Platinum CCTV has announced the development and release of a unique body temperature sensing security camera designed to help protect against pathogenic community spread by rapidly pre-screening individuals before they enter a facility. The new thermal body temperature camera identifies individual body temperatures in addition to providing visual security, which is an innovative tool to rapidly pre-screen individuals for fevers when entering a facility and help fight future pandemic spread. PT-...
With the Government directives brought into action earlier this week, Security Systems and Alarms Inspection Board (SSAIB) has had to change certain aspects of their working practices, while also ensuring that it doesn’t impact negatively on the registered firms and the level of service that the company provides to customers. UKAS accreditation SSAIB is fully aware of the uncertainty and worry that our firms will be facing at this difficult time" Security Systems and Alarms Inspection B...
Interface Security Systems, globally renowned managed services provider delivering managed network, interactive alarm monitoring, video surveillance and business intelligence solutions to distributed enterprises, has announced a new strategic partnership with OpenEye, international provider of cloud-managed solutions for video security, business intelligence, and loss prevention. OpenEye – Interface Security strategic partnership The strategic partnership will combine the proven solution...
Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data center, the IT department has complete control over network acce...
PerpetuityARC Training, part of Linx International Group - the world’s renowned provider of accredited security systems training courses, is responding to a surge in demand, for its portfolio of online training courses. The company is experiencing unprecedented international demand from organizations of all sizes, operating across a wide range of sectors, as they look to ensure they have the skills in-house to coordinate their response to the rapidly changing coronavirus (COVID-19) situati...
Quantum Corp. announced new product lines and capabilities which significantly expand its video surveillance and physical security product portfolio. The offerings include a new line of network video recording servers, and a new line of servers for building management systems and GPU-based video analytics. In addition, Quantum added new capabilities for the VS-HCI Series which the company launched in 2019 to provide hyperconverged infrastructure (HCI) for surveillance recording, video ma...
Focused on Revenue, Knowledge and Branding, whether its profitable new cloud services, specialist ‘how to’ training or simply making a company stand out from the competition, GAP has what a business needs for success. Pyronix has launched their ‘GAP’ initiative, in an effort to help installers and their businesses grow, by working smarter and building their brand. Key areas Providing free tools to make an installer’s business grow faster, GAP focuses on taking a smarter approach to business performance, identifying three key areas: Revenue - ‘Not all clouds are gray’ With an emphasis on providing superior tools for installers, in order to develop and grow their business, with offerings including PyronixCloud, an evolving product range, and additional value-added services; there’s something that all installers can benefit from with GAP. Built with businesses in mind, Pyronix can help installers grow and excel. Knowledge - ‘Knowledge is Power’ Pyronix believes knowledge within the industry is key to being a leader, which is why they devised a knowledge-focused branch of GAP. Focusing on installation and product knowledge, and how installers can gain and use this to their advantage. Enabling them to accelerate ahead of the competition and be the best. Brand - ‘Make Yourself Famous’ GAP guides installers by providing brand focused tools and tricks, to make their brand stand out. Encouraging installers to look at customized products and sales tools, GAP will soon also introduce the new Pyronix Personal Print Portal. Providing a one-stop solution for designing and ordering promotional materials, Pyronix is set to demonstrate the importance of an installer’s brand and presence within the market. Helping installers grow business Laurence Kenny, Pyronix Marketing Manager commented, “This new initiative highlights the additional commitment Pyronix wants to make to installers. We want to help them grow their business and thrive within the industry.” We feel that this is a really positive step towards helping installers of Pyronix intruder systems" “This initiative is flexible and built with several interchangeable drivers, all designed to suit an installer’s business needs, whether they’re an experienced installer or just starting out.” Brand marketing tools He continued, “We feel that this is a really positive step towards helping installers of Pyronix intruder systems, guiding them through multiple aspects for business success, including recurring revenue business models, branding and training elements within their business. This initiative will provide practical tools installers need, to help them go that little bit further and realize their potential.” “We’re very excited to see the uptake in GAP and showcase our revenue, knowledge and brand marketing tools, providing the best platform to both new and existing installer businesses within the industry.” For any installers who would like to develop their brand and business, GAP has the needed tools.
Cheshire, UK, based Anekanta Ltd (Anekanta) and New York, USA, based GT Digital (GT) announced that they are working together to progress GT’s patent-pending, innovative, cognitive intelligence platform MediaMaestro. Through its advanced military-grade proprietary algorithms, MediaMaestro can automatically predict emerging threats before they happen, enable fast mitigating action and provide continuous updates to a rapidly evolving scenario. In a society where the threats to the safety and well-being of the individual are ever increasing, whether in public spaces, borders, critical infrastructure, the workplace, at home or at leisure, there is an increasing demand for better situational awareness which enables effective decision making by authorities and business leaders to keep people safe. Low threat visibility Current technology in the marketplace is hindered by the limited ability to access Many situations appear to evolve at a lightning pace, yet evidence may be building up days, weeks and months ahead and may also involve groups of people working together. Visibility of an evolving threat is often low. The challenge to the stakeholders is that the situation may already be live by the time action is taken and by then it may be too late. Often the evidence isn’t discovered and connected until post event. Current technology in the marketplace is hindered by the limited ability to access, converge, analzse and extract meaning from millions of sources. It can only provide a perspective based on the snapshot of information available at the time. Situational awareness GT Digital's innovation is a form of artificial intelligence which by Connecting the Dots, combines and analyses any data source, including images from video surveillance, body worn, drone and satellite cameras, building sensors, GPS sensors, any externally accessible data and media source, and predicts intent using its patent pending algorithms. GT’s innovation creates a halo of protection through its dynamic all-round situational awareness surpassing anything on the market currently. Anekanta solves problems and adds entrepreneurial value to technology-focused organizations with an interest in artificial intelligence, video surveillance and safety domains. The team brings specialized strategic knowledge and expertise to the GT proposition aiming to further define the target customer and refine the solution. Through its corporate consultancy it will also act as a catalyst to enable the business to lay down the early stage financial foundations, build the corporate structure and help the business move forward to piloting the platform. Cognitive intelligence platform GT Digital Ltd correlates video and data from any source, in any format" Pauline Norstrom CEO and Founder of Anekanta Ltd “My interest in artificial intelligence in the security domain, is rooted in putting technology to good use in order to benefit society as a whole. GT Digital Ltd’s innovative cognitive intelligence platform aims to do exactly that by preventing acts of disruption before they happen." "I am delighted to be working with Gary Olson, Len Fertig and the team to help them develop the proposition and move the business forward to the next stage.” Gary Olson CEO and Co-Founder GT Digital Ltd “We are excited to have Pauline Norstrom working with us on our goal to help prevent some of the disruptive events in the security domain, protecting lives and property.” Artificial Intelligence solution “CONNECTING THE DOTS - No Human analyst can process or manage the overwhelming amount of digital information efficiently and effectively to initiate preventive action without an Artificial Intelligence solution. We correlate video and data from any source in any format.” Len Fertig CFO and Co-Founder GT Digital Ltd “GT Digital is in the “plot prevention” business thanks to ground-breaking technology that alerts security experts before events happen, foiling or at least mitigating the damage to people and property. Not only does this represent a great market opportunity but also a critically important social good.”
The Security Industry Association (SIA) welcomed a new chairman, announced its 2020 executive committee and welcomed five new members to the SIA Board of Directors at The Advance, SIA’s annual membership meeting, held virtually on Tuesday, March 17, 2020. SIA’s The Advance SIA ratified the selection of Pierre Trapanese, CEO of Northland Controls, as SIA’s chairman of the board. Trapanese has 33 years of international project and financial management experience in the security industry. He has been the sole owner of Northland Controls since 2005 and has transformed it into a global service provider with 250 Northlanders spread across offices in 5 countries. During The Advance, SIA also announced the addition of five new voting members to the SIA Board of Directors to serve terms from 2020 to 2022: Jonathan Aguila, director – systems and technology, Facebook – Global Security Stacy Deveraux, president, Electromechanical Solutions Group, ASSA ABLOY Opening Solutions Mike Mathes, executive vice president, Convergint Technologies Erica McBride-Rapp, logistics manager, Allegion Tim Palmquist, vice president, Americas, Milestone Systems Following the ratification, the SIA Executive Committee for 2020 includes: Chairman: Pierre Trapanese, CEO, Northland Controls Director of Technology: Kim Loy, Vandebilt Treasurer: Scott Dunn, director, business development, Axis Communications Secretary: Lynn de Séve, president, GSA Schedules Inc. Immediate Past Chairman: Scott Schafer, principal, SMS Advisors New additions to SIA Board I am thankful to SIA for welcoming me as SIA chairman and entrusting me with the responsibilities of this role" Additionally, three existing SIA board members – Janet Fenner, chief marketing officer at Intelligent Security Systems; John E. Mack III, executive vice president, co-head of investment banking and head of mergers and acquisitions at Imperial Capital; and Tom Nakatani, vice president of customer monitoring technology and product development at ADT – renewed their involvement in the SIA Board of Directors for an additional term. “I am thankful to SIA for welcoming me as SIA chairman and entrusting me with the responsibilities of this role,” said Trapanese. “We congratulate the new and returning members to the SIA Board of Directors and the SIA Executive Committee – this is a remarkable group of security leaders poised to guide the association and industry forward.” SIA Board of Directors The SIA Board of Directors is comprised of industry professionals representing a broad spectrum of interests in the security industry. The full list of current board members can be found here. During The Advance, in addition to announcing the new board chairman, new and returning board members and executive committee, SIA shared market intelligence for the year ahead and presented its annual membership awards – the SIA Chairman’s Award, Sandy Jones Volunteer of the Year Award, Committee Chair of the Year Award and Member of the Year Award.
Symmetry Business Intelligence analyzes how a person’s access activity is tracked and patterns established based on a risk score methodology. Anomalous behavior may raise a person’s score, and high-risk identities are flagged in a dashboard. Identify the employees Dashboards within Symmetry Business Intelligence provide the security team with an at-a-glance look at identities with the highest risk scores. Scores are generated based on the reader location, time of day and a user’s access patterns. Symmetry Business Intelligence helps to easily identify the employees, contractors and other identities that may pose the highest risk to a company. “Symmetry Business Intelligence highlights anomalous behavior, helping organizations discover unauthorized access patterns and possible threats worthy of further investigation,” said AMAG Technology, COO, Howard Johnson. “It’s a natural extension of any security program.” Easily integrate with other systems Keeping in line with AMAG’s commitment to providing open solutions, Symmetry Business Intelligence has been designed from the ground up to easily integrate with other systems. Over the past five years, AMAG has released Symmetry CONNECT identity management, Symmetry GUEST visitor management and Symmetry incident management, all open, cloud-based security systems designed to provide more flexibility and options for the end-user.
Aqua Security, the platform provider for securing cloud native applications and infrastructure, announced that its open source Trivy vulnerability scanner is now available as an integrated option in several widely deployed cloud native platforms. Trivy is a comprehensive and easy-to-use open source vulnerability scanner for container images. Since its introduction 10 months ago, the project has gained a broad following among open source community members who have tagged it with more than 3,300 GitHub stars. Unlike other open source scanners, Trivy covers both OS packages and language-specific dependencies and is extremely easy to integrate into organizations’ software development pipelines. Integrated scanning option Trivy is now available under the Apache 2 license, allowing royalty-free use, modification, and distribution of the software. Trivy will be included as the default scanner in Harbor, a popular open source container image registry project under the Cloud Native Computing Foundation, and in addition, the widely used container platforms Docker and Mirantis Docker Enterprise will make Trivy available as an integrated scanning option for their deployments. “Trivy takes container image scanning to higher levels of usability and performance. With frequent feature and vulnerability database updates and its comprehensive vulnerability scanning, it is the perfect complement to Harbor. In fact, we made it the default scanner option for Harbor registry users in the upcoming v2.0 release because of these capabilities,” said Michael Michael, Harbor Maintainer and Director of Product Management at VMware. “With Trivy, Harbor users can easily and quickly scan their container images for vulnerabilities on an ongoing basis.” Flexible container management platform technology After evaluating several leading options for open source vulnerability scanning, Trivy really stood out" “Trivy is a container image scanner that is so incredibly easy to use and fast to scan,” added Justin Cormack, Security Lead at Docker and a member of the CNCF Technical Oversight Committee. “It suddenly means that vulnerability scanning becomes easy to integrate into your daily routine, scripts and CI, which is the way it should be” "After evaluating several leading options for open source vulnerability scanning, Trivy really stood out,” said Milind Gadre, VP of Engineering at Mirantis. “Mirantis will enable Trivy as an integrated component that's verified as compatible with the Docker Trusted Registry included in our Docker Enterprise solution. We're extremely excited to extend our leadership in secure, flexible container management platform technology for organizations with challenging security and compliance concerns.” Cloud security posture management Liz Rice, VP Open Source Engineering at Aqua and Chair of the Cloud Native Computing Foundation’s (CNCF) Technical Oversight Committee (TOC) leads the team of dedicated open source developers at Aqua who work on the company’s open source software and also actively contribute to other community projects. “Our team is excited by the level of interest in and adoption of Trivy, and this increases our determination to make Trivy the most widely adopted open source solution for container vulnerability scanning.” said Rice. Trivy is part of Aqua’s portfolio of open source cloud native security projects, including: kube-bench: Winner of the 2018 InfoWorld Bossie Awards, kube-bench automatically determines whether Kubernetes is configured according to recommendations in the CIS Kubernetes benchmark. kube-hunter: Penetration testing tool searches for weaknesses in Kubernetes clusters so administrators, operators and security teams can identify and address any issues before attackers are able to exploit them. Tracee: Traces events in containers using eBPF, a kernel technology that lets users run custom programs within the kernel itself. CloudSploit: Provides cloud security posture management (CSPM), evaluating cloud account and service configurations against security best practices. kubectl-who-can: An extension to the standard kubectl tool that simplifies queries about Kubernetes role-based access control (RBAC) configuration.
Identiv, Inc. has announced the launch of MobilisID, its latest solution for frictionless access. The MobilisID solution brings ease and simplicity to physical access and management without compromising security. Using the latest in Bluetooth and capacitive technologies, MobilisID allows users the freedom to access a controlled environment without the need to present a credential. MobilisID solution Identiv’s MobilisID solution combines security, simplicity, and convenience into an easy-to-install, cloud-managed physical access control system (PACS). By harnessing users’ current smartphones and tablets to transition from conventional physical cards to secure mobile credentials using powerful, multi-tech Bluetooth MobilisID Readers, the smart mobile solution creates a secure and effortless way to approach physical access, keeping users on-the-go. Issuing and managing credentials has never been easier with MobilisID Manager. The MobilisID cloud-based portal works on any web-browser and gives administrators and operators the ability to issue, update, and remove user credentials on-the-fly, making the once cumbersome process of creating physical credentials simple, quick, and efficient. MobilisID Manager Managing users and credentials with MobilisID Manager is also cost-effective by cutting out the hardware necessary to produce cards and eliminating costs to deploy, ship, and track physical cards. The MobilisID app securely transmits a personalised credential using the latest Bluetooth technology “Now, more than ever, we’re seeing the overwhelming need from our customers and partners to make physical access more convenient, more secure, less expensive, and simply smarter,” said Mark Allen, Identiv GM Physical Access. “Carrying conventional physical cards is just not the right solution for some people. But everyone carries a mobile device. With MobilisID, we’re harnessing the power of multi-tech Bluetooth readers combined with a highly secure, cloud-based management system that saves users time and money.” MobilisID app The MobilisID app, available on the Apple App Store and Google Play Store, converts almost any iOS or Android smartphone or tablet into a direct replacement for a traditional, physical credential. The MobilisID app securely transmits a personalized credential using the latest Bluetooth technology to MobilisID readers allowing the user to freely move throughout a building or facility without the need to present the mobile device. For those sites that require support for legacy, proximity-based credentials, including cards, tags, or fobs, the MobilisID Reader supports 26 – 37 bit 125 kHz low frequency (LF) credentials, making the transition from physical to electronic-based access control seamless.
Leap years occur every four years as a way to help synchronize the calendar year with the solar year, or how long it takes the Earth to orbit the sun. While this is necessary, leap years require our security systems to account for an extra day, apart from its normal schedule. As a result, leap years create problems with computing and can cause major issues to access control system functionality if a provider is not leap year compatible. There are a few things to keep in mind as we near February 29 to ensure you and your system are prepared for this uncommon occurrence. Why doesn't my access control system work on a leap year day? A leap year doesn’t occur that often, but if your system is newer than four years old, then this may be the first time you are being hit with this issue. It may be something as simple as the fact that the manufacturer of the system failed to account for leap day in their QA/testing procedures when designing the product. Regardless of the reasoning, it is important to recognize the issues that could arise so you can be prepared. An access control system malfunctioning never leads to a good outcome. What are some of the issues I could run into if my system isn’t leap year compatible? If you have your doors on a schedule, it could lead to doors being open on a Saturday or Sunday — which is the case this leap year — when they should not be open. This could naturally lead to unauthorized individuals gaining access to sensitive areas, putting company assets at risk. This could also lead to problems with credentials that were set to start or expire on a certain date, which could cause problems for new employees needing access, or could extend access privileges to contract workers whose employment terms have ended. In addition to credentialing, other scheduled events will also be off in the system. For example, some access control systems automatically lock or unlock doors on a set schedule based on business hours. With no defined schedules in place for a day that only occurs once every four years, this could lead to issues with scheduling for both authorized and unauthorized individuals. What can I do to ensure my system is ready for Feb. 29? Anything? If your manufacturer hasn’t alerted you that your system is leap year compatible, it is best to set up your system in a test lab and simulate the leap year date. This allows you to verify that all of your scheduling type events work correctly. If it works in a simulation, it will work on the actual day. However, beware waiting until the last moment to test your system, in case you do run into challenges that need to be addressed. Are there solutions available that account for this already? This is an important question to ask if you are evaluating a new system. While there are some systems that do not account for a leap day, many systems, like Hirsch Velocity, already do. In fact, Hirsch products have been leap-year compatible for many years now, allowing end-users to ignore the inconvenient day altogether. What if my system doesn’t? If you know for a fact that your system is not leap year compatible, ask your provider before that date to test and ensure that your system will work properly. If you do this and encounter scheduling issues, you can opt to push off all of your scheduled events until March 1 and validate scheduled doors being opened on February 29 to plan accordingly. While leap day is inconvenient, it is addressable. It is just important to do so early to catch any issues before they arise. Failure to acknowledge the challenges associated with leap years will inevitably lead to difficulties when the day comes.
Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’. The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall success. Secure work environments For years the tug of war in the security industry has pitted the need for a secure environment against the desire for technology that is convenient for users. However, finding a happy medium between the two has often seemed elusive. I believe you can design and have operational convenience at the same time as achieving high security" Jeff Spivey, a security consultant and the CEO of Security Risk Management, has this to say about it, “If there is an understanding of the security-related risks and their separate and/or collective impact on the organization’s bottom line business goals, a resolution can be reached.” Jeff also does not think that convenience and high security have to be opposing each other. He says, “I believe you can design and have operational convenience at the same time as achieving high security.” Importance of secure access control The premise is that for organizations and spaces to be truly secure, they must be difficult to access. So, by its very nature, access control is designed to be restrictive, allowing only authorized staff and visitors to access a facility or other secured areas inside. This immediately puts convenience at odds with security. Most people will tolerate the restrictive nature of a controlled entrance using badge, card or biometric because they understand the need for security. When that technology gets in the way of staff traversing freely throughout the facility during the course of a business day, or hindering potential visitors or vendors from a positive experience entering the building, they become less tolerant, which often leads to negative feedback to the security staff. Enhancing corporate security Security consultants like Spivey and security directors all stress that understanding the threats and risk levels of an organization will most likely dictate its physical security infrastructure and approach. All the technology in the world is useless if it is not embraced by those who are expected to use it and it doesn’t fit the culture of the organization. Once employees and customers are educated about what security really is, they understand that they're not losing convenience, they're gaining freedom to move safely from point A to point B. Converged data and information shape new access options Migration of physical access control systems to a more network-centric platform is a game-changer for security technologies The migration of physical access control systems to a more network-centric platform has been a game-changer for emerging security technology options. The expansion of the Internet of Things (IoT), Near-Field Communication devices powered by Bluetooth technology, and the explosion of converged information systems and identity management tools that are now driving access control are making it easier than ever before for employees and visitors to apply for clearance, permissions and credentials. Wireless and proximity readers Advancements in high-performance wireless and proximity readers have enhanced the user’s access experience when presenting credentials at an entry and expediting movement throughout a facility. A user is now able to access a secured office from street-level without ever touching a key or card. Using a Bluetooth-enabled smartphone or triggering a facial recognition technology, they enter the building through a security revolving door or turnstile. A total building automation approach adds extra convenience, as well as seamless security, when access technology is integrated into other systems like elevator controls. A total building automation approach adds extra convenience and seamless security How to Meet Security Concerns at the Entry While security managers are charged with providing their facilities the maximum level of security possible, there is always the human element to consider. But does the effort to make people comfortable with their security system ecosystem come at a cost? Does all this convenience and the drive to deliver a positive security experience reduce an organization’s overall levels of security? And if so, how can we continue to deliver the same positive experience including speed of entry – while improving risk mitigation and threat prevention? Door entrances, barriers Users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through Let’s examine some of the various types of entrances being used at most facilities and the security properties of each. With some entrance types, there is the possibility for security to fall short of its intended goals in a way that can’t be addressed by access control technology alone. In particular, with many types of doors and barriers, tailgating is possible: users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through. To address this, many organizations hire security officers to supervise the entry. While this can help to reduce tailgating, it has been demonstrated that officers are not immune to social engineering and can often be “talked into” letting an unauthorized person into a facility. Deploying video cameras, sensors Some organizations have deployed video surveillance cameras or sensors to help identify tailgaters after the fact or a door left open for longer than rules allow. This approach is not uncommon where facilities have attempted to optimize throughput and maintain a positive experience for staff and visitors. Security staff monitoring the video feeds can alert management so that action can be taken – but this is at best a reactive solution. It does not keep the unauthorized persons from entering, and so is not a totally secure solution. Optical turnstiles, speedgates Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself. Not all security entrances work the same way. And, there will always be a balance between security and convenience – the more secure the entry, the less convenient it is for your personnel and visitors to enter your facility. For example, it takes more time to provide 2-factor authentication and enter through a mantrap portal than to provide only one credential and enter through an optical turnstile or speedgate. Perimeter protection So, it is an important first step to determine what is right at every entrance point within and around the perimeter. Remember that convenience does not equate to throughput. Convenience is the ease and speed of entry experienced by each individual crossing that threshold, while throughput relates to the speed at which many individuals can gain access to the facility. A more convenient entry makes a better first impression on visitors and is good for overall employee morale. Throughput is more functional; employees need to get logged in to begin their workday (and often to clock in to get paid), and they quickly become frustrated and dissatisfied when waiting in a long line to enter or exit the premises. Considering form and function when designing a security entrance can ensure that those requiring both high-security and convenience are appeased.
With so many high-end professional security companies in attendance, a security trade show is perhaps the least likely environment for criminal activity. Would criminals really choose to mess with the leaders in global security? While it may seem counter-intuitive, personal and corporate security needs to be a priority for every attendee – no matter how secure you may feel. If you are attending a security trade show where you will be surrounded by security experts, you should still not let your guard down. Use your security expertise to remain alert and vigilant to your surroundings. Use your security expertise to remain alert and vigilant to your surroundings Personal safety When it comes to security, there are two main areas where you need to focus on: your personal and your corporate security. Personal safety is self-explanatory: how you keep your person safe from physical attacks. When attending a trade show of any type, it is important that you are willing to speak to people and allow them to approach your personal space. However, it is equally important to set guidelines in order to keep your personal safety. Any location where large amounts of people are in attendance is a potential target for both individual criminal assault and terrorist attacks. Constant vigilance is your best defense here. Below are just a few examples of personal safety standards you should adhere to while attending any type of trade show: Always have a way out: as soon as you are provided a map of the facility hosting the show, commit to memory both the public entrances and exits. As a backup, take notice of the utilitarian transitways used by employees of the facility. Don’t let the most obvious exits become a “choke-point,” where you can be easily become caught in case of a crisis. Stay together: when you leave the venue make sure you do so in your group of colleagues or friends. While you may be anxious to get to your next destination, don’t breach protocol to do so. Keep a buddy system: communicate your known travel destinations with your teammates. If you have a meeting to attend with a client, let someone know when you will be there and when you plan on returning from it. Use tech to your advantage: consider installing a tracking app on the phone of everyone in your group attending the show. An app such as Life360 allows you to easily find your friends in case of an emergency. Drink responsibly: at many trade shows, alcoholic beverages are served. If you decide to partake, make sure that only people you trust are providing those beverages. Furthermore, don’t ever leave drinks unattended – it’s better to grab another than risk a spiked drink. Corporate safety Corporate security is typically a bit broader in that it includes your physical space, the materials or equipment located in your booth, and any proprietary or digital materials shared with clients or visitors. A security trade show will by nature offer a great many products and services that may be proprietary in nature. And so it’s important that everything you bring is accounted for at all times. Here are a few things to keep in mind when thinking about corporate safety: Securing privacy: if you plan on meeting with attendees in your booth, make sure you can provide privacy during your discussions. It is essential to be able to provide a safe place to discuss things. Make sure that prying eyes or sensitive ears can’t pierce your veil of confidentiality. Secure your assets: petty theft is a problem at any venue. To avoid the unexpected loss of your items, you should make sure all laptops, briefcases, backpacks, purses and anything else of value are “cabled” to hardpoints such as heavy tables to keep them from being carried off. Never leave anything important unattended. Secure delivery: if the trade show facility requires contracted employees to deliver your equipment or booth materials to your space, make sure that your materials are locked, secured, and properly labeled to mitigate pilfered or misplaced materials. Do not be afraid to take photos of your booth before it is left for the evening to document the shape it is left in. After all, it is a security trade show Keep in mind that you are there to target clients and customers who may need your products or services. Corporate espionage is a billion-dollar industry now. There are agents who attend security trade shows looking to steal the latest and greatest technology. These “professional spies” are solely there to undercut the success of your company at the show. Make their job as difficult as possible by being smart and alert.
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilizing the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualization and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
A larger proportion of cyberattacks in the first half of 2019 can be attributed to electronic criminals (eCrime adversaries) compared to state-sponsored or unidentified attacks. CrowdStrike, a cybersecurity company that provides the CrowdStrike Falcon endpoint protection platform, observes that 61% of targeted cybersecurity campaigns in the first half of 2019 were sourced from eCrime adversaries, compared to 39% from other sources. Technology was the top vertical market targeted by cyber-attacks in the first half of the year CrowdStrike Falcon Overwatch platform The eCrime portion more than doubled since 2018, reflecting an escalation of criminal players in search of more and larger payouts. The trend is among the information presented in CrowdStrike’s Overwatch 2019 Mid-Year Report: Observations from the Front Lines of Threat Hunting. Falcon OverWatch is the CrowdStrike-managed threat hunting service built on the CrowdStrike Falcon platform. Technology was the top vertical market targeted by cyber-attacks in the first half of the year, followed by telecommunications and non-governmental organizations (including think tanks). Other targets (in decreasing order) were retail, financial, manufacturing, transportation and logistics, gaming, entertainment and engineering. Hospitality disappeared from the list so far this year, although Crowdstrike expects an increase in intrusions aimed at the hospitality industry to put it back in the top 10 by the end of the year. Intrusion adversaries In terms of intrusion adversaries, the top players so far in 2019 are Spiders (eCrime) and Pandas (China). Regarding initial access techniques, the most common remain, in order of prevalence, valid accounts, spear-phishing and exploitation of public-facing applications. 2009 is proving to be an active year with a significant increase in eCrime and the inter-relationships occurring across different groups as they strengthen their organizations, forge alliances and expand their footprint. Need for a proactive security posture Basic hygiene form the foundation for a strong cybersecurity program Many of the techniques used by eCrime actors are easily defensible through strong security products and a proactive security posture, says CrowdStrike, which recommends the following measures to help maintain strong defense in 2019: Be attentive to basic hygiene such as user awareness, asset and vulnerability management, and secure configurations, which form the foundation for a strong cybersecurity program. User awareness programs can combat the continued threat of phishing and related social engineering techniques. Asset management and software inventory ensures that an organization understands it footprint and exposure. Vulnerability and patch management can verify that known vulnerabilities and insecure configurations are identified, prioritized and remediated. Multifactor authentication (MFA) should be established for all users because today's attackers are adept at accessing and using valid credentials. A robust privilege access management process will limit the damage adversaries can do if they get in and reduce the likelihood of later movement. Implementing password protection prevents disabling or uninstalling endpoint protection that provides critical prevention and visibility for defenders. Countering sophisticated cyber attacks As sophisticated attacks continue to evolve, enterprises face more than a "malware problem" As sophisticated attacks continue to evolve, enterprises face more than a "malware problem." Defenders should look for early warning signs that an attack may be underway, such as code execution, persistence, stealth, command control and lateral movement within a network. Contextual and behavioral analysis, when delivered in real time via machine learning and artificial intelligence, effectively detects and prevents attacks that conventional "defense-in-depth" technologies cannot address. "1-10-60 rule" in combating advanced cyber threats CrowdStrike recommends that organizations pursue a "1-10-60 rule" in order to effectively combat sophisticated cyberthreats. That is, they should seek to detect intrusions in under one minute; to perform a full investigation in under 10 minutes, and to eradicate the adversary from the environment in under 60 minutes. A source at CrowdStrike said "Meeting this challenge requires investment in deep visibility, as well as automated analysis and remediation tools across the enterprise, reducing friction and enabling responders to understand threats and take fast, decisive action."
The State of Illinois has enacted a ‘stay at home’ order effective as of Saturday, March 21, at 5pm to curb the spread of the COVID-19 coronavirus. This means all residents are mandated to ‘remain at home’ and only essential businesses may remain open to provide critical services. Everybody fully supports this measure as it will hopefully slow the spread of the virus. Securing critical infrastructure Under the order, Illinois Gov. J.B. Pritzker has mandated that all Illinoisans stay in their homes except as needed to maintain continuity of business critical operations. This coincides with Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience that advances a national policy to strengthen and maintain secure, functioning, and resilient critical infrastructure. BCD plays an important role in the information technology sector. The sector's complex and dynamic environment makes identifying threats and assessing security vulnerabilities difficult and requires that these tasks be addressed in a collaborative and creative fashion, especially as it directly affects both the public and security infrastructure.BCD plays an important role in the information technology sector Working with security integrators and OEMS In addition, it is imperative to maintain the supply chain in this unprecedented time of need. They work hand-in-hand with a number of security integrators and OEMs that work directly with the Federal Government. Most importantly, they supply life safety equipment that is used by first responders to help and keep them safe. Therefore, BCD Illinois build centers will remain open and operational, as the support technicians and engineers will remain available to continue to support all customers to fulfill the critical technology needs of the nation’s federal, state and local governments, healthcare facilities, and education, industrial and financial services sectors. It has also been notified that all shipments to US States currently in "stay at home" status may be delayed by the freight carriers; this includes the State of Illinois. BCD build centers Jeff Burgess, Chief Executive Officer (CEO) at BCD said, “We continue to implement strict precautionary measures in all our logistics and integration centers, in accordance with government and public health requirements, to reduce risk for colleagues who are performing their duties. Our Illinois-based technical operations will continue as long as we can confidently protect the health and well-being of these dedicated two dozen team members. All other BCD staff will continue working from home until further notice.”
National Bank of Umm Al Qaiwain (the Bank) is a Public Shareholding Company incorporated in Umm Al Qaiwain by Amiri Decree Number (1) on January 5, 1982, issued by His Highness, the Ruler of Umm Al Qaiwain and commenced its operations with effect from August 1, 1982. The Local government of Umm Al Qaiwain is the largest shareholder and promoter of the bank. The bank is engaged in providing retail and corporate banking services through a network of 14 branches in U.A.E. The Bank carries out Islamic banking operations through Islamic Banking window established in 2005 across its branch network. They were searching for a fool-proof solution that would help them in managing the Time-Attendance and overtime calculation. With offices spread over 14 locations in UAE, management of attendance data was a daunting task. centralized attendance data management All manual work for report generation was eliminated outrightly, simplifying the salary procedure Thus, centralized attendance data management and maintaining a complete record of their employees were a part of their key requirements. Moreover, their payroll processing deployed a software - RAMCO, wherein the attendance data was manually entered. After a comprehensive discussion with the customer, Matrix offered a centralized platform - COSEC CENTRA, to manage all the data centrally. Door controllers - COSEC VEGA FAX installed in all the office entrances. These door controllers are integrated with the central platform that pushes the event data to the server. Furthermore, the Matrix platform is integrated with the payroll system - RAMCO. All manual work for report generation was eliminated outrightly, simplifying the salary procedure. After implementing Matrix solutions, NBQ witnessed drastic changes while following their processes. Customized attendance policy formation Effortless attendance management of multiple locations from the Head Office was prominently one of them. The shift allocation and shift correction processes were streamlined. Their solution included some advanced features like customized attendance policy formation and real item alert on attendance related event & auto-scheduled reporting. This, in turn, ensured efficient employee database management improving productivity. Products and solutions offered: COSEC VEGA FAX A complete Time-Attendance and Access Control solution with a blend of aesthetics, size, connectivity, reliability and ease-of-use. Designed for large enterprises with multi-location organizations. COSEC CENTRA PLT A web-enabled application server that controls the entire system from anywhere in the world. It is the heart of the entire solution and acts as a bridge between applications and the devices. COSEC CENTRA TAM An enterprise-grade solution, designed for organizations the Time-Attendance and Leave Management processes like recording entries and exits, salary processing, etc.
Pulse Secure, globally renowned provider of software-defined Secure Access solutions, has announced the delivery of a successful project at Warrington Borough Council (WBC), designed to help deliver taxpayer value and workforce flexibility through Secure Network Access. Warrington Borough Council is a unitary authority in the north west of England serving approximately 200,000 citizens across 22 wards. WBC provides a full range of local government services including council tax billing, libraries, social services, the processing of planning applications, waste collection and disposal and more, that are delivered through its own staff and third-party partners supporting council operations. This approach makes remote access to relevant areas of the network increasingly important for communication and productivity. Juniper VPN technology and RSA two-factor authentication WBC’s existing Juniper VPN technology and RSA two-factor authentication were up for replacement, prompting the council to put out a tender invitation for vendors to propose new technology to deliver secure, selective access to its network for third party associates. The tender required a secure access platform that could initially support 100 licenses, with the potential to scale to meet changing demand while offering easy ongoing management. WBC objectively tested the proposed solution before selecting Pulse Secure as the best fit for its needs with DXC, a Pulse Secure Elite partner selected as the solution provider including a three-year contract with built-in software and service support. Reliable, secure VPN access DXC team transitioned the council’s network from Juniper SAs to Pulse PSAs in on-site implementation project The DXC team seamlessly transitioned the council’s network from Juniper SAs to Pulse PSAs in a two-day, on-site implementation project with minimal interruption to user services. Now, the council can provide reliable and secure VPN access for its entire direct and indirect workforce, making remote and mobile working easier. “[I was] really impressed with how DXC were able to implement our remote access solution, no impact to our customers, and no complaints either,” said David Gallear, Technical Lead (Network), Resources and Strategic Commissioning Directorate at Warrington Borough Council. Remote and mobile access The council has gained a fully secure network and can grant selective access to third party partners as needed, with simple ongoing management keeping costs low. Giving third-party associates remote and mobile access has also helped the council to promote a better work/life balance for its entire workforce. The new solution also helps WBC provide a more responsive, streamlined and efficient service to customers. With secure remote access, productivity has remained high even during bad weather or travel disruption that would previously prevent staff from coming into the office.
The Government of Jersey has appointed SureCloud to manage its government-wide cyber security transformation program, which aims to maintain the reputation of Jersey as a safe place to work and live. The new two-year deal forms part of the government’s Cyber Security Strategy, announced in 2017, to enhance its cyber resilience during its period of modernization. Cyber Security Strategy The Government of Jersey provides key operational services to more than 106,000 citizens and 7,000 businesses in Jersey. All of its services, including tax, healthcare, waste management, social services and education, depend on the security and availability of IT and Operational Technology (OT) systems. The financial services and tourism industries also heavily rely on the availability and security of the government’s services. Cyber Security Program Management Service SureCloud to deliver a Cyber Security Program Management Service, includes establishing governance SureCloud will deliver a Cyber Security Program Management Service which includes establishing governance and reporting processes for all elements of the government’s cyber security program. This will involve providing risk and issue management, program governance, information security processes as well as financial, quality and information management. It will also coordinate, lead and communicate business change across cyber security projects. This will be led by a dedicated Program Director who will proactively manage the day-to-day management of the government’s cyber security program and proactively monitor overall progress, as well as resolving any risks and issues that may arise. Cyber Security solutions “The Government of Jersey wants the island to remain a stable and attractive place to live and do business, in both the physical and digital world,” comments Ben Jepson, Vice President of Risk Advisory at SureCloud. “Cyber security is a prerequisite for this, which is why the government is investing in this cyber security programme. With our experience, knowledge and hands-on team, we are confident we can help them enhance their cyber security and move their transformation programme forwards.” The Cyber Security Program Management Service, which launches on 3rd March, will be delivered in two 12-month tranches. The first is split into six distinct projects: Program Management, Managed Security Service Provider (MSSP), Governance Improvement, Identity and Access Management, Asset Management and People Security. The second includes preparing for, and developing, procurement documentation for tranche two projects. Cyber Security expert Stuart Powell, CISO at Government of Jersey, concludes, “As we embark on a period of extensive change and modernization, cyber security is a critical enabler for delivering government services to the citizens and businesses of Jersey. We were impressed with SureCloud’s offering for improving our cyber security capability in quality and scale as well as their Program Director who we are looking forward to working with.”
SALTO Systems has been selected to provide a smart access control solution for Venture X, a modern workspace community located in Chiswick Park, West London. This business hub, with great transport links into Central London and Heathrow Airport is home to some of the best companies working in the oil and gas, media, entertainment, technology, food and drink, and health and beauty markets. It comprises 1.8 million sq. ft of award winning accommodation, arranged as a necklace of 12 office buildings. Each building faces the Park's 'inner garden' with a featured two-tier lake, waterfall, decked boardwalk, pathways, events space and landscaping. Chiswick Park also houses over 45,000 sq. ft of retail including the on-site Virgin Active gym, restaurants, convenience stores and an ever-changing array of pop-up traders and street-food vendors. Cutting edge sustainable building development Hot desks offer 24/7 access to common working areas (hubs) including phone booths and high speed Wi-Fi Part of the globally renowned, Venture X United Franchise Group, Venture X provides a brand new inspiring, diverse, and collaborative working environment that is so much more than just shared office space. Housed in a cutting edge sustainable building development, which includes solar fins, it offers a place where individuals and businesses can lease hot desks, private desks or private offices. Hot desks offer 24/7 access to common working areas (hubs) including phone booths and high speed Wi-Fi. Private desks add a Cat 6 Ethernet port, meeting and board room access, a business address with incoming mail handling, lockable office space and a private locker. Private offices top the package by proving all the previous offerings but in a fully furnished office space including SALTO access control. Modern locking solution With some 30 internal office and meeting room doors to secure, Venture X was looking for a technologically modern locking solution that would satisfy the needs of both the business and its customers. Key requirements were the ability to grant access rights instantly for new customers and revoke them in real-time for former customers. No hassle, costs or security issues with mechanical keys were wanted. They needed an audit-trail overview of who accessed which door at which time. Flexibility allocating office space, meeting rooms etc on a day to day basis as required. Easy meeting and conference room access, and finally, easy, wire-free installation without software installation and IT configuration. SALTO KS Keys as a Service cloud locking To meet these needs, SALTO’s KS ‘Keys as a Service’ cloud based locking solution was recommended. This provides a flexible access control management system that requires no software installation or the added expense of a fully-wired electronic product. All that is needed is an online device with an Internet connection. Providing end users with cloud-based SALTO KS Keys as a Service reduces cost and almost eliminates the need for maintenance. Highly secure, thanks to its 2-factor-authentication and 128 bit AES encryption; it provides flexibility, scalability, reliability, and the ability to manage access control from any Internet platform. Remote door locking solution One of the key need was a product that offered both a card and mobile app solution to remotely open doors" Venture X Director Andrew Ross comments “When you’re providing a working and meeting environment for entrepreneurs, and business people and large corporates, many of whom will be involved with technology businesses, security, efficiency and design were all essential aspects of the brief when we selected our preferred access control solution”. He adds, “One of their key requirements was a product that offered both a card and mobile app solution that would enable the members to remotely open doors, i.e. for customers, tradespersons or postal deliveries to gain access for example without the need for a staff member to be physically present in the building." Electronic access control Ross added, “Another feature wanted was office mode, so instead of having to present an access card or smart phone app to a door every time someone used it, the door would function just like a normal door during pre-set times but auto lock when required." Andrew further said, “The SALTO KS now installed meets those requirements and gives comprehensive 24/7 access control that covers our entire property. They are looking forward to utilizing SALTO KS across the new Venture X locations that are in development for 2020 and 2021.”
Fast-growing Spanish menswear brand Álvaro Moreno has selected ID Cloud, Nedap’s renowned RFID-based inventory visibility platform. The deployment of the RFID solution at source of production, in the distribution center and throughout the 50 stores across Spain started in June 2019 and was completed in September 2019. RFID inventory visibility platform Álvaro Moreno leverages RFID for complete traceability within the supply chain. “We believe RFID is a main pillar in our digitalization strategy as this allows us to close the gap between online and brick-and-mortar store experience”, says Álvaro Moreno, CEO of the menswear brand. Ultimate customer satisfaction is very important for our current and future success" “Ultimate customer satisfaction is very important for our current and future success. That is why we recently implemented omni-channel services such as BOPIS (Buy Online, Pick up in Store) and BORIS (Buy Online, Return in Store). In order to do this successfully, inventory accuracy as provided by RFID is key. For the future, we are considering to offer services like ship-from-store, mobile payment and self-checkout as well”, he continues. ID Cloud software suite Álvaro Moreno wanted to roll-out nationwide at a fast pace and was looking for a reliable partner. He said, “We selected Nedap because of their extensive experience within RFID projects. This enabled us to quickly deploy this technology throughout our 50 stores in just three months.” Nedap’s ID Cloud software suite is a Software-as-a-Service solution specifically developed for retail RFID applications. It offers retailers the quickest route to implement RFID and improve their in-store inventory accuracy to over 98%. Álvaro Moreno integrates ID Cloud with the Comerzzia POS-system. This enables seamless data transfer and provides the most accurate real-time business information.
Round table discussion
Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: How is the rise in terrorism impacting the physical security market?
Employee turnover is a problem for many companies, especially among younger employees who have not developed the philosophy of employer loyalty that was common in previous generations. Nowadays, changing jobs is the norm. The idea of spending decades working for a single employer seems almost quaint in today’s economy. However, excessive employee turnover can be expensive for employers, who are looking for ways to keep their brightest and best employees happily toiling away as long as possible. We asked this week’s Expert Panel Roundtable: How can the physical security market promote better employee retention in a competitive employment environment?
In today’s global economy, goods are manufactured all over the world and shipped to customers thousands of miles away. Where goods are manufactured thus becomes a mere detail. However, in the case of “Made in China”, the location of a manufacturer has become more high-profile and possibly more urgent. The U.S. government recently banned the use in government installations of video system components from two Chinese manufacturers, presumably because of cybersecurity concerns. A simmering trade war between China and the United States also emphasizes other concerns related to Chinese manufacturing. We asked this week’s Expert Panel Roundtable: Should "Made in China" be seen as a negative in the video surveillance marketplace? Why or why not?
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals