AlertEnterprise Inc., global physical-logical security convergence software company, has announced its latest evolution in insider threat protection with the launch of its next-generation Identity Intelligence technology, available in the upcoming release of Enterprise Guardian and Enterprise Sentry software (“The system”). Identity Intelligence Technology Identity Intelligence technology is designed to dramatically reduce the time and cost for detecting and resolving risk by automating threat protection Identity Intelligence technology is designed to dramatically reduce the time and cost for detecting and resolving risk by automating threat protection, across IT, physical, and operational systems, from one place. Its enhanced machine learning capabilities automatically baseline identity profiles, allowing it to quickly sort through millions of events to detect behavior anomalies and trends for an effective response to potential malicious behavior and policy violations. When evaluating potential threats, the system considers changes in identity behavior such as extended stays in secured areas, increased access attempts outside of regular shift hours, expired badge use, multiple incorrect PIN attempts, and unauthorized remote disconnections. False positives are kept low through powerful AI and the ability to train the system to learn from exception scenarios, helping to reduce the noise and move Security Operation Center (SOC) teams from distraction to action and focus on what matters most. AI-Powered Threat Protection “Today’s increasingly complex networks, with more data, devices, applications, and users accessing networked and physical resources, make it difficult for security teams to detect and prevent insider threats, regardless of whether those breaches are malicious or the result of negligence,” said Ruby Deol, Chief Operations Officer of AlertEnterprise. “With the addition of AI to Identity Intelligence technology organizations can now address these concerns head-on.” The system delivers a clear view of what’s happening across an enterprise, providing context and awareness of correlated events, and empowering SOC personnel to make informed decisions and respond appropriately. Featuring patented risk visualization, remediation and situational intelligence technology, the system delivers behavioral trends, statistical information, and automatic security policy enforcement. Intelligent Security The patented active policy enforcement rules-based engine automatically identifies policy violations and unauthorized access The system's powerful dashboards provide operators with a risk score assigned to individual identity profiles based on access to critical assets, areas, and information, enabling them to conduct a proactive risk analysis before provisioning or removing access. The patented active policy enforcement rules-based engine automatically identifies policy violations and unauthorized access, allowing security managers to proactively monitor, and respond to suspicious behavior, criminal activity, security violations, as well as operational and procedural issues. “The attack surface is continuing to expand, and with the launch of AI-powered Identity Intelligence technology, we’re helping organizations move from a reactive to a proactive posture against insider threat with smarter risk management and identity governance,” said Jasvir Gill, Founder, and CEO of AlertEnterprise Inc. “Today, the world’s most forward-looking and influential CISOs know that security must be part of the process of enterprise digital transformation. We are ensuring that their vision for the intelligent enterprise aligns with intelligent security.” Enterprise Guardian and Enterprise Sentry with AI-powered Identity Intelligence technology is expected to be available in the second quarter of 2019.
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. We have come a long way from a little-known surveillance manufacturer with a small booth size VIVOTEK has been an exhibitor at ISC West for many years now. Looking back, we have come a long way from a little-known surveillance manufacturer with a small booth size to one of the global providers in the security industry with a recognizable and trusted brand. Now, we are well-known in the industry and are proud of our accomplishments, but we feel greater things are still in front of us. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? Each year, we want our booth to tell our stories – who we are, what we do and what we are capable of, and where we are heading. We do not want to just be another camera manufacturer who only promotes and displays products; we want to be the solution provider that customers are looking for. In addition, we have very knowledgeable sale managers who can assist visitors at our booth who are looking for surveillance, whether it’s an upgrade or a totally new solution. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Gain industry knowledge and perspective as to where surveillance security industry is heading Like any trade show, it is difficult to quantify success. We attend ISC West to promote the VIVOTEK brand, meet and discuss with customers and gain industry knowledge and perspective as to where surveillance security industry is heading. If we achieve these, then ISC West is a success for us. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? Our main focus each year at ISC West has always been the interaction with customers and potential customers on the show floor. We pride ourselves in the products and technology we offer, and there aren’t any other trade shows in North America to showcase our capabilities than ISC West. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is the industry standard of security trade shows in North America. Since we are a security surveillance manufacturer, ISC West is the one show that all manufacturers in this industry must attend.
IONODES, a market innovator in dedicated IP video appliances, announced that it has joined the Genetec Technology Partner Program as a Silver Partner. Genetec is a global provider of unified security, public safety, operations, and business intelligence solutions. IONODES’ Secure Display Stations, which offer a secure and reliable video wall and spot monitor solution, is now fully integrated with Genetec Security Center. The integration is available as of Security Center 5.7 Service Release 5 and the related products are now listed in the list of supported devices from Genetec. Live Video Monitoring Secure Display Stations have been designed to use live video monitoring to promote more secure environments. They can display live video on a variety of digital monitors without the cost, complexity and security risk of a client workstation. This is ideal in public areas and in remote sites or facilities with few or no trained security staff. The ION-R100S and ION-R200 Secure Display Stations can display up to 32 IP video streams, on one or two HD monitors, and can be managed directly through the Genetec Security Desk client application. IONODES is very committed to using video to increase safety through awareness, by making live video available to more people" “We’re excited about this integration with IONODES because it makes valuable visual information available, further extending the value of the Genetec Security Center platform and offering greater situational awareness to our joint users”, said Alexandra Scarlat, Commercial Manager, Device Integration at Genetec. Enhanced Cybersecurity Secure Display Stations limit cyber security threats and cannot be tampered with by general staff or the public. This ensures that video is delivered reliably, securely and efficiently, around the clock. “IONODES is very committed to using video to increase safety through awareness, by making live video available to more people. This integration with Genetec will allow customers using Genetec Security Center another means to dynamically share live video throughout their organizations to enhance safety and improve business processes.” said Steve Green, Director of Sales and Business Development at IONODES.
Dragos, Inc., provider of the industrial industry’s most trusted asset identification, threat detection and response platform and services, announces the acquisition of Atlanta-based NexDefense, a provider of industrial controls system (ICS) visibility technology. As part of this announcement, the company also introduces Dragos Community Tools, a set of free assessment tools to help organizations of all sizes around the globe forge the path forward towards comprehensive ICS security. NexDefense further developed and sold Integrity, a tool originally funded by the United States Department of Energy and developed as ‘Sophia’ at Idaho National Laboratory (INL). NexDefense was one of the earliest and most well-known ICS security companies in the space. Asset Monitoring Capabilities This acquisition further supports the company’s mission of safeguarding civilization by making ICS security tools and knowledge readily accessible to the ICS security community. Dragos is committed to safeguarding civilization, and central to this mission is finding ways to provide tools and resources for the entire community" “Dragos is committed to safeguarding civilization, and central to this mission is finding ways to provide tools and resources for the entire community,” said Robert M. Lee, CEO and Founder of Dragos. “With the acquisition of NexDefense, we can provide a free asset identification tool specifically for operators looking to start with situational awareness and enable continuous asset monitoring capabilities, thereby helping move our entire community closer to the next level of maturity in security against cyber threats.” Cybersecurity Architectures Dragos Community Toolsprovide organizations with free asset identification capabilities, an important first step to effective threat detection and response. This is especially important in ICS environments, as they can contain thousands of assets--many potentially unknown to industrial organizations--with interconnected communications. The tools include both the NexDefense product Integrity, as well as Cyberlens, an assessment tool developed by Dragos team members before founding Dragos Inc. Dragos is providing free access to Dragos Community Tools Dragos is providing free access to Dragos Community Tools, so that many in the community can take steps to effectively understand what assets they have and how their ICS assets function, communicate, and behave. This visibility is the prerequisite for development and deployment of cybersecurity architectures to detect and respond to threats. Dragos Community Tools Dragos’ CyberLensproduct is available free of charge for industrial organizations as an assessment tool to help the community quickly process packet captures and visualise ICS environments. Dragos’ Integrityproduct is available free of charge for industrial organizations in need of continuous, passive ICS network monitoring with basic DPI and asset fingerprinting capabilities. The creation of these free community tools is an expansion of the Dragos commitment to the community. Dragos began its programmatic community approach in October 2018 with Neighborhood Keeper, a program announced earlier this year that serves smaller providers who lack sufficient resources to buy and manage advanced security technologies. Neighborhood Keeper is a paid offering that makes ICS threat analytics and data accessible to smaller providers, giving them access to collaborative ICS data at near-real-time and providing them immediate insight into the ICS threat landscape without revealing sensitive data.
ISC West continues to innovate and adapt to the changing needs of the security marketplace. In 2019, there will be 200 new exhibitors, 100 new speakers and an expanding mix of attendees that includes more end users and international attendees. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas. Among the more than 200 new exhibitors on the show floor will be Dell Technologies, Resideo, SAST (a Bosch IoT startup), Belkin International, NetApp, Lenovo, Kingston Technology and many others. The event continues to see more and more solutions in the area of IoT/connected security, a surge in barrier/bollards exhibitors, an increased number of start-up companies, and an emphasis this year on stadium/major events security. Plus, the new exhibit area of ISC West, Venetian Ballroom, will include a mix of solutions from mid-sized domestic and international companies, and is the home of the Emerging Technology Zone – back for its second year with 50-plus start-up companies expected. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas “ISC West is no longer just about video cameras, access control systems and alarms,” says Will Wise, Group Vice President, Security Portfolio for Reed Exhibitions, which produces and manages ISC West. Embracing and stimulating the market dynamic of comprehensive security for a safer, connected world, solutions on display at the show reflect convergence across physical security, IT (information technology) and OT (operational technology). The ISC West expo floor includes specialized featured areas such Connected Home, Public Safety & Security, Connected Security, Unmanned Security Expo and the Emerging Technology Zone. Plus, complimentary education sessions in the Unmanned Security Expo theatre will include topics such as drones, counter-drone solutions, ground robotics and regulations/policies that support autonomous technology. This year’s event will feature more than 1,000 products and brands covering everything from video surveillance, access control and alarms/alerts, to IoT, IT/cybersecurity convergence, AI, embedded systems, drones and robotics, smart homes, smart cities, public safety and more. The ISC West expo floor includes specialized featured areas such Connected Home and the Emerging Technology Zone Elevating the Keynote Series Over the past few years, ISC West has elevated its Keynote Series (open to all attendee types) to include more speakers and dynamic content covering relevant topics. Attendees should be sure to head to the Keynote room Wednesday and Thursday mornings at 8:30 a.m. before the expo floor opens at 10 a.m. Relating to attendance, ISC West continues to diversify and grow the attendee universe by attracting additional enterprise government end-users across physical and IT/OT responsibilities. The show also continues to attract and grow the channel audience, and there will be an increasing number of International attendees. “Years ago, ISC West was known exclusively as a dealer/integrator/installer show, but not anymore,” says Wise. “Today, the demographic mix continues to evolve as the event diversifies its product and educational offerings, embracing the current market reality of collaboration among integrators/dealers/installers, end-user decision-makers, and public safety and security professionals.” When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities Within the SIA Education@ISC West conference program, there are over 100 new speakers. Through ISC West’s strong partnership with the Security Industry Association (SIA, the Premier Sponsor of ISC), the SIA Education@ISC West program has expanded and become increasingly dynamic and diverse over the last three years. In addition, ISC West and SIA are hosting a Women in Security breakfast on Friday morning April 12th. Women in Security is a new track for the education program. “Our attendance data reflects the demand for a mix of physical security integrator and end-user content, a balance of technical and management/strategic topics, and diverse topics incorporating IoT and cybersecurity/physical security convergence, and analytics expertise,” says Wise. “Last year was a record year for conference program attendance, and 2019 will yet again set new benchmarks.” Mobile apps, information desks and ease of registration ISC West is also focusing on the attendee experience. Need advice on what exhibitors are a fit for your business needs and interests? The Information Desk adjacent to the main expo entrance will provide customized recommendations based on the information attendees provided during the registration process. Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website to research exhibitors and product categories, receive exhibitor recommendations that best fit business needs, review complimentary educational opportunities as well as 85-plus sessions from the paid SIA Education@ISC program. There are many networking opportunities being offered at the show this year. When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities. Whether attendees want to network with peers or customers at an awards ceremony (Sammy Awards, Fast 50, New Product Showcase Awards), Charity event (AIREF Golf Classic, Mission 500 Security 5K-2K Run/Walk), or an industry party (SIA Market Leaders Reception, ISC West Customer Appreciation Party at Tao), there are a variety of special events offered, all designed to help you make new connections. Make sure to check out the ISC West website for all the Special Events taking place at ISC West.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organizations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organizations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using Smartphone Apps To Open Doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognize people and use deep learning analytics to customize their office environment, the workplace is undergoing dramatic change. Improved Fingerprint Solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defense and other public section use cases where higher security is needed. Flexible Subscription Models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimization solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating Valuable Insights With Machine Learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focused on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organizations incorporate this type of analytics engine into their access control systems, they will improve security and personalize the user experience while driving better business decisions.
The access control industry tends to be more conservative when it comes to the adoption of new technology and services for end users, but that doesn't mean that 2019 won't provide a significant amount of progress through emerging trends taking shape in the industry. In addition to the increased adoption and acceptance of the cloud, mobile credentials and biometrics are becoming more mainstream, and integrations between manufacturers will take centre stage. Here, we take a look at these and other trends helping to shape the coming year. Cloud-Based Products We're continuing to see a demand by end-user customers for customized responses to certain actions within an access control system For many access control manufacturers, the core of the business is in more traditional products, with a high percentage of installs continuing to be these kinds of projects. However, over the last couple of years, cloud-based products have emerged as a viable option for customers. We've seen more of a willingness for end-user customers to inquire whether this is an option for them, citing ease of use, remote management, cybersecurity and more as part of their foray into this branch of access control. The cloud has established its reputation as being quicker to install, more flexible for customers to access and manage both their access points as well as the video associated with these doors, and placing less pressure on internal (or in some cases, non-existent) IT teams to help set up and manage an access control system. Mobile Credentials Applications We're continuing to see a demand by end-user customers for customized responses to certain actions within an access control system. For example, if there's an alarm set off during the day along a perimeter, the ability to automatically execute a lockdown and simultaneous email or message to everyone within the building alerting them to the issue is critical. The desire for this kind of flexibility within a system is prompting manufacturers to build new simple to use graphical tools into their systems that allow customized action responses that are proportional to the level of alarm. There's a strong desire by many of today's companies to be able to use mobile phones for access control and as such, manufacturers are either developing their own mobile credentials applications or integrating their systems with these kinds of products. Over the last couple of years, cloud-based products have emerged as a viable option for customers Future Of Biometrics As companies start to ask about whether their facilities are safe enough, they're often more willing to consider access control that takes security to a new level, such as the implementation of biometric readers. Biometrics is getting more usage in professional security applications and many customers want to move away from using physical cards for access control. Manufacturers that don't currently have biometric hardware in place are starting to integrate with readers designed to offer this functionality in an effort to meet the demands of customers. The dramatic rise in facial recognition biometrics is something that will likely shape the future of biometrics as costs start to decrease. While the access control industry is highly fragmented, we're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire. Video Management Platforms We're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire For example, there are a number of access control providers that are providing paths toward full integration with lock manufacturers and vice versa in an effort to meet the needs of clients who may have purchased locks but a high powered access control system to properly manage them. There's also a large shift toward full integration with video management platforms and access control systems to fully integrate the two into a single, user-friendly experience and give end users more control over both. Additionally, manufacturers are looking to provide customers with a single system that meets the needs they have with regards to video, intrusion and access control. Right now, I don't think there's a system that can fully deliver on the promise of being exceptional at all three, so integrations and partnerships remain important to achieve that end goal. Access Control World An increasing number of end users are realising the holes in the current Wiegand protocols that have been in place since the 1980s, along with the large number of ‘off the shelf’ equipment that's now available to allow outsiders access through readers that operate under these protocols. As a result, in the last decade or so, OSDP has come onto the scene and is growing in popularity. One of the most important steps for access control manufacturers in 2019 will be to listen to customers who are concerned with this vulnerability and work toward fully supporting OSDP in an effort to protect these access control systems. It's an exciting time to be a part of the access control world, as we finally see results from all of the hype centred around the cloud, biometrics, mobile credentials, hacking protection and strong partnerships come to fruition. As 2019 begins, look for these trends to grow in popularity and for manufacturers to really listen to the end-user customer they serve and respond in kind.
In the physical security industry, the advent of artificial intelligence (AI) and deep learning is most commonly associated with potential improvements in video analytics performance. However, AI is also applicable to a variety of content analytics beyond video. It will be interesting to watch how companies that take the next step beyond proving viability for security purposes to deliver true business applications to the market. Right now, we’re seeing organizations working hard to develop content analytics that perform in an effective, efficient and accurate manner. Enterprise Software Companies This shift will create a huge disruption in our industry and cause further consolidation Many of these organizations are true AI and/or computer vision companies, and they are spending a lot of money developing very advanced algorithms. However, there’s still work to be done identifying the real benefit of these analytics for customers as part of comprehensive business intelligence solutions. Until that happens, and customers understand how those benefits apply to them directly, adoption will continue to be lower than all the marketing hype would suggest. Data capture form to appear here! Because data analytics are becoming such a significant component of today’s ‘big data’ solutions, watch for a number of large, enterprise software companies to start focusing on the security industry. This shift will create a huge disruption in our industry and cause further consolidation. Analyzing Mobile Endpoints There is also a potential for machine learning to enable cybersecurity companies to predict the nature of future attacks based on past behavior, similar to how Netflix displays what you want to watch based on what you’ve previously viewed. According to Jack Gold, president and principal analyst at J. Gold Associates, this innovation can assist cyber companies to transition away from a ‘signature-based’ system to detect malware. Instead, he sees more companies adopting a machine learning approach that aims to analyze past incidents in a broader manner and aggregate information from a multitude of sources. A main function of AI is to analyze past incidents in a broader manner and aggregate information from a multitude of sources Specifically, some machine learning applications for cybersecurity are effective at doing the following: detecting malicious activity, helping security officers determine what tasks they need to complete in an investigation process, analyzing mobile endpoints, decreasing the number of false positive threats, automating repetitive tasks like interrupting ransomware, and potentially closing some zero-day vulnerabilities. Android Mobile Endpoints A number of tech giants have invested in these capabilities recently, including Google, which is employing machine learning to help protect Android mobile endpoints. Amazon also bought a startup called harvest.AI to help it aggregate and better understand data located on the S3 cloud storage service. Machine learning can help cybersecurity efforts, but it can’t replace many important functions Ultimately, machine learning can help cybersecurity efforts, but it can’t replace many important functions. There will always be sophisticated attacks that no machine learning algorithm will be able to find. Pairing human intellect with machine technology is the best approach. In another application, AI-driven robots can be deployed for security in places where it may not be feasible to have a human patrol, such as the outskirts of a vital electric substation located hundreds of miles from the nearest town. Evolution Of Artificial Intelligence A robot can easily traverse the harsh terrain and notify authorities when something is amiss. Another use is during disaster recovery efforts. Robots don’t get tired, and they don’t have to use the bathroom, eat or take a break. With the abilities afforded by AI, robots can also navigate any designated area autonomously to keep an eye out for suspicious behavior or alert first responders to those who may need aid. In situations where health and safety concerns preclude the ability of having a human to watch the site, such as at toxic waste dumps, robots can be deployed. Although drones still largely require a human operator to chart their flight paths and control their movements, the evolution of artificial intelligence is also revolutionizing the capabilities of machines to work autonomously. If you missed part two, see it here. Or, to start from part one, click here.
Choosing the right server for a video surveillance application comes down to one question: What does the customer expect from the system? Is it a retail location with two cameras that only needs video stored for 24 hours? Does the system need failover protection? What are the ramifications if a system goes down? Does business have to stop? How fast does the customer need to have access to video? Is it a regulated industry where immediate access is a requirement? How mission-critical is the video system to operations? Mission Critical Video Surveillance Solutions Such questions can point video system designers to the right technology for an application, and a manufacturer and reseller with a wide product offering ensure that the perfect solution is available and can be shipped quickly. It’s important to remember that this is not a “one size fits all” marketplace. Data capture form to appear here! Questions need to be asked on what an appropriate server solution will provide for the customer 1) JBOD - It stands for "just a bunch of disks" and refers to a collection of hard disks that have not been configured to work together. This approach is typical of stand-alone systems such as a retailer who has one or two cameras recording locally at a remote location, and who have a tolerance for occasionally losing video footage. 2) RAID 5/6 is a redundant array of independent disks in which data is stored across all the disks. The configuration provides more redundancy and reliability, better balance of disk usage, and more throughput and performance. RAID 5/6 is a redundant array of independent disks in which data is stored across all the disks 3) SAN or storage area network is a type of centralized storage providing enhanced accessibility to disk arrays. SAN provides high performance but is not as easy to expand. It is also less expensive than NAS systems. 4) NAS or network-attached storage is another type of centralized data storage. NAS systems are networked appliances containing storage drives. Benefits include faster data access, easier administration and simple configuration. NAS systems are easier to expand than SAN but provide less performance. NAS systems fit well in situations where customers have massive storage needs (or expect to in the future.) These are applications with lots of cameras and a need to retain high-frame-rate video for 180 days or longer. Typical uses include sports arenas, large cities, universities, corporate campuses and airports. Immediate Access To Video Highly available systems, such as SAN or NAS, are needed in any regulated industry. For example, in the cannabis grower market, an end user might need immediate access to video to show a compliance regulator. Gaming is another market in which immediate access to video is critical, and, for example, if a video system goes down at a table game, the gaming has to shut down, which is an expensive prospect to the casino. Therefore, reliability is critical. Video’s benefits beyond safety and security can also help to justify the costs of more expensive system Importance Of Video In Risk Mitigation In some instances, video is used primarily to manage risk, for example in litigation (or to avoid litigation) in a slip-and-fall claim or other court action. This is referred to as Loss Prevention. The ability to save thousands of dollars (or millions) by averting an expensive legal verdict can go a long way toward justifying the costs of systems. Video’s benefits beyond safety and security, such as for marketing and business analytics, can also help to justify the costs of more expensive systems. Identifying The Right Video Server Equipment Offering a variety of choices, and adapting those systems to specific applications, ensures customer satisfaction “A tradeoff of cost and needed functionality is at the center of decisions when buying server systems for video applications,” says Tom Larson, Chief Technology Officer, BCDVideo. “Identifying specifically what the customer needs from the system, and how important it is to meet those needs, points to the right choice in video server equipment. "Various technologies have advantages and some downsides, and it is the customer’s need for those advantages (and tolerance for the downsides) that determines which server equipment is right for the job.” Offering a variety of choices, and adapting those systems to specific applications, ensures customer satisfaction. The systems builder can help integrators analyze the site and project requirements and translate those into the right equipment and networking choices. What does the customer need and how much are they willing to pay for it? The real determination is “how important is the video?”
Security is arguably at the heart of the United States partial government shutdown: President Trump’s demand for $5.6 billion to start building a wall along the southern border with Mexico is the major bone of contention as gridlock in Washington prevents passage of a spending bill to keep the government in full operation. The partial government shutdown has affected security in other ways, too, and some of the impact could continue long after the impasse is settled. Some 800,000 federal employees are impacted, some on full or partial leave as a result of the shutdown and others working without knowing when they will get paid. Cybersecurity Initiatives Delayed Furloughed federal employees tasked with cybersecurity are not on hand to address the constant threat to government IT systems from possible hackers and other bad actors. In fact, hackers may decide the government shutdown is a vulnerable time to launch an attack. Data capture form to appear here! Hackers may decide the government shutdown is a vulnerable time to launch an attack Specifically, the new Cybersecurity Infrastructure Security Agency, launched last fall, is operating with a skeleton staff. If the shutdown encourages cybersecurity experts to seek other employment, the resulting drain of “knowledge capital” could be a lasting detriment. New cybersecurity initiatives are also being delayed, such as the 21st Century Integrated Digital Experience Act, aimed at creating a baseline of security defense across government web sites. Some government websites have had their Transport Layer Security (TLS) encryption certificates expire during the shutdown. Impact On TSA Agents Although Transportation Security Administration (TSA) agents remain on the job at major airports, they will not be paid again until after the shutdown is over. The resulting negative impact on morale has arguably slowed down airport security operations, although airports have not reported any major problems. In addition, some agents have called in “sick” and/or sought other employment to provide income during the shutdown. In the Dallas-Fort Worth airport, the number of agents calling out sick reportedly increased by 200% to 300%. The absences can aggravate existing TSA staffing shortages. Impact On Border Protection Agents Customs and border protection agents are also on the job with no assurance of when they will be paid. Other immigration agents in the Department of Homeland Security are also currently without pay. Hearings on immigration cases are being canceled, which can result in a large backlog to be addressed after the shutdown ends. Customs and border protection agents are also on the job with no assurance of when they will be paid What About Worker Documentation? A consequence of the shutdown is unavailability of the government’s E-Verify system, which is used to verify a worker’s immigration status prior to being hired by an employer. During the lapse in government appropriations, employers will not be able to access their E-Verify accounts, create an E-Verify case, edit company information, terminate accounts, run reports, etc. Long-Term Impact On Government Employment The longer the shutdown continues, the more employees will be encouraged to seek work elsewhere The shutdown may lead federal employees to seek work in the private sector, where their paycheck is not likely to be delayed because of a political impasse. The longer the shutdown continues, the more employees will be encouraged to seek work elsewhere, whether on a temporary basis or as a permanent alternative. Manpower shortages can translate into security risks. Trump has argued for funding of the border wall on security and humanitarian grounds and has sought to put pressure on newly empowered Democrats. However, adding physical barriers at the border is only part of the solution to border security, says the conservative Heritage Foundation. Also needed are improved technology to monitor the border and appropriately equipped border patrol agents. Holistic Approach To Border Security This holistic approach of combining barriers, technology, and people is the cost-effective way to secure the border, says Heritage Foundation. It’s also important to enforce immigration laws, and border security does nothing to stop visa overstays, another source of illegal immigration. The Democratic opposition has said Trump’s urgent call to build the wall is a “manufactured crisis,” and the wall would be “immoral” and “ineffective.” Weeks into the impasse, there is no end in sight.
A total overhaul of care and safeguarding measures at Southern Health NHS Foundation Trust’s mental healthcare facilities was required following historic failures, including preventable deaths in 2012 and 2013. A root-and-branch reform program was put in place to improve care, ensure transparency and cut risks. A comprehensive video surveillance solution was sought to underpin these efforts. The first phase project required complete video capture and recording at the Ravenswood House facility for children and adolescents, with further premises to follow in subsequent phases. Affordable Surveillance System The surveillance system not only needed to cover all areas of the site but also needed to be affordable, secure against cyber-attacksSouthern Health had a critical need for continuous video evidence capture in all areas at Ravenswood House, in all lighting conditions, without blind-spots. The primary objective was to use the recordings of interactions with patients to improve standards of care, with clinical staff reviewing how incidents are handled, and protecting staff in the event of accusations of mistreatment. Because vulnerable young people are being cared for, any allegation of mistreatment requires that the staff involved are removed from front-line care duties pending investigations, therefore the ability to find and present video evidence quickly is vital. The surveillance system not only needed to cover all areas of the site but also needed to be affordable, secure against cyber-attacks in compliance with NHS requirements, quick to install – as the hospital had to remain in constant use – and easy for clinical staff to use as well as security specialists. Installation Of 12MP Super Fisheye Cameras The 12MP Super Fisheyes benefit from IDIS’s Smart Failover protection, which ensures continued recording even during network instability or drop-outHigh specification IDIS video technology was identified as the best for the project following a detailed on-site comparison which demonstrated its superior picture quality and ease-of-use. Specialist integrator ISD Tech was brought in to install more than a hundred IDIS 12MP Super Fisheye cameras. These units allow affordable, comprehensive area coverage, typically doing the equivalent job of three or four PTZ cameras. The result is lower installation fees, a reduced maintenance burden and affordable operation, recording the full scene without the need for an operator 24/7. The 12MP Super Fisheyes also benefit from IDIS’s Smart Failover protection, which ensures continued recording even during network instability or drop-out. And IDIS’s Korean-made technology uses proprietary protocols (not off-the-shelf) that makes it fully network-secure, allowing it to be linked to local LANs without the risk of system hacking, which is a key consideration for any IP surveillance solution. Easier And Less Costly Installation The impact on staff is huge when they can’t work in the wards, so this speeded-up process is really valuable"The IDIS video solution was used to quickly and easily replace a previously-installed IP video system which comprised a mix of equipment from different manufacturers, and in comparison, it is easier and less costly to install, maintain and operate. “This will really assist us with evidence gathering and any criminal process. We can now look at the footage ourselves and quickly determine what happened. And we can email video links to the police and local authority designated officers. The impact on staff is huge when they can’t work in the wards, so this speeded-up process is really valuable,” said Tracey Edwards, Head of Security Southern Health NHS Trust. Following ISD Tech’s successful completion of the Ravenswood House upgrade, 250 more facilities across Hampshire are to follow, including clinics, medium secure units and admin centers.
Sony 4K security cameras act as ‘intelligent eyes’ at EDGE Olympic, one of Amsterdam’s most technologically advanced sustainable buildings. The rugged minidome cameras give a clear picture of the flow of workers and visitors into and around the premises. In addition, their excellent low-light sensitivity is an asset for the reinforcement of security at entrances and car parking areas. Playing a key role in EDGE Olympic’s intelligent design are thirteen Sony SNC VM772R 4K minidome cameras EDGE Olympic is an exciting landmark in sustainability. Opened in May 2018, the building constructed by EDGE offers over 11,000m2 of innovative co-working space close to Amsterdam’s Olympic Stadium. Providing a creative and energy-efficient workspace for commercial tenants, the building’s design is focused on a sophisticated digital infrastructure that connects people, devices, sensors and information via a secure cloud platform. Sony SNC VM772R 4K Minidome Cameras Playing a key role in EDGE Olympic’s intelligent design are thirteen Sony SNC VM772R 4K minidome cameras installed by Netherlands security specialist, Lancker Wolters. The cameras are integrated with Genetec’s video management system to create a comprehensive video security and monitoring solution. Ruggedly built for all-weather outdoor operation around the clock, the SNC VM772R camera features a large, highly sensitive 1.0-type back-illuminated Exmor R CMOS image sensor. Offering four times higher resolution than Full HD, the camera is capable of capturing smooth, crisply detailed 4K video in conditions of near darkness. This allows people and objects to be seen clearly in a wide range of lighting conditions – and thus helps to ensure round-the-clock safety and security of employees, co-workers and visitors to the building. Video Data In Building Operations Optimization In the future, it is expected that video data will also be used to optimise building operations In the future, it is expected that video data will also be used to optimize building operations. For example, intelligent analysis of traffic patterns could enable more efficient room bookings and use of resources such as heating, lighting and cleaning services. Further, SNC-VM772R cameras monitor the EDGE Olympic car park, scanning the registration license plates of vehicles and checking the number against a database to admit authorized staff and visitors only, while automatically raising the barrier to let vehicles exit. This also allows instant confirmation whether a particular employee is present in the building: this overview can be beneficial, for example, in the event of an emergency evacuation. Sony 4K Surveillance Cameras "The initial price of a particular camera doesn’t matter" comments Erik Ubels, CTO, EDGE Technologies. "It’s the usability over its lifetime that makes it a better investment. That's why we chose Sony 4K cameras for this landmark building and other properties that we’re planning in the near future."
ProdataKey (PDK), an innovator of cloud-based network and wireless access control products and ASSA ABLOY, the pioneer in door opening solutions, announced the completion of a campus-wide security upgrade at Glenaire Retirement Community in Cary, North Carolina. Modern Systems, of Yadkinville, North Carolina, has installed a fully integrated wireless lock and access control solution securing 370 doors spread across the community’s main building entrances, public access areas, offices and residential apartment units. It makes use of ASSA ABLOY’s Aperio wireless locksets with PDK’s cloud access control software, providing administrators with the ability to remotely lock and unlock doors, set specific hours for maintenance workers’ access to buildings, continuously monitor door use, and easily retrieve system-wide reports. ASSA ABLOY IN100 Aperio wireless locks feature sleek readers integrated with the door hardware, helping to preserve the upscale aesthetic of Glenaire’s many buildings. Accessing PDK Software From Mobile Device System management of PDK software can be handled completely from any mobile device or computer browserThe system will continue to grow, with expansion to all electrical rooms, storage rooms, mechanical rooms and closets, bringing the total to approximately 650 doors, as well as another 190 apartments and 40 assisted living units. As new doors come online, they will appear within the completely scalable PDK interface with no interruption to service or administrative functions. System management of PDK software can be handled completely from any mobile device or computer browser. Modern Systems was able to upload the user database from Glenaire’s legacy access control system to PDK’s cloud servers, allowing residents to retain use of their existing cards, which previously were used only to open the front doors of main buildings. With the PDK/ASSA ABLOY system, they now use those same cards to access public areas and their own private residences. ‘Guest’ cards, with more restricted access, are available for residents to give to family or friends as appropriate. Customized card permissions have also been established for staff groups, including service workers, nursing professionals and dining staff. Integrating Security Solutions When a resident is missing, administrators will be able to quickly call up cameras from the last door where the resident used his or her access cardModern Systems plans to soon facilitate an integration between the PDK software and several other security solutions they have installed at Glenaire. Mapping between doors and surveillance cameras, which are part of a new Milestone Systems video management solution, will not only enhance security but assist with Glenaire’s missing resident protocol. When a resident is missing, administrators will be able to quickly call up cameras from the last door where the resident used his or her access card. They also plan to connect the facility’s Situational Awareness and Response Assistant (SARA) risk management solution and mass notification system, from Status Solutions, with PDK. This integration will be important both in campus lock-down situations, as well as to assist with entry for response teams during medical emergencies. Glenaire’s Director of Facility Services, Ryan Ferguson, says he was wowed by the cloud-based PDK solution, which he says, “has the most modern, up-to-date access control software of anything I’ve seen. In addition, we were able to install the wireless PDK/ASSA ABLOY solution in about half the time it would have taken to install a wired solution, and for about half the cost.” Protection From Cyber Vulnerabilities The fact that all updates and security patches are automatically installed, system expansion is pain-free and limitless"Cory Jackson, PDK’s Vice President of Strategic Sales, adds, “The Glenaire project demonstrates the many ways in which our cloud solution makes sense for enterprise scale customers. “The fact that all updates and security patches are automatically installed, system expansion is pain-free and limitless – even across multiple buildings or sites, we offer seamless integration with solutions from valuable partners like ASSA ABLOY and others, and the customer’s in-house network is not exposed to any potential cyber vulnerabilities, are all reasons that PDK is gaining traction with larger customers.” “Retirement communities like Glenaire face a very unique set of challenges. The ability to provide a sense of security to residents and their families while still creating an environment that feels like home is paramount,” says Caleb Allen, electro-mechanical specialist for ASSA ABLOY Door Security Solutions. “We were happy to offer them a solution that made it easy and affordable to install comprehensive access control throughout the facility.”
Integrity Security Group is using SmartTask’s SmartForms to gain added visibility and dramatically cut down on its administrative burden. Having adopted the employee scheduling and mobile workforce management software last year for the provision of proof of attendance, control room management and staff rostering, the company is now using its electronic data capture functionality to streamline a range of operational processes. Initially, SmartForms are being used for vacant property and mobile patrol inspections as well as daily vehicle checks, already saving more than 15 hours of admin a month. SmartTask SmartForms The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team “We are now using the SmartTask SmartForms to help reduce administration, capture critical work data and enforce health and safety procedures,” explains James Chittil, General Manager at Integrity Security Group. “We are constantly looking at clever ways to take advantage of the software’s rich functionality, so we can continue to simplify and enhance the way we operate.” The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team. All reporting for vacant property and mobile patrol inspections – for both scheduled patrols and alarm activations – are now completed using a SmartTask-enabled smartphone. By electronically capturing all relevant information, including photo evidence, Integrity can quickly provide customers with a status update and details of all undertaken work as well as respond to any identified issues. Vehicle Checks And Fleet Management Meanwhile, daily vehicle checks for Integrity’s fleet of vans are now completed using a specially-developed SmartForm, so the company can instantly see if drivers are complying with this health and safety procedure. Any vehicle-related problems or damage can be raised by the driver and actioned immediately by the admin team to mitigate fleet risk. Mileage data is also captured through the software, enabling maintenance requirements to be tracked and scheduled at appropriate intervals. “The SmartForms are enabling us to dramatically reduce paperwork and remove manual processes. This is making it much simpler for both our security officers in the field and our office-based admin team to capture, collate and communicate essential operational data. This is not only helping us make better use of our valuable resources, but also enhance the service we are providing to customers,” added James Chittil. Paul Ridden, CEO of SmartTask commented: “Our experience within the security sector means we are continually developing new functionality that overcome real-world problems for our customers. This is the reason we are working in partnership with a growing number of security businesses who recognize the value they can gain and the benefits they can achieve from using the SmartTask software.” Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff Lone Worker Protection Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff as part of its commitment to lone worker protection. The company is also using the intelligent rostering functionality to streamline internal planning processes, while the interactive dashboard supported the launch of a dedicated, out-of-hours control room operation by providing a live view of all scheduled shifts and expected or missed check calls. SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
Round table discussion
A basic tenet of sales is ABC – always be closing. But it's a principle that most professional salespeople would say oversimplifies the process. Especially in a sophisticated, high-tech market such as physical security, the required sales skills are much more involved and nuanced. We asked this week's Expert Panel Roundtable: What unique characteristics are required of salespeople in the arena of physical security systems?
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
Cybersecurity continues to be a major theme in the physical security industry, but effective cybersecurity comes at a cost. Higher cost is contrary to another major trend in the market: lower product pricing, which some have characterized as a ‘race to the bottom’. Chinese manufacturers, whose products tend to have lower prices, have been the target of cybersecurity concerns and even a government ban. So what is the overall impact of cybersecurity on pricing trends in video products? We asked this week’s Expert Panel Roundtable: Are cybersecurity concerns slowing down the ‘race to the bottom’ (i.e., the dominance of lower-cost cameras)?