OnSSI, a provider of advanced Video Management System (VMS) open platform solutions – is offering a free highly-informative guidebook entitled, ‘Hardening Guide for Networked Video Surveillance Systems,’ to help enterprises protect their systems from potential cybersecurity threats. The free downloadable guide provides specific recommendations on hardening video surveillance systems by applying proven cybersecurity initiatives.
“Hardening surveillance systems is a necessary and ongoing process to mitigate against potential cybersecurity threats and liabilities,” said Ken LaMarca, VP of Sales and Marketing, OnSSI. “We are thrilled to offer this comprehensive hardening guide free of charge to help enterprises protect their system’s integrity, and maintain the highest levels of both physical and cybersecurity.”
Critical Security Controls
The OnSSI Hardening Guide for Networked Video Surveillance Systems includes guidance on password strength, how to avoid poor password practices
The OnSSI Hardening Guide for Networked Video Surveillance Systems includes guidance on password strength, how to avoid poor password practices, collaboration with IT and HR departments and how to apply software and firmware security updates. It also includes standard, advanced and enterprise cybersecurity best practices for cameras, servers and workstations and networks.
This free resource from OnSSI is based on the recommendations of the Center for Internet Security (CIS), and its Critical Security Controls guidance. The CIS is a forward-thinking, non-profit entity whose mission it is to safeguard private and public organizations against cyber threats. As cyber risks evolve, the CIS updates its Critical Security Controls recommendations, which were updated in March of 2018 from version 6.1 to version 7.
The Hardening Guide for Networked Video Surveillance Systems is another way OnSSI approaches cybersecurity. OnSSI’s flagship Ocularis VMS platform is designed with cybersecurity as a top priority by building in encryption and the ability for users to keep up-to-date with software patches to help ensure that their servers and networks are protected.
ISS - Intelligent Security Systems, a global provider of intelligent VMS and analytics, announces the latest release of the company’s renowned SecurOS Video Management System at GSX 2018. The new SecurOS v.10 features an updated, highly intuitive GUI designed to accommodate multiple clients and the ability to easily manage large systems with infinite scalability. Additional enhancements include a new web client for remote access, robust cyber security updates, 64-bit edition for faster throughput and larger capacity, enhanced native failover operations, H.265 Intel QSV support and a brand-new Evidence Manager.
SecurOS v.10 is designed to seamlessly integrate with a host of powerful analytics developed by ISS. This unique combination allows ISS to offer a wide range of specialized packages to fulfill users’ specific physical security and business intelligence needs.
The release of SecurOS v.10 builds upon our powerful open platform with numerous enhancements designed to further facilitate ease of use"
“ISS provides a more holistic approach to camera management and control by seamlessly integrating native analytics with our VMS platform, enabling us to provide users with truly innovative and unique solutions for their specific security challenges,” said Cody Flood, Vice President of North American Sales, ISS. “The release of SecurOS v.10 builds upon our powerful open platform with numerous enhancements designed to further facilitate ease of use for today’s more advanced and larger surveillance installations.”
SecurOS v.10 New Enhancements
SecurOS v.10 features a long list of new enhancements that increase ease of operation, performance and functionality, system scalability and security, including:
An updated Client and Administrator GUI featuring new Operator Workstation Profiles to manage large numbers of clients on a unified platform along with new object groups/categories for more intuitive, customized system configuration.
A new web client, SecurOS WebConnect to facilitate seamless remote access and operation.
New Cyber Security enhancements including: secure HTTPS connection to all cameras with tunneling of both video and audio; digital signature of all exported files using digital certificates to verify the authenticity and source of exported files; and encryption of all data stored on ISS server HDDs.
New Native Failover Cluster capabilities including: native cluster failover of many or 1-1 cameras using as few as 2 servers; failover of all features including analytics modules; failover operation within 30 seconds and the ability to manually assign any video server to any workstation.
New Evidence Manager with many new features to manage exported video.
265 Intel Quick Sync decompression support. Decompression of H.265 on Intel HD Graphics adapters to concurrently view large amounts of cameras on client workstations.
64-bit Server Edition to increase the number of cameras and throughput per server.
Innovative VMS Solution
SecurOS v.10 is also available pre-bundled with ISS’ native analyticsISS SecurOS v.10 is available in five configurations: MCC (Monitoring Control Center), Enterprise, Premium, Professional, and Xpress to deliver the perfect balance of functionality and cost-efficiency for every size and level of application.
SecurOS v.10 is also available pre-bundled with ISS’ native analytics to provide VMS solutions for specific applications. Some of the SecurOS v.10 analytic modules include:
SecurOS Auto which provides license plate recognition (ANPR) and comparative analysis for all types of vehicles. SecurOS Auto works in a wide range of internal/external conditions and delivers industry-leading recognition accuracy for US and international locations.
SecurOS Face captures and recognizes faces from a video stream. SecurOS Face is a class-leading solution with active recognition where subjects know their image is being captured or passively, where they do not have knowledge of such surveillance.
SecurOS Cargo provides recognition of cargo container ISO codes in a variety of applications. It implements the most advanced native image processing software, the ISS SecurOS framework, and advanced algorithms for the recognition of codes on cargo containers.
SecurOS Tracking Kit provides a suite of situational awareness detectors such as loitering, crowd detection, object left behind, object counting, etc.
Integrated Hardware-software Solutions
ISS is a true provider of intelligent surveillance solutions that we refer to it as ‘intelligent video defined'"
Additional specialized SecurOS v.10 hardware and software solutions include:
SecurOS UVSS, an integrated hardware-software based solution for remote under-vehicle surveillance.
SecurOS Velox, to detect speeding violations with automatic license plate recognition (ANPR) of all passing vehicles.
SecurOS Motus, an IP-camera designed with integrated ALPR for high-speed and high accuracy commercial and law enforcement applications.
SecurOS Cargo Terminal, which provides remote visual inspection of cargo containers and control of vehicles which carry them.
SecurOS Crossroad combines specifically engineered hardware and software to provide real-time detection of complex types of traffic violations.
“ISS is a true provider of intelligent surveillance solutions that not only sees and documents events but provides the rich data necessary to analyze what may otherwise be perceived as disparate events, and alerts management of impending threats. We refer to it as ‘intelligent video defined,” concluded Mr. Flood.
Pulse Secure, the provider of Secure Access solutions, announced its designation as a Distinguished Vendor in this year’s ‘2019 TAG Cyber Security Annual’.
Pulse Secure recently became a member of the world’s leading cybersecurity vendors as selected by Dr. Edward Amoroso, CEO of TAG Cyber, and added to this year’s report. Each year TAG Cyber publishes its three-volume report to the IT community for download at no cost. Volume Two of the report also includes an informative interview with Pulse Secure CEO, Sudhakar Ramakrishna.
Assisting Chief Information Security Officers
This year’s ‘TAG Cyber Security Annual’ was developed to assist chief information security officers (CISOs) and security teams as they advance their information enterprise cybersecurity protection programs and best practices. Beyond offering a ‘periodic table’ of cybersecurity controls, the volume offers insights as to key control trends based on expert and practitioner participation.
Beyond offering a ‘periodic table’ of cybersecurity controls, the volume offers insights as to key control trends based on expert and practitioner participation
“Ed Amoroso and his team have put together a pragmatic compendium of security controls and outlooks that can be readily applied by information security professionals. We are pleased to have participated and to be distinguished in this report as TAG Cybers’ service to the IT community and their best practices are to be commended,” said Sudhakar Ramakrishna, CEO of Pulse Secure.
Expediting multi-factor authentication
The 2019 Tag Cyber Volume Two highlighted key trends within 50 top controls. Key findings within Secure Access controls highlighted in the report include:
Where initial generations of remote access focused on teleworkers and two-factor authentication, next-generation secure access solutions are increasing effectiveness by expediting multi-factor authentication and integrating with modern cloud and mobility platforms
Leading secure access vendors are delivering solutions equally focused on user experience with the goal of minimizing the steps required to establish secure connectivity
The future of secure access lies in device-to-cloud, where mobility and embedded controls ensure that authentication, encryption and integrity are in place. While the use of public clouds to host enterprise applications will eventually remove access to the corporate LAN, this function will remain in hybrid mode for several years where traditional remote access will remain in place during this transition period
Simple, robust and interoperable approach
“Ensuring secure access to a multitude of applications and resources is a business imperative that challenges IT as enterprises accelerate data center virtualization and cloud computing. As such, organizations are reassessing their technology stack that comprises Secure Access,” said Amoroso.
“Pulse Secure is among leading vendors focused on offering a simpler, more robust and interoperable approach for enterprises as they migrate from remote access to more advanced hybrid IT access protection.”
Kingston Digital, Inc., the Flash memory affiliate of Kingston Technology Company, Inc., a global provider of memory products and technology solutions, announced it will showcase an array of products at Global Security Exchange (GSX) (booth 2685 Central Hall), the most established trade event for security professionals. The company will display its full line of industry-leading encrypted USB Flash drive solutions, including the IronKey brand purchased in 2016, as well as upcoming high-density business and enterprise SSDs and Server Premier memory.
“When it comes to memory and data storage solutions, it is imperative that security professionals trust the products they use and the companies that make them. For over 30 years, we have been an unquestioned leader in this field,” said Richard Kanadjian, encrypted USB business manager, Kingston.
“For storage-bound applications, Kingston stands ready as the industry shifts away from traditional 15k SAS toward NVMe, where the performance gains in terms of IOPS and lower latency is tremendous. GSX is the perfect venue for us to show the security industry our ability to provide it with the most complete line of superior data performance solutions for their varied security, data, audio/video or other applications.”
GDPR Compliant USB Drives
Kingston encrypted USB drives are designed to protect data that require high security and serve as an additional element in compliance with the EU’s GDPR
GSX 2018 takes place at the Las Vegas Convention Center from September 23-27. Kingston is located in booth #2685 in the Central Hall.
Kingston encrypted USB drives are designed to protect data that require high security, maintain a productive and efficient mobile workforce, and serve as an additional element in compliance with the EU’s GDPR (General Data Protection Regulation). These drives help users meet specific agency directives, such as encryption, TAA and FIPS compliance, and are ideal for government or corporate use. The line includes both IronKey drives available in 4GB to 128GB capacities; and, Kingston DataTraveler models available from 4GB to 64GB.
Securing Data With SSDs
In business applications, Kingston SSDs increase performance, help secure data, and extend the life of older systems. In enterprise applications, Kingston SSDs offer increased reliability and power fail features to keep mission-critical environments up and running 24/7.
The upcoming DC500R is a high-performance 6 Gbps SATA SSD designed for read-centric data-center workloads. It is designed with strict QoS requirements to ensure predictable random IO performance as well as predictable latencies over a wide range of read/write workloads. Special power-loss safeguards help reduce the likelihood of data loss and ensure that the drive will successfully re-initialise on the next power-up of the system.
DC1000M U.2 NVMe SSD
The DC1000M 2.5″ U.2 NVMe SSD's advanced architecture enables delivery of up to 600k IOPS of random read performance and a potent 3GB/s of throughput
The DC1000M 2.5″ U.2 NVMe SSD features high-storage capacity and best-in-class enterprise performance. Its high-performance Gen 3.0 x4 PCIe NVMe interface enables high throughput and low latency on a standardized low-cost platform. The drive’s advanced architecture enables delivery of up to 600k IOPS of random read performance and a potent 3GB/s of throughput. Its strict QoS requirements ensure predictable random IO performance as well as predictable latencies over a wide range of workloads. The ‘mixed-use’ workload drive makes it ideal for running a wide range of applications.
Kingston server memory is a worldwide industry standard. Server Premier modules are manufactured using a locked bill of materials (BOM). They are designed for big data centers, people who implement high-quality branded provisioned servers to those who use or build white-box systems and require a consistent brand and revision of DRAM. The line offers a variety of embedded memory products that provide maximum performance and flexibility
Hoverfly Technologies Inc., global supplier of tether-powered aerial drone systems, is pleased to announce it has engaged retired Deputy Chief of Los Angeles Police Department Mike Hillmann to consult and provide expertise to Hoverfly and public safety officials of cities, counties and special law enforcement agencies who are considering the use of Small Unmanned Aerial Systems (sUAS) to assist in keeping their cities safe.
Small Unmanned Aerial Systems (sUAS) When incidents and/or events happen, having ‘real-time, situational awareness’ from above the scene is critical to managing risk and upholding public safety
“With 24-hour news cycles, a never-ending stream of social media posts, mid-term elections and potential threats to the public at large, getting fast, accurate situational awareness from the air during an incident has never been more important when it comes to keeping the public safe. We are thrilled to have Chief Hillmann advising on use cases and how best to implement and integrate this new technology,” says Hoverfly SVP of Systems, Lew Pincus.
When incidents and/or events happen, having ‘real-time, situational awareness’ from above the scene is critical to managing risk and upholding public safety and the safety of those who serve our communities.
He adds, “We typically have relied on manned aircraft to provide aerial coverage over a variety of incidents. On occasion, those assets have not always been available, deemed too disruptive or too expensive to deploy in certain situations where an aerial view clearly could have helped an incident commander better understand the situation. Deploying small tether-powered, highly portable, unobtrusive persistent cameras positioned high above the scene can now be used as either a standalone capability or integrated system with existing networks, security infrastructure and even manned aircraft.”
Hoverfly tether-powered sUAV (Small Unmanned Aerial Vehicles) systems solve short battery-life problems associated with free-flying dronesToday, Mr. Hillmann is helping chiefs of police, local city and county officials and other public safety personnel understand how Hoverfly’s tether-powered LiveSky systems can be deployed from police or EMS vehicles providing incident commanders with actionable intelligence from high above the scene within minutes of arrival. “Tactically, having the ability to stay in the air monitoring the situation from above for hours, days, even weeks at a time represents an amazing capability we never had before. During my career, I can think of hundreds of situations where having a drone in the air to provide real-time intelligence, surveillance and reconnaissance would have helped keep my officers and the community much safer. It’s a force multiplier that should be exploited by public safety,” says Hillmann.
Hoverfly’s LiveSky Systems
Hoverfly tether-powered sUAV (Small Unmanned Aerial Vehicles) systems solve short battery-life problems associated with free-flying drones because they operate using a standard 120VAC power source or vehicle inverter. The power, command and control information and video are transmitted over the tether making the entire system completely secure from jamming, hacking or spoofing, ensuring the privacy of the data and improving safety. Perhaps the biggest benefit of Hoverfly systems is they are autonomous and require no piloting skills. The CEO of Hoverfly likes to say, “if you can operate an elevator, you can operate our LiveSky system.”
As prime targets for criminals, banks have always faced major security challenges. But today, when banks are pressed to increase revenues, improve operational efficiency, and mitigate risk, defending against security threats is increasingly expensive. Two key drivers in the banking sector are customer trust and operational efficiency. Both are significantly strengthened by a quality integrated ‘smart’ banking security solution.
Smart Banking Security Solution
A robust security strategy is of the highest priority and is usually embedded within the bank’s Risk Management Plan. This enables banks to manage operational risk and compliance demands. The modern approach to bank security design incorporates IT, Channel Management and Identity and Access Management systems into one solution.
At the heart of Vanderbilt, systems are compliance with some of the highest industry and regulatory standards. These systems impact all bank functions and help deliver greater trust, operational efficiencies, and excellent customer experience.
Vanderbilt Video Surveillance Vanderbilt can provide live video surveillance that continuously monitors and provides quality images should a suspicious event need to be investigated
In the bank’s self-service area, Vanderbilt can provide live video surveillance that continuously monitors and provides quality images should a suspicious event need to be investigated.
Meanwhile, Vanderbilt’s Seismic detectors protect ATM's 24/7. These detectors give immediate and reliable alerts of attacks on the enclosure, but unlike other detectors, do not register false alarms triggered by passing traffic or the vibrations of the ATM itself.
Seismic Detectors And Interlocking
Electronic security measures are also used in other banking situations – for example, when a customer claims he tried to withdraw cash from an ATM and was issued a receipt, but no cash – the bank can check with a specialized data department to ascertain whether the money was deducted from the customer’s account.
When a staff member unlocks the vault, the door to the secured area simultaneously locks
Unique codes grant workers who fill ATMs access to secured areas and the ability to unlock ATM's. The worker's code over-rides any ‘delayed unlock function,' so he can immediately access the ATM and fill it. There are set time limits for the work to be done. The ATM buzzes for a pre-determined time before the machine is due to auto-lock. If the worker needs more time, he can delay this. Once the job is done – the ATM automatically locks.
Another example of bank security involves interlocking. When a staff member unlocks the vault, the door to the secured area simultaneously locks. This prevents anyone else from gaining entry until the vault is once again locked. This ensures the safety of staff members and the security of vault contents.
There are many layers of electronic security protecting the bank. If the manager arrives early, he uses his card to gain access to the branch office and a PIN to disarm the alarm. His code disables the office and secure area, but the ATM's, vaults and safe deposit boxes remain armed. A Central Monitoring Station is alerted to the early entry. They need to know whether the entry is routine or under duress. The monitoring station views the manager on live video as he executes a pre-determined security procedure and until he hits an ‘All is OK' button. If there is a problem – the manager can send a silent ‘Duress Alarm' rather than the ‘All is OK.' The Monitoring Station can listen in – and if necessary can call the police.
Security in banking is an essential issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability – flagship traits of the Vanderbilt brand. Banks wish to operate in an open and friendly layout while ultimately safeguarding their customers, staff, and assets. Vanderbilt's solutions respond to these expectations and enable active safeguarding foundations to be laid.
Established by the French Government’s Ministry of Finance and Economics, the ACCORD project was commissioned to design and implement financial system modernization. The charter of the ACCORD initiative team, composed of representatives from multiple government ministries, is to architect solutions that enable the French government to manage the finances of the country with the same level of accountability as private sector enterprises. The technology-based infrastructure selected was a smart card solution to confirm and authenticate users across 40 departments.
HID Global’s Identity Assurance Software
The systems operated in parallel but could not leverage the benefits of a unified system.
AIFE – Agence pour l’Informatique Financière de l’Etat – chose HID Global’s Identity Assurance software coupled with smart cards for the solution.
Ensuring users are ‘who they say they are’ over the course of several decades, individual French government departments had developed separate and distinct applications to manage activities such as budgeting, processing purchase orders, and other accounting activities. The systems operated in parallel but could not leverage the benefits of a unified system.
Enterprise Resource Planning System
With the inception of the ACCORD project, the government committed to streamlining finance management by moving to one system for centralized control of the country’s budgeting and finance operations – with a goal that by 2004, all government central entities will be using the standard Enterprise Resource Planning (ERP) system. The transition to an online application that consolidates financial reporting and transactions requires an organization to determine how it will identify users with certainty prior to granting them access to the system and to valuable data.
The solution must be easy to use to ensure departmental acceptance of the new application and authentication process. It must also minimize the IT staff time required for day-to-day administration and helpdesk activities for a large population over 7,000 dispersed users. These multiple challenges presented an opportunity to leverage proven digital identification solutions from HID Global.
Smart card-based PKI Identification Solution
HID Global’s Security Client software solution and smart card readers are key elements for securing the finance system at all user points of entrySmart card-based solution using digital certificates with PKI, The French government-wide implementation securely links multiple departments, such as the Ministries of Education, Justice, Transportation and Housing, and Foreign Affairs, to the unified ERP application, enabling the exchange and ultimate consolidation of digital information.
In 2000, the Ministry of Finance began deploying HID Global’s smart card-based PKI solution. HID Global’s Security Client software solution and smart card readers are key elements for securing the finance system at all user points of entry – any of which could become a source of fraudulent or malicious activity in the absence of strong authentication and confirmation of digital identity. Today, employees regularly use the card with a microchip that holds their unique credentials in the form of an Entrust digital certificate.
HID Global’s Gold Entrust-Ready certification ensures a smooth deployment to large numbers of users, and the combined solution with Entrust TruePass delivers the following benefits:
Enhanced Security: HID Global’s multi-factor authentication reinforces the fundamental security and intent of a PKI by requiring something the user has (a smart card) and something the user knows (a PIN code) in order to use the private keys stored on the card. To further enhance security, the key pair is generated on the cryptographic smart card itself, so that the private key is never exposed to the insecure PC environment. The tight integration of HID Global’s client software with Entrust ensures certificate key updates are transparently and automatically made on the card.
Non-Repudiation: To support non-repudiation, it is essential that ERP system users provide undeniable proof that they are who they say they are. Keys used for that authentication can never be stored on the potentially vulnerable user workstation. Those sensitive keys must remain under the sole control of the user, and HID Global’s client software ensures private keys are generated on the card and remain in the rightful owner’s possession at all times.
User Simplicity: HID Gobal’s Security Client software provides a familiar ATM-like user interface that makes complex digital identity and PKI technologies transparent, so employees can focus on their work responsibilities and financial application activities to easily access the system. HID Global’s commitment to openness and industry standards ensures that the French Government’s initial investment in digital identity products and smart card client software infrastructure is capable of supporting multiple PKI vendors and other forms of identity credentials in the future.
STANLEY Security, one of the most trusted names in the world of security, has provided a photography studio in Knowsley, Merseyside, with a top class wireless Ricochet technology-based alarm system financed through STANLEY Assure.
Studio Argent is a 5,000 ft. sq. studio that houses and uses state-of-the-art digital equipment to produce creative and commercial photography for numerous large national and international clients, making security of their premises a priority.
Ricochet Wireless Networking Technology
STANLEY Security installed a modern intruder alarm system based on STANLEY’s Ricochet technology. This next generation wireless networking technology operates by receiving repeated wireless transmissions from devices located throughout the studio building to ensure that even the remotest areas are secured. Furthermore, any weak signals between devices prompt the Ricochet network to self-heal and automatically re-route communication so that the studio is protected at all times.
STANLEY Security recommended the studio’s existing aging intruder alarm system be replaced, with the costs covered under STANLEY Assure
STANLEY Security recommended the studio’s existing aging intruder alarm system be replaced, with the costs covered under STANLEY Assure. STANLEY Assure is a finance solution for customers wishing to benefit from up to date security technology without the risks of ownership and with evenly spread, manageable payment terms with no hidden extra costs. Additionally, included is a full monitoring package for total peace of mind.
STANLEY Intruder Alarm System
STANLEY Assure removes the need to justify and raise significant capital outlay in a depreciating asset. Instead, STANLEY will buy back and take over an existing security system, upgrade it to incorporate the latest security technology, and then hire it back for usage. It provides an affordable means of upgrading a complete security system.
Studio Argent not only benefitted from STANLEY Security’s product technology, but also gained access to STANLEY’s NSI Gold accreditation ProtectionNet Customer Service Center (PNC) as a part of the contract. As a result, Studio Argent receives 24/7, 365 days a year monitoring and immediate customer care.
The ease of usage of the new STANLEY intruder alarm system allows Studio Argent to activate the system in under five minutes
Mesh Technology and Reduced False Alarms
The ease of usage of the new STANLEY intruder alarm system allows Studio Argent to activate the system in under five minutes, while previously the process took approximately 40 minutes. Furthermore, whereas the old system was hypersensitive and would often be set off by mice and moths in the building, the new system, relying on latest mesh technology, ensures no false alarms occur while offering airtight security which is easily scalable, should the studio expand its premises.
After repeatedly having to pay additional, hidden costs to the previous security supplier for patch up work to the studio’s 20-year-old alarm system and dealing with subpar service which in one incident breached the national code of conduct for UK Alarm providers, Studio Argent was pleased to make the cut and move to a reliable security provider.
John Organ, Owner of Studio Argent, happy with the move to STANLEY’s new alarm system said, “From the knowledgeable and expert representatives who contacted me to the total peace of mind and ease of operation that it offers, I feel that STANLEY Assure has really changed my life. I would not hesitate in recommending STANLEY to anyone.”
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?
Finding the exact right technology to solve an end user’s problem is challenging, but the rewards are great when an integrator gets it right. A wide range of available product types, price levels and added features increases the likelihood of identifying a technology to solve any problem. But with so many technology and product choices in the marketplace, identifying that one solution can be akin to finding a needle in a haystack. We wondered whether a vast range of product choices is always a good thing. We asked this week’s Expert Panel Roundtable: Are security integrators and end users overwhelmed by “too many choices” related to security equipment and systems? How can they make sense of it all?
Consolidation – a decrease in the number of companies in a market achieved through mergers and acquisitions (M&A) – has been an important trend among manufacturers in the physical security market for many years. More recently, the trend has also appeared to extend to the integrator market. Larger integrators have been buying up other large integrators; in some cases, they have also been buying up smaller, regional integrators to expand their geographic coverage area. We wondered if this week’s Expert Panel Roundtable has noticed the trend. We asked: Has consolidation among security companies shifted to the integrator/installer market? What is the impact?