Convergence), with Hikvision’s help, and the help of French distributor ITESA. The BMW reseller wanted a standalone system to streamline their security operation. Originally they used a night security agent, which was a costly solution. They needed to be able to integrate the security solution into a third party monitoring system, managed by Securitas, in order to reduce manpower costs. Perimeter protection systems The site posed a number of technical challenges. The team also needed to counter some crafty thinking from intruders, who were even resorting to hiding underneath cars during the day, when they can slip in unnoticed. They then could wander around the closed garage, avoiding detection by perimeter protection systems activated only at night. This meant the solution needed to focus on providing real-time, active image at night. With a lot of flags flying on the site, false alarms were a particular issue - these would set them off regularly With a lot of flags flying on the site, false alarms were a particular issue - these would set them off regularly. The complexity of the site also gave a lot of potential for false alarms, which needed to be minimised to reduce overall costs. The solution was made up from Hikvision products, providing a converged system, with seamless monitoring. Central to the system was Hikvision’s Security Radar (DS-PR1-60) for intrusion detection at night. Speed dome PTZ camera The Radar has a large coverage area, and performs excellently at night, whatever the weather. This means that false alarms are kept to a minimum. Radar has the added benefit that it can position humans and vehicles on a map, making it very useful for tracking purposes. This is where the DarkFighter IR Network Speed Dome PTZ camera (DS-2DF8225IX-AEL) comes in. The radar cameras are linked with this for auto tracking. If an event is detected, the control center automatically receives an alarm and can use the PTZ’s auto-tracking function to track any intruders. DarkFighter cameras are also designed to excel at night, so are ideal for this solution. Although radar has promising accuracy rates, the team needed to carefully configure it. The site environment proved a complex installation, with a lot of metal that can cause false alarms for the radar. Seamless security solution We were very satisfied with the innovative products and onsite service provided by the Hikvision team" The local team drafted in expertise from Hikvision HQ’s R&D and technical teams to complete the installation to a high quality and low false alarm rate. The system is coordinated using a AcuSensecamera (DS-2CD2686G2-IZS AcuSense 4K NVR (DS-7716NXI-I4) and a POE Switch (DS-3E0510P-E). Finally, HikCentral provides a user-friendly VMS experience, designed especially to integrate all the different Hikvision products, to make a seamless security solution. Christophe Chamand, from Faurie Telecom, says: “We were very satisfied with the innovative products and onsite service provided by the Hikvision team. From presales and order to technical support and aftersales service, Hikvision has been with us throughout the process, ensuring a successful installation and a happy customer.” With an innovative, converged security solution, BMW has been able to streamline its security, even at night. So intruders sneaking in and hiding during the day are out of luck.
The Headquarters Business Park developed by Adeem Al-Watania is a 52 story office building located on the coast site of Jeddah, Saudi Arabia. When completed in 2012, it became the tallest building in Jeddah and is served by a large 11-story parking garage. Nedap’s Long-Range Identification solutions provide seamless vehicle access to employees and long-term tenants. The devices were successful installed and integrated with Lenel access control system OnGuard by Idex Services. The Headquarters Business Park Tower This tallest skyscraper, towering above Jeddah’s North Corniche and with a unique “Sail of a dhow” design, is an iconic structure in the commercial hub of Saudi Arabia. The iconic business park consists of offices, clinics, restaurants, entertainment facilities and a luxurious hotel. It has three main sections, the West tower housing 52 floors, East tower housing a luxurious hotel with 16 floors and a mid-section with 11 story parking facility comprising of 2.000 parking spots which connects the West and East towers. Need for hands-free vehicle access Multiple entry and exit points to the vehicle parking facility had to be provided with an automated system With the exemplary design of the tower, there was a need for an all-in-one innovative vehicle and driver access control solution which can provide seamless integration with best performance which is in line with the state-of-art services to tenants in one of the most sophisticated buildings in Jeddah. Multiple entry and exit points to the vehicle parking facility had to be provided with an automated system, for convenient, hands-free access to authorized vehicles of office employees and long-term tenants. An efficient solution was identified, with a combination of Automatic Number Plate Recognition and Long-Range RFID (Radiofrequency Identification for Automatic Vehicle Identification). Touchless vehicle access to employees Nedap’s uPASS Reach, based on passive UHF technology read-range up to 5 meters in combination with UHF Windshield tags Nedap’s uPASS Reach, based on passive UHF technology read-range up to 5 meters in combination with UHF Windshield tags is used to provide convenient vehicle access to employees. UHF Tags, which are thin, flexible, tamper resistant and maintenance free are assigned to vehicles of employees who work in the 256 office units. When the registered vehicle with UHF tag installed approaches the long-range UHF RFID reader installed near the barrier, the vehicle is automatically identified and access is granted for authorized vehicles to the parking facility. Parking access to tenants based on LPR Nedap’s ANPR series – License plate recognition camera with an accurate read-range at several metres The iconic tower with sea-view includes a luxurious hotel and it is observed that tenants stay for a longer duration or prefer coming back on regular basis. To provide a seamless experience to tenants and ensure smooth flow of vehicles and drivers into the parking facility, there was a need for a solution which could grant tenant vehicles access temporarily or incidentally. Nedap’s ANPR series – License plate recognition camera with an accurate read-range at several metres – ensures tenant number plates are registered and required access rights can be easily granted in the backend application. Securing the 11 floor parking facility With the parking facility being the main entry point to both the West and East tower, it was very necessary to meet high-security standards and control the flow of vehicles. The proposed solution required to have seamless integration with the existing Lenel access control system OnGuard. The open architecture of Lenel and Nedap supporting variety of industry-standard communication interfaces, enabled seamless integration and successful implementation of the products by Idex services. Customized reports with the required log were easily accessible after the successful integration.
Union Wharf is a community of 249 apartments to rent, based on the banks of Deptford Creek in Greenwich. Completed in September 2019, it comprises two towers. The first is a 23-story tower designed for a varied community of renters. The second is a smaller 12-story tower that’s intended specifically for families. Across both buildings all residents benefit from free access to a variety of shared spaces as well as services such as a 24-hour on-site residents’ team. Essential Living was also keen to ensure the development encouraged a sustainable lifestyle, with features including bicycle storage facilities, gym, green areas and a roof terrace. Working with Comelit from initial specification, for each stylish apartment on site, a combination bespoke door entry and energy monitoring system was created, using its Icona Manager IP solution for each apartment. Reducing carbon footprint We have worked with Comelit on a number of developments and know them to be capable of fulfilling our mission" Says Juey Thanyakittikul, Senior Project Manager of Essential Living: “From the outset, sustainability, reducing carbon footprint and stylish living has been the foundation of our vision for Union Wharf. And with a focus on the rented community, we wanted to continue these key features right into the finishing details for all our residents to benefit. We have worked with Comelit on a number of developments and know them to be capable of fulfilling our mission when it comes to customized door entry." "The advantage of presenting smart credentials, including resident’s ability to answer video calls from a cellphone or tablet, only adds to the premium lifestyle on offer.” Fire and security system Richard Slee, Managing Director at Security Systems Design Limited, which completed the installation as part of the overall fire and security system works for Gloster MEP Limited added: “The integration of energy monitoring and door entry in Comelit’s stylish one Icona Manager IP receiver, presents as one multifunctional solution that sits on the building’s CAT6 structured wiring and LAN system, removing the need for separate cabling." "The slim line white Icona Manager finish adds to the aesthetics of each apartment, and reduces the number of control devices for residents, all without compromising on the smart technology enabled. For residents, it ultimately means door entry can be answered from the external systems, with video in their own home, or even via a cellphone or tablet from wherever they are.” Combined energy monitoring This trend is only likely to rise as we become more dependent on our homes for work and personal requirements" Comelit’s ViP system includes Comelit’s color Icona Manager Monitors fitted in each apartment, presenting the opportunity for video and audio communication with visitors at ground level, as well as two-way audio communication with the on-site residents’ team. The combined energy monitoring provides instant information and feedback for residents, to encourage more sustainable living. Dan Wood, Southern Sales Manager at Comelit UK concludes: “While the Code for Sustainable Homes is no longer mandatory, demand for more sustainable living is growing among consumers. This trend is only likely to rise as we become more dependent on our homes for work and personal requirements. Working closely with Essential Living right from the initial design phase of Union Wharf, enabled us to create a bespoke tailored solution using our stylish Icona Manager Monitors." Targeted renters market "The flexible nature of the systems presents ideally for the targeted renters market, which continues to put in a strong performance despite challenges in other parts of the property market. Developments such as this, only goes to support how the perception of the Build to Rent sector is changing for the better. We are already working on the next scheme for Essential Living due for installation in 2021.”
Located 40 kilometers outside the Russian capital, the new Mercedes-Benz passenger car factory is a showcase for Industry 4.0 automotive manufacturing. To ensure the safety of more than 1,000 employees at the massive facility, Bosch provided a fire alarm and security system, replete with voice evacuation capabilities to meet the specific safety needs of modern-day car factories. Future of car manufacturing Walking into the main manufacturing hall of the new Mercedes-Benz Cars plant in the Moscow region is to see the future of automotive production. Amid glass walls and high ceilings, robots and humans work side-by side to assemble the company’s most popular limousines for the Russian market. From chassis welding to windshield installation to painting, the plant combines all production steps in the same building as part of a ‘one-roof concept’. But from a fire safety perspective, the ‘one-roof concept’ with its tall factory ceilings and open floorplan poses challenges. The reason: Conventional, point-type fire detectors exceed their performance limit when it comes to detecting smoke particles inside such a vast, air-conditioned space. Working closely with the client, experts of Ateksis, the system integrator who lead this project, realized that early fire detection would take a solution just as innovative as the futuristic car factory itself. Safety for automotive factories They can detect fires in the beginning stages (called the “smoldering” phase) even before visible smoke is released Additionally, Mercedes-Benz required a centrally controlled combination of intrusion alarm and video security to guard the entire perimeter of the 85-hectare facility with its total of seven buildings. And could the solution be ready within a few weeks for the plant’s grand opening featuring international dignitaries? Working on a tight timeline, the team of Bosch and Ateksis experts selected a fitting smoke detection technology: aspirating smoke detectors. Perfectly suited for large warehouses, the detection units are located within a pipe system that constantly ‘inhales’ samples of air, which are checked for smoke particles via intelligent signal processing technology. As a result, the light-based detectors achieve smoke sensitivities as precise as 0.05%. They can detect fires in the beginning stages (called the “smoldering” phase) even before visible smoke is released. electrical interference for reliability Aspirating detectors also pinpoint the exact location of fires, thus reliably preventing major damage in most cases. The system also suppresses environmental factors that typically cause false alarms in car factories, including dust, flying sparks and electrical interference for maximum reliability. “The Mercedes-Benz project is an important reference for us. It shows the level of integration and customer focus made possible by Bosch solutions. Our system has succeeded in meeting the specific needs of automobile manufacturers in the next generation of car production facilities”, said Ivan Konukhin, Bosch Security and Safety Systems Russia. audio sound quality The ceiling loudspeakers are equipped with a metal fire dome to adapt to the in-air handling spaces Amid the acoustic conditions inside the vast production plant, a total of 650 horn and ceiling loudspeakers from Bosch deliver sufficient volume and intelligibility. The horn speakers offer a wide opening angle to broadcast sound across factory floors while offering protection from water and dust, as well as the corrosive effects of industrial environments. What’s more, the ceiling loudspeakers are equipped with a metal fire dome to adapt to the in-air handling spaces of the automotive plant. The cabinet loudspeakers are certified according to the fire evacuation EN54-24 standard for reliable performance under emergency conditions. Overall, this level of audio sound quality directly serves to keep workers secure and informed, especially if evacuation becomes necessary. automatic fire detectors In the bigger picture, the total of 248 aspirating detectors inside the main production hall are centrally networked via Modular Fire Panels 5000 series and connected to more than 2,500 automatic fire detectors installed throughout six additional administrative buildings on the premises. For maximum employee safety, clear voice and audio alarm is provided by the PRAESIDEO Digital Public Address and Voice Alarm System. With Smart Safety Link, the interfaced fire and voice alarm system offers a full control in case of emergency, including the customization of the fire verification time and the automatic process that can ensure a safe phased evacuation. To ensure full visibility of the premises and around-the-clock safety, the video security solution consists of 112 high-definition cameras from Bosch. While bullet and moving cameras secure the perimeter, dome cameras monitor inside spaces. Video Management System Integrated on the Bosch Video Management System, all cameras can be controlled by the on-site security team Integrated on the Bosch Video Management System (BVMS), all cameras can be controlled centrally by the on-site security team inside the control room. Bringing security full-circle, the video system has a direct interface with intrusion alarm system containing over 200 detectors. This seamless integration of all solutions on the Building Integration System (BIS) from Bosch enables a host of additional functions: for instance, the system alerts the control room when a fire detector is triggered and sends live images from the nearest camera for full situational awareness. Aspiration smoke detector As Ivan Konukhin at the Regional Representative Center North-West and South Russia at Bosch Security Systems explains: “The cooperative functionalities between BIS and BVMS components were programmed according to customer requirements in an uncomplicated manner via macros, which also supported a timely installation.” Bosch Security System’s solution consists of: FPA-5000 Modular Fire Panel Solution Smart Safety Link License key for voice alarm Aspiration smoke detector 2 pipe systems AVENAR detector 4000 PRAESIDEO Digital Public Address and Voice Alarm System Metal Fire Dome Cabinet loudspeaker, metal, rectangular Horn loudspeaker, 10W, 6x10" Ceiling loudspeaker, 6W, ABS MAP 5000 family IP4000i, 5000i and 6000 cameras AUTODOME IP Cameras Access Control System Bosch Video Management System Building Integration System
When Swinkels Family Brewers wanted to unify its access control internationally, it chose Nedap Security Management’s AEOS access control system, which enabled this producer of world-famous Bavaria beer to design a system around the people using it. AEOS access control system The facts & figures - 6 breweries 27 brands 130 countries 1,800+ employees Increase security, yet maintain openness Swinkels Family Brewers wanted a system that would match its people-first approach Swinkels Family Brewers had grown quickly and needed to review its security and apply more stringent measures. It was using two access control systems and wanted to unite everything on one platform. Most importantly, Swinkels Family Brewers wanted a system that would match its people-first approach, and provide the flexibility to adapt and scale in the future. First people, then technology Initially, Swinkels Family Brewers established a cross-department project group, which developed a new security policy. With that in place, the project group identified AEOS as the system to meet its long and growing list of requirements. During the planning stages, they consulted department managers on their needs. And before AEOS was implemented they ensured their people knew what to expect and why the change was happening. Key benefits: The system is designed around the people using it. Security is stronger but there’s a welcoming sense of warmth and openness. One unified system fulfills all access control needs. Several systems are linked to AEOS and updates transfer automatically. Flexibility to easily add new functionality, such as video monitoring, or scale the system. Scalable, robust access control solution Stefan Fehlhaber, Facility Manager at Swinkels stated, “We’re very impressed with the scalability, stability and robustness of AEOS. It’s very practical to use in daily life and is easy for our security people to operate. It’s also very convenient for our employees to be able to use one badge at different locations.”
Video surveillance has many applications, and keeping a watchful eye on an active volcano ranks as an important one. IDIS’ video technology has been meeting the task as the video technology provider for the Volcan de Fuego project in Guatemala. This volcano, one of the world’s most active and dangerous, is now watched day and night in order to give early warning of impending eruptions. Continual live footage of the ‘Volcan de Fuego’ can now be viewed online by emergency agencies, scientists and residents, as it is all being captured by IDIS’ award winning 8MP 31x IR PTZ camera. Ultra-high definition Even from over nine miles away, the 8-megapixel model is delivering ultra-high definition, full day, and night surveillance of the active caldera, showing sudden gas and ash eruptions as often as every 15 to 20 minutes. In June 2018 nearly 200 people were killed on Volcan de Fuego during a series of explosions and pyroclastic flows which left little evacuation time. This was the volcano’s most powerful eruption since 1974 and its deadliest since 1929 but was far from an isolated incident. More than 60 major eruptions have been recorded over the last five centuries, and with 54,000 people living on the fertile farmlands within six miles of the crater, the risk remains high. DC-S3883HRX camera The H.265 IR DC-S3883HRX camera features an 8MP, auto focus, and 31x optical zoom lens Consequently, ultra-high definition, continual video monitoring, alongside data from sensors including seismology and gas detectors, now aims to protect vulnerable communities living around the volcano by giving early warning. The H.265 IR DC-S3883HRX camera, which features an 8MP, auto focus, and 31x optical zoom lens, IR performance up to 200m, and a highly sensitive auto-return positioning sensor, was installed by IDIS, its partner EPCOM and Guatemalan telecommunications specialist Crelosa. Like all IDIS cameras, the model, which has won two prestigious design awards, benefits from true, one-click plug-and-play set up, making it ideal for hassle-free installation at height, in challenging environments, and in locations where engineers are exposed to increased risk. Electronic image stabilization The IDIS PTZ also features true wide dynamic range (WDR), allowing it to cope easily in changing lighting conditions; electronic image stabilization (EIS) ensures steady coverage of scenes at distance, so images from the volcano remain crisp and sharp; and H.265 and intelligent codec requires minimum bandwidth even for 4K live monitoring. The camera also remains stable despite the region’s variable weather conditions including under strong sun, and when temperatures that fall sharply at night. The water droplet wiper proves essential during the rainy season. Smart failover and IDIS’ Ultimate Warranty gives Crelosa and the Volcan de Fuego monitoring agencies peace of mind that the camera will continue to deliver outstanding video in one of the world’s most dramatic settings.
Round table discussion
Should security spending be a one-time capital expense or as an ongoing operating expense? At first glance, the question appears to be an accounting issue with little impact on the actual equipment or systems involved. However, as security professionals seek to cost-justify new systems, the question may be central to providing the “best security for the money” and a system that fits the company’s continuing needs. We asked this week’s Expert Panel Roundtable: Should security be a capital expense (CAPEX) or an operating expense (OPEX)? Is the trend shifting and what is the impact?
Traditionally, security industry professionals have often come from backgrounds in law enforcement or the military. However, the industry is changing, and today’s security professionals can benefit from a variety of backgrounds and educational disciplines. The industry’s emphasis on technology solutions suggests a need for more students of computer science, engineering and other technology fields. The closer integration of security with related disciplines within the enterprise suggests a need to prepare through a broad array of educational pursuits. We asked this week’s Expert Panel Roundtable: What is the role of higher education to create the next generation of physical security leaders?
Serving customer needs is the goal of most commerce in the physical security market. Understanding those needs requires communication and nuance, and there are sometimes surprises along the way. But in every surprising revelation – and in every customer interaction – there is opportunity to learn something valuable that can help to serve the next customer’s needs more effectively. We asked this week’s Expert Panel Roundtable: What was the best lesson you ever learned from a security end user customer?