Commercial security system
DICE Corporation is pleased to announce and welcome Carl Galsterer as the company’s new chief network architect. Galsterer will be responsible for overseeing all aspects of the company’s information technology infrastructure, including the design and implementation of customer networks and process standardization. More About Carl With over 16 years of experience in network engineering as a senior engineer, Galsterer was pivotal in building the Charter Spectrum network throughout Mi...
India’s foremost shop window and business hub for the security industry, Secutech India, is set to return from 25 – 27 April 2019 against a backdrop of rising government investment in smart city projects. Jointly organized by Asian Business Exhibition and Conferences Ltd (ABEC) and Messe Frankfurt Trade Fairs India Pvt. Ltd, the 2019 edition of the fair will introduce a new smart home zone to accommodate India’s growing home automation sector. Indian Security Indu...
It has been announced that next year will see IFSEC move to a brand-new dateline of 19 - 21 May and welcome three prestigious events alongside it at ExCeL London; Security & Counter Terror Expo (SCTX), Ambition and Forensics Europe Expo. Focal Point For Security Industry Building on a rich history of the two exhibitions - IFSEC steeped in the trade and commercial security world and Security & Counter Terror Expo immersed in national security – the collaboration of these key event...
A futuristic alternative to plastic cards for access control and other applications is being considered by some corporate users in Sweden and the United Kingdom. The idea involves using a microchip device implanted into a user’s hand. About the size of a grain of rice and provided by Swedish company Biohax, the tiny device employs passive near field communication (NFC) to interface with a user’s digital environment. Access control is just one application for the device, which can be...
OPTEX Corporation Ltd, global sensor manufacturer, has launched a new series of outdoor PIRs in EMEA (Europe Middle East and Africa) and in South and North America that offer 180° detection coverage and 12m/40ft radius to detect any intrusion around a residential or commercial building. Outdoor Intruder Detection Sensors The WX Infinity series comprises two wired and two wireless models available either as the standard or anti-masking version. The new models are built upon OPTEX’s ex...
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
OPTEX, renowned global sensor manufacturer, will demonstrate the recently enhanced long-range RLS-3060 LiDAR series live on its stand, as well as showcase its new 180-degree outdoor sensor ideal for boundary protection. OPTEX LiDAR And REDSCAN Series Sensors “OPTEX’s LiDARs have been successfully deployed in the Middle East region for years, for a number of applications ranging from perimeter security to roof and asset protection. At this year’s Intersec we are looking forward to showing the new functionalities of our long-range REDSCAN series which will make it more flexible and compelling for perimeter security,” says Gaurav Mahajan, Divisional Manager for OPTEX in Middle East. The advanced RLS-3060-SH model has been designed for harsher environments and extends the detection area to 50m radius in horizontal mode The long-range RLS-3060L has a detection range of up to 30 metres, and now features four detection areas that can be independently adjusted via an analog connection, and up to eight areas that can be adjusted via an IP connection. The inclusion of area allocation and masking functions enable these detection zones to be precisely defined. The advanced RLS-3060-SH model has been designed for harsher environments and extends the detection area to 50m radius in horizontal mode. When in vertical detection mode, it can detect a standing or squatting person over 100m away. WXI 180-Degree Outdoor PIR Sensors The event is also the opportunity for OPTEX to showcase its new 180-degree outdoor sensor, ideal to protect the boundary of residential and commercial premises. The new WXI 12m 180-degree outdoor PIR has left and right alarm outputs that trigger alarm signals from both sides individually, making it ideal for PTZ activation, direction, recognition and changing detection pattern by day and night. The WX Infinity series features advanced Super Multidimensional Analysis (SMDA) logic to differentiate between human beings and animals, advanced temperature compensation, an area masking shutter, and a single or dual pulse count. The new series is available as both hard wired and battery-operated models. With the launch of our new 180-degree PIR, we are complementing our boundary protection range" “With the launch of our new 180-degree PIR, we are complementing our boundary protection range,” says Masaya Kida, Managing Director of OPTEX EMEA. “We are now able to offer single sided and double-sided curtain PIRs, 90-degree volumetric and 180-degree volumetric sensors, covering all areas around the building.” Fiber Optic Perimeter Fence Detection System Also, on the stand, OPTEX’s sister company Fiber Sensys will be showcasing its compact radar range which offers object tracking and object categorizing that differentiates between vehicles, people and drones. It complements its fiber optic perimeter fence detection system by offering protection for wide open areas. Masaya says the company is looking forward to exhibiting again at Intersec and having the opportunity to present its range of perimeter protection sensors: “A delegation from OPTEX EMEA will be attending the show including technical engineers, marketing specialists, Middle East and Africa sales managers, and our Strategic Alliance Manager. This gives visitors to Intersec a great opportunity to connect with the OPTEX team and discuss their projects.”
ADT Inc., global provider of monitored security and interactive home and business automation solutions in the United States and Canada, has announced that it has completed its acquisition of Red Hawk Fire & Security, provider of commercial fire, life safety and security services and portfolio company of Comvest Partners. Commercial Security And Fire Safety “We are pleased to complete this transaction, which strengthens ADT’s growth in the commercial security market and meaningfully expands the company’s product portfolio with the introduction of commercial fire safety related solutions,” said Jim DeVries, ADT’s President and Chief Executive Officer. He further added, “With the added robust portfolio of fire and life safety solutions, as well as additional scale through commercially-focused sales professionals and technicians, we enhanced our position as a leader in commercial security, just as we are today in the residential market. ADT has a strong track record of successfully integrating acquisitions and we look forward to welcoming the talented Red Hawk team to the company.” Moving forward, Red Hawk’s ability to showcase its products and services to a wider range of National Account and enterprise-level customers will be significantly accelerated with ADT, while also increasing ADT’s technician workforce dedicated to the commercial customer.
Aiphone has announced significant improvements to its full IP IX intercom and security solution. The new and upgraded features built into the new IX2 series include improved audio and camera functionality, large touch screen monitors and communication with up to 9,999 door stations. IX2 IP Intercom And Security Solution “With no server or license fees, the IX2 system offers highly affordable P2P full IP video entry security, internal communication and multicast paging,” said Wyatt Taylor, Managing Director of Aiphone UK Ltd. “Utilizing its ability to connect directly to a network, all these functions can be implemented between remote locations over large areas.” “However, what elevates IX2 above other traditional and IP intercom systems currently available for large scale installations, is the ease at which it can be integrated with third-party systems. As a result, we are able to provide a totally integrated intercom and security solution, including access control, IP network cameras and video management software (VMS), such as Avigilon, ExacqVision and Milestone, as well as Lenel Onguard access control management software out of the box and without the need to buy any licenses.” Scalable Solution Offering Video Entry Security IX2 has the capacity to provide communication with a practically infinite number of intercom stations IX2 has the capacity to provide communication with a practically infinite number of intercom stations. Video entry security, internal communication, emergency stations and multicast paging are all able to be implemented between remote locations over large areas and distances, making the IX2 system an ideal solution for education campuses, as well as any other type of application involving multiple locations such as airports, railway stations and parking facilities. Key features of IX2 include: No wiring-distance limitations: LAN and VPN connections enable implementation over extensive areas and between remote locations. Peer-to-peer configuration results in space savings, reduced installation time and lower cost. Simply connect the units to Power over Ethernet (PoE) switches. No need for a dedicated server, with the additional benefit of eliminating the risk of system downtime due to server malfunction. 7-inch handset with a touchscreen which can be used in domestic and commercial environments. Hands free touch screen monitors. Picture in picture video can show the door station camera and an overhead camera simultaneously. Video intercom between master monitors. Newly designed IX panels which comply with DDA regulations, e.g. offer clear visual guidance and a blue halo button. Audio and video SIP Integration with Cisco IP phone systems. ONVIF compatibility provides the option for images captured by call panel cameras to be integrated with a video surveillance system. SD card slots on panels and monitors enable video and audio data to be recorded and backed-up. Call log facility on each handset provides data trails. IX2 is also equipped with some advanced functionality rarely found in other IP Intercom POE systems. These include: Call Queuing Up to 20 calls can be queued and prioritised on an IX-MV7 master station When multiple calls are made to the same monitor station, the IX2 system places the calls in a queue which is displayed on the LCD screen. On the calling end, users are given notification that their calls are in the queue. Up to 20 calls can be queued and prioritized on an IX-MV7 master station. The importance of each call, e.g. normal, priority or urgent, can be indicated by the display of respective red, amber or green colors on the master station. Higher priority calls are moved automatically to the top of the list. Call Transfers Calls and conversations within the IX2 system can be transferred to up to 10 other IX-MV7 monitor stations. The transfers can be done manually or through a variety of system settings. With Delay Transfer, for example, the system automatically transfers calls which are not answered within a pre-set time. An Absent Transfer feature immediately calls another IX-MV7 master station when someone is away from their desk, while Scheduled Transfer automatically transfers calls to another IX-MV7 master station during pre-determined times, e.g. out of hours.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500™ winner, announced the availability of its portfolio of solutions including infinias access control, VIGIL video management system and TRENDS business intelligence platform into the European market through its sister company, PAC, located in Stockport in the UK. While 3xLOGIC’s solutions have been trusted for many years in North America and beyond, the launch of infinias, VIGIL and TRENDS in the UK represents the first time that the cost-effective, easy-to-use solutions have been made available in Europe, a key new market for 3xLOGIC. Commercial-Grade Features The launch of the 3xLOGIC solutions meets a fast-growing demand in the European market Whether leveraging cloud or server-based options, 3xLOGIC’s infinias, VIGIL and TRENDS solutions are easy to manage, simple to install and simple to scale, to meet an organization’s changing needs. “infinias is the original IoT access control system, and it now serves thousands of installations ranging from one to thousands of doors,” said Wayne Jared, VP of Engineering for 3xLOGIC. “Its market-leading design, simplicity, scalability and integration with video have resulted in exponential adoption across all vertical markets including delivering commercial-grade features at a price point for the small-to-medium business market.” Demand In The European market The launch of the 3xLOGIC solutions meets a fast-growing demand in the European market for a solution which is internet-facing with a cloud back-end. These solutions will be available in the UK from November 2018, followed by other European markets in due course, and will be supplied by existing PAC partners who possess the necessary skill set and business model to leverage this exciting technology. Infinias access control is available in four versions: cloud, essentials, professional and corporate, each tailored to specific end user needs and capabilities. Training Facility For End-Users With an Easy Set-up Wizard to guide users through installation, the application has users up and running in minutes The VIGIL Software Suite provides a powerful, enterprise-grade video management system (VMS) with unrivaled ease of set-up and use. VIGIL Server software is the core program upon which all other 3xLOGIC applications are built. With an Easy Set-up Wizard to guide users through installation, the application has users up and running in minutes. Designed with bandwidth limitations in mind, VIGIL Server utilizes 3xLOGIC proprietary RapidStream technology and Substream Motion Detection capabilities to provide high resolution over low bandwidth networks. To support 3xLOGIC’s solutions—infinias, VIGIL and TRENDS—PAC will offer robust after-sales support through telephone and field support engineers based in the UK. In addition, a series of online training courses have been developed to ensure customers can take full advantage of all the features and benefits infinias offers. A dedicated training facility in Manchester will offer hands-on training for end users, while they can also schedule on-site and/or online training to supplement their needs.
Identiv, Inc., a global provider of physical security and secure identification, has entered into a definitive agreement to acquire Thursby Software Systems, Inc., an Arlington, Texas-based provider of security software for mobile devices. The acquisition is expected to strengthen Identiv’s identity offerings with complete solutions for secure and convenient logical access across smart cards and derived credentials on Apple iOS and Android mobile devices. It is also a major strategic step towards Identiv’s vision of converged, highly secure yet frictionless access to information and places through a single identity and a single infrastructure platform. Thursby’s software solutions provide strong security for enterprise and personal mobility, supporting bring-your-own-device (BYOD) and two-factor authentication (2FA) on mobile devices. The company enables Department of Defense (DoD) issued Common Access Cards (CAC), federally issued Personal Identification Verification (PIV) cards, derived credentials, and commercially issued PIV-I cards to access, sign, encrypt, and decrypt information and emails from Apple iOS and Android mobile phones or tablet devices. The company’s deep government strengths and mobile app expertise are core elements in our vision for federal and commercial security solutions" Accessing Information On-The-Go These capabilities have allowed over a hundred thousand DoD and federal employees, including the U.S. Navy Reserve via the Ready-2-Serve (R2S) mobile application, to use personal and government-furnished mobile devices to access needed information on-the-go. Thursby has sold more than one million software licenses to a range of customers and industries, including government, healthcare, finance, energy, education, research, Fortune 500, Global 2000, and OEMs. “This combination substantially strengthens our position as a trusted provider of convenient high-security solutions to government and enterprise customers,” said Steven Humphreys, CEO of Identiv. “Thursby has built deep, long-standing customer relationships, completely aligned with our strategy of providing secure software platforms that are customisable to specific customer preferences. Thursby's solutions truly deliver beyond its customers' expectations, providing both high security and terrific end-user convenience. The company’s deep government strengths and mobile app expertise are core elements in our vision for federal and commercial security solutions.” Supplier Of Smart Card Readers “Thursby’s seamless support of both government-grade smart card deployments and derived credentials also aligns with our philosophy of supporting customers' adoption of technologies at their own pace, optimized for their own use cases. We believe this accretive acquisition is a strategic step that moves us closer to achieving our long-term target business model, generating higher margins, improving profitability, and delivering a solutions platform that transforms our industry.” We are excited to be joining the Identiv team who shares our passion for bringing together security and innovation for our customers" Bill Thursby, President and Founder of Thursby Software Systems, commented: "In our 32 years, we have prided ourselves as being a leader in technology while remaining small and responsive. By becoming part of the Identiv family, we will retain our strengths while taking on the additional benefits of a large international company with an excellent reputation." “We first partnered with Identiv in 2011 as both a supplier of smart card readers and a customer by adding the Thursby Sub Rosa license to the Identiv mobile reader line-up. We are excited to be joining the Identiv team who shares our passion for bringing together security and innovation for our customers.” Securing BYOD And Mobile Access "We started working with Thursby and Identiv in 2016 to enhance productivity and secure BYOD and mobile access for our Reservists," said Tim Bentjen, Director of IT Development, Navy Reserve. "Thursby has been a key partner in making sure our applications are highly secure, yet convenient, in the field. To ensure compatibility of our secure mobile applications on Android platforms, we have leveraged the Identiv smart fold reader/mobile dongle."
ADT Inc., the provider of monitored security and interactive home and business automation solutions in the United States and Canada, announced it has entered into a definitive agreement to acquire Boca Raton, FL-based Red Hawk Fire & Security, a leader in commercial fire, life safety and security services and portfolio company of Comvest Partners, for $317.5 million in cash. This transaction accelerates ADT’s growth in the commercial security market and expands the company’s product portfolio with the introduction of commercial fire safety related solutions. It is the latest in a series of strategic acquisitions made over the last year to drive commercial growth and build on ADT’s strong foundation of superior customer service. With the addition of Red Hawk, ADT will have an increased geographic footprint and enhanced customer service capabilities across the nation. Revenues from the combined company’s business customers are expected to represent approximately 25% of total revenue. Red Hawk is a pioneer in the design, installation, integration, monitoring and servicing of commercial fire, security and life safety solutionsOffers Mission-Critical Solutions Red Hawk is a pioneer in the design, installation, integration, monitoring and servicing of commercial fire, security and life safety solutions. Red Hawk represents one of the few last independent large national commercial integrators, offering complex, mission-critical solutions across its 45 district locations and is expected to generate approximately $300 million of revenues in 2018. In recent years, Red Hawk has demonstrated double-digit revenue growth across a diverse set of customers, markets and geographies, leveraging its strong local presence backed by its nationwide footprint and differentiated fire and security expertise. Expanding Business And Service Capabilities “Commercial security is one of the core pillars of ADT’s growth strategy and today’s announcement marks a significant step in our concerted efforts to expand our commercial business with the critical capabilities and services that our customers expect,” said ADT President and incoming CEO, Jim DeVries. We are excited to welcome the talented and experienced Red Hawk team to the ADT family while expanding our geographic reach"“Red Hawk’s exceptional portfolio of commercial fire and security solutions complements ADT’s existing commercial business, positioning us to provide a superior customer experience at a local and national level. We are excited to welcome the talented and experienced Red Hawk team to the ADT family while expanding our geographic reach, service capabilities and product offerings. Having long admired Red Hawk, we are confident that combining the strengths of our two companies will allow us to deliver increased value to our customers and shareholders.” Providing High-Quality Customer Service “We are delighted to join a company with ADT’s resources, growth potential and shared commitment to providing high quality customer service and innovative solutions to customers,” said Red Hawk President and CEO Michael McWilliams. “We look forward to our future with ADT, which we are confident will help us to achieve our next phase of growth.” “It was a rewarding and collaborative experience working with Michael McWilliams, Mark Foley, Red Hawk’s CFO, and the other members of Red Hawk’s senior management team to build Red Hawk into a market leader from our original acquisition, and Red Hawk is positioned to continue to thrive under ADT’s leadership,” said Roger Marrero, the Managing Partner of Comvest Partners. Strategic And Financial Benefits Of Transaction Substantial increase in scale to accelerate ADT’s commercial growth: The combined commercial business will have substantially increased scale with an expanded commercial technician work force that will allow the company to meet growing customer demand across the U.S. and provide enhanced customer service capabilities. This transaction creates the opportunity to leverage the capabilities of both organizations to create a more robust and differentiated commercial security offering in a highly fragmented industry. Introduction of fire safety solutions: This transaction expands ADT’s product portfolio with the introduction of Red Hawk’s fire safety solutions, allowing the company to become a single destination for both fire and security needs at the commercial level. The company intends to leverage Red Hawk’s fire safety solutions and expertise to help capture new business opportunities with new and existing customers. Compelling long-term financial benefits: Given the strong financial and operating profile of Red Hawk’s business – which, similar to ADT’s growing commercial and multi-site businesses, has a very attractive net customer acquisition cost and retention characteristics – the acquisition is expected to be accretive to free cash flow generation, before taking into account meaningful expected cost benefits. The completion of the transaction is subject to customary closing conditions, including regulatory approvals. The transaction is expected to close by the end of the fourth quarter 2018.
Users of security systems have long been willing to sacrifice certain aspects of security in favour of convenience and ease of use. The tide seems to be turning, however, with the industry at large showing significant concerns over cyber security. End user sentiments also seem to be following that trend, becoming more cautious when it comes to having their security systems connected to the internet. While it has become the norm for security systems to be accessible online, still it presents security threats that unconnected systems would not face. In 2018, we saw a notable shift from the convenience of a connected system to the less convenient, but more secure, standalone system. Consumers are willingly making the choice to trade convenience for security, and companies are responding. While cyber security concerns will continue to be a big topic of discussion, connected platforms will probably be the trend of 2019This in turn is driving an increase in more IoT-like deployments. Rather than the traditional client that is connected to a device to retrieve information, more often we are seeing more active devices, capable of reporting their presence and transmitting information on a scheduled basis, without the need for a client. Preventing Security Systems From Outside Threats This changes the dynamic of the network and alleviates many threats associated with traditional systems because there is no opportunity for outside threats to access your system since the device is transmitting information out vs requiring a connection to the outside world. With IoT deployments, when the device is active and sending messages out of the network segment, it is not vulnerable in the same way that the traditional systems are. While cyber security concerns will continue to be a big topic of discussion, connected platforms will probably be the trend of 2019. In 2018, we saw an increased acceptance in the residential market for smart home applications. While this has been an area of discussion for the past ten years, it is now gaining real traction. With artificial intelligent capabilities in tow, smart home deployments are more common than ever and the video analytics that accompany them are quite impressive. Cloud Security For The Commercial Sector If consumers are trusting their home security systems with this, it only makes sense that they will begin trusting Google to provide security for their offices as wellIn addition to the residential market, connected platforms will likely start to impact the commercial space as well. The border between consumer and commercial user will become a little more blurred. Companies such as Google that cater primarily to home services have cloud capabilities beyond the means of many competitors, in turn giving them a favourable advantage to provide security for the cloud. If consumers are trusting their home security systems with this, it only makes sense that they will begin trusting Google to provide security for their offices as well. As far as ONVIF is concerned, we are excited to see how the market will adopt the newly released Profile T for advanced video streaming in the coming year. We are also excited to explore our relationship with the International Electrotechnical Commission (IEC), by continuing our work on giving devices the ability to communicate upwards and proactively. It is clear that the market is open to adopting models in the quest for more efficiency without sacrificing security.
2018 was a good year for integrators and manufacturers across the board. The economy has been strong which manifested itself in many ways but in particular construction was booming. This was very good for the security industry, especially those integrators and manufacturers who provide services and products in the commercial space. Two of the most unexpected things that impacted the market, and will continue to impact it into 2019, are the trade war and the rapid rise of interest rates. I have been monitoring both very closely and didn’t expect the trade ‘skirmish’ to escalate into the trade war it has become. Similarly, interest rates have started to rise which was a bit of a surprise and one that will definitely impact the nation’s economy and by extension our market. Upcoming Cloud-Based Trends Cyber has definitely taken a strong foothold in the industry and with the continued expansion of cloud-based services I see three main trends coming in 2019. The first is the rise of cloud-based products and service offerings that security integrators will have access to. While we have had a few key players already offering cloud-based solutions for a couple of years on the video side in particular, I see this really picking up steam across all other security and life safety solutions. This really leads into the second trend which is integrators adjusting their business models to leverage these cloud-based solutions into recurring revenue models as managed security service providers (MSSP). The ability for integrators to develop their own managed service portfolio will be key; PSA is already working with several partners to help bring a portfolio offering to our membership which is really exciting. I anticipate that we will see about 10% of security integrators take hold of this new model in 2019 and then expect that number to increase by around 10% each year until the majority of the security business is cloud-based and integrators accept the new model of being an MSSP. Finally, of course is cybersecurity. Cyber has definitely taken a strong foothold in the industry and with the continued expansion of these cloud-based services, it will be more important than ever to integrators, manufacturers and end users alike. MSSP Portfolio Offering The more progressive security professionals will see cyber as an opportunity, a part of the MSSP portfolio offering, rather than just a threat that we have been talking about for going on five years. The winners in this market will be the integrators and manufacturers who can adapt to all these changes, leverage new technologies we are seeing with AI and cloud-based solutions, and those who stick to commodity-based solutions will be left behind. There are some remarkable things happening with AI technology, analytics, biometrics PSA’s growth has been remarkable. We have exceeded our own growth plans year over year and have also exceed the market projected growth marks as well. We continue to add more offerings to our membership to help them stay ahead of the curve, which in turn helps us to do the same. Right now, we are investing in programs that provide data to our integrators to help inform their business decisions. Data is key for any business and PSA has spent a lot of time working with developers and our integrators to understand what the most meaningful data is they need and how we can best deliver that to them by way of dashboards and reporting tools. Future Technology Advancements The biggest challenge we face is really tied to the higher interest rates that we have seen so far this year and what lies ahead. We help future fund projects for our integrators so when we see higher interest rates, we must closely monitor that and make business adjustments along the way as well to flex along with those rate hikes. I have been in this industry a long time so clearly my enthusiasm for what the industry is doing doesn’t fade. But what makes it really exciting right now is really related to technology advances. There are some remarkable things happening with AI technology, analytics, biometrics – you name it. It is a very tech heavy industry that people can feel good about being a part of and is an industry that will continue to grow so the opportunities are endless.
Edward Snowden’s name entered the cultural lexicon in 2013, after he leaked thousands of classified National Security Agency documents to journalists. He’s been variously called a traitor, a patriot, a revolutionary, a dissident and a whistleblower, but however you personally feel about him, there’s one way to categorize him that no one can dispute: He’s a thief. There’s no doubt about it: Snowden’s information didn’t belong to him, and the scary truth is that he is neither the first nor the last employee to attempt to smuggle secrets out of a building – and we need to learn from his success to try to prevent it from happening again. Since the dawn of the digital age, we’ve fought cyber pirates with tools like firewalls, encryption, strong passwords, antivirus software and white-hat hackers. But with so much attention on protecting against cyber risks, we sometimes forget about the other side of the coin: the risk that data will be physically removed from the building. Douglas Miorandi, director of federal programs, counter-terrorism and physical data security for Metrasens, recently discussed the major risks to physical data security with SecurityInformed.com. Q: What Do You Believe Are The Main Physical Threats To Data? The biggest threats I have seen in the physical data security space have varied over the years, but there are four specific risks that remain the same across the board for any organization, which are: Every organization is at risk of having data walk out the building with that employee The Insider Threat The Outsider Threat The Seemingly Innocent Personal Item Poor or Nonexistent Screening To beginning with, every company or government agency has at least one disgruntled employee working for them, whether they know it or not, and that means every organization is at risk of having data walk out the building with that employee. That is what security experts call the insider threat. Q: What Do You Think Influences Employees To Steal Data From Their Own Organization? People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially – meaning they don’t even need to be disgruntled; they might just want a quick way to make a buck. Financial data, too, is attractive, both for insider trading and selling to the competition. People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially This can happen to both private companies as well as government agencies. Take Natalie Mayflower Sours Edwards for example, a Treasury Department employee who was caught in the act just last month, when she disclosed sensitive government information about figures connected to the Russia investigation to a reporter. She didn’t hack the system, she simply used a flash drive. And let’s not forget that Snowden was a contractor working for the NSA. Q: Many Of Us Think Of Security Threats Coming From An Outsider, Do Companies Still Face These Type Of Threats? Yes. Unfortunately, organizations do not only need to worry about their own employees – companies and government agencies need to be wary of threats from outsiders. COTS devices include SD cards, external hard drives, audio recorders and even smart phones They can come in the form of the corporate spy – someone specifically hired to pose as a legitimate employee or private contractor in order to extract information – or the opportunistic thief – a contractor hired to work on a server or in sensitive areas who sees an opening and seizes it. Either one is equally damaging to sensitive data because of the physical access they have. Q: Whether It Be An Insider Threat Or An Outsider Threat, What Are Ways These Individuals Can Steal Sensitive Data? There are two types of personal items that can be used to steal data: the commercially available off-the-shelf (COTS) variety, and the intentionally disguised variety. This is considered risk number three – the seemingly innocent personal item. COTS devices include SD cards, external hard drives, audio recorders and even smart phones, any of which can be used to transport audio, video and computer data in and out of a building. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom Q: What Is The Difference Between COTS And Disguised Devices? The difference between COTS and disguised devices is that if someone gets caught with a COTS device, security will know what it is and can confiscate it. The disguised device looks like a security-approved item anyone could be carrying into the workplace, making it especially devious. Sometimes these devices don’t just function to bring information out of a building; they are used to damage a server or hard drive once it’s plugged in to a computer or the network. Some are both – a recording device that extracts data and then destroys the hard drive. Companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening peopleQ: With These Types Of Discrete Items, Can Security Personnel Still Catch Individuals In The Act? For Example, Through Security Screenings? Poor or nonexistent screening is the most substantial security threat to any organization when it comes to sensitive data. Whether it’s an employee, an outside contractor or a device, the physical security risks are real, and everyone and everything entering and leaving a building needs to be screened. Unfortunately, screening often isn’t occurring at all, or is ineffective or inconsistent when it does occur. Even companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening people and stopping them from stealing data through recording devices. Q: It’s Surprising That So Many Organizations Would Neglect Physical Security When Protecting Their Data. It’s a huge mistake, and the consequences can be dire. They range from loss of customer trust, exorbitant lawsuits and tanking stock prices in the private sector; and risks to national security in the public sector. Costs and resource allocation increase as well during efforts to reactively fix or mitigate the effects of physically stolen data. For both the private and public sectors, the risk for data to be physically removed from a building has never been greater. Years ago, it was much harder for the average Joe to figure out where they could sell stolen data. Now, with the Deep Web, anyone with Tor can access forums requesting specific information from competing spy agencies, with instructions on how to deliver it, greatly reducing the risk of getting caught – and increasing the likelihood people will try it. Although it’s getting easier to sell data, the good news is that all of these threats are avoidable with the right measures. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack Q: So How Can An Organization Protect Against These Risks? There are a number of ways – and the first one requires a change of mindset. Not long ago, the building/physical security department and the IT/cybersecurity department were considered two different entities within an organization, with little overlap or communication. organizations now are realizing that, because of the level of risk they face from both internal and external threats, they must take a holistic approach to data security. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack. Q: How Can Companies And Government Agencies Combine Both Physical Data Security And Cybersecurity Initiatives? Physical security managers can advise cybersecurity managers on ways to reinforce their protocols – perhaps by implementing the newest surveillance cameras in sensitive areas, or removing ports on servers so that external drives cannot be used. Organizations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try In turn, the cybersecurity team can let the physical security team know that they have outside contractors coming in to work on the server, and the physical security team can escort the contractors in and stand guard as they work. Constant communication and a symbiotic relationship between the two departments are crucial to creating an effective holistic security protocol and, once you’ve got the momentum going, don’t let it slow down. Sometimes efforts start off strong and then peter out if priorities change. When guards are down, it’s an excellent time for a malicious actor to strike. organizations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try. It’s not just about the mentality, though. Using the right technology is just as important. Q: What Type Of Technology Can You Use To Protect Physical Data? Many problems can be avoided by simply using the right technology to detect devices that bring threats in and carry proprietary information out. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them. Using a ferromagnetic detection system (FMDS) as people enter and exit a building or restricted area means that anything down to a small microSD card triggers an alert, allowing confiscation or further action as needed. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them Q: How Does FMDS Work? In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects the magnetic signature, down to a millionth of the earth’s magnetic field. FMDS is the most reliable method of finding small electronics items and should be part of the “trust, but verify” model Although it is a passive technology, it is more effective and reliable than using hand wands or the walk-through metal detectors typically seen in an airport, which cannot detect very small ferrous metal objects. FMDS can see through body tissue and liquids, so items cannot be concealed anywhere on a person or with their belongings. Whether or not the items are turned on doesn’t matter; FMDS doesn’t work by detecting a signal, but rather by spotting the magnetic signature that electronics contain. This is ideal, because most recording devices do not emit any signal whatsoever. In my experience, FMDS is the most reliable method of finding small electronics items (as well as other ferrous metal objects, like weapons), and should be part of the “trust, but verify” model, in which companies assume the best of their employees and anyone else entering the building, but still take necessary precautions. Q: What Are The Key Takeaways For Organizations Looking To Enhance Data Security? The toughest challenge in the security sector – whether it’s cyber or physical – is remembering that the bad guys are constantly looking for ways to slip in through the cracks, and security departments need to stay one step ahead to ward off both internal and external threats. Recognizing the existing threats, putting together a holistic security strategy, and using the right technology to detect illicit devices comprises an effective three-pronged approach to protecting an organization’s data. Organizations cannot afford to be passive about security and assume employees won’t steal data and spies won’t sneak in. Strong countermeasures are necessary because data loss can come from both inside and outside, in both private and public sectors, from places not everyone thinks of – and with technology like FMDS acting as a backup to the human element, organizations can lock down their data and keep the wolves in sheep’s clothing from getting through the door.
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no searching in a bag or purse for the card). And there’s no personal identification number (PIN) code to remember; no “intrusive” biometric element that can concern some users. James Segil, President and Co-Founder of Openpath, says the simplified process “uses fewer thought cycles.” Reliability of the system comes from Openpath’s SurePath triple-connect technology “We wanted to make mobile access control that people want to use and can use safely and with ease,” he says. “We wanted to make using a smart phone for access control easier and more reliable than using a keycard.” Simplified User Operation In the simplified scenario, the mobile credential resides on a smart phone that can remain tucked away in the user’s purse or pocket. The credential remains active without the user needing to open an app. The wave of the hand signals intent, which causes the button to light up, activate and the door is ready to open. Segil says the simplicity of operation has contributed to the system seeing an unheard-of 94% adoption rate among users. Reliability of the system comes from Openpath’s SurePath triple-connect technology. The smart phone credential is delivered using Bluetooth, WiFi or LTE (cellular) – whichever signal reaches the reader first enables the door to be opened. So even if a company’s WiFi is down or Bluetooth proves unreliable, there is still a third option. Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems Seamless Cloud Integration Segil is a serial entrepreneur who has had experiences as a frustrated user, dealing with many different offices, people and access control deployments over the years – subletting office space, changing PIN codes, dealing with 10 different offices using 10 different cards. Based on that experience, Openpath’s founders saw a need for a more user-centric approach to access control, and a chance to improve the office experience to be more aligned with employees’ experiences in their smart homes. Segil says he also saw “significant lethargy” among incumbent players in the access control space, and a market in which mobile and cloud technologies had still not taken hold. In addition to a simplified user experience built around mobile credentialing, Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems. The “elegant” readers, including a flush-mounted version, fit in well with high-end office environments. The company launched in May 2018. Openpath has been signing up national and regional channel partners all across the U.S. Openpath is focused on the commercial real estate market, where they have already seen significant adoptions, especially among mid-sized companies. Larger deployments as part of new construction are in the pipeline. National System Integration In the past six months since its launch, Openpath has been signing up national and regional channel partners all across the U.S. and now has a nationwide footprint and is able to service customers all over the U.S. They are not yet disclosing any specifics about the number of partners they have signed up and who they are. “I can share that we have a number of large national system integration and security brands on board as channel partners and many more regional and local system integrators,” says Segil. They are looking for additional integrator partners. “There is a cohort of folks out there who say ‘I get it,’ and I want to offer it to my customers,” says Segil. The cloud element of the system can provide recurring monthly revenue (RMR). Openpath’s system offers flexibility in terms of meeting each customer’s security needs. In addition to the “super convenient” scenario described above, the system can also be configured to be “super secure,” using two-factor authentication and other measures, says Segil. There are multiple “flavors” between the two extremes. It can also be integrated with elevators to enable the buttons on allowed floors. Integration With Existing Systems Cloud software simplifies operation for both tenants and landlords. The system is backwards-compatible to existing systems and can be used to retrofit and mobile-enable a legacy system, providing the benefits of mobile features and cloud operation to multiple sites. The software can interface with enterprise applications such as Active Directory, and an application programming interface (API) facilitates integration with other systems and building components. It operates with marketing automation platforms such as Flack and visitor management systems such as Envoy. The system is backwards-compatible, providing the benefits of mobile features and cloud operation to multiple sites Open standards make the system easy to install in new or existing buildings using RS485, or Cat 5 or Cat 6 wiring, whatever is in place. Retrofit installations can use existing panels, servers, software, etc., or they can be replaced. The Openpath panel is installed right next to an existing panel in a retrofit and preserves all legacy integrations of the previous system. Access Credentials Compatibility In its simplest configuration, the Openpath system consists of single or four-door panels wired using standard ports, Wiegand ports and REX ports, each connected to software in the cloud. Each panel works offline if the internet connection is down. Various key fobs, cards and other credentials are available in addition to mobile credentials. Openpath was one of the new exhibitors at last fall’s GSX show in Las Vegas, occupying a large-sized booth for a startup company. The “beautiful” hardware drew a lot of attention, says Segil. “The channel loves us, and we signed a lot of people,” he adds. “We were excited by the response.”
When Linus Yale Sr. invented the pin tumbler cylinder lock, it was the start of an iconic security brand that would eventually be known all over the world. What began in a lock shop in Newport, N.Y., would eventually evolve into the global presence of the brand “Yale” that we know today. The Yale brand was purchased in August 2000 by the Swedish lock manufacturer ASSA ABLOY Group, which expanded Yale’s global presence in the ensuing years and recently has led the way into smart locks and building automation. This year, ASSA ABLOY is marking the 175th anniversary of the Yale brand. Global home security brand “People all over the world trust the brand to protect what they love most in their homes,” says Kate Clark, Managing Director of Yale EMEA at ASSA ABLOY. Although Yale has a successful commercial sector business in the United States, in the rest of the world Yale is a residential brand. The Yale brand is well known in 130 countries from Australia to the Czech Republic to Colombia, and is popular in Africa, too. In the EMEA (Europe, Middle East and Africa) market alone, Yale has around 20,000 products; that’s without counting products sold in the Asia-Pacific and Americas regions. Yale is familiar as a generic term for “lock” in some areas and is one of the largest home security brands in the world. Expansion Into Digital Locks Good old-fashioned cylinder locks still look nice and cost the right amount of money, so they are in demand “I think we stand for safety, quality and reliability, and that hasn’t changed,” says Clark. “It’s as important now as ever. We have tried to pioneer new technology in the industry, new innovations. The rate of acceleration has increased, and there are so many technologies we have to understand and work with.” Growing beyond its heritage in mechanical locking systems, Yale is now expanding into digital locks that can protect homes with a high level of security synonymous with the Yale brand. The current selection of locks includes partnerships with tech brands such as Nest Labs (Google) and Alexa (Amazon). There is a rapid acceleration of growth in the electro-mechanical lock market. But even as the focus expands to smart locks and partnerships with tech companies, Yale continues to dedicate time and resources to the design of their core mechanical products. Good old-fashioned cylinder locks still look nice and cost the right amount of money, so they are in demand. Yale padlocks and bike locks also keep the name top-of-mind. There’s an ongoing education process as home locks expand beyond the use of mechanical devices and even personal identification (PIN) codes. Beyond Mechanical Locks And PIN Codes “It’s important for people to know that we have been around a long time, and we want to celebrate that,” says Clark. “It’s a fantastic story around the brand and what we have achieved. Internally we have a lot of people doing a lot of great things with the brand. We inspire people working with the brand and show them that this is the pedigree, and it should be cherished. We are also raising awareness among younger people, so they know that we are still relevant.” We have an obligation to show people that the new technologies are just as secure as mechanical locks" There’s an ongoing education process as home locks expand beyond the use of mechanical devices and even personal identification (PIN) codes. “We have to take people on a journey,” says Clark. “We have an obligation to show them that the new technologies are just as secure as mechanical locks. If we eliminate PIN codes, we have to do it in a secure and safe way. Then suddenly access to your home can be made available by a company you trust.” Smart Home Security “We have a responsibility to do our best job with the new technology – it’s wonderful, but it needs to be used correctly,” says Clark. “I personally feel a responsibility to do that in the right way.” For example, in working with Amazon and Alexa to remotely authorize the delivery of a parcel to a home, concerns of security must be weighed carefully along with issues of convenience. “It’s important that we get the balance right,” says Clark. “We need to know the right person is giving the right voice command to lock a lock. We have to be true to our core as ‘security first.’” Will Yale be here another 175 years? Clark says she doesn’t expect to be around to find out but will do her best to preserve and promote the brand until she hands it off to a new caretaker.
Security and Safety Things GmbH (SAST) is a new company that has announced its vision for an Internet of Things (IoT) platform for the next generation of security cameras. The Bosch startup plans to build a global ecosystem for the development of innovative security camera applications. Based on the Android Open Source Project (AOSP), SAST provides libraries, an API framework, and codecs for developers to work with. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphone applications. We presented some questions to Nikolas Mangold-Takao, VP Product Management and Marketing, about the new venture, and here are his responses: Q: Why a new company now? What technology innovations have made this a good time to launch this company? The time is right to bring market needs and technological innovations together on one platform"Mangold-Takao: From a technical perspective we see two main drivers: increasing computing power at the edge and increasing internet connectivity, which will enable devices to directly communicate with each other and bring new technologies such as artificial intelligence also to the security and safety industry. At the same time, we see that this industry and its users are hungry for more innovative solutions – addressing new security needs while at the same leveraging the possibility to improve business operations for specific verticals, e.g. retail and transportation. The time is right to bring market needs and technological innovations together on one platform for this industry. Q: Why does SAST need to be a separate entity from Bosch? Mangold-Takao: SAST is setup as a wholly owned subsidiary of the Bosch Group. We wanted to make sure that SAST is able to underline its role as an industry standard platform across multiple players. SAST is open to get additional investors and is being setup as a startup in its own offices in Munich to foster the environment where speed and innovation can more easily take place. Having said that, several entities of the Bosch Group are very interesting partners for SAST. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphone applications Q: Please explain your "value proposition" to the industry. Mangold-Takao: We will bring new innovations and possibilities to the security and safety industry by providing an open, secure and standardized Operating System for video security cameras, to also address pressing issues such as cyber security and data privacy concerns. Devices that run then with the SAST operating system will work with an application marketplace provided and operated by SAST. Integrators and users can then use these apps from this marketplace to deploy additional functionality on these devices. With our platform we will be able to build up a community of app developers, including the ones not yet developing for this industry who have expertise in computer vision and artificial intelligence. Q: It seems what you are doing has parallels with the Apple and Android "app" stores. How is your approach the same (and how is it different) than those approaches? We are setting up SAST as a user-centric company and involve selected users very early on in the process"Mangold-Takao: The approach is similar in the way that we plan to generate revenue by operating the application marketplace and thus participate in the app revenue. The difference is that there is much more needed than apps and cameras to create a complete working solution addressing a user problem in this industry – we need to make sure that our own platform as well as the new applications being created will work as a part of an end-to-end solution. Q: "Critical mass" and wide industry participation seem to be requirements for your success. How will you achieve those goals? Will you involve integrators, consultants, or other parties in addition to manufacturers (to drive awareness)? How? Mangold-Takao: SAST is in close exchange with device manufacturers, integrators and consultants, as well as application developers and large end-users at the moment to ensure that we are building the right platform and ecosystem for this industry. We are setting up SAST as a user-centric company and involve selected users very early on in the process. We will run dedicated programs and hackathons to attract app developers, already active and new to our industry. We will also run selected pilots with end-users throughout 2019 to ensure we have all partners involved early on. SAST sees the industry is hungry for more innovative solutions – with the retail vertical market a target for these solutions Q: What timeline do you foresee in terms of implementing these initiatives? Mangold-Takao: While we start with first app development programs and plan our first pilots already for this year, we are planning our commercial launch for end of 2019. Q: How does your new company relate to the new Open Security & Safety Alliance (OSSA)? Mangold-Takao: The Open Security and Safety Alliance has been working very closely with SAST over the past year, defining some important concepts and elements required. One of the most important elements is an open and standardized Operating System, specific to this industry, which will then bring forward new innovative technologies and solutions. SAST is actively working on this Operating System, based on Android Open Source Project (ASOP), but is evolved and hardened with industry-specific features. Q: What's the biggest thing you want the security industry to understand about SAST? What is your "message" to the industry? Mangold-Takao: Our message is simple: let’s build better security and safety systems – together! But for real, innovating an industry is a joint effort, we can only bring new innovation to this industry with partners who share our vision and are excited about new technology. At the same time, we strongly believe that our platform allows every partner to bring forward what they do best but also invite new partners to our industry.
CaleyLock Edinburgh was established in 1973 and is one of the longest established locksmiths in Edinburgh – the current owners took it over in 2011 and moved into their brand-new purpose-built premises in December 2017. CaleyLock installs and commissions as well as builds cylinders and padlocks in-house and their main customers belong to utilities, commercial, high-end residential, banking, local authorities and leisure sectors. When preparing to move to their new premises, they needed a security solution which would not only secure their premises, but also enable them to create a Showroom for customers – this is where CLIQ from Abloy came in. CaleyLock worked together with Abloy UK to install CLIQ throughout their premises to secure a number of external and internal doors. A key benefit that CaleyLock have gained from the installation of CLIQ is the ability to change access rights for employees CLIQ Monitoring & Access Solutions A key benefit that CaleyLock have gained from the installation of CLIQ is the ability to change access rights for people including employees, and monitor the access to restricted areas. The owners also now have peace of mind that nobody can access unauthorized areas outside of work hours and lost or stolen keys can easily be deleted from the system. CaleyLock are also delighted to now have a CLIQ Showroom to be able to demonstrate PROTEC2 CLIQ from Abloy to customers and end-users in a real-life working environment, which has proven to be efficient in displaying the benefits that CLIQ can bring to any organization, big or small. Ross McKay, Director of CaleyLock Edinburgh said of the installation “We find CLIQ is working really well for us, as our new premises are purpose built – there were no locks installed initially so this has been a great upgrade to the security. As part of the system, we also have a low energy Bluetooth key which is ideal for people working in remote areas as we can see from the audit trail who has accessed specific sites, and when.”
Opengear, a provider of solutions that deliver secure, resilient network access and automation to critical IT infrastructure, today announced CSC – IT Center for Science Ltd, a Finnish center of expertise in Information and Communications Technology, has deployed Opengear Smart out-of-band appliances to streamline a major upgrade project and improve day-to-day remote management. CSC, a non-profit organization with 70% ownership by the state of Finland and 30% controlled by Finnish higher education institutions provides services for research, education, culture, public administration and enterprises, to help them thrive and benefit society at large. CSC's primary customers are the Ministry of Education and Culture and organizations within its field of operations, higher education and research institutes and public administration sector. Planned Network Upgrade As Antti Ristimaki, Senior Network Specialist for CSC explains, "Getting from our data centers to some of the sites we look after might take many hours and so having remote out-of-band access is vital for us." CSC has used a legacy out-of-band (OOB) console server solution for several years, but with a major network upgrade planned for 2018-2020 it was decided that more flexibility was needed to help the small networking team support clients at around 40 sites spread across the country. "What we liked most about Opengear was its small footprint and high-quality software along with the 4G mobile connectivity option which provides us with the option to deploy the OOB console server at site before we have any working in-band access," says Ristimaki. Setting up the devices took very little time and we are now remotely managing the process" Remotely Configure Networking Equipment CSC has already deployed Opengear ACM7004-5-LMR - Resilience Gateway appliances at around 10 locations across the country, which were initially used to help remotely configure networking equipment at sites connecting to its newly upgraded backbone network. Having a remote access server at distant locations makes it easier to reliably commission and configure new network equipment from its main offices at Espoo and Kajaani. At the final stage, there will be around 40 Opengear Resilience Gateway appliances across the country. "Setting up the devices took very little time and we are now remotely managing the process - which has proved surprisingly simple using 4G LTE and even 3G connections," Ristimaki adds. Built-In CLI Tools The built-in CLI tools provided by the Opengear software have proven to be useful especially when commissioning the console server itself. Through this accessibility, CSC has integrated the management of its Opengear Smart OOB devices into its own internally developed network management and orchestration platform based on Ansible. CSC is also using Opengear to help record, and in the event of any problems, rollback critical firmware upgrades and configuration changes for core networking elements at remote sites.
Security has become one of the priorities to be focused on for the operation of commercial buildings because many people come in and out of the buildings every day. IP surveillance solutions are particularly essential for those commercial applications generally used in a wider and more open areas, owing to the requirement of system scalability. Surveon commercial solutions, including high-reliability cameras with wide monitoring area, feature-rich CMS with multiple access as well as RAID NVR with flexible storage expansion. These enterprise solutions help commercial buildings to prevent the incidents such as thefts or other illegalities, effectively safeguarding the property and profits in time. Enhanced Storage And Data Security When designing a suitable surveillance system, commercial buildings might encounter some major challenges such as open field and wide monitoring area. Under such circumstances, Surveon’s 3-megapixel camera will be the best solution. Surveon’s RAID NVR allows users to scale up the storage capacity through iSCSI (SAN/NAS) and JBOD It provides 1.5-time larger monitoring range at 30 FPS, offering a cost-effective option for monitoring wide areas. Besides, Surveon cameras are with industrial-grade components and 3-year warranty to ensure long-term operations. Its quality can be proved by the extremely low RMA rate, and reliability can be assured. The data protection of recorded videos and the flexible expansion of storage capacity for future scale up are of great importance to the planning of commercial surveillance. Surveon’s RAID NVR allows users to scale up the storage capacity through iSCSI (SAN/NAS) and JBOD, bringing commercial buildings a convenient and budget-saving option that they can expand storage capacity by demand or yearly budget instead of buying entire system at the beginning. Efficient Management With Reduced Risk Surveon’s enterprise Central Management Software provides superior features including interactive video walls, matrix screen displays, centralized alarm management, and high scalability for thousands of cameras and multiple clients, allowing the management level and the security guards to keep every detail under control and review both live and stored videos through browsers or mobile applications anytime, anywhere. Surveon was chosen as the supplier of a comprehensive networked security solution for KL Tower, the highest building in Malaysia. The security project manager for the KL Tower said, “Surveon’s full end-to-end integration, including enterprise VMS and storage that supports up to 300TB, helps us manage the project in the most efficient way and brings the lowest risk.” Surveon's commercial solutions have also been deployed at Historic Buildings in Poland, ISP server rooms in Taiwan, and the building of airline catering service provider in Hong Kong.
A major redevelopment and construction project is designed to completely modernize New York’s LaGuardia Airport into a world-class transportation hub that will better serve the tens of millions of passengers that use the airport each year. Siemens Building Technologies is working with Skanska Walsh Joint Venture, the design-build contractor for the redevelopment of Central Terminal B, to deploy an intelligent infrastructure solution that includes an integrated building automation and fire/life safety system for the new central terminal complex.The vision for the new terminal includes an enriched passenger experience by reducing delays at the gate Integrated Facility Security The new Terminal B will be far more efficient and safer than its predecessor built in 1964. Siemens’ Desigo CC integrated building management platform will monitor the building automation, allowing for dynamic control of the facility’s systems in order to respond to the changing needs of the terminal’s operations. The Desigo Fire XLS-V fire alarm panel with voice capability will be at the heart of the fire alarm system, operating both in Terminal B and the central plant. “The vision for the new terminal includes an enriched passenger experience by reducing delays at the gate and moving all passengers more safely and efficiently throughout the airport,” says Ted Jadermark, Airport System Manager with Skanska Walsh Joint Venture. “Integrating Siemens building automation and fire safety systems as we construct the new facility gives us the ability to manage and monitor its dynamic daily operations with the increased confidence necessary to protect the comfort and safety of LaGuardia’s passengers.” Efficient And Safe Travel The new terminal complex will be located closer to the existing Grand Central Parkway, freeing up valuable airport apron space for planes. It will also utilize an island-gate system, which will create nearly two miles of additional taxiways and lead to fewer gate delays and less carbon emissions from idling planes. “We’re extremely proud to play such a key role in modernizing LaGuardia Airport, and in helping create the perfect place to travel efficiently and safely,” says Dave Hopping, President of Siemens Building Technologies North America. Siemens has an extensive footprint as a leading technology partner and financial ally for the New York City metropolitan region, helping shape the city’s infrastructure.
GardaWorld’s cash handling business is North America’s largest, with its ubiquitous red and white trucks easily spotted throughout Canada and the United States. With hundreds of facilities and handling centers, GardaWorld processes currency for an entire continent, monitored by complex video surveillance technologies, working together to ensure the integrity of their processes and operations. Headquartered in Montreal, Canada, GardaWorld provides business solutions and security services. With over 62,000 staff globally, GardaWorld is one of the largest privately-owned security companies in the world, protecting people, assets, and reputations on a daily basis, performing critical tasks to protect and secure in an increasingly chaotic world. Efficient Central Monitoring When the time came to upgrade existing video surveillance operations for the company’s cash handling business as well as installations for the company’s newest sites, the task was complex with unique requirements and on a massive scale spanning two countries. IDIS technology, known for its power, flexibility, modularity, and low total cost of ownership, stood ready to meet the company’s needs.DirectCX TVRs were installed at legacy sites to ensure zero downtime for GardaWorld’s video surveillance capabilities Upgrading the legacy GardaWorld video surveillance solution across their 250+ sites required the installation of over 700 IDIS cameras and the establishment of two major central monitoring facilities. The inter-compatibility inherent in the IDIS Total Solution allowed the powerful and intuitive video management software (VMS) solutions, IDIS DirectCX and IDIS Solution Suite, to harmonize at GardaWorld central monitoring facilities. DirectCX TVRs were installed at legacy sites to ensure zero downtime for GardaWorld’s video surveillance capabilities, and IDIS DirectIP network video recorders (NVRs) were incorporated rapidly thanks to their ease and speed of installation and configuration. Reduced Ownership Cost The IDIS solution for GardaWorld was not only rapidly deployed thanks to the simplicity of DirectIP and IDIS VMS; the modernized monitoring system also comes with a low total cost of ownership due to a reduction of cabling cost thanks to IDIS DirectCX TVRs, the lack of any annual service management agreement or licensing fees for IDIS VMS, and less training time required from the single remote application used for managing each device on the system.IDIS solutions have proven flexible, scalable, and customizable to deliver the appropriate technology "IDIS meets our high standards and more with a surveillance offering that is as committed to our security requirements as we are. IDIS technology delivers powerful features and capabilities in a variety of ways that meet needs as diverse as our differing locations and custom requirements." "Whether analog or IP networked solutions, new installations or upgrades, or at urban or remote sites, IDIS solutions have proven flexible, scalable, and customizable to deliver the appropriate technology in the ideal way for each requirement." "We are pleased with the partnership we have created with IDIS over the past year and look forward to the continued benefit we’ll receive from current and planned installations of IDIS technology," Guy Côté, Vice President and Chief Security Officer, GardaWorld. Integrating Analog And Digital Surveillance GardaWorld’s exceptional footprint and storied legacy in North America meant there was a highly varied set of conditions and requirements for optimizing video surveillance operations. With a mix of existing analog and digital surveillance in existing facilities and requirements for initial installations in newer facilities, GardaWorld articulated complex security needs for more than 250 individual sites throughout Canada and the United States, each requiring high quality video surveillance and networking with a mix of analog and digital technology.The rollout of IDIS technology required training for operators and monitors of surveillance equipment Within individual facilities, existing video surveillance reflected a substantial level of upgrade complexity. The number of cameras at each site varied, with additional variances in age and operations for prior installations. Due to the nature of GardaWorld’s operations, it was imperative that no interruption of security monitoring would occur during the transition to IDIS technology. Further, the rollout of IDIS technology required training for operators and monitors of surveillance equipment at various locations, a potential challenge given the scale of the rollout and upgrades. Customizable Security Solution The ability of the powerfully modular and customizable IDIS Total Solution were an ideal fit for GardaWorld’s security needs, delivering benefits from the start, and are still ongoing, of the installation. GardaWorld benefitted from worry free integration of existing technologies and the installation of a flexible, customized solution that blended analog HD-TVI technology with next-generation IP networked surveillance, as appropriate to each site, linked and managed by the powerful and highly customizable IDIS Solution Suite VMS. The installation met GardaWorld’s requirements for seamless upgrade and technology handover, minimizing downtime and supporting the critical nature of GardaWorld’s operations.The seamless integration under IDIS’s powerful connectivity and simplified installation and use has reduced training time for GardaWorld staff Seamless Security Integration GardaWorld facilities now benefit from modernized, functionally rich cameras and recording devices that deliver clearer and smoother surveillance, and hasten an operator's ability to identify and mitigate potential incidents and fully review and respond to questions about operational security. The seamless integration under IDIS’s powerful connectivity and simplified installation and use has reduced training time for GardaWorld staff and eliminated the most common headaches associated with mass upgrades and new installations of security technology. Better surveillance and security operations for GardaWorld pass through to a more secure position for GardaWorld staff and customer assets around the world, further confirming GardaWorld’s place as a market and innovation leader in the security space.
Regensburg-based Euro Rastpark GmbH & Co. KG operates comfortably equipped rest stops for commercial drivers at 18 sites throughout Germany, many of which are located on important transport logistics routes. The rest areas represent a valuable addition to the regional infrastructure with thoughtful additions of service, eating, entertainment and shopping facilities, and in more and more cases with opportunities for inexpensive overnight accommodation. For professional drivers, these rest stops (Autohöfe) close to the motorway are important waystations where they can take their legally mandated breaks from driving. In recent years, a particular form of criminality has become more widespread on Europe´s major highways: the theft of valuable commercial goods, vehicles and their cargoes. The financial cost is enormous. German insurers pay an average of a million euros per business day for lost commercial goods alone. On top of this, property damage must be considered, and no less important are the threat and uncertainty felt by many drivers. In recent years, a particular form of criminality has become more widespread on Europe´s major highways: the theft of valuable commercial goods Fuel Theft Even the fuel tanks on lorries have been targeted by organized crime, and accordingly theft of fuel has become a regular cause of annoyance to drivers and hauliers alike. In recent times, the police have been called to investigate as many as nine criminal offences a week at the Theeßen Euro Rastpark on Eastern Europe Route A2. The company has recorded high crime rates elsewhere too. Respected logistics companies were even compelled to warn their driving personnel about less safe routes. The situation could not be allowed to continue, and Euro Rastpark began working with other members of the Association of German Off-motorway Truck Stop Owners (VEDA) to combat the problems by developing a security concept that addressed actual conditions. Euro Rastpark now offers premium parking areas that are screened and monitored according to VEDA standards for lorries at seven of its truck stops. Their aim was to develop a security solution that could be implemented quickly and without prohibitive expense. Even the fuel tanks on lorries have been targeted by organized crime Video Observation Solution Managing director Johannes Witt explains the concept: "We have not relied on expensive construction, but rather on pragmatic detection and deterrent measures such as restricted approach roads, the best possible lighting and complete documentation of all movements by vehicles and people." For the full-coverage detection of all movements, they decided to use an economical and top-quality video observation solution offered by another Regensburg-based company, the technology pioneer Dallmeier. Accordingly, DF5200HD-DN/IR type high resolution infrared cameras have now been deployed to improve security on the approach and departure roads to the separate lorry parking areas at the Theeßen Euro Rastpark. The video system is set up so that the vehicle licence plates are clearly readable not only by day, but also in night recording mode. We have not relied on expensive construction, but rather on pragmatic detection and deterrent measures" Dallmeier Recording Solutions The video data is backed up reliably by the DMS 2400 Appliance, one of the most powerful recording solutions in Dallmeier's inventory. During the project to equip the premium parking area with video equipment, Euro Rastpark seized the opportunity and commissioned Dallmeier to install cameras for observing the refuelling lanes as well as the retail area and cash registers in the service station shop. In all, 24 camera systems are now operational and between them they monitor all critical areas. The 96 lorry parking spaces at the Theeßen truck stop now constitute a further precinct of safety and calm within a zone that is fully protected by video technology. Secure Parking Areas The number of thefts of vehicles, goods and fuel from the secured parking area has fallen dramatically. These new security zones also mean that the drivers can work with more peace of mind, since they do not have to worry about the safety of their valuable cargoes, or even their personal safety on top of the normal cares of a demanding job. "Since we started this initiative, the number of robberies has fallen massively" confirms Witt. More protection and comfort for drivers, theft prevention for goods and operating equipment – video technology from Dallmeier ensures that the logistics chain does not break down on the roads and highways.
Round table discussion
High-quality products are the building blocks of successful physical security systems. How they are packaged may sometimes be seen as an unimportant detail or an afterthought. But should it be? Effective packaging can serve many functions, from creating a favorable customer impression to ensuring the product isn’t damaged in transit. Packaging can also contribute to ease of installation. On the negative side, excess packaging can be an environmental concern, especially for customers who are sensitive to green factors or to minimizing waste. We asked this week’s Expert Panel Roundtable: Is packaging of products important in the commercial security market? Why or why not?
Higher pixel count is better. It’s a basic tenet of the video surveillance market, or at least it is the implication as manufacturers continue to tout their latest products offering ever-higher pixel counts. But the reality is more nuanced, as our Expert Panel Roundtable panellists explain this week. Pixel count shouldn’t be seen as an end unto itself, but rather as a factor in determining what camera is applicable to which application. Pixel count is just one factor of several to consider, and the needs of the application must rule all decisions. We asked this week’s panel: How many megapixels are enough? At what point does additional resolution not matter, or not make economic sense?
For many years, generally speaking, the use of video surveillance has been seen as an extension of an end user customer’s security system. However, recently, we have also heard about how video can help customers more generally, providing benefits that extend beyond security and encompass better operations and management. Easier economic justification is one important aspect of looking more broadly at the benefits of video surveillance to the enterprise as a whole. Better return on investment (ROI) means more sales. We asked our Expert Panelists to share their observations about which non-security uses of video are catching on. Their responses suggest an extremely broad range of possibilities.