Inner Range is reminding customers with Concept systems that its stock of parts is rapidly depleting with some items now down to single figures. The security system designer and manufacturer first announced its Concept system was nearing End of Life in November 2018. Many customers have migrated easily to Inner Range’s Integriti product at only a fraction of the cost of an entire system replacement. But the company says it’s concerned some customers have not yet migrated and may fi...
Alcatraz, a developer of secure touchless access control products, has partnered with TRL Systems to sell and market Alcatraz’s innovative security solutions. Headquartered in Rancho Cucamonga, California, and with regional offices in Burbank, Tustin, and San Diego, TRL Systems is a provider of fire life safety and security integration solutions for a variety of industry segments including their specialty, healthcare, as well as education, industrial, hospitality, government, entertainmen...
Honeywell announced the release of Pro-Watch® Integrated Security Suite, a software platform designed to help protect people and property, optimize productivity and ensure compliance with industry regulations. The platform provides complete visibility of all connected systems and the scalability of the software makes it easy to grow with the changing needs of a business. Pro-Watch Intelligent Command is a web-based user interface that provides organizations complete situational awareness of...
ConnectWise, the provider of intelligent software and expert services for technology solution providers (TSPs), announced it has launched a bug bounty program to supplement its own internal vulnerability management strategy boosting efforts to quickly identify and remediate bugs and security vulnerabilities in its software. ConnectWise is partnering with HackerOne, the industry’s trusted hacker-powered security platform, to host the program. A bug bounty program incentivises security res...
Interface Security Systems, a managed service provider delivering business security, managed network, and business intelligence solutions to distributed enterprises, announced it is now offering interactive remote video monitoring service with automated voice-down options to help its retail and restaurant customers promote social distancing and mask-wearing guidelines on their premises. A growing number of retailers and restaurants are reporting increased incidents of agitated customers and in-...
Sectigo, a provider of automated digital identity management and web security solutions, announced that Baidu, a Chinese search engine with more than one billion daily page views, has chosen Sectigo to provide the back-end services for the company’s all-new Baidu Trust SSL Certificates. Baidu will offer Sectigo Domain Validated (DV), Organization Validated (OV), and Extended Validation (EV) certificates white-labeled under the Baidu Trust product line, greatly expanding Sectigo’s foo...
ADT Inc. announced that, via its commercial channel (“ADT Commercial”), it is investing in Percepta Labs, an artificial-intelligence technology startup out of Philadelphia. ADT Commercial is a premier provider of commercial security, fire, life safety, and risk consulting services in the U.S., and through its investment will fund the commercialisation and application of the startup’s cutting-edge AI technology to help detect and deter shoplifting. ADT Commercial will work directly with Percepta to further test and develop the application of Percepta’s proprietary, socially responsible AI technology in commercial environments and facilitate the launch when the solution is market-ready. Response to facial recognition challenges Founded by Philippe Sawaya, Neil Gramopadhye, and Jonathan Mak while pursuing their undergraduate degrees at the University of Pennsylvania, Percepta’s proprietary "ethical AI" technology responds to emerging concerns surrounding the use of facial recognition technologies and is designed to anonymize individuals’ demographic features—including race, gender, and age—by analyzing existing security camera feeds to detect shoplifting incidents in real-time. Using advanced action recognition techniques, Percepta’s AI technology tracks individuals’ movements, scanning for probable shoplifting or precursory shoplifting behavior and assesses theft probability. Loss prevention accuracy “We’re so proud to place our support in forward-thinking organizations like Percepta, who are aiming to truly revolutionize the industry,” said Dan Bresingham, Executive Vice President for ADT. “We pride ourselves on being at the forefront of change in our industry. We believe Percepta could signal a tidal shift in how we approach AI, facial recognition, and data collection, and we look forward to seeing how their technology continues to develop.” In addition to taking a socially responsible approach to AI, Percepta’s technology shows tremendous promise when it comes to loss prevention accuracy. Early tests by Percepta indicate the technology could be more than two times more accurate than human loss prevention personnel in detecting shoplifting behaviors, translating into improved margins, decreased shrink, and a better experience for customers, while eliminating biases based on race, gender, and age. Ethical AI technology “AI’s presence in our lives has skyrocketed, yet it poses ethical concerns that have not been sufficiently addressed. We’ve made these concerns a key priority and are proud to have developed an ethical AI technology that counteracts these biases in the world of retail and beyond,” said Sawaya, CEO of Percepta. “We look forward to seeing how ADT Commercial’s vast experience and commercial network will accelerate Percepta’s growth. We’re excited to partner with them in our shared mission to support socially responsible AI security solutions.”
After the “ONE” comes the “OCF”: AGILOX expands their line of intelligent guided vehicles by introducing a new autonomous omnidirectional counterbalanced forklift, operating with swarm intelligence. In doing so, AGILOX has entered a new area of application: classic intralogistics in inbound/outbound warehousing and storage. With the ONE, AGILOX's ultralight, high-efficiency forklift product line, the company has reshaped the concept of AGVs. The fleets operate without a central control system, meaning the vehicles navigate the production facility or warehouse in a truly autonomous fashion. Counterbalanced forklift The AGILOX IGVs organize their routes according to the decentralized principles of swarm intelligence The exceptionally compact AGILOX IGVs organize their routes according to the decentralized principles of swarm intelligence, making them much more flexible than traditional AGVs. Additionally, programming or “teaching” the vehicles becomes significantly easier, while central software programs including maintenance, updates, etc. are rendered obsolete—an innovation that lowers operating costs. AGILOX is now expanding its range of IGVs to include the OCF—an abbreviation for “Omnidirectional Counterbalanced Forklift”. While the ONE is equipped with a scissor lift to function as a load handling device (and thus transports the load within the vehicle contour), the OCF is designed according to the principles of the counterbalanced forklift. Pick loads Hence, it can pick up pallets, lattice boxes, and other load carriers with a maximum weight of 1500 kgs (3300 lbs), transport them to the destination, and set them down at a height of up to 1600 mm (63 in). AGILOX’s intelligent and cost-saving IGV concept opens up new application areas. While the ONE vehicles are mainly used for material supply in production, the OCF enables classic intralogistics tasks in incoming and outgoing goods, order picking and storage, as well as in production—provided that the transport is pallet-bound. Omnidirectional drive concept The lithium-ion (LiFePO4) battery technology ensures short charging and long operating times Just like the ONE, the OCF uses an omnidirectional drive concept. It can therefore also drive sideways through narrow aisles, turn on the spot, and maneuver in the tightest of spaces. The same lithium-ion (LiFePO4) battery technology ensures short charging and long operating times - just three minutes of charging allows for up to one hour of operating time. The IGV fleets can be connected to customer software systems (LVR, ERP, WMS, MES, etc.) via an open API interface. An optional IO box enables the integration of external infrastructure, such as rolling gates and stationary conveyor systems, in the intelligent control system. An analytics module provides the user with all relevant operating data and KPIs. Series production Dipl.-Ing. (FH) Franz Humer, M.A. Co-Founder and CEO of AGILOX, notes “The OCF is a logical addition to round out our product portfolio. With it, we open up opportunities in storage and order picking technology, and thus, a large market in which the IGVs can showcase their advantages over both AGVs and man-operated forklifts.” The combined operation of the ONE and OCF in a “swarm” also provides a great advantage. For instance, while the smaller vehicles carry out delivery services to assembly workstations or tend to e-Kanban shelves, the OCF can, using the same control system and WiFi infrastructure, take over pallet transport. The OCF pilot series has already been successfully tested in Vorchdorf, Austria. Series production will begin shortly, with the first OCFs set to be delivered to customers in the first quarter of 2021.
Designed with facilities managers and nominated Responsible Persons in mind, the guide has been created to be a trusted source of safety and compliance information. It is free for any business to download and use to review their own fire doors. In 2019, the Fire Door Inspection Scheme found that 76% of fire doors inspected were condemned as not fit for purpose, with excessive gaps, damaged smoke seals and poorly adjusted door closers the top reasons for failings. Fire door safety The research suggests that more organizations need to focus on fire door safety and how to ensure their solutions remain safe and compliant. Abloy’s guide outlines whose responsibility fire doors are, along with a seven-step guide to door inspection and a printable check list to assist with record keeping. The guide is the latest part of Abloy’s long-term commitment to fire safety; for more than 10 years it has offered free training at the Abloy Academy designed to help the market understand the importance of compliance with Building Regulations. Access control Pat Jefferies, Commercial Director at Abloy UK, said: “We take our commitment to fire door compliance incredibly seriously. Anyone with a responsibility for access control has a duty to increase their knowledge and commit to making buildings safe for occupants: specifying the correct solution can mean the difference between life and death.” “I understand that there are many other pressing priorities in 2020, but to be frank you’ll care a lot less about these if you’re trapped in a burning building. That’s why we must never, ever let fire door safety slip, and instead find the best solutions that combine touch-free access along with compliance for emergency escape.”
HID Global, a worldwide provider in trusted identity solutions, unveiled its new HID® ELEMENT product line, the industry’s heavy-duty, fully modular desktop-based card personalization portfolio that establishes a new category for mid-range and high-volume market segments. The portfolio’s enhanced card production capabilities, flexible system architecture and cost-effective deployment model empower organizations to create custom secure ID and financial card production solutions for a variety of use cases and applications. For government entities and financial card issuers “From government entities to financial card issuers and service bureaus, customers around the world have unique card personalisation and issuance requirements where traditional direct-to-card printers and large production machines may be too cost- or space-prohibitive,” said Craig Sandness, Vice President and Managing Director of Secure Issuance with HID Global. “By bridging the gap between desktop printers and central issuance machines, our HID ELEMENT product line pioneers a new approach for delivering a host of highly configurable options that address current and evolving customer challenges.” The HID ELEMENT portfolio delivers optimal card personalization and accommodates projects that require high-resolution UV ink printing, laser engraving or both. Designed to serve government and financial institutions, medium-to-large enterprise corporations and service bureaus, its features address the demand for greater print speed, higher resolution, larger card output and better cost-per-card economy. Key features Key product line features that enable a variety of configuration options include: Precision UV-cured, Drop on Demand (DOD) inkjet card printing: Options span full-color over-the-edge or monochrome text and graphics printing, with as many as six configurable ink channels. Users have options for custom colours, fluorescents, and color tactile effects. Laser engraving system for tamper-proof, high-durability card personalisation: Deliver secure sub-surface or tactile effect black markings and precise greyscale imaging in a laser engraving-only system or combined with a color UV ink module. Multiple card encoding options: HID OMNIKEY® or third-party (Smartware®) contact and contactless reader and programmer functionality and magstripe support. Lenticular personalisation: Multiple/Changeable Laser Image (MLI/CLI) engraved images or data shift with the viewing angle for convenient authentication. Optional modules: Additional input/output card hopper for a total capacity of as many as 1,600 cards and a camera system for registration and verification.
InfoSaaS and Axora have concluded a partnership agreement intended to transform the processes and costs of achieving and retaining information security, data protection and business compliance ISO management system certifications for companies operating in the oil, gas and mining sectors. Companies in these sectors are subject to the same compliance requirements as other organizations, but the very nature of their business activities means their sites are frequently in difficult-to-reach and/or inhospitable locations. As a result it can be both difficult and/or expensive to: Bring and keep compliance managers on-site to implement procedures and processes, collaborate with local teams, and generally prepare for certification or surveillance audits Bring auditors from Certification Bodies on-site to conduct the initial audits necessary for the awarding of certifications or to carry out the annual surveillance audits required for organizations to retain those certifications. SaaS software solutions InfoSaaS provides SaaS software solutions for achieving and retaining multiple ISO management system certifications. By virtue of being platform-based, these solutions enable: Compliance managers (or whoever is responsible for ISO compliance within their organization) to collaborate with colleagues on-site, and to conduct "internal audits" to ensure that standards are met ahead of any external audit; and Certification Bodies to conduct surveillance audits remotely – eliminating the need for auditors to travel to difficult-to-reach locations. Axora and InfoSaaS collaboration Axora works specifically with companies in the oil, gas and mining sectorsAxora works specifically with companies in the oil, gas and mining sectors, identifying technologies with the potential to shape the future of such businesses, helping them understand the key opportunity areas that sit across the value chain, and connecting them to the innovators. Several InfoSaaS solutions are available on Axora’s platform, supporting: ISO27001 (information security management), ISO9001 (quality management), ISO14001 (environmental management) and ISO18001/ISO45001 (health and safety management). ISO certifications costs and challenges InfoSaaS and Axora intend to leverage each other’s expertise in information security, data protection solutions"Peter Rossi, co-founder of InfoSaaS, said: “ISO certifications are valuable for any business to earn. But, for otherwise similar companies that happen to be in different industries, there can be huge disparities in the costs of doing so. InfoSaaS and Axora intend to leverage each other’s expertise – in information security, data protection and business compliance solutions, and the oil/gas/mining industries respectively – to transform the processes and associated costs of certification and surveillance audit for companies operating in those sectors, where simple ‘geography’ may currently make it expensive and difficult.” Energy and mining sectors The energy and mining sectors are under increasing pressure to adhere to the ever-changing compliance certification criteria"Dr. Nick Mayhew, Chief Commercial Officer for Axora said: “The energy and mining sectors are under increasing pressure to adhere to the ever-changing compliance certification criteria and improve their strategies. With this comes additional overhead in terms of resource, time and effort required to obtain and maintain these standards. We are excited to help organizations leverage the InfoSaaS platform to drastically simplify and manage their compliance operations in key business areas including environmental, security, health and safety.” Demand for remote audits ISO management system certifications have grown in importance to organizations operating in increasingly competitive markets around the world, clearly communicating relevant or important competencies to potential customers. Demonstrating certification against industry standards and evidencing a mature approach to the protection of sensitive information and personal data have become baseline requirements in many markets and for some customers. The global coronavirus pandemic has driven a surge in demand for remote audits generally, requiring businesses to adopt new approaches and solutions that allow teams, compliance managers and auditors to collaborate effectively to achieve and retain certifications.
Exabeam, the Smarter SIEM™ company, and Code42, the provider in insider risk detection and response, announced a strategic partnership to help security and insider threat teams quickly detect, investigate and respond to data exfiltration, and reduce risks caused by compromised, negligent or malicious insiders. Customers using the joint solution will benefit from having a full picture of their environment, even in distributed workforce conditions, with automated incident response to obstruct insider threats before data loss occurs. Insider threats are now among the most serious security risks and are becoming increasingly difficult to manage using conventional security technologies. The huge shift to remote working in 2020 has increased the use of personal devices, and at the same time, reduced the effectiveness of existing enterprise security solutions. Remote workers Remote workers have also become the targets of social engineering attacks as cybercriminals attempt to exploit them When devices aren’t accessing assets directly through the corporate network or a VPN and instead going straight to the cloud, on-premise network data loss prevention (DLP) techniques and network firewalls have blind spots. Remote workers have also become the targets of social engineering attacks as cybercriminals attempt to exploit them to access corporate networks. “The unprecedented growth in distributed work presents novel and complex insider threats -- even when compared to just months ago,” commented Grant McCormick, CIO, Exabeam. “As a result, organizations should attach greater urgency to monitoring risky activities that may impact the security of their vital data. Failure to do so creates a potentially catastrophic blind spot in the protection and integrity of enterprise infrastructure.” Technology integration The partnership enhances security across a variety of exfiltration vectors — across endpoint to cloud, through a technology integration, which uses the Exabeam Cloud Connector solution to ingest data that indicates risk from the Code42 IncydrTM product into Exabeam Data Lake and Exabeam Advanced Analytics. Organizations using the Exabeam and Code42 integration will gain the ability to establish or more easily build insider threat programs and processes. These organizations’ security operations center (SOC) and insider threat teams can: Provide real-time analysis and reporting on security alerts and data exfiltration attempts across their environment Accelerate investigations related to insider threats with detailed incident context across exfiltration vectors, file types, and user attributes and behavior Resolve insider risk incidents faster through a combined solution that delivers high-fidelity alerts and actionable insights, along with the ability to correlate alert information and triage incidents Protection to systems We can offer organizations the ability to protect their systems and data" Ananth Appathurai, strategic partnerships and ecosystem SVP at Code42, said, “Together, we can offer organizations the ability to protect their systems and data from the malicious and accidental consequences of insider threats. This is vital as the recent changes in workplace culture evolve into permanent distributed strategies that legacy data protection solutions aren’t designed to address.” To further support their cooperation, Exabeam is joining Code42 as a founding partner of the inaugural Insider Risk Summit, where the security community will connect to address the growing data risks from insider threats. Detecting and responding to threats Presented as a virtual event on September 17, 2020, it is the premier gathering for security leaders and professionals to gain knowledge, share insights and advance strategies on detecting and responding to one of the biggest security challenges: the growing risk to IP and data presented by cloud-based collaboration and decentralized work. “This technology collaboration between Exabeam and Code42 will allow employees to use the tools they need to work in distributed environments, while giving security teams visibility into how files are moving across endpoints and cloud applications,” said Chris Stewart, senior director, business development & global alliances at Exabeam. “It’s an important collaborative step, and by joining forces for events such as the Insider Risk Summit, we aim to maximize awareness of the risks of data loss from insider threats.”
In today’s fraught times, business continuity and success hinges on how you manage the visitors to your company. By prioritizing safety and security, and coupling them with top-notch attention and customer service, you win loyalty and gain a reputation that will serve you in years to come. An excellent way to accomplish this is by identifying and implementing the best visitor management system for your company. And visitor management systems go beyond ensuring the safety of your visitors and staff safety from your visitors. A feature-rich VMS will track your guests' activities, so you can better understand their preferences for future visits. That way, you can manage visitor experience and tailor amenities and preferences. Both customer loyalty and brand reputation benefit. Visitor management systems: who uses it, and why is it used? Visitor management refers to all the processes put together by an organization to welcome, process, and keep track Visitor management refers to all the processes put together by an organization to welcome, process, and keep track of all the guests daily. A visitor management system (VMS) is the technology used to manage guests for their convenience, safety, and security. Several features are typical in today’s applications. They include preregistration tools, video intercoms, self-check-in stations, and health screening. In visitor management, the term "visitor" doesn't only refer to guests but also anyone without an authorized access credential. For instance, an employee without their access credential logs in as a visitor. The same applies to a delivery man or a technician carrying out routine maintenance. A VMS helps to account for everyone within the organization at any given time. Who uses visitor management systems? You need a visitor management system to manage a school or hospital, an office, or even a residential building. Here's why: Visitor management system for schools: schools are among society’s most vulnerable facilities. A VMS is almost mandatory in this setting. It helps to identify visitors, detect intruders, and alert security of any unauthorized access. Visitor management system for offices: A VMS accounts for guests at all times. They include clients, maintenance contractors, delivery men, employees without credentials, friends, and family, Visitor management system for hospitals: access control is essential in hospitals, and managing visitors plays a major role. Hospitals offer access to pharmaceuticals, medical records, newborns, and expensive equipment. It is crucial to monitor restricted hallways and sections with video intercoms and track unauthorized persons' movements. Residential visitor management system: tracking people's movement is a key VMS component. In case of a crime, knowing who had access to the building within a specific time frame can help in the investigation. Plus, tracking the activities of visitors can deter future crime. Why is the visitor management system important? A video intercom makes it much more difficult for a visitor to impersonate a known guest. VMS accounts for everyone within the organization in cases of emergency. VMSs can prevent intruders and alert the security department of a breach. A VMS creates a positive visitor experience, which shapes perception of the organization. With a trusted VMS in place, employees can focus on being productive. Health screening gives staff peace of mind. It increases employees' willingness to return to work in the midst of the COVID 19 pandemic. How does a good VMS address occupant and visitor safety? The necessary technology to ensure building safety The best visitor management systems contain the necessary technology to ensure building safety. To maximize occupant and visitor safety, a VMS should have the following features: Job one of a VMS is visitor identification. It also helps deter potential criminals. Some VMSs go beyond identification by running a quick check on the visitor's ID and alerting security of any discrepancies. By identifying and proving a visitor's identity, the VMS ensures the safety of employees and other visitors. VMS helps with compliance A good visitor management system helps the organization follow regulations, such as for occupancy. In the COVID era, some states may require health screening for guests. Health screening helps protect the building's occupants from exposure to health hazards. Information security VMSs also aid in information protection. It takes mere seconds for a rogue visitor to download files into a jump drive, photograph exposed blueprints, or copy customer lists. Visitor management systems restrict visitor access to parts of the building and track the whereabouts of guests. Visitor privacy With pen and paper systems, walking up to the receptionist often gives visitors full view of the visitors list. Visitor management systems seal that vulnerability. Visitors can check in without fear that anyone nearby can see their information. Emergency evacuation With a good VMS, the exact number of people within the building is always known. In the case of an emergency, first responders can use VMS data to identify everyone on site. This is a safety net for both the occupants and visitors to the organization. How to manage building visitors System features depend on the purpose and setting of the VMS. Yet certain features and processes are essential. Preauthorization and health screening The first step is knowing the visitors upfront. Preauthorisation allows everyone to know who is coming and when. Guests specify the time and purpose of their visits. You get to welcome and accommodate your visitors accordingly. Some systems may also be able to upload documents of interest, such as proposals, contracts, presentations, or agendas. Health screening is critical today. It signals that the organization cares about its guests. A visitor is more likely to visit an organization that prioritises health and safety. Health screening is a way to protect your staff and send the right message. Video intercom Along with health screening, video intercom is a key element of VMSs. It enables secure video identification with remote, touchless, and COVID-safe access into buildings. Intercoms are a safe and secure way to communicate with audio and video without physical contact. Video allows you to visually verify the visitor. The audio component enables spoken communication. Some systems even use facial recognition technology and mobile app unlock. When integrated with access control, visitor arrival is seamless. Upgrade to touchless access Touchless access is the safest and most secure VMS option Touchless access is the safest and most secure VMS option. It is more sophisticated because it receives visitors without them having to lift a finger. It's also convenient and effective. In this time of the novel coronavirus, the demand for hands-free systems is surging. VMS has pivoted to met this demand. Many organizations are finding how touchless systems increase safety in the workplace. Visitor logging is essential for managing guests to your building. Besides being a source for verification and data tracing, it also helps in real-time to know who signed into the building and who hasn't signed out yet. Tracking the movement of visitors within the facility makes it clear where they are at all times. This way, there can be an effective emergency action plan for visitors and other occupants. This feature has use in contact tracing, health investigations, and other investigations, such as for theft.
The security industry knows the value of recurring revenue, as it’s the foundation of the residential security monitoring market. Commercial systems integrators have traditionally taken a different approach, focused on one-time commodity-based sales that lack the financial benefits provided through long-term serviced-based agreements. Cash flow is one of the biggest challenges faced by security systems integrators. And the truth is, during economic uncertainty, businesses will find that companies that have adopted and implemented a sales model that incorporates a monthly-based service program will be more financially secure. Technology solutions TAMCO was founded in 1994 by Jack Thompson who had a unique background that included technology integration, finance, and sales. With this knowledge, he set out to build a company that would introduce a finance offering and business model that addressed the pitfalls within cash and traditional lease procurement methods. The design of this finance offering was under the premise that most technology solutions are non-revenue generating assets. Most technology solutions are non-revenue generating assets The goal was to give the end-user customer a better way to pay with more control and flexibility as they entered in and out of technology lifecycles. At the same time, this new offering would give integrators easier ways to sell services with those technologies while shortening the selling cycle. With changes in telecommunication solutions several years ago, we noticed typical voice integrator partners attempting to diversify their technology solution offerings. We explored providing payment options for these additional technologies and found several areas with significant interest in our approach. About two years ago we saw increasing interest from within the security industry and this is now one of our top growth sectors today. Being in control Historically integrators have done a great job of getting customers accustomed to cash purchase transactions. While owning technology solutions may have felt like a way to be in control, customers have begun to realize that ownership is really not a necessity. It is the use of the technology and what they can do with the use of the technology that is truly meaningful. Now add to that the fact that technology continues to change more quickly than ever and I think it makes sense that customers are looking for better ways to pay for and manage their technology needs. Integrators have begun to express an overwhelming interest in creating recurring revenue At the same time, integrators have begun to express an overwhelming interest in creating recurring revenue. They are looking for ways to complement their one-time project-based revenue business or shift to a model that is focused on a regular stream of revenue. However, many integrators are not sure how to implement this new approach. As-a-service is just another way of saying a subscription service. At the consumer level, we are all very familiar with subscription services, such as Netflix or Birchbox. Small to medium-size businesses and enterprise-level commercial customers are also familiar with equivalent type technology services from their hosted phone service subscriptions or software-as-a-service (SaaS) solutions. As-a-service security If an integrator can package their technology solution in the form of an as-a-service solution, they will have a much better chance of developing recurring revenue. A majority of as-a-service models involve the customer paying for hardware equipment upfront and then having a monthly payment only for monitoring or support services. Or, to avoid a large upfront capital outlay, the integrator may arrange for a traditional lease payment that gives the illusion of as-a-service but still results in the customer owning dated equipment at the end of the term. TAMCO takes a different approach because we help integrators create a very comprehensive and logical solution under a single, use-based monthly payment. The integrator still designs, configures, and recommends the technology solution appropriate for the customer. But TAMCO will take the cash sale price of hardware, software, installation, manufacturer warranty, multi-year maintenance and support, and convert all of that to a single all-inclusive monthly payment which the integrator can present to their customer. In addition, this as-a-service monthly payment also provides the customer with exclusive protection against technology obsolescence. Integrators have really been excited to learn of this approach and to convert to selling this way. Integrators can remove themselves from being a commodity sale and thereby maintain margins Integrators can remove themselves from being a commodity sale and thereby maintain margins. They become much more successful at selling multi-year maintenance and support agreements, thereby building recurring revenue which is valuable to help weather slow periods of sales activities and economic downturns. And following the market currents of subscription-based solutions helps create long term customer relationships. Whether an organization works with TAMCO or not, there are certain foundational elements they need to embrace in order to build and adopt a successful as-a-service sales model. Some form of payment alternative like we discussed is certainly one of those elements, but it is not necessarily the most important. The technical expertise to deliver on support has to be there for the customer. While sales training, mindset shift, and supporting marketing materials are all critical as well.
All public properties are faced with a diverse and complicated set of safety and security risks, from health and safety to violence, terrorism, natural disasters, fires, political and environmental. Reducing safety and security risks requires the hands-on support of all operating teams, not just the security team, each playing their part in the pursuit of providing a safe and secure environment for all customers and staff. The challenge is twofold, one many still rely on antiquated logbooks, checklists, and manuals to manage the broad spectrum of safety and security risks. And two, the resources we rely on to complete the tasks necessary to improve safety are generally junior, inexperienced, and not particularly loyal to the business. Continuing to rely on these outdated and complicated management practices is risky and could be very costly. It leaves organizations exposed to safety and security related incidents, it is unreliable, reactive, resource intensive, and easily debatable. Complex risks To complicate matters, as safety and security risks continue to grow more complex, the corresponding operating costs are also on the rise. Regulatory fines, commercial insurance premiums and lawsuits are increasing year over year, making non-compliance with safety regulations a risk no one can afford. Not only is business continuity a concern, but when something goes wrong, the negative impact on the brand/reputation and resulting legal liabilities and regulatory fines will cost dearly. We envision a world where physical safety is managed with the same commitment as digital and financial security At Zendelity, we envision a world where physical safety is managed with the same commitment as digital and financial security; where all safety and security risks are managed with the same level of due diligence and accountability. A day in the life To understand just how much risk these outdated management practices are exposing operations to and how complicated managing safety and security has become, we will look at just a single weave in the web of corporate safety and security. It’s a simple, yet common safety risk, one that every operation is faced with, the ‘slip and fall’ accident. It’s the perfect example of a safety risk that no operation is immune to, it touches multiple departmental silos and when it happens you can be sure the executive management team will know all about it. Consider this for a moment, according to the Ontario Workplace Safety & Prevention Services (WSPS), 80 workers are injured every day because of a fall - that's one every 20 minutes and the cost to the organization is approximately $59,000 per injury. Now consider this, in Ottawa, Canada, on average it snows 63 days a year. Each time it snows, all public entrance ways will need to be shoveled and salted a minimum of twice per snow fall, halfway through and at the end. In the case, of an elementary school, hotel, hospital, apartment complex or commercial building, that has 9 entrance ways leading to the great outdoors that will translate to a minimum of 1132 net new tasks that must be completed per year on top of all the other daily safety requirements. Now ask yourself this, how often do you suppose one of those entrance ways are missed? At an average cost of $60K for a slip and fall accident, I’m not sure I would want to play the odds. The challenge is not the job, that is simple enough, the challenge is making sure it gets done in the first place. While responsibilities are listed in safety manuals, requirements change based on the amount of snow or weather conditions making it hard for staff to remember the rules. Communicating requirements to staff is often done with paper-based checklists that are being updated, reprinted, and manually distributed. To measure and manage compliance, completed checklists are collected, and results manually compiled. Inspections are invested in, to identify potential procedural errors, and catch negligence before someone gets hurt. Access to the data necessary to verify work and understand how the team is actually performing is time-consuming to consolidate, outdated and nearly impossible to verify. The stakes are getting higher The focus and priority of safety and security have been growing year over year While COVID has recently put the spotlight on safety procedures and the risk of a slip and fall is a simple example of the daily safety risks companies face, the focus and priority of safety and security have been growing year over year. Today more than ever before our physical safety and security is at increased risk, the threat of natural disasters, terrorism, violence or political actions has never before been at this level. Today people are equally as concerned for their physical safety as their financial and personal information. On top of the fear uncertainty and doubt in the minds of customers and staff, all businesses are facing an increase in operating costs, related to safety and security, according to: The Insurance Journal, commercial property insurance is expected to increase by an average of 20% in 2020, in one part due to the extreme catastrophic weather and wildfires since 2017 which have had a direct impact on pricing. A survey by U.S.-based Marsh LLC found that rates for directors and officers liability insurance rose more than 100% in the UK in Q2 as insurers fear that the pandemic will lead to hefty litigation claims. Occupational Safety and Health Association, for a willful violation, in which an employer knowingly failed to comply with an OSHA standard or demonstrated a plain indifference for employee safety, the maximum penalty has increase to $134,937/violation in 2020. The National Safety Council, the average cost of a workplace fatality and preventable death is now $1.19M. In addition to the legal and regulatory requirements, organizations are also faced with the new ‘see through economy’ where nothing is secret. Social media has created a world where it is no longer possible to keep even the smallest of incidents out of the public eye, exposing the brand in ways never before seen. When something goes viral, everyone, including customers, prospects, business partners, investors, etc. will know about it. To put the power of social media into perspective, consider a study by Cornell University, who found that hotels can expect to see an increase of 39% in their average daily rate if they can increase their score by just one unit on TripAdvisor, say from 3.5 to 4.5! A 39% increase in revenue is a huge incentive to protect the brand from the negative connotation of a safety and security incident taking place on your property, even if it’s as simple as a slip and fall accident. We envision a world where… At Zendelity, we envision a world where all organizations have a system of record for all types and levels of safety and security actions and issues. Where the safety and security team have a 365-degree view of all safety risks across the property and access to the real-time data necessary to improve response times. Where managing operating compliance is as simple as viewing a dashboard, running a report or receiving an automatic notification. We envision a time where operations will promote their ‘safety and security score’ as a badge of honor, as a means of competitive differentiation. Similar to a ‘5-star hotel’, customers and guests will look for a ‘safety and security report card’ and those with a good track record will differentiate. Safety and security have become a complicated web We envision a world with smarter cities, where emergency services are able to respond faster and with more accuracy when they arrive on site due to improved situational awareness. Where both the on-site emergency response team and the emergency responders can act as one, to reduce the risk and improve safety during an incident. Safety and security have become a complicated web, the operating practices you employee to manage that risk will determine your success. So, ask yourself this, are the logbooks, checklists, and manuals really still good enough, are you willing to stake your business on it?
Ethics are an important – but some might argue, undervalued – aspect of the security marketplace. To kindle the industry’s interest in ethics, the Security Industry Association (SIA) in early 2019 created a working group on Ethics in Security Technology. The working group developed a list of ethical principles, which were approved by the organization’s Executive Committee and Board of Directors and became the SIA Membership Code of Ethics. SIA member companies must adhere to the Code of Ethics, and there are consequences of noncompliance, up to and including possible expulsion from the organization. In addition to adopting the Code of Ethics, the Board of Directors have revised the organization’s bylaws to require that members read, understand and adhere to the Code of Ethics as a condition of SIA membership. Navigating issues “SIA wanted to be proactive on this and give members resources to navigate day-to-day issues,” said Ron Hawkins, SIA Director of Industry Relations. He notes that the Code is intentionally written broadly to be applied to a range in cases, and to provide SIA leaders with latitude making decisions. Current members will be required to adhere to the code when they renew their membership Current members will be required to adhere to the code when they renew their membership, which will be sometime during 2020 or in the first half of 2021, depending on when a member joined (for a one-year term). If there is an ethics-related complaint or an issue with a member company, the matter is considered by SIA leadership, which will review the concerns and ask the member company to respond. The resulting judgment might be a written notice/warning, a suspension of membership or expulsion. Enforcement of the Code of Ethics might be triggered by media coverage, government announcements, or written complaints submitted to the SIA Executive Committee. Handling complaints Hawkins emphasises that each complaint will be handled by the Executive Committee and full Board of Directors on a case-by-case basis to address anything not specified in the principles, which focus on requirements rather than consequences. Hawkins says it would be unlikely that any public announcement would be made about enforcement of the Code unless or until a member company were expelled. Since the Code of Ethics took effect on July 1, 2020, SIA has not taken any action on any member company. Any issue with any current member would be addressed on their membership renewal date, Hawkins said. The code applies to all SIA member companies, both manufacturer companies (which make up more than half of the membership) as well as to integrators, service providers, distributors and other member companies. Act with honesty, integrity and transparency Among the principles in the Code of Ethics are requirements to act with honesty, integrity and transparency, and to avoid fraudulent or misleading business practices. Marketing materials must be accurate. Sustainability and environmental impacts of products and services must be considered. The Code also opposes prejudice, harassment and abuse in the workplace The Code also opposes prejudice, harassment and abuse in the workplace. SIA companies should work with law enforcement to enhance public safety while respecting expectations of privacy. Cybersecurity risks should be monitored and mitigated “as much as reasonably possible, according to industry best practices.” Products, services and solutions should not be designed or manufactured in a manner as to “surreptitiously transmit information to third parties.” Finally, the principles require SIA member companies not to “knowingly” design, manufacture, sell or deploy products that have been deemed by any government authority or self-regulatory entity to “support the infliction of human rights abuses, the restrictions of civil liberties, and/or the implementation of other oppressive measures.” Hawkins says that the interpretation of “knowingly” would be made by SIA leaders. Why does the industry need The Code of Ethics? He would not comment on whether the Code of Ethics applies to activities by global companies that do not involve that company’s U.S. subsidiary (which is a SIA member). Such details would be decided on a case-by-case basis by the SIA Board of Directors, he said. The Code of Ethics is needed in part because the security industry impacts important issues for society at large, from privacy to civil liberties to national security. The Code of Ethics is needed in part because the security industry impacts important issues for society “Everywhere you go, you encounter security technologies, such as video cameras in public places,” says Hawkins. “Even if someone is not a purchaser or user of security technology, they will encounter it every day. So security is in a unique position because of its reach beyond the people who buy and use it, and it requires consideration of issues such as civil liberties and privacy.” Hawkins notes that the SIA Board of Directors already has its own “Code of Ethics” which directs how board members perform their duties, such as abstaining from a decision that might involve a competitor.
Trends in the alarm industry point to a need for a software system that accommodates business patterns such as recurring monthly revenue (RMR). Workhorse Service Company provides a software that combines customer relationship management (CRM), enterprise resource planning (ERP) and field service management (FSM) into a “cradle-to-grave” system designed specifically for the alarm industry. “Making an alarm sale is different than making a CCTV sale, and the processes for the salesperson, technician and customer service rep are different,” says Steven Hayes, founder of Workhorse Service Company. He says WorkHorse is built on modern programming languages, is responsive, and provides a pleasant user experience regardless of the device being used. Client experience “Before coming on WorkHorse, our clients have needed to use multiple softwares such as bookkeeping, quoting, central station software, email, spreadsheets, and more,” says Hayes. “This would cause issues with continuity between softwares. Mistakes are made, appointments are missed, and customers leave.” When building WorkHorse, Hayes and his team interviewed dozens of companies to find out what they were missing and what their pain points were. “There are other CRM and FSM softwares on the market, but the ones that are made for our industry are generally designed for dealer programs and selling contracts,” he says. “Others are designed to bill your RMR and have basic service call functionality.” Alarm companies know that they need RMR to survive, and WorkHorse seeks to make it easy. WorkHorse allows companies to have multiple subscriptions inside a single deal. Single point of data entry WorkHorse ensures a single point of data entry for alarm companies Merchant services come with Auto Updater. If a credit card expires or even if it is canceled, the service will reach out to the issuing bank and get the new number or token necessary to bill customers. This means less time with past due bills and calling on customers to get an updated form of payment. With two-way sync integration into central stations, WorkHorse ensures a single point of data entry for alarm companies. Information used at the time of the sale to create accounts is then pushed right from the tech portal to the central station. Employees can Create, Place Online/Offline, on test, and terminate accounts through the use of WorkHorse. The Workhorse call center, ProConnect.io, will answer phone calls and provide a Tier 1 Tech Support line for clients as a well as a concierge service. Operators will trouble-shoot alarm issues or create a service ticket if they cannot help them (subscriptions to both ProConnect and WorkHorse are needed). Operators will also try and collect money that is past due while assisting clients. Misconceptions in the industry Over the next year the prevailing trends will likely be a large swing from dealer programs to the traditional alarm company, says Hayes. This will make software like WorkHorse incredibly important as companies move from a funding program to managing their in-house sales, RMR, service, and customer retention, he adds. There is a misconception is that an owner/operator can purchase a bookkeeping software and run their alarm company efficiently and effectively. Another misconception is that someone can just turn on a software and know how to use it without any help or guidance, that “playing around” with it at night will be enough to make them proficient users. The software used to run a business should be a top priority. The software used to run a business should be a top priority The WorkHorse team is looking to expand verticals into other environments in the future. WorkHorse is built in a way that could easily expand verticals by making changes to the deal and service call modules. “In mid-2020 we plan on starting Pool Cleaning and Pest Control followed by HVAC, Plumbing, Electricians, and more,” says Hayes. WorkHorse has all in-house developers located in South West Florida. The team is continuously working to create additional features and integrations in order to bring the best user experience to clients and their customers.
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilizing the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualization and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
Co-op, a large consumer co-operative in the UK and one of the largest retailers in the country, is rolling out an integrated body-worn video solution from Motorola Solutions to front-line colleagues, with a focus on further increasing safety in-store against a background of rising retail crime in the industry. The Co-op has seen in-store crime increase by more than 140% year-on-year, despite communities recognizing the critical role played by retail workers in society - true frontline workers in the days of a global pandemic. The number of violent incidents also hit record levels with 1,350 attacks having been experienced by Co-op shop workers in the first six months of 2020. Keeping colleagues safe The retailer warns of a crime and violence epidemic and its targeted deployment of a body-worn video solution forms part of an ongoing commitment to invest a further £70M over the next three years in innovative technology to keep colleagues safe. Co-op will equip front-line staff with more than 1,000 Motorola Solutions VT100 body-worn cameras in around 250 stores initially, with the ability to stream video in real-time to the Security Operations Center of Co-op security partner, Mitie. The footage is used to identify criminals and provide evidence to secure prosecution. The VT100 body-worn camera from Motorola Solutions can be worn in standby mode for up to six months, preserving battery for instances when Co-op store colleagues feel threatened by aggressive or violent behavior. The cameras are operated by a simple one-push activation, instantly recording footage to the camera itself, and streaming live video to the security operations center, allowing for a quick response from security personnel or police. Cloud-based software The cameras are supported by cloud-hosted VideoManager software The cameras are supported by cloud-hosted VideoManager software, which enables secure and efficient camera allocation, user administration and incident management. With security features such as comprehensive audit-trails, encryption, configurable retention policies and RFID camera allocation, this integrated solution ensures footage and incidents are dealt with efficiently and securely. As part of its Safer Colleagues, Safer Communities campaign, Co-op is also building awareness and support for MP Alex Norris’ “Assault on Shop Workers Bill” which has now seen its second reading in Parliament postponed until September. The Bill states that because shop workers have responsibilities to uphold the law on age-restricted products they should be afforded greater protection in carrying out those public duties. Retail crime A knife was the most commonly used weapon (43%) with axes, hammers and syringes also used to attack In its 2020 Crime Report, the Association of Convenience Stores (ACS) found that a quarter of violent incidents resulted in injury, with a weapon used in almost 20% of occurrences. A knife was the most commonly used weapon (43%) with axes, hammers and syringes also used to attack or threaten shop workers. In 2019, Co-op funded research into retail crime, with the hard-hitting findings reporting that shop workers were showing signs of Post-Traumatic Stress Disorder (PTSD). Co-op has committed a further £70M over the next three years in innovative technology to keep colleagues safer, it has introduced SmartWater Fog Cannons, the latest remote monitored iCCTV, body cameras and, communication headsets for all frontline colleagues. Protection for shop workers Cheryl Houghton, Co-op Retail Security Manager, said, “Shop workers play an essential role serving communities, yet they have to contend with unprecedented levels of violence and abuse on a daily basis. As a community retailer we see the impact of social issues in our stores. I have never seen such high levels of violence and abuse, it’s a societal issue that all retailers are concerned about and it’s having lasting effects on the lives of shop workers - both mentally and physically. It is not part of the job to be verbally abused, threatened or attacked and we’re determined to make sure it isn’t. Calling for greater protection for shop workers carrying out public duties and for the root causes of crime in communities to be addressed.” Body-worn videos in commercial organizations Richie McBride, Director of Business Operations, Video & Analytics at Motorola Solutions UK, said, “Body-worn video is becoming a critical element in commercial organizations’ strategy to keep their employees safe. As a company focused on mission-critical solutions, we provide our commercial customers with the right tools to help them enhance their operational efficiency, responsiveness and safety. We are proud to partner with one of the UK’s largest retailers in its work to further improve the shopping experience and enhance safety for both shoppers and staff,”
Family-owned and run company, Bijou Wedding Venues, that offers exclusive wedding venues coupled with exceptional food and service, is improving its safety in response to the COVID-19 pandemic by implementing a state-of-the-art body temperature monitoring solution from ANT Telecom to reduce the risk of virus transmission. With restrictions lifting to enable larger groups of people to meet, weddings can begin to take place with greater numbers of guests. Bijou therefore wanted a solution that could enable special days to go ahead with confidence and reached out to ANT Telecom to implement its thermal imaging cameras at wedding venue entrances to ensure a significant reduction in risk to guests. Temperature monitoring cameras With Bijou operating across a range of venues, the cameras will be used to scan guests discreetly as they enter the venues to ensure minimum disruption to the day, and allow full focus to be on the couple’s celebration with families and friends. It comes as part of a range of other initiatives the company is implementing, such as changes to seating arrangements to ensure ample distancing; provision of outdoor ceremonies where possible; new methods of serving food and drink; as well as many other adaptations to minimize risk. ANT Telecom’s temperature monitoring cameras can be set up very quickly and are easy to use. The camera can detect multiple people at the same time, so is perfectly suited to scan wedding guests entering the venue. Protect guests and staff Our cameras support fast temperature measurement with discreet notifications to ensure minimal disruption" Sam Cutmore-Scott, Managing Director, Bijou Wedding Venues, comments: “We’ve made a range of changes in light of the pandemic to ensure that weddings can continue as planned and we’re pleased to offer couples this extra layer of safety alongside other measures. The temperature monitoring cameras allow us to protect all of our guests and staff right from the entrance of the venue. This is one of our key initiatives, and on top of this our exclusive venue model means venues can be completely sanitized between events and essentially acts as a private home for the couple, unlike hotel venues which have other people and staff entering and leaving the site.” Discreet notifications Upon camera detection of a temperature above the guidelines, that guest can be discreetly notified by a nominated person on behalf of the couple and alternative arrangements made, for instance inviting them to watch live streamed footage of the ceremony. Klaus Allion, Managing Director, ANT Telecom, states: “We’re delighted to support Bijou in enabling couples’ memorable days to continue and take place as close to as expected as possible. Our cameras support fast temperature measurement with discreet notifications to ensure minimal disruption and peace of mind for both the couple and guests at the venue, as well as staff. It’s an essential component of hospitality and event management and will help many types of gatherings similar to this take place safely as the fallout from the pandemic continues.”
With more than 2,200 locations and 41,000 associates, Panda Express is America’s family-owned and operated Asian dining concept. Challenged with losses at the point of sale (POS) and growing false alarm penalties, the company turned to Interface Security Systems, a managed services provider delivering managed network, interactive alarm monitoring, video surveillance and business intelligence solutions to help them dramatically decrease shrink and resolve security inadequacies. False alarms and fines Panda store managers faced continuous distractions from false alarms, receiving calls from the legacy alarm company at all hours of the night and incurring fines from local law enforcement for needless police dispatches. Interface monitoring center instantly verify any alarm from a Panda store “When an alarm went off overnight, our managers would always err on the side of caution, send police in, or go in themselves. That was dangerous in itself if there was actually a burglary happening inside the store,” says Lyle Forcum, Executive Director of Asset Protection at Panda Restaurant Group, parent company of Panda Express. “Additionally, we were losing significant amounts of money on false alarm charges.” Suspicious transaction notification To address the false alarm challenge, Interface installed a next-generation IP Interactive Monitoring system with live video and two-way audio, which offers a virtual, guard-like level of protection in every Panda location. Operators in the Interface monitoring center instantly verify any alarm from a Panda store with live streaming video, eliminating false alarms. Forcum reports that Panda is saving over $100K per year in false alarm fees Panda had also implemented a customized, exception-based POS reporting system, which notifies Panda management whenever a suspicious transaction takes place at the register. Interface took the tool a step further by integrating it with the video surveillance and alarm systems at each of the Panda locations, allowing management to immediately connect to the video of any problematic transaction. Identify anomalies and prevent shrink The solution enables loss prevention professionals to quickly identify anomalies and prevent shrink. Top offenders from thousands of employees doing millions of transactions can easily be bubbled up to the top. The combination of business intelligence and video surveillance resulted in a massive reduction in shrink and cash shortage at the register. The business intelligence provided allows for focused tracking and improved store operations With Interface, Panda has experienced vast improvements in security for its associates, customers and assets. Forcum reports that Panda is saving over $100K per year in false alarm fees and thousands of dollars per month per store in reduced shrink at the POS. Monitoring intrusion data The business intelligence provided allows for focused tracking and improved store operations, including people development, store performance data comparison, optimized store efficiencies, monitored intrusion data, and cash tracking. Panda and Interface have successfully partnered to create a potent security and loss prevention tool in the Quick Service Restaurant space. “Interface is a partner that's been collaborating with us on our needs from day one,” says Forcum. “The company understands what we need, and then it develops solutions towards that end. It doesn’t just come up with an off-the-shelf product and expect us to purchase it. Interface has shown a real commitment to our business. We meet with them regularly to collaborate on new initiatives and on emerging issues that Panda faces. The company has truly become part of that solution voluntarily and eagerly. Other business partners do not do that. Interface is, in fact, a true part of the Panda team.” A more detailed case study and video testimonial on Panda Express can be found on the Interface website.
ADT announced that, via ADT Commercial, its commercial channel, it is joining forces with Dollar Tree, Inc., to help provide protection to its retail locations nationwide. ADT Commercial, a provider of commercial security, fire, life safety and risk consulting services in the U.S., will provide comprehensive and innovative security solutions and monitoring services at the majority of Dollar Tree and Family Dollar locations across the U.S. “In these rapidly evolving times, we’re thrilled to be partnering with Dollar Tree for what marks the largest contract to-date for ADT Commercial,” said Jim DeVries, President and CEO of ADT. “Dollar Tree has shown itself to be a true provider by seeking out enterprise-level security solutions on the market.” Commercial security for customer and employee safety ADT Commercial will service Dollar Tree and Family Dollar locations across the U.S. The agreement includes equipment and service enhancements, and 24x7 remote support from ADT. “Our goal is to provide custom, innovative, integrated solutions to meet Dollar Tree’s unique needs. With this partnership, we’re helping to shape the future of retail security and look forward to working with Dollar Tree to make that future a reality,” said Dan Bresingham, Executive Vice President, Commercial, of ADT. “It is very important for us to ensure our customers and associates feel safe and secure while in our stores,” said Bob Oberosler, Sr. Vice President of Asset Protection, at Dollar Tree, Inc. “We continue to enhance our in-store technologies, and are fully committed to customer and employee safety.”
There are a handful of amazing things that set San Francisco apart from other global cities. Notably, there is the Golden Gate Bridge, Alcatraz Island, Fisherman’s Wharf and Chinatown, the Twin Peaks overlooking the city skyline, San Francisco Bay, and The Moscone Center. Just how does a convention center fit into the list of places to see in beautiful San Francisco? It is the largest convention and exhibition complex in San Francisco, California. It includes three main halls spread out across three blocks and 87 acres in the prime South of Market neighborhood. The convention center originally opened in 1981 and has gone through several renovations. It is currently upgrading its security system to reflect a modern, state-of-the-art security solution. Securing SMG/Moscone Center Security at the SMG/Moscone Center is handled similar to the security at a Tier 1 airport. However, clients who use the facility are required to provide their own inside security. When the doors of the convention Center are open to the public, it plays host to people who want to come in and look around. Our new security system will provide analytics, and the ability to look at the images in real time" “We are responsible for facility security inside and on the perimeter outside. This is considered a soft target, so we do everything possible to harden the security,” said Damion Ellis, Director of Security at the SMG/Moscone Center. Damion adds, “The time is right for us to take out the old security system, including the old analog camera system. Our new security system will provide analytics, and the ability to look at the images in real time.” IP cameras installed for wide surveillance Like any major metropolitan area, the San Francisco metropolitan region has its own issues that have to be dealt with that aren’t pleasant. This includes keeping track of the homeless population and what they are doing. Damion Ellis further said, “We are able to place the new IP cameras in places where the homeless population congregates on the outside, in dark corners of the facility.” CompleteView VMS video platform The Moscone Center complex consists of three main halls. Moscone South is located to the south of Howard Street and is three-story tall. It opened in 2017, replacing the original Moscone Center building that opened in 1981. A Keith Haring sculpture stands outside the hall at the corner of 5th and Howard streets. Moscone North is located to the north of Howard Street, and Moscone West is a three-level exhibition hall located across 4th Street from Moscone North. Integration with ProWatch access control platform “One of the most compelling reasons Moscone deployed CompleteView video platform was the integration with Honeywell’s ProWatch access control platform, as well as newly designed multi-sensor cameras,” said Salient’s Regional Sales Manager in the Bay Area, Cindy Doyle. Cindy adds, “The ease of use and intuitive software allowed the guard staff to use maps in the system to identify where triggered events took place for guard dispatch.” Monitoring door alarms Prowatch access control platform is currently being used to monitor door alarms throughout the property Prowatch access control platform is currently being used to monitor door alarms throughout the property and triggering video call-up and/or alarm video event when there is a forced or held open door. In order to keep track of outside foot traffic and provide interior and exterior security, an analytics option was foremost on everyone’s mind, and integrator Microbiz Security Co., dove in with an initial site survey to determine the best course of action. Microbiz has partnered with the SMG/Moscone Center for several years. Video analytics solution “Our goal was to take a look at what it would take to secure the facility, but to do it properly,” said Todd Chritton, President of Microbiz Security. “The integrator had some suggestions in terms of offering better security coverage in some areas,” said Marco Escobar, Vice President of Operations at Microbiz Security, adding “What they knew was three buildings needed to update from its current 2002 technology, and upgrade to 2018 technology. It also was beneficial to the integrator having worked on site for several years and also having worked with Ellis during his tenure with the Hilton Hotel chain.” Multi-sensor and multi-megapixel IP cameras Marco Escober further stated, “We’ve been a long-time vendor at the convention center, and we offer a pride of installation as well as using the best of the best security solutions. We began by updating current cameras to Arecont Vision multi-sensor and multi-megapixel IP cameras and Salient Systems’ CompleteView VMS, Dellintegrated server with RAID6 configuration and CompleteView Enterprise software." He adds, "The VMS is a fully open architecture, enabling convention center security staff to seamlessly leverage existing technology investments and minimize disruption.”
Boon Edam Inc., a global renowned provider of security entrances and architectural revolving doors, has announced that Park House, a commercial space located in London, has installed entry solutions at two separate main entrances to the building. One entrance features a special European door model, the Circleslide sliding door; the other is outfitted with four lanes of Speedlane Swing optical turnstiles for increased lobby security. Equipped with Circleslide sliding doors Park House is a busy 195,000 sq. ft. office, retail, and apartment space with one main entrance facing Finsbury Circus, the last remaining section of London’s oldest public park (opened in 1607). The other entrance faces Eldon Street, a location that is close to transit stations and easily accessible to commuters.In 2019, Park House underwent a renovation steered by Stiff + Trevillion, a renowned London architect In 2019, Park House underwent a renovation steered by Stiff + Trevillion, a renowned architect in London. The firm felt it was necessary to increase the efficiency of pedestrian traffic flow into the building and open another entrance near Finsbury Circus. Speedlane Swing optical turnstiles installed This upgrade meant that another entry solution would be required in order to restrict access to certain areas of the building not meant for casual visitors. The firm selected the Boon Edam Speedlane Swing optical turnstile to control access and detect any tailgating attempts by unauthorized individuals. The 2019 refurbishment project included the addition of a four-lane array of Speedlane Swing optical turnstiles, chosen for their slim cabinet design, swinging glass barriers and customized black powder coated finish. To secure the lanes to the floor, Stiff + Trevillion requested custom steel sub-floor baseplates to be placed between the finished floor and structural slab to add extra reinforcement and aid in accurate installation. The facility managers at Park House take advantage of Boon Edam’s regular service and maintenance on all their Boon Edam entrances to maximize the life span and performance of their investments.
Round table discussion
For several decades, Baby Boomers represented the largest sector of employees in the physical security market. However, these security professionals born between 1946 and 1964 are now nearing retirement – or have already retired. How will the security market change as the next generations step up to make their contributions? We asked this week’s Expert Panel Roundtable: As Baby Boomers approach retirement age, what are the positives and negatives in the physical security market?
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
Delivering on customer expectations is a basic tenet of success in the physical security market. However, meeting expectations may be an elusive goal, whether because customer needs are not communicated effectively or because equipment doesn’t perform as promised. We asked this week’s Expert Panel Roundtable: what if a customer expects more than a security system can deliver?