Cobalt Iron Inc., global provider of cloud-based data protection and security solutions, has announced that it has received a patent for its techniques related to electronic discovery (e-discovery) when searching for data in backup storage. Solidifying Cobalt Iron's advanced enterprise-data discipline capabilities and providing further proof of it, this patent represents the company's unique approach to managing backup data sets to facilitate e-discovery requests. As a result, CIOs, data custodians, compliance officers, systems administrators, backup administrators, and other IT professionals who use Cobalt Iron's Adaptive Data Protection platform can fulfill e-discovery requests more quickly and cost-effectively, with verifiable data discipline. Adaptive Data Protection platform Among the largest data targets for e-discovery searches in most enterprises are backup data sets In today's business and regulatory climate, it is essential for enterprises to be able to respond to e-discovery requests in a timely, comprehensive, and cost-efficient manner. Among the largest data targets for e-discovery searches in most enterprises are backup data sets, which typically contain copies and versions of all key corporate data. Performing e-discovery data searches on these enterprise backup data sets can be complex, time-consuming, and very costly. Enterprise data custodians struggle with balancing the demands of legal e-discovery requests against the challenges and costs of performing the searches. e-discovery in backup data This Cobalt Iron patent unveils novel techniques for facilitating electronic discovery in backup data including: - Extracting metadata from a backup data set for e-discovery - Efficiently identifying a subset of data within a backup data set associated with an e-discovery request - Performing data reduction on data targeted by an e-discovery request - Preserving a native file format and a chain of custody for each data item in a backup data set identified by an e-discovery request - Applying e-discovery and backup policies to data identified by an e-discovery request - Automatically copying e-discovery data that is about to be deleted or modified within a backup data storage e-discovery techniques "Cobalt Iron's new electronic discovery techniques bring insights and efficiencies to corporate data custodians, allowing them to manage e-discovery requests more effectively and introduce new levels of data discipline," said Richard Spurlock, CEO and founder of Cobalt Iron. "Preserving native file formats, maintaining a chain of custody, and applying e-discovery policy for each data item identified by an e-discovery request greatly simplifies the arduous tasks associated with regulatory compliance."
TrackTik Software, provider of the No. 1 security workforce management software solutions internationally, has announced that its Vice President, Security Industry Mark Folmer has been selected as the third most influential thought leader on the IFSEC Global Influencers in Security and Fire 2019 list. Driving technology innovations This list, unveiled by the UK-based International Fire and Security Exhibition and Conference, the premier integrated security event — features executives who have significantly influenced the security sector. This includes individuals who have played a key role in driving technological innovation and best practices, shaping debate around industry issues, propelling the success of their organization, and helping to raise the industry’s profile. Folmer made it on to the list after being judged by a leading panel of industry experts - which he will be joining next year. Folmer, who took third spot on the 2019 thought leadership list — up from placing 19th in 2018 — was recognized as a security leader and forward-thinking influencer, committed to shaping the future of the industry as a practitioner, consultant, technology disruptor and university instructor. In his role at TrackTik Software alone, he is a trailblazer in advocating for the professionalisation of the industry Importance of data to drive security In his role at TrackTik Software alone, he is a trailblazer in advocating for the professionalization of the industry and reinforcing the importance of data to drive security organizations forward. By so doing, he has helped security organizations globally transform their operations to unprecedented levels of intelligence and efficiency. Within TrackTik, he also serves as an industry evangelist ensuring that the company stays up-to-date with the industry’s best practices and standards. A business school graduate with Certified Protection Professional (CPP) and The Security Institute (FSyI) certifications, Folmer gained status as a security services specialist through two decades of operations and volunteer experience. A Senior Regional Vice President for ASIS International’s Region 6, Canada, and Chair of the ASIS Security Service Council — an international group focused on security service delivery standards — he is a keen industry speaker and media spokesperson, committed to sharing his knowledge with the next generation of security professionals in his teaching role at Université de Montréal. Data protection expert Folmer’s selection follows a long list of recognitions attained by TrackTik Software. Most recently, the company’s CEO Simon Ferragne was presented an award for the Next Generation Executive Leadership by the Canadian Advanced Technology Alliance (CATAAlliance) and was named a Top 10 under 40 Security Leader by Canadian Security Magazine. In 2018, TrackTik Software was ranked No. 11 on the Deloitte Technology Fast 50 list, was named one of LinkedIn’s Top 25 Startups in Canada, placed 36th on the Canadian Business 2018 Startup 50 ranking of Canada’s Top New Growth Companies, and received a SaaS Award for Customer Success by San Diego-based APPEALIE.
NTT Security, the specialized security division and center of excellence in security for NTT, announced that it has completed the acquisition of WhiteHat Security, an application security provider committed to securing applications that run enterprises’ businesses. The acquisition will strengthen NTT Security’s ability to address modern enterprise security needs that range from IT infrastructure to critical business applications, covering the full lifecycle of digital transformation. Importance of application security As part of the NTT Security family, we are well-equipped to provide global solutions"As part of the completed transaction, WhiteHat Security will continue to operate as an independent, wholly-owned subsidiary. NTT Security is one of 28 remarkable companies to be brought together to become a global leading technology services provider, NTT announced on 1st July 2019. Formed to work with organizations around the world, NTT enables its clients to shape and achieve outcomes through intelligent technology solutions and champions a more secure and connected future. “With the cyberthreat landscape constantly growing and applications being central to digital businesses, application security is more important now than ever before. As part of the NTT Security family, we are well-equipped to provide global solutions to meet the rising demand for application security,” said Craig Hinkley, CEO, WhiteHat Security. “The WhiteHat Security team looks forward to the next phase of our journey. Our customers, partners and the market continue to appreciate the strategic nature of this acquisition and the combined cybersecurity solutions we can now offer.” Cybersecurity solutions to protect businesses We look forward to formally welcoming the global WhiteHat Security team and its impressive customer-base to NTT Security"“At NTT Security, our goal is to provide comprehensive, game-changing cybersecurity solutions that address the broad needs of digital transformation. With the acquisition of WhiteHat Security, we are now able to offer the full spectrum of cybersecurity solutions to protect digital businesses,” said Matthew Gyde, CEO, NTT Security. “We look forward to formally welcoming the global WhiteHat Security team and its impressive customer-base to NTT Security.” Recent accolades for WhiteHat Security include being recognized as a Bronze Stevie Award winner in the Most Innovative Tech Company of the Year category for the 17th Annual American Business Awards; being named a finalist in the White Hat category of the inaugural Channel Partners Excellence in Digital Services Awards; receiving a 5-Star rating in CRN’s 2019 Partner Program Guide; and earning top recognition in three categories from Cyber Defense Magazine’s 2019 InfoSec Awards: Best Product, Web Application Security; Most Innovative, Software Security Tools; and Best Product, Application Security Testing.
Arecont Vision Costar, the provider of network-based video surveillance solutions, announces the addition of Desjardins Technologies to its Authorized Manufacturer’s Representative Program to increase coverage for customers in Canada. Desjardins Technologies will deliver French and English pre-sales support in much of Eastern Canada, including the National Capital Region and the provinces of Quebec and New Brunswick. “Desjardins Technologies brings a wealth of experience in both the Ottawa area and throughout the provinces of Quebec and New Brunswick,” said Kyle Parker, Vice President, Americas, Arecont Vision Costar. “They offer expertise in both security and home automation systems that will be of benefit to our customers in this part of Canada, including for training and design assistance in both English and French.” Video surveillance products I look forward to the opportunity to bring the company’s solutions to customers throughout the Ottawa area" Based in Blainville, Quebec, CEO and Founder Jean Pierre Desjardins brings twenty-five years of experience providing outstanding pre-sales support and assistance to customers across the region. “Arecont Vision Costar and its web-enabled Total Video Solution are an ideal fit for those in the region who are looking for proven video surveillance products combined with an easy to deploy and manage offering,” stated Mr. Desjardins. “I look forward to the opportunity to bring the company’s solutions to customers throughout the Ottawa area and across both Quebec and New Brunswick.” Cloud-Enabled offering “Jean Pierre and his team will enable Arecont Vision Costar to reach many new customers in this region for the first time,” stated John Bujarski, Senior Regional Sales Director, Arecont Vision Costar. “Our Total Video Solution is proven, simple to deploy, and a truly modern cloud-enabled offering that will benefit those in this part of Eastern Canada, just as it has across the United States and around the world.” Desjardins Technologies and the other members of Arecont Vision Costar’s Manufacturer’s Representative Partner Program are focused on bringing the industry’s best, cyber-secure video surveillance offerings to their assigned regions. Participants in the program extend the reach of Arecont Vision Costar by providing expert pre-sales assistance while interfacing with and educating customers, system integrators, and distributors on available solutions for even the most challenging video surveillance requirements.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organization's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organizations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realizing it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyze a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analog technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organization open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organization is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organization is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organizations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organization, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR world. Large cloud environment But modern applications are difficult to secure. SaaS based, web, mobile, or custom made all work on different platforms and frameworks. It’s a headache managing all the APIs needed to automate and sync tools. This introduces risk. The greater the number of apps the broader the attack surface and therefore the greater the chance there will be blind posts. Keeping up to date with updates and new security policies is never easy There are also added hazards. Applications are always changing. Keeping up to date with updates and new security policies is never easy, but especially hard in a large cloud environment. Failure to adopt changes puts the organization and customers at further risk. But the biggest obstacle is keeping applications and APIs out of harm’s way. It’s a near on impossible task when attack methods and sources are constantly changing. More advanced threats To be specific there are four emerging challenges when it comes to protecting apps. Firstly, managing the good and the bad bots and spotting which is which, secondly securing APIs as IoT adoption intensifies, thirdly the relationship between securing apps and DevOps and ensuring ownership of security, and finally denial of service attacks that use newer tactics such as brute force. Basic security hygiene dictates that security teams refer to the OWASP Top 10. It’s considered the ‘ten commandments’ in security circles, providing a starting point for ensuring the most common threats and vulnerabilities are managed, detected and mitigated. Web Application Firewalls also come into the fray with guidance on testing for the ways hackers exploit vulnerabilities. However, though the basics are good to have in place, there are always more advanced threats to take care of. Bots being a big one. Bot management The more sophisticated bots will go as far as to mimic human behaviorAstonishingly about half of internet traffic is bot generated. Half of it is from bad bots. Discerning the good from the bad isn’t easy though and explains why around 80% of organizations can’t make a clear distinction between the two. Bad bots can do a lot of damage like take over user accounts and payment information, scrape confidential data, or hold up inventory and skew marketing metrics. The more sophisticated bots will go as far as to mimic human behavior and bypass tools like CAPTCHA and even device fingerprinting based protection ineffective. Securing APIs Then there’s the complications derived from machine-to-machine and internet of things (IoT) communications. The more integrated ‘things’, the more data there is, the more events there are report on, and the more activity there is reliant on APIs to make the ‘things’ useful and agile. That’s what makes them a target and the threats to API vulnerabilities include injections, protocol attacks, parameter manipulations, invalidated redirects and bot attacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks Denial of service (DoS) You might think there’s little to add to the swathes of denial of service warnings. Yet when businesses are still being targeted and feeling the ill effects it’s worth mentioning again that different forms of application-layer DoS attacks are still very effective at bringing application services down. Even the greatest application protection is worthless if the service itself can be knocked down This includes HTTP/S floods, low and slow attacks (famous examples being Slowloris, LOIC, Torshammer), dynamic IP attacks, buffer overflow, Brute Force attacks and more. The IoT botnets are the culprits and have made application-layer attacks so popular that they have become the preferred DDoS attack vector. Even the greatest application protection is worthless if the service itself can be knocked down. Continuous security It may seem easy to say but for modern DevOps, agility is valued at the expense of security. We see time and again examples of where development and roll-out methodologies, such as continuous delivery, mean applications are exposed to threats each time they are modified. There’s no doubt it is extremely difficult to maintain a valid security policy and protect sensitive data in dynamic conditions without creating a high number of false positives. But we now find that this task has gone way beyond the capability of humans. Organizations now need machine-learning based solutions that map application resources, analyse possible threats, and create and optimise security policies in real time. Reaching this level in security planning should be a big wake-up call that security automation is an essential not a nice to have. Running security plans The board needs to know that investment is critical to protect their profits It’s critical that the security solution your company adopts protects applications on all platforms, against all attacks, through all the channels and at all times. The board needs to know that investment is critical to protect their profits. As such there are six things they need to know: Application security solutions must encompass web and mobile apps, as well as APIs. Bot management solutions need to overcome the most sophisticated bot attacks. DDoS mitigation must be an essential and integrated part of application security solutions. A future-proof solution must protect containerized applications, severless functions, and integrate with automation, provisioning and orchestration tools. To keep up with continuous application delivery, security protections must adapt in real time. A fully managed service should be considered to remove complexity and minimise resources. No amount of human power will beat the bots. That last point is the most critical. Skill is essential in designing and running security plans and policies that work. But the plans can’t be executed without automated tools. There are just too many decisions to make in a split second. Combining both is the path to an effective app protection strategy and a stronger brand to boot.
Several video manufacturers have participated in the development of a U.K. 'Secure by Default' baseline standard to ensure cybersecurity measures are included in equipment as it leaves the factory. The standard includes ensuring that passwords must be changed from the manufacturer default at start-up, that chosen passwords should be sufficiently complex to provide a degree of assurance, and that controls are placed around how and when remote access should be commissioned. The standard aims to ensure security products are cyber- and network-secure by default and out of the box. The concept is that network video products will ship to installers in the most hardened, cyber-security-optimal form possible, with default settings that provide minimal vulnerabilities on first use. Secure by Default is a self-certification scheme that allows manufacturers to assess their systems for compliance and to apply for the U.K. Surveillance Camera Commissioner’s Secure by Default mark. The mark demonstrates to installers and customers that they are a competent manufacturer who takes the security of their products seriously. The Secure By Default mark demonstrates to installers and customers that they take the security of their products seriously Axis, Bosch, Hanwha, HikVision and Milestone Systems participated in developing the standard, which was officially unveiled at the IFSEC 2019 show. “The launch of the standard is not the end of the journey, but rather the beginning of something unique, exciting and vital for the future success of video surveillance,” says cybersecurity consultant Mike Gillespie, who works with the National Surveillance Camera Strategy for England and Wales. The standard has been developed so as not to present a barrier to entry The manufacturer standard is intended to lay out the basic areas where all video surveillance systems should be secure, regardless of their intended use, whether in public space or not, says Gillespie. “This is very much intended to be an entry-level standard and has been written with the intention of providing [video] manufacturers with a minimum baseline level all should aspire to,” he says. The standard has been developed so as not to present a barrier to entry for any competent and responsible manufacturer, he adds. The Secure by Default standards form part of a wider set of cyber security proposals from the Surveillance Camera Commissioner for the UK Home Office. Adoption within the industry Hanwha Techwin has embraced Secure by Default as part of its comprehensive approach to cybersecurity. “Although we appreciate security needs to be easy to implement, we do not allow for a default password to be used,” according to Hanwha Techwin. “We consider it essential that a secure password be set up during the initial installation process, which is why we prohibit the consecutive use of the same letter or number and we encourage the use of special characters as well as a combination of letters and numbers.” Hanwha Techwin’s approach has been to make security a fundamental feature of cameras and recording devices. Cybersecurity has been taken into account at the start of the design and development process, and not just treated as an optional feature. Article 25 mandates that organizations put in place appropriate technical and organization measures Axis is aligned with the Secure by Default principles recommended by the U.K. National Cybersecurity Strategy Code of Practice. Furthermore, General Data Protection Regulation (GDPR) makes data protection and security by design and default a legal requirement. Article 25 mandates that organizations put in place appropriate technical and organization measures designed to implement data protection in an effective manner. Gary Harmer, UK and Ireland Sales Director for Hikvision, said the new Secure by Default scheme is a further positive step forward for the industry, one which Hikvision fully supports. “The process of developing these standards has been one of open collaboration between companies across the network video security industry,” he said. “It’s a truly positive and genuine initiative geared towards creating a more secure environment for all stakeholders in the network security ecosystem.”
Time for an indepth review of IFSEC 2019 in London. This show had fewer exhibitors than previous shows, and the ‘vibe’ was definitely more low-key. Fewer exhibitors meant larger aisles and plenty of room to breathe, and the slower pace provided time for exhibitors to reflect (often negatively) on the return on investment (ROI) of large trade shows. There was little buzz on the first day of the show, but spirits picked up on the second day (when, not coincidentally, some exhibitors served drinks to attendees at their stands). Enterprise security solutions One eye-catcher was smart wireless security provider Ajax Systems’ stylish black stand Many exhibitors compared IFSEC unfavorably to ISC West in the United States and even to Intersec in Dubai. Others seemed willing to be lured back to Birmingham (previous location for IFSEC) to participate in the upstart competitor, The Security Event, next spring. However, not all the IFSEC 2019 reviews were negative. Vaion made the most of their small stand toward the back of the hall. They experienced brisk traffic right up until the end of the show. Happy with the response, the provider of real-time enterprise security solutions reportedly has already committed to IFSEC 2020. Other exhibitors also made the most of their space at IFSEC; one eye-catcher was smart wireless security provider Ajax Systems’ stylish black stand. Vaion made the most of their small stand toward the back of the hall Latest new products Nedap launched a new product, AEOS 2019.1, that is five time faster and more stable than its predecessor. It uses HTML5 – no more reliance on Adobe. Feedback has been good. The company has also increased its integration of open security standards (OSS). Traka showcased smart lockers, which are modular, scalable, and staff can easily replace broken equipment. Product features can be adapted to specific sectors (i.e., retail, prisons). Traka spends 30% of its revenue on research and development, developing their own engineering. The company has seen massive growth in the UK and Europe. Hanwha Techwin lured visitors into the centre of their stand with drinks and ice cream, surrounded by the latest new products. Hanwha promoted their investment in a manufacturing facility in Vietnam and showcased Wisenet cameras with enhanced 4K images, digital auto tracking, and less motion blur for clearer images. Video verification product A multi-sensor model captures wide areas with a single camera. Hanwha also offered some value-priced cameras that feature easy self-install and are swappable. Optex launched a new product called ‘the Bridge’, a video verification product that bridges CCTV on a digital video recorder (DVR) to intruder alarms. Hanwha showcased Wisenet cameras with enhanced 4K images UK Surveillance Camera Commissioner Tony Porter announced ‘Security By Default’, a set of minimum requirements that will guarantee users that network video security products are as secure as possible in their default settings right out of the box. Hikvision promoted their support for Secure by Default and expressed hopes the initiative would be embraced by other companies and create a new best practice for camera cybersecurity. Hikvision also promoted their retail solution, which includes on-site redaction for GDPR compliance, shelf detection incorporating artificial intelligence, and use of heat mapping to analyze customer foot traffic. Generating revenue Safety and Security Things (SAST), another IFSEC exhibitor, is in the process of creating an ‘app store’ for the security market. Striving to achieve critical mass with participation by a wide range of systems integrators and manufacturers, SAST has a goal of launching to the public in Q1 next year in time for ISC West. Hanwha Techwin is among the players that have already joined the alliance A pilot version will debut this autumn, and they already have 26 apps and six camera manufacturers toward that goal. With a staff of 120, mostly based in Munich, SAST expects to begin generating revenue in 2020 and to grow rapidly. An investment by Bosch is financing start-up operations. Open Security & Safety Alliance (OSSA) is creating standards and a platform to enable the sale of apps in the security market. Large industry players Hanwha Techwin is among the players that have already joined the alliance, and OSSA is seeking to add other large companies, such as Axis, Genetec and Hikvision. Engaging integrators, app developers and software providers as well as camera manufacturers will generate widespread support to ensure the initiative succeeds. Although currently most OSSA members are based in the EU and Asia, it is a global organization open to any company in the world. Many large industry players are now missing from the IFSEC show floor; the most noticeable new abstainer this year was Milestone. And the downturn seems likely to continue: Exhibitors were largely noncommittal about returning next year, although organizers were urging them during the exhibition to sign up for 2020.
IFSEC Global, like any large trade show, can be daunting for attendees. At big shows, there can be hundreds of physical security manufacturers and dealers vying for your attention. As the scope of physical security expands from video surveillance and access control to include smart building integrations, cybersecurity and the Internet of Things (IoT), there is an increasing amount of information to take in from education sessions and panels. With IFSEC Global approaching next week, we present eight hints and tips for visitors to make the most out of trade shows: 1. Outline Your Objectives As the famous saying goes, “Failing to plan is planning to fail!” Once you know your objectives, you can start to research who is exhibiting Before you plan anything else, ensure you know what you need to achieve at the show. By clearly noting your objectives, you will be able to divide your time at the show appropriately, and carefully choose who you speak to. If there is a particular project your organization is working on, search out the products and solutions that address your security challenges. If you are a security professional aiming to keep up with the latest trends and technologies, then networking sessions and seminars may be more appropriate. 2. Bring a standard list of questions Prepare a list of specific questions that will tell you if a product, solution or potential partner will help you meet your objectives. By asking the same questions to each exhibitor you speak to, you will be able to take notes and compare their offerings side by side at the end of the day. This also means you won’t get bogged down in details that are irrelevant to your goals. 3. Do your homework Once you know your objectives, you can start to research who is exhibiting and decide who you want to talk to. Lists of exhibitors can be daunting, and don’t always show you which manufacturers meet your needs. Luckily, most trade show websites provide the option to filter exhibitors by their product category. Once you know your objectives, you can start to research who is exhibiting and it may be easier to download the floor plan to your phone/tablet Many exhibitions also offer a downloadable floor plan, grouping exhibitors by product category or by relevant vertical market. It may be easier to download the floor plan to your phone/tablet or even print it out, if you don’t want to carry around a weighty map or show-guide. 4. Make a schedule Once you have shortlisted the companies you need to see, you can make a schedule that reflects your priorities. Even if you are not booking fixed meetings, a schedule will allow you to effectively manage your time, ensuring you make time for the exhibitors you can’t afford to miss. When scheduling fixed meetings, keep the floor plan at hand If the trade show spans several days, aim to have your most important conversations early on day one. By the time the last afternoon of the show comes around, many companies are already packing up their booth and preparing to head home. When scheduling fixed meetings, keep the floor plan at hand to avoid booking consecutive meetings at opposite ends of the venue. This will ensure you can walk calmly between stands and don’t arrive at an important meeting feeling flustered! 5. Make time for learning If you’re on a mission to expand your knowledge in a given area, check the event guide beforehand to note any education sessions you may want to attend. Look for panels and seminars which address the specific needs of your project, or which will contribute to your professional growth. This is one of the best opportunities you will have to learn from industry leaders in the field. Be sure to plan your attendance in advance so you can schedule the rest of your day accordingly. Check the event guide beforehand to note any education sessions you may want to attend and be sure to plan your attendance in advance 6. Keep a record Armed with your objectives and list of questions, you will want to make a note of exhibitors’ responses to help you come to an informed decision. If you’re relying on an electronic device such as a smartphone or tablet to take notes, you may like to consider bringing a back-up notepad and pen, so you can continue to take notes if your battery fails. Your record does not have to be confined to written bullet points. Photos and videos are great tools remind you what you saw at the show, and they may pick up details that you weren’t able to describe in your notes. Most mobile devices can take photos – and images don’t need to be high quality if they’re just to refresh your memory. 7. Network – but don’t let small talk rule the day It may seem obvious, but don’t forget to exchange business cards with everyone you speak to It may be tempting to take advantage of this time away from the office to talk about anything but business! While small talk can be helpful for building strong professional relationships, remember to keep your list of questions at hand so you can always bring conversations back to your key objectives. Keeping these goals in mind will also help you avoid being swayed by any unhelpful marketing-speak. It may seem obvious, but don’t forget to exchange business cards with everyone you speak to, or even take the opportunity to connect via LinkedIn. Even if something doesn’t seem relevant now, these contacts may be useful in future. Have a dedicated section in your bag or briefcase for business cards to avoid rummaging around. 8. Schedule time for wandering With your most important conversations planned carefully, there should be time left to explore the show more freely. Allowing dedicated time to wander will give you a welcome break from more pressing conversations, and may throw up a welcome surprise in the form of a smaller company or new technology you weren’t aware of. Allowing dedicated time may throw up a welcome surprise in the form of a smaller company or new technology you weren’t aware of Security Trade Show Checklist Photo Identification: As well as your event pass, some events require photo identification for entry. Notebook and pen: By writing as you go, you will be able to compare notes at the end of the day. Mobile device: Photos and videos are great tools to remind you what you saw at the show, and may pick up details you missed in your notes. Paper schedule and floor plan: In case batteries or network service fail. Business cards: Have a dedicated pouch or pocket for these to avoid rummaging at the bottom of a bag. Comfortable shoes: If you’re spending a whole day at an event, and plan on visiting multiple booths, comfortable shoes are a must!
AlertEnterprise Inc., the physical-logical security convergence software company, announced that its Airport Guardian software has been selected by Los Angeles World Airports (LAWA) as the new Identity Management and Credentialing System (IMCS) at Los Angeles International Airport (LAX). Airport Guardian cyber-physical security software will be deployed to deliver a new level of converged security, identity and access intelligence, and enhanced customer experience across IT, physical and OT systems. “At LAWA, we work hard to provide a high level of safety, security, and service for our customers, communities, and stakeholders,” said Aura Moore, Deputy Executive Director - CIO of LAX. “We’ve selected AlertEnterprise software as our new Identity Management and Credentialing System for its integrated, configurable, and futureproof design. This new system will enable us to improve security, enhance customer experience, minimize risk, and proactively enforce compliance for many years to come.” Ensuring real-Time compliance With Airport Guardian software, LAX will be able to streamline and automate their entire badge lifecycle processWith Airport Guardian software, LAX will be able to streamline and automate their entire badge lifecycle process, from application to badge printing, and access provisioning. By automating core processes with role-based workflow and active policy enforcement, the airport can ensure compliance in real-time, which helps to eliminate costly auditing efforts. The deployment of Airport Guardian software will include a secure, web-based portal that will enable LAX personnel to manage employees, vendors, and visitors across their enterprise landscape. Applicants and Authorized Signatories will be able to start, save, and submit applications, including requesting access to critical areas that require additional approval. Streamline application processes With built-in schedule management, Airport Guardian software will help the LAWA Badge Office streamline application processes and enhance customer experience, including reduced wait times, and application status visibility to applicants and authorized signatories. The aviation content pack features DACS, STA, CHRC, Rap Back, and LMS integrations as part of the Airport Guardian software Airport Guardian software includes an aviation specific content pack comprised of Tenant Management, Incident Management, Asset Governance, built-in airport compliance, industry reporting, badge auditing, and process automation best practices. The aviation content pack features DACS, STA, CHRC, Rap Back, and Learning Management Systems (LMS) integrations as part of the Airport Guardian software. Airport Security Awareness training The Airport Guardian software’s powerful LMS integration feature is designed to assist LAX administration teams in tracking and enforcing mandatory training for personnel including active shooter, Airside Vehicle Operating Permit, and Airport Security Awareness training. “LAX is one of world’s premier and busiest airports, and we are thrilled that they have selected AlertEnterprise as part of their security modernization and digital transformation,” said Ruby Deol, AlertEnterprise Chief Operating Officer. “Our game-changing approach of converged cyber-physical security is helping to make airports and critical infrastructure around the world more secure while creating a positive workforce and customer experience.”
A supplier of global technology services, Bosch chose to partner with Gallagher and KW Corporation to help streamline its North American security operations. Operational efficiency Bosch required a comprehensive yet flexible security solution that could be tailored to solve their specific requirements and challenges. Presently 22 Bosch locations are on the Gallagher platform with a cardholder database of approximately 6,000. A key area of focus for Bosch was improving operational efficiency. Command Center, Gallagher’s powerful access control solution, offered Bosch a range of reporting functions to help streamline operations. Manager of Bosch’s corporate Security, Frederick Fung, says “The user friendliness of Command Center and the ability to automate reporting means our operations now run more smoothly. Administration time has been reduced, creating significant cost savings.” Having the ability to pick up the phone and call technical support is critical to securing our sites"CenrCentralized System Bosch selected Gallagher as the solution that could best meet its needs, including a centralised system to secure multiple sites. “Having the ability to pick up the phone and call technical support is critical to securing our sites,” explains Fung. “Many of our security staff have multiple responsibilities, so the Gallagher and KW Corporation services are invaluable.” Gallagher also offers customers the same training courses that it conducts for certified channel partners, providing staff with the capability to be first responders and giving them the confidence to handle certain security issues themselves. Command Centre Like many businesses, theft of physical and intellectual property is a big concern. With the support of Gallagher and KW Corporation, Command Center manages access control, Bosch surveillance, and intrusion systems. Selecting Gallagher provided Bosch with: Video management system integration (BVMS), for safety precautions and oversight CCTV integration, image and video event audit trail Peace of mind through the use of the latest continually evolving software technologies and cyber security counter measures, eliminating the fear of hacking and site down-time Integrated intrusion detection system allowing full situational awareness Flexible and scalable solutions Fung explains, “The key differentiator for Gallagher is the company’s unmatched support, system user-friendliness, and cost savings in both short and long-term.” Gallagher solutions are flexible and scalable, creating the potential for future growth across Bosch locations. “Integration with Gallagher Command Center has had a positive impact across our sites, improving safety, security, and operational efficiencies,” says Fung. “Gallagher supports us in providing a safe and secure working environment, improving the quality of life for our associates and visitors.”
The power grid is a modern engineering marvel, providing us widely available and affordable energy for not only our day to day lives, but also highly critical infrastructure elements for which we rely on personally, and as an economy. However, our reliance on the grid also makes it highly susceptible to adverse events, including physical attacks. All parts of the grid can become victims of malicious events, but substations are particularly vulnerable due to their role in power distribution and the nature of their equipment. Power utilities’ security The challenge power utilities worldwide are facing is finding an affordable solution The challenge power utilities worldwide are facing is finding an affordable solution, which can help detect, deter and facilitate an informed response to a substation security event. In the United States, this need is furthered by the physical security mandate CIP-014 issued by the North American Electric Reliability Corporation (NERC), calling for identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address. CIP-104 specifically calls for implemented security plans which include measures to deter, detect, delay, assess, communicate, coordinate and respond to potential physical threats and vulnerabilities. Fortunately, there are many solutions to help power utilities address these security concerns, one effective choice is the use of intelligent video. Intelligent video analytics solution Intelligent video, or video analytics, is a popular choice for the protection of critical facilities given its ability to detect, provide instant visual confirmation of the event and subsequent event forensics. The capability of this technology is increasing at a rapid rate, while decreases in hardware cost make such solutions affordable for owners or operators of critical bulk-power system sites. This case study looks at the issue of substation vulnerability and how to best use video to address, keeping in mind requirements of CIP-014. Such a system consists of fixed cameras, pan-tilt-zoom (PTZ) cameras, a deterrence device and data communication capability. Perimeter designs can vary based on the vulnerabilities identified, aspects of the site, budget, etc Perimeter designs can vary based on the vulnerabilities identified, aspects of the site, budget, etc. In most cases, substations can benefit from a simple “camera-following” design, which includes surveillance of a potential breach at the fence line, as well as, the ability for early detection for some distance beyond the physical perimeter. Camera-Following design In a camera-following design, in addition to its own coverage, each camera is responsible for covering the blind spot of the adjacent camera. That camera is then responsible for covering the blind spot of the next camera, and this pairing continues around the perimeter until the final camera covers the blind spot of the first. This type of coverage design is very effective and affordable for locations with well-defined perimeters, such as substations. Using this layout, the video feed from the fixed cameras are then enabled with video analytics algorithms to alert when predefined conditions are met. This is done by inputting the video signal into a server, edge device or NVR, located at the site, or remote to the location. Intelligent video technology Today’s intelligent video technology provides for very specific alarm criteria Today’s intelligent video technology provides for very specific alarm criteria, which in addition to only alarming when a target enters in a specific region, can also discriminate, or classify, by the type of target: human, vehicle, etc. Furthermore, the alarm can be restricted by specific actions taken by the target, such as loitering in an area, dropping or throwing an object, more than one target entering with a valid badge swipe (tailgating) or even the speed at which a target is entering an area. This level of discrimination provides the ability to address very specific vulnerabilities, as well as, avoid nuisance targets, such as wildlife, debris or moving vegetation. Another key feature with significant value to substation protection is the geospatial aspects available with some video analytic solutions. This capability maps each pixel of video to its real-world latitude, longitude and elevation. This results in further assessment of the target, including the actual location, the real size of the target, the real speed and the current track. It also affords the opportunity to provide a real-time display of this information to the security operator through an easy to understand map-based user interface. Autonomous PTZ cameras Geospatial video analytics provide the benefit of knowing the exact map-based location of the target Another key assessment aspect of this substation protection scheme is the use of autonomous PTZ cameras. These are typically placed at the corners of the perimeter where they can service detections from multiple fixed cameras. As previously mentioned, geospatial video analytics, provide the benefit of knowing the exact map-based location of the target. Knowing the location of the target is extremely valuable to the security officer, but it is also the basis for a feature known as “slew to cue,” whereby PTZ cameras armed with video intelligence can be automatically steered to the same location for instant confirmation of the target. In most cases, “slew to cue” functionality also includes an “intelligent zoom” feature, which uses the target size information from the alarm, the PTZ camera location and the target location to adjust the zoom level of the PTZ for an instant view of the target that can provide identification details (clothing color, car type, etc) without the need for the operator to further adjust the zoom. Target detection and response Once a target is detected, a security approach leveraging intelligent video can continue with a coordinated response Once a target is detected and confirmed, a security approach leveraging the use of intelligent video can continue with a coordinated response to the event. When video analytics is applied to pan-tilt-zoom cameras, it has the ability to automatically follow a defined target, freeing the operator to take other actions, such as coordinating with law enforcement officials. This feature, referred to as camera auto follow or PTZ following, can be automatically engaged as the result of a detection event, or subsequent to a slew to cue action. The system will continue to follow the target until it reaches a pre-defined system time-out, the operator takes manual control, or the camera can no longer view the target. The system can then provide the resulting PTZ video as a component of the detection alarm, for a more complete understanding of the intrusion for the operator to review. Effective deterrence At this point, the system has detected the target, classified its type and verified it has met alarm conditions. As part of the alarm it has also included dynamic indication of its location on a map, autonomously steered a PTZ to the target to allow for gathering of more detailed target information and a PTZ has locked on and is now following the target without any required user interaction. Total elapsed time to this point in the security response is typically less than 5 seconds. Deterrence is often realized as a fence, physical barriers or access controlled gates This level of automated response addresses many vulnerabilities typically identified as part of a CIP-014 security assessment, but with minimal extra cost, it can be extended to help with the aspect of deterrence. Deterrence is often realized as a fence, physical barriers or access controlled gates. These are physical items and should certainly be included in a substation security plan. Intrusion detection However, another form of deterrence, which can be enabled through the use of intelligent video is the idea of audio talk down. This is the use of live or pre-recorded audio, which is activated upon an intrusion to deter the intruder. Different from a general alarm warning audio, audio talk down uses information about the location of the intruder and their actions to select appropriate pre-recorded audio to deter the intruder. Worse case, the understanding that they are being actively monitored may hasten their plan. Video-Based security and alarm system A common concern when deploying such a system is the amount of bandwidth required A common concern when deploying such a system is the amount of bandwidth required. Substations are almost always unmanned, which means the intrusion information must have a means to get communicated back to the main monitoring location. From a design aspect, this is typically the case, but it is important to know that it is not a requirement in order to gain security benefits from a video based system. The system described in this case study has the capability to detect, assess, respond and deter without any communication back to a main command and control. Alarms, events and system actions can be logged and stored remotely for review at a later time. In reality, utilities will want to be notified and react in real time. In these cases, video systems can adjust to the available bandwidth – from a low bandwidth situation where a textual alarm is provided with an image of the detection, to a high bandwidth installation where feeds from multiple cameras can be monitored and controlled in real time. Web-Based, mobile access In each case, complete alarm information, including meta data, images and video can be readily available to the security operations center, which can then take action based on their security response plan, including contacting and coordinating this alarm data with local law enforcement through web-based access or mobile phones. This case study outlines the effectiveness of utilising video analytics to address the physical vulnerabilities of a typical substation. The study outlines how recent technological advances can autonomously address assessment, response and deterrence This case study outlines the effectiveness of utilizing video analytics to address the physical vulnerabilities of a typical substation. Further, the study outlines how recent technological advances allow such a solution to extend beyond the mere detection of events, but can also autonomously address assessment, response and deterrence. Key capabilities Of intelligent video include: Advanced Detection – Accurate alarming based on specific targets types and actions Situational Awareness – The ability to quickly convey the critical details of a security event in an easy to understand map-based format. Real-time Target Location – Real-time location information of events and real-time location tracking of potential intruders. Autonomous Sensor Control – Automated steering of cameras to an event location and subsequent hands free video tracking of a suspect. Although each utility and substation may encounter different vulnerabilities, this case study outlines how video can be considered to address NERC guidelines for protecting critical substation assets by providing situational awareness of a potential threat and initiating an appropriate and timely response.
ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, announced that Corning High School, in Corning, Arkansas, has increased its security and greatly enhanced its lockdown capabilities by installing the pdk io wireless access control system. Pdk io is a wireless, cloud-based solution that provides advantages such as around-the-clock accessibility, remote management, superior backup and redundancy, automated updates, and strong cyber security. The installation was undertaken by Blue Sky Technologies (Blue Sky) of Jonesboro, Arkansas. Wireless PDK solution The system is proving to be a useful tool for monitoring student traffic patterns and identifying problem behaviorsCorning High School comprises seven buildings connected by breezeways, designed in an open style common to campuses constructed in the 1960s. Integrator Blue Sky chose the wireless PDK solution because it was perfectly suited to the multi-building layout, with no need to run copper or fiber cable to all connected door locations. As a result, material and labor costs were greatly reduced – a major plus for the small and budget-conscious school district. The installation includes exterior doors for each of the classroom buildings and a few other key locations. As budgets permit, additional doors will be added throughout the high school as well as in other district buildings. The wireless connectivity makes the solution exceptionally scalable; new doors can be immediately brought online through connection with the system’s wireless mesh network without additional infrastructure. Enhancing campus security In addition to enhancing the security of the campus by automating the unlocking and locking of exterior doors to align with the high school’s bell schedule, the system is also proving to be a useful tool for monitoring student traffic patterns and identifying problem behaviors. Faculty and support staff find the pdk io system to be much more convenient than the traditional locks and keys Classrooms are each allocated with ‘student fobs’ for use by students who need to travel between buildings during class periods when doors are otherwise locked. Their use of the fobs enables administrators to track where the students go, making sure they head to the intended destination (i.e. the library or nurse’s office) rather than elsewhere. Suitable access control solution for schools Faculty and support staff find the pdk io system to be much more convenient than the traditional locks and keys that previously secured most doors. Permission groups, managed through the pdk io software, control different access levels for teachers, administrators and custodians. Programming of special door schedules, as well initiating lockdown conditions, can all be handled by the IT staff using the mobile interface. Brian Duckworth, sales consultant with Blue Sky, says, “Pdk io has become our go-to access control solution for K-12 installations because the wireless aspect leads to such major cost savings for the schools, which are always budget-challenged. In addition, the installation process causes very little disruption for the students and teachers.” Keeping students safe and secure Pdk io is ideal for K-12 applications, providing educators with a tool that’s powerful and easy to manage"School Superintendent Kellee Smith adds, “We strive to make our campus a place where our students enjoy the freedom to focus fully on learning because they’re not worrying about safety and security. This solution is making our goal so much easier to meet. It’s also making the teachers’ daily routines less stressful and they really like it.” “PDK is passionate about creating technology that delivers security and peace-of-mind, and what could be more important than keeping our children safe?” says ProdataKey’s President, Jeffery Perri. “Pdk io is ideal for K-12 applications, providing educators with a tool that’s powerful and easy to manage, affordable, scalable over time, and is sure to provide value for the long term.”
Round table discussion
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
The definition of a standard is “an authoritative principle or rule that usually implies a model or pattern for guidance, by comparison with which the quantity, excellence, correctness, etc., of other things may be determined.” In technology markets, such as physical security, standards are agreed-upon language, specifications or processes that are used across the board by multiple stakeholders to enable easier interconnectivity and smoother operation of systems. We asked this week’s Expert Panel Roundtable: How are standards shaping change in the physical security market?