Kingston Digital, Inc., the Flash memory affiliate of Kingston Technology Company, Inc., a global provider of memory products and technology solutions, announced it will showcase an array of products at Global Security Exchange (GSX) (booth 2685 Central Hall), the most established trade event for security professionals. The company will display its full line of industry-leading encrypted USB Flash drive solutions, including the IronKey brand purchased in 2016, as well as upcoming high-density business and enterprise SSDs and Server Premier memory.
“When it comes to memory and data storage solutions, it is imperative that security professionals trust the products they use and the companies that make them. For over 30 years, we have been an unquestioned leader in this field,” said Richard Kanadjian, encrypted USB business manager, Kingston.
“For storage-bound applications, Kingston stands ready as the industry shifts away from traditional 15k SAS toward NVMe, where the performance gains in terms of IOPS and lower latency is tremendous. GSX is the perfect venue for us to show the security industry our ability to provide it with the most complete line of superior data performance solutions for their varied security, data, audio/video or other applications.”
GDPR Compliant USB Drives
Kingston encrypted USB drives are designed to protect data that require high security and serve as an additional element in compliance with the EU’s GDPR
GSX 2018 takes place at the Las Vegas Convention Center from September 23-27. Kingston is located in booth #2685 in the Central Hall.
Kingston encrypted USB drives are designed to protect data that require high security, maintain a productive and efficient mobile workforce, and serve as an additional element in compliance with the EU’s GDPR (General Data Protection Regulation). These drives help users meet specific agency directives, such as encryption, TAA and FIPS compliance, and are ideal for government or corporate use. The line includes both IronKey drives available in 4GB to 128GB capacities; and, Kingston DataTraveler models available from 4GB to 64GB.
Securing Data With SSDs
In business applications, Kingston SSDs increase performance, help secure data, and extend the life of older systems. In enterprise applications, Kingston SSDs offer increased reliability and power fail features to keep mission-critical environments up and running 24/7.
The upcoming DC500R is a high-performance 6 Gbps SATA SSD designed for read-centric data-center workloads. It is designed with strict QoS requirements to ensure predictable random IO performance as well as predictable latencies over a wide range of read/write workloads. Special power-loss safeguards help reduce the likelihood of data loss and ensure that the drive will successfully re-initialise on the next power-up of the system.
DC1000M U.2 NVMe SSD
The DC1000M 2.5″ U.2 NVMe SSD's advanced architecture enables delivery of up to 600k IOPS of random read performance and a potent 3GB/s of throughput
The DC1000M 2.5″ U.2 NVMe SSD features high-storage capacity and best-in-class enterprise performance. Its high-performance Gen 3.0 x4 PCIe NVMe interface enables high throughput and low latency on a standardized low-cost platform. The drive’s advanced architecture enables delivery of up to 600k IOPS of random read performance and a potent 3GB/s of throughput. Its strict QoS requirements ensure predictable random IO performance as well as predictable latencies over a wide range of workloads. The ‘mixed-use’ workload drive makes it ideal for running a wide range of applications.
Kingston server memory is a worldwide industry standard. Server Premier modules are manufactured using a locked bill of materials (BOM). They are designed for big data centers, people who implement high-quality branded provisioned servers to those who use or build white-box systems and require a consistent brand and revision of DRAM. The line offers a variety of embedded memory products that provide maximum performance and flexibility
I have been thinking a lot about the U.S. government’s ban on video surveillance technologies by Hikvision and Dahua. In general, I question the wisdom and logic of the ban and am frankly puzzled as to how it came to be. Allow me to elaborate.
Chinese Camera Manufacturers
Reality check: The government ban is based on concerns about the potential misuse of cameras, not actual misuse. Before the government ban, you occasionally heard about some government entities deciding not to use cameras manufactured by Chinese companies, although the reasons were mostly “in an abundance of caution.”
Even so, I find the targeting of two Chinese companies – three if you count Hytera Communications, a mobile radio manufacturer – in a huge government military spending bill to be a little puzzling. I can’t quite picture how these specific companies got on Congress’s radar. The government ban is based on concerns about the potential misuse of cameras, not actual misuse What level of lobbying or backroom dealing was involved in getting the ban introduced (by a Missouri congresswoman) into the House version of the bill?
And after the ban was left out of the Senate version, was there a new wave of discussions to ensure it was included in the joint House-Senate version (with some minor changes, and who negotiated those?). It all seems a little random.
Concerns For The U.S.
Furthermore, the U.S. ban solves neither of the two main concerns that are generally used as its justification:
Concern: Cybersecurity. The U.S. ban “solves” the issue of cybersecurity only if both of the following statements are true.
No security system that uses a Hikvision or Dahua camera or other component is cybersecure.
Any system that does not use a Hikvision or Dahua camera or other component is cybersecure.
What level of lobbying or backroom dealing was involved in getting the ban introduced into the House version of the bill?
The ban ignores the breadth and complexity of cybersecurity and instead offers up two companies as scapegoats. Our industry has sought to address cybersecurity, and the one principle that has guided that effort is that cybersecurity is an issue that must be addressed by manufacturers, consultants, integrators and end users – in effect, everyone in the industry. Cybersecurity does not begin and end with the manufacturer and banning any manufacturers from the market does not ensure better cybersecurity.
Concern: “Untrustworthy” Chinese companies. Hikvision and Dahua are only two Chinese companies. Any response to concerns about whether Chinese companies are trustworthy would need to cover many more companies that manufacture their products in China. Australian TV recently claimed that “All Chinese companies pose a risk. Because of Chinese laws, there is a requirement for companies to be engaged in espionage on behalf of the state.”
Even if one embraces that extreme view, the logic fails when only two companies are targeted. One source told me that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, so it’s a much bigger issue than two companies.The Chinese government has much more effective ways of conducting espionage than exploiting security cameras
And is U.S. security at risk unless or until it is cut off from more than half of the world’s supply of video cameras? Even Western camera companies manufacture some of their cameras and/or components in China. Why name only two (or three) companies, only one of which has ties to the Chinese government?
If the goal of the U.S. ban was to address the possibility of cybersecurity and/or espionage by the Chinese government, shouldn’t there be other companies and product categories included? Clearly, video surveillance is not the only category that has the potential for abuse. The Chinese government has much more effective ways of conducting espionage than exploiting security cameras.
Global Response To U.S. Ban
And now that the U.S. ban has been passed, how is the ban being misused to justify a new level of alarm about Chinese companies? Australian television effortlessly made the leap from “software backdoors” to a concerted and organized effort by the Chinese government to use cameras to be the “number one country for espionage.”
And it’s not just about government facilities: “Even on the street, [cameras] have the potential to inadvertently contribute toward Chinese espionage activity by providing real-time information about the situation on the ground,” says the Australian TV report.
If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies?
If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies, or at least those with electronics or computer products that could be used for espionage? What about the espionage potential of the 70% of mobile phones that are made in China?
What about other consumer electronics such as PCs or smart TVs? How many government facilities that are eliminating Dahua and Hikvision cameras have employees who use iPhones or use other electronic equipment from China?
Artificial Intelligence & IP-Over-Coax
Also, consider the impact of the ban on business. Hikvision and Dahua have had many successes in the video surveillance market, including in the U.S. market. They have added value to many integrators and end user customers. They have been on the forefront of important trends such as artificial intelligence and IP-over-coax. And, yes, they have made technologies available at lower prices.Cybersecurity issues have plagued several companies in the industry, not just Hikvision and Dahua
Cybersecurity issues have plagued several companies in the industry, not just these two, and both Hikvision and Dahua have worked to fix past problems, and to raise awareness of cybersecurity concerns in general.
Is a U.S. ban on two companies an appropriate response to a series of geo-political concerns that are much bigger than those two companies (and bigger than our entire market)? Should two companies take the brunt of the anti-Chinese backlash?
Video Surveillance Cameras
Is the video surveillance market as a whole better or worse for the presence of Hikvision and Dahua? Is it up to the U.S. government to make that call?
In some ways, thoughts of Chinese espionage are a sign of these uncertain political times. Fear of video surveillance is perfectly congruent with long-standing anxieties about “Big Brother;” suspicion about China taking over our video cameras just rings true at a time when Russia is (supposedly) controlling our elections. But should two companies be targeted while broader concerns are shrugged off?
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk.
Effective Response Plan
In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign.
Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze.
Assessing Threats For Prevention
Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data!
With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way.
Social Media Monitoring
Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile
Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response.
Locating A Threat
Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order.
This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response.
Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective.
Security teams can quickly see if there are actual threats to the organizations or communities they are protecting
Acting And Automating
The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out.
Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm.
Summon Security Guards
Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert
Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene.
Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses.
Analysis Of A Threat
Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again
It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly?
With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike.
Coordinate Emergency Response
Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze.
Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
TIANDY Technologies, global supplier of versatile surveillance solutions catering to customers from enterprise to entry level, has announced the execution of a distribution agreement with SecureNet, one of the premier value-added IT Surveillance, cybersecurity and video conferencing distributors (VAD) in the United Arab Emirates. SecureNet will promote TIANDY's complete portfolio of surveillance solutions to its network of channel partners throughout the Middle East region.
TIANDY-SecureNet Collaborate On Surveillance TIANDY innovative offerings directly address the surveillance market challenges surrounding Artificial Intelligence and Deeper Learning"
"We are very excited about our new partnership with TIANDY Technologies and adding their portfolio of surveillance solutions to our line card, "said Avinash Wadhwa, VP Strategic Alliances & Business Development of SecureNet. “TIANDY innovative offerings directly address the surveillance market challenges surrounding Artificial Intelligence and Deeper Learning which are at the forefront with our customers. With the addition of the TIANDY family of surveillance products and our joint collaboration with eco-system partners, we can provide some of the most innovative solutions to the market today. TIANDY is an outstanding addition to our portfolio and it will help to provide our channel partners with leading-edge surveillance solutions making them more competitive."
We are pleased to be announcing this partnership with SecureNet. SecureNet's experience and expertise in IT Security and IT Surveillance market in the Middle East makes them the perfect choice upon which to build a solid foundation for success, said John van den Elzen, General Manager EMEA for TIANDY Technologies. Van den Elzen continued, "Deploying our turn-key surveillance solutions with SecureNet's high professional services dramatically expands our ability to address the demands of commercial accounts. We look forward to a sustained and mutually beneficial relationship."
Hoverfly Technologies Inc., global supplier of tether-powered aerial drone systems, is pleased to announce it has engaged retired Deputy Chief of Los Angeles Police Department Mike Hillmann to consult and provide expertise to Hoverfly and public safety officials of cities, counties and special law enforcement agencies who are considering the use of Small Unmanned Aerial Systems (sUAS) to assist in keeping their cities safe.
Small Unmanned Aerial Systems (sUAS) When incidents and/or events happen, having ‘real-time, situational awareness’ from above the scene is critical to managing risk and upholding public safety
“With 24-hour news cycles, a never-ending stream of social media posts, mid-term elections and potential threats to the public at large, getting fast, accurate situational awareness from the air during an incident has never been more important when it comes to keeping the public safe. We are thrilled to have Chief Hillmann advising on use cases and how best to implement and integrate this new technology,” says Hoverfly SVP of Systems, Lew Pincus.
When incidents and/or events happen, having ‘real-time, situational awareness’ from above the scene is critical to managing risk and upholding public safety and the safety of those who serve our communities.
He adds, “We typically have relied on manned aircraft to provide aerial coverage over a variety of incidents. On occasion, those assets have not always been available, deemed too disruptive or too expensive to deploy in certain situations where an aerial view clearly could have helped an incident commander better understand the situation. Deploying small tether-powered, highly portable, unobtrusive persistent cameras positioned high above the scene can now be used as either a standalone capability or integrated system with existing networks, security infrastructure and even manned aircraft.”
Hoverfly tether-powered sUAV (Small Unmanned Aerial Vehicles) systems solve short battery-life problems associated with free-flying dronesToday, Mr. Hillmann is helping chiefs of police, local city and county officials and other public safety personnel understand how Hoverfly’s tether-powered LiveSky systems can be deployed from police or EMS vehicles providing incident commanders with actionable intelligence from high above the scene within minutes of arrival. “Tactically, having the ability to stay in the air monitoring the situation from above for hours, days, even weeks at a time represents an amazing capability we never had before. During my career, I can think of hundreds of situations where having a drone in the air to provide real-time intelligence, surveillance and reconnaissance would have helped keep my officers and the community much safer. It’s a force multiplier that should be exploited by public safety,” says Hillmann.
Hoverfly’s LiveSky Systems
Hoverfly tether-powered sUAV (Small Unmanned Aerial Vehicles) systems solve short battery-life problems associated with free-flying drones because they operate using a standard 120VAC power source or vehicle inverter. The power, command and control information and video are transmitted over the tether making the entire system completely secure from jamming, hacking or spoofing, ensuring the privacy of the data and improving safety. Perhaps the biggest benefit of Hoverfly systems is they are autonomous and require no piloting skills. The CEO of Hoverfly likes to say, “if you can operate an elevator, you can operate our LiveSky system.”
As prime targets for criminals, banks have always faced major security challenges. But today, when banks are pressed to increase revenues, improve operational efficiency, and mitigate risk, defending against security threats is increasingly expensive. Two key drivers in the banking sector are customer trust and operational efficiency. Both are significantly strengthened by a quality integrated ‘smart’ banking security solution.
Smart Banking Security Solution
A robust security strategy is of the highest priority and is usually embedded within the bank’s Risk Management Plan. This enables banks to manage operational risk and compliance demands. The modern approach to bank security design incorporates IT, Channel Management and Identity and Access Management systems into one solution.
At the heart of Vanderbilt, systems are compliance with some of the highest industry and regulatory standards. These systems impact all bank functions and help deliver greater trust, operational efficiencies, and excellent customer experience.
Vanderbilt Video Surveillance Vanderbilt can provide live video surveillance that continuously monitors and provides quality images should a suspicious event need to be investigated
In the bank’s self-service area, Vanderbilt can provide live video surveillance that continuously monitors and provides quality images should a suspicious event need to be investigated.
Meanwhile, Vanderbilt’s Seismic detectors protect ATM's 24/7. These detectors give immediate and reliable alerts of attacks on the enclosure, but unlike other detectors, do not register false alarms triggered by passing traffic or the vibrations of the ATM itself.
Seismic Detectors And Interlocking
Electronic security measures are also used in other banking situations – for example, when a customer claims he tried to withdraw cash from an ATM and was issued a receipt, but no cash – the bank can check with a specialized data department to ascertain whether the money was deducted from the customer’s account.
When a staff member unlocks the vault, the door to the secured area simultaneously locks
Unique codes grant workers who fill ATMs access to secured areas and the ability to unlock ATM's. The worker's code over-rides any ‘delayed unlock function,' so he can immediately access the ATM and fill it. There are set time limits for the work to be done. The ATM buzzes for a pre-determined time before the machine is due to auto-lock. If the worker needs more time, he can delay this. Once the job is done – the ATM automatically locks.
Another example of bank security involves interlocking. When a staff member unlocks the vault, the door to the secured area simultaneously locks. This prevents anyone else from gaining entry until the vault is once again locked. This ensures the safety of staff members and the security of vault contents.
There are many layers of electronic security protecting the bank. If the manager arrives early, he uses his card to gain access to the branch office and a PIN to disarm the alarm. His code disables the office and secure area, but the ATM's, vaults and safe deposit boxes remain armed. A Central Monitoring Station is alerted to the early entry. They need to know whether the entry is routine or under duress. The monitoring station views the manager on live video as he executes a pre-determined security procedure and until he hits an ‘All is OK' button. If there is a problem – the manager can send a silent ‘Duress Alarm' rather than the ‘All is OK.' The Monitoring Station can listen in – and if necessary can call the police.
Security in banking is an essential issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability – flagship traits of the Vanderbilt brand. Banks wish to operate in an open and friendly layout while ultimately safeguarding their customers, staff, and assets. Vanderbilt's solutions respond to these expectations and enable active safeguarding foundations to be laid.
Established by the French Government’s Ministry of Finance and Economics, the ACCORD project was commissioned to design and implement financial system modernization. The charter of the ACCORD initiative team, composed of representatives from multiple government ministries, is to architect solutions that enable the French government to manage the finances of the country with the same level of accountability as private sector enterprises. The technology-based infrastructure selected was a smart card solution to confirm and authenticate users across 40 departments.
HID Global’s Identity Assurance Software
The systems operated in parallel but could not leverage the benefits of a unified system.
AIFE – Agence pour l’Informatique Financière de l’Etat – chose HID Global’s Identity Assurance software coupled with smart cards for the solution.
Ensuring users are ‘who they say they are’ over the course of several decades, individual French government departments had developed separate and distinct applications to manage activities such as budgeting, processing purchase orders, and other accounting activities. The systems operated in parallel but could not leverage the benefits of a unified system.
Enterprise Resource Planning System
With the inception of the ACCORD project, the government committed to streamlining finance management by moving to one system for centralized control of the country’s budgeting and finance operations – with a goal that by 2004, all government central entities will be using the standard Enterprise Resource Planning (ERP) system. The transition to an online application that consolidates financial reporting and transactions requires an organization to determine how it will identify users with certainty prior to granting them access to the system and to valuable data.
The solution must be easy to use to ensure departmental acceptance of the new application and authentication process. It must also minimize the IT staff time required for day-to-day administration and helpdesk activities for a large population over 7,000 dispersed users. These multiple challenges presented an opportunity to leverage proven digital identification solutions from HID Global.
Smart card-based PKI Identification Solution
HID Global’s Security Client software solution and smart card readers are key elements for securing the finance system at all user points of entrySmart card-based solution using digital certificates with PKI, The French government-wide implementation securely links multiple departments, such as the Ministries of Education, Justice, Transportation and Housing, and Foreign Affairs, to the unified ERP application, enabling the exchange and ultimate consolidation of digital information.
In 2000, the Ministry of Finance began deploying HID Global’s smart card-based PKI solution. HID Global’s Security Client software solution and smart card readers are key elements for securing the finance system at all user points of entry – any of which could become a source of fraudulent or malicious activity in the absence of strong authentication and confirmation of digital identity. Today, employees regularly use the card with a microchip that holds their unique credentials in the form of an Entrust digital certificate.
HID Global’s Gold Entrust-Ready certification ensures a smooth deployment to large numbers of users, and the combined solution with Entrust TruePass delivers the following benefits:
Enhanced Security: HID Global’s multi-factor authentication reinforces the fundamental security and intent of a PKI by requiring something the user has (a smart card) and something the user knows (a PIN code) in order to use the private keys stored on the card. To further enhance security, the key pair is generated on the cryptographic smart card itself, so that the private key is never exposed to the insecure PC environment. The tight integration of HID Global’s client software with Entrust ensures certificate key updates are transparently and automatically made on the card.
Non-Repudiation: To support non-repudiation, it is essential that ERP system users provide undeniable proof that they are who they say they are. Keys used for that authentication can never be stored on the potentially vulnerable user workstation. Those sensitive keys must remain under the sole control of the user, and HID Global’s client software ensures private keys are generated on the card and remain in the rightful owner’s possession at all times.
User Simplicity: HID Gobal’s Security Client software provides a familiar ATM-like user interface that makes complex digital identity and PKI technologies transparent, so employees can focus on their work responsibilities and financial application activities to easily access the system. HID Global’s commitment to openness and industry standards ensures that the French Government’s initial investment in digital identity products and smart card client software infrastructure is capable of supporting multiple PKI vendors and other forms of identity credentials in the future.
STANLEY Security, one of the most trusted names in the world of security, has provided a photography studio in Knowsley, Merseyside, with a top class wireless Ricochet technology-based alarm system financed through STANLEY Assure.
Studio Argent is a 5,000 ft. sq. studio that houses and uses state-of-the-art digital equipment to produce creative and commercial photography for numerous large national and international clients, making security of their premises a priority.
Ricochet Wireless Networking Technology
STANLEY Security installed a modern intruder alarm system based on STANLEY’s Ricochet technology. This next generation wireless networking technology operates by receiving repeated wireless transmissions from devices located throughout the studio building to ensure that even the remotest areas are secured. Furthermore, any weak signals between devices prompt the Ricochet network to self-heal and automatically re-route communication so that the studio is protected at all times.
STANLEY Security recommended the studio’s existing aging intruder alarm system be replaced, with the costs covered under STANLEY Assure
STANLEY Security recommended the studio’s existing aging intruder alarm system be replaced, with the costs covered under STANLEY Assure. STANLEY Assure is a finance solution for customers wishing to benefit from up to date security technology without the risks of ownership and with evenly spread, manageable payment terms with no hidden extra costs. Additionally, included is a full monitoring package for total peace of mind.
STANLEY Intruder Alarm System
STANLEY Assure removes the need to justify and raise significant capital outlay in a depreciating asset. Instead, STANLEY will buy back and take over an existing security system, upgrade it to incorporate the latest security technology, and then hire it back for usage. It provides an affordable means of upgrading a complete security system.
Studio Argent not only benefitted from STANLEY Security’s product technology, but also gained access to STANLEY’s NSI Gold accreditation ProtectionNet Customer Service Center (PNC) as a part of the contract. As a result, Studio Argent receives 24/7, 365 days a year monitoring and immediate customer care.
The ease of usage of the new STANLEY intruder alarm system allows Studio Argent to activate the system in under five minutes
Mesh Technology and Reduced False Alarms
The ease of usage of the new STANLEY intruder alarm system allows Studio Argent to activate the system in under five minutes, while previously the process took approximately 40 minutes. Furthermore, whereas the old system was hypersensitive and would often be set off by mice and moths in the building, the new system, relying on latest mesh technology, ensures no false alarms occur while offering airtight security which is easily scalable, should the studio expand its premises.
After repeatedly having to pay additional, hidden costs to the previous security supplier for patch up work to the studio’s 20-year-old alarm system and dealing with subpar service which in one incident breached the national code of conduct for UK Alarm providers, Studio Argent was pleased to make the cut and move to a reliable security provider.
John Organ, Owner of Studio Argent, happy with the move to STANLEY’s new alarm system said, “From the knowledgeable and expert representatives who contacted me to the total peace of mind and ease of operation that it offers, I feel that STANLEY Assure has really changed my life. I would not hesitate in recommending STANLEY to anyone.”
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?
Finding the exact right technology to solve an end user’s problem is challenging, but the rewards are great when an integrator gets it right. A wide range of available product types, price levels and added features increases the likelihood of identifying a technology to solve any problem. But with so many technology and product choices in the marketplace, identifying that one solution can be akin to finding a needle in a haystack. We wondered whether a vast range of product choices is always a good thing. We asked this week’s Expert Panel Roundtable: Are security integrators and end users overwhelmed by “too many choices” related to security equipment and systems? How can they make sense of it all?
Consolidation – a decrease in the number of companies in a market achieved through mergers and acquisitions (M&A) – has been an important trend among manufacturers in the physical security market for many years. More recently, the trend has also appeared to extend to the integrator market. Larger integrators have been buying up other large integrators; in some cases, they have also been buying up smaller, regional integrators to expand their geographic coverage area. We wondered if this week’s Expert Panel Roundtable has noticed the trend. We asked: Has consolidation among security companies shifted to the integrator/installer market? What is the impact?