“With C•CURE 9000 at the heart of so many high security solutions, it is not surprising that end-users want to be kept informed on any emerging cyber threats and how we are dealing with them,” said Gordon Morrison, GB Sales Director for the Tyco access control and video brands. “In this respect the well-established Tyco Cyber Protection Program, which we see as part of our long-term' holistic approach to supplying customers with quality solutions, is helping us maintain a leadership position on cyber security.”
Tyco Cyber Protection Program
“We were able to reassure delegates that our solutions are specifically designed to be cyber resilient and that before they are introduced, they are extensively tested so that we can discover and address any critical vulnerabilities. We also arrange for independent testing to be conducted on our products and software to ensure that any new firmware or software updates do not open a ‘back door’.”
The end-users from across the UK who attended the daylong event were able to see demonstrations of how they can take advantage of the latest technical advances from C•CURE 9000, the access control and event management platform from Tyco, the security products division of Johnson Controls. These included a Business Intelligent Reporting System (BIRS) module which provides real-time ‘easy on the eye’ graphical reports on access control activity.
C•CURE Go Mobile Access Control App The C•CURE Go mobile access control app is supported by iPhone, iPad, iPad Air, iPad Mini, Android phones and tablets
The C•CURE Go mobile access control app, which is supported by iPhone, iPad, iPad Air, iPad Mini, and Android phones and tablets, attracted a lot of interest. Delegates were impressed with the app’s extensive range of features including offering the ability to remotely lock/unlock doors with a touch of a button, as well as quickly search, create or update personnel records and add/remove clearances and deactivate cards on the go.
Some new hardware was also showcased such as the recently introduced Innometriks readers which provide strong identity authentication for mission critical environments using smart card, PIN and biometrics, and delegates were informed that a second generation PoE edge based iSTAR 4 door controller was under development.
Web-Based Access Management Portal
A recent updated version of C•CURE 9000, v2.7, has seen the introduction of a wide new range of features and functions designed to enhance the user experience. Included is a web-based Access Management portal which further adds to C•CURE 9000’s ability to claim that it is the most flexible and easy to use access control platform available, as well as adding to its reporting capabilities.
A cardholder’s request to be given access to a restricted area can now be directed to the person best placed to make the decision, replacing potential long email chains and slow response times common for access approvals. A new Access Management module offers an efficient method of managing cardholder access requests without requiring direct involvement from the security team.
C•CURE 9000 Access Management
C•CURE 9000 Access Management allows cardholders to make access requests through an intuitive, web-based portal
C•CURE 9000 Access Management allows cardholders to make access requests through an intuitive, web-based portal. The self-service capabilities increase the agility of clearance owners' responses to cardholder access requests for temporary and contract staff, as well as employees who have with drop-in work schedules or are part of project-based self-organizing teams.
There was also a presentation on the latest features and functionalities of the victor unified video management system and how it integrates seamlessly with C•CURE 9000 to streamline real-time security command and management over widespread and demanding environments.
The victor Video Management System (VMS) seamlessly synchronizes video with data from access control, fire, intrusion and other systems. Future-proof and scalable, it has been designed to provide a high-performance solution which provides operators with superior situational awareness, as well as an easy way to investigate incidents and generate activity reports.
Intelligently delivers the right video and other critical information such as event notifications, maps and health monitoring, to the right person at the right time and with the flexibility to display the video and other information on single or multiple screens, as well as video walls.
System integrators are able to meet the customers’ operational requirements by selecting the right Tyco NVR for their needs together with a camera compatibility list spanning over 60 manufacturers and 3,300 cameras.
Provides a centralized view of fire, security and life safety operations.
Offers powerful tools to help simplify and enhance your command and control operations.
Victor VMS - C•CURE 9000 Integration Victor’s integration with C•CURE 9000 enables operators to monitor and prioritise events from both systems
Victor’s integration with C•CURE 9000 enables operators to monitor and prioritize events from both systems and to color code them for rapid identification in order to facilitate quick response times. Combine these with other innovative C•CURE 9000 features and you have a formidable integrated security solution which can provide security or operational personnel with all the information they need to make quick decisions and take appropriate command actions if an incident or emergency occurs.
The event, which was supported by a number of C•CURE 9000 Enterprise Partners as well as a number of third-party manufacturers who have integrated their solutions with the platform, was by all accounts a great success, with many of the delegates contributing to the session dedicated to discussing the new features and innovations which could be introduced in future updates of the C•CURE 9000 platform.
Intelligent Communications Solutions
Russell Baker, Southern Area Business Development Manager for Zenitel, the UK’s leading specialist provider of intelligent communications solutions, said “We were very pleased to be able to participate in the end user event. We were able to take the opportunity to demonstrate how the deep level of integration which can be achieved between the C•CURE platform and Zenitel’s intercom and public address systems, enables our mutual end-user clients to take their security to the next level.”
“For high security and mission critical applications, the interaction that takes place between the two solutions will ensure security personnel are able to strictly control who has access to restricted areas and react quickly to any incidents.”
Traka - C•CURE 9000 Integration
Traka showcased how its intelligent key and equipment management systems have been integrated with C•CURE 9000Traka, a division of Assa Abloy, showcased how its intelligent key and equipment management systems have been integrated with C•CURE 9000. “Our ability to support C•CURE 9000 means there is so much more we can do together to provide end-users with greater value from their electronic security system,” said Steve Bumphrey, UK Sales Director for Traka ASSA ABLOY. “The level of integration achieved means end-users can use the C•CURE interface to enrolI authorized personnel into the Traka database and then control access to our key cabinets and intelligent lockers, as well as manage the removal of physical assets. Traka generated real-time alarms can be seamlessly managed via the C•CURE 9000 platform and improved efficiency comes from only needing a single credential for both systems.”
Other successful integrations with C•CURE 9000 which were highlighted at the event included:
FireClass, a revolutionary new class of commercial fire detection products which are packaged as an easy to install, out-of-the-box, digital open-protocol solution. Designed and engineered in Europe, FireClass technology is part of Tyco’s family of solutions.
3D Fingerprint MorphoWave from Idemia, the market leader in augmented identity. Immune to environmental factors such as dust and lighting, MorphoWave acquisition of finger prints is dynamic, high speed and because it is touchless it offers the additional benefit of being hygienic.
Pulse Secure, the provider of Secure Access solutions, announced that analyst firm Frost & Sullivan recognized Pulse Secure among the top four major NAC leaders in the SMB to Large Enterprise segment by market share and among the top three NAC vendors showing the most significant market share gains.
The recent Frost & Sullivan ‘2018 Network Access Control (NAC) Market, Global, Forecast to 2022’ report states that network visibility is critical. Every device on a network is a potential attack or reconnaissance point that must be discovered and secured, and the increasing level of malware and cyberattacks are driving NAC investments.
Software-Driven Secure Access Solutions
Pulse Policy Secure delivers a full-featured NAC solution that is easy to deploy, manage and scale
NAC vendors have been able to add value to licenses by offering added endpoint posture assessment and remediation services, and integration modules. NAC vendors are delivering improved features and functions for visibility, mobility, BYOD, IoT and automated threat response. The result is sustained growth for the NAC market where revenues are expected to grow from 2017 – 2022 at a 16.9 percent CAGR, reaching $2.1B in 2022.
The published report provides an overview of the market including NAC capabilities, technology, drivers, adoption trends and competitive insights. Pulse Secure offers a portfolio of software-driven Secure Access solutions that satisfy usability, contextual intelligence and policy orchestration to support data center and hybrid IT environments. Sold separately or as part of a Secure Access Suite, Pulse Policy Secure delivers a full-featured NAC solution that is easy to deploy, manage and scale.
Highlights Of Pulse Secure’s NAC Solution:
Markets. BYOD, IoT, interoperability and enforcement drive sales in all geographic regions, with financial services, government, healthcare and manufacturing/high tech among Pulse Secure’s key markets.
Product. Pulse Secure NAC provides 360-degree visibility with enforcement to see, monitor and control managed, unknown and IoT devices connecting locally or remotely to the network.
Value. Customers can start with Pulse Profiler to discover, assess and inventory network devices. With full network visibility, customers can then use Pulse Policy Secure NAC to invoke access, enforcement and threat response policies, orchestrated via API, Syslog, SNMP and IF-MAP protocols.
Value. Pulse Secure’s highly scalable architecture is ideal for large enterprises and MSSPs. Each high-performance appliance can control up to 50,000 users. The solution also includes an embedded, enterprise-class RADIUS server.
Enhanced Security Posture
The report also cross-references solution attributes compared to other NAC market leaders such as Cisco, ForeScout and HP/Aruba. According to the report findings, “Unlike pure-play NAC offerings, Pulse Secure’s solution can include both VPN and NAC which enables unified visibility, consistent endpoint compliance policy and access control for data center and Hybrid IT.
Pulse Secure works with popular switches, wireless, NGFW, EMM, SIEMs and endpoint security for automated threat response"
“Customers gain a stronger security posture, expedited deployment and lower TCO by leveraging a common client, policy and management framework. Unlike infrastructure NAC, Pulse Secure works with popular switches, wireless, NGFW, EMM, SIEMs and endpoint security for automated threat response. This proven, interoperable architecture simplifies deployment, administration and orchestration.”
Integrating NAC With VPN
“Pulse Secure is experiencing a resurgence in NAC adoption driven by sales of Pulse Policy Secure, our enterprise NAC solution, Pulse Profiler which offers endpoint and IOT device discovery, classification and monitoring, and as part of our Secure Access Suite that integrates NAC with our VPN, mobile and cloud security solutions,” said Prakash Mana, vice president of product management at Pulse Secure.
“We are pleased to receive these NAC market distinctions as an enterprise market segment leader and among the top vendors showing significant market share gains.”
“Network visibility and the increasing level of malware and cyberattacks are driving NAC investments as end user and IOT devices are ultimately the place where intrusions to networks matter, and the last chance to defend or detect a network breach,” said Tony Massimini, senior industry analyst at Frost & Sullivan. “Pulse Secure provides a complete NAC platform, and when combined with their VPN solution provides enterprises a centralized view of remote, cloud and network user and device activity and compliance, as well as threat response.”
Security Essen 2018 presented itself as the international source of inspiration for the industry. 950 exhibitors from 43 countries showed their innovations for increased safety and convenience to over 36,000 trade visitors from 125 nations at Messe Essen on topics ranging from cyber security to innovations for building security and new solutions for the protection of valuables.
The representatives of the companies, associations and institutions were in great demand as discussion partners. There was strong need for information and investment from trade visitors as a result of current events such as hacker attacks, challenges involving access control at airports, the still-high number of break-ins and increasing legal requirements. The exhibitors praised the significantly increased percentage of international visitors (eight percent up) and the strong decision-making authority of the trade visitors.
Security Essen attracted more than 36,000 professional visitors – including experts from industry and installers
"Security Essen has underlined its position as a trend-setting international trade fair for all aspects of security. We were able to welcome significantly more visitors from abroad – 125 nations, that's an impressive number", says Oliver P. Kuhrt, CEO of Messe Essen. “Protection – whether public or private, digital or analog – is the central theme of our time. Our exhibitors provided answers to these challenges and presented trend-setting solutions. The high number of first-time exhibitors who showed their services to the specialist world indicates the importance of our trade fair as an independent platform for the security industry."
There were more than 200 new exhibitors, including Hoppe AG, PwC Cyber Security Services and AEG ID. The trade fair attracted more than 36,000 professional visitors – predominantly including experts from industry, installers and participants from the security sector – who were characterized by greater internationality, a significant interest in new products and new business contacts as well as a strong willingness to invest.
There were more than 200 new exhibitors, including Hoppe AG, PwC Cyber Security Services and AEG ID
Numerous New Products
Around 40 percent of the visitors came from abroad (2016: 32). The 76 percent of visitors were decision-makers within their companies and one quarter prepared their investments at the trade fair or concluded contracts directly. After all, the economy is still excellent. Industry sales in Germany alone are estimated at around 17.2 billion euros – a two-year increase of 18 percent. 62 percent of visitors rated the economic situation in the security sector as good to very good. Over 90 percent were satisfied with their visit to the fair and want to recommend Security Essen to others.
The relevance of Security Essen as a pulse monitor for the security industry was particularly evident in the numerous new products. Once again, the influence of digitization became clear: access solutions are becoming smarter and rely on smartphones or biometric identification as keys.
Evaluate Video Data Faster
Protection of data and networked access was an all-encompassing topic for numerous exhibitors and many lectures
Artificial intelligence helps to evaluate video data faster and more accurately. Apps display unsecured windows in the smart home or help keep track of valuable contents of safes. The protection of data and networked access was an all-encompassing topic for numerous exhibitors and many lectures.
The winners of the Security Innovation Award attracted a great deal of attention. Seven exhibitors were honored with this award for their pioneering innovations. UrbanAlps convinced the jury with Stealth Key, a forgery-proof key from the 3D printer. The Jansen Tore burglar-proof sectional door with WK5 classification, which also received a prize, is especially secure – suitable, for example, for museums, hazardous material stores or military headquarters. Kötter Security received one of the coveted awards for the new emergency call and service control center, in which high-tech infrastructure and digital processes ensure the best possible customer security.
New Service Facilities
Security Essen was held for the first time in the modernized halls of Messe Essen, which will set new standards once the final construction phase is completed in 2019. Spacious, single-storey halls, plenty of daylight, the new glass entrance area and new service facilities such as the Business Club have already delighted exhibitors and visitors.
Security Essen also provided optimal visitor and exhibitor communication with a new hall structure organized according to exhibition areas. The guests of Security Essen praised the division of the fair into key topics. The exhibition hall for Cyber Security and Economic Security celebrated a successful premiere. Exhibitors such as the Federal Office for Information Security, Telekom Security, Advancis Software & Services GmbH and the newly founded Federal Association for Critical Infrastructure Protection (BSKI) presented here.
Numerous campaigns and events relating to the actual trade fair events offered visitors genuine added value
Thematically Suitable Exhibitors
Numerous campaigns and events relating to the actual trade fair events offered visitors genuine added value. Thus on the ‘Day of training and further education’, which was organized by the Federal Association of the Security Industry (BDSW) and Messe Essen, 300 participants of the security industry were provided with information on training possibilities and career opportunities. At the new Cyber Security Conference, Arne Schönbohm, President of the Federal Office for Information Security, spoke about cyber security as a challenge for politics, business and society. The computer scientist Jan Krissler, known as Starbug, was also a guest at the top-class conference.
Gregor Gysi, member of the Bundestag of the German party ‘Die Linke’, discussed the economic importance of cash at the BMWL (Federal Association of Medium-Sized Value Logistics Companies) booth. In the security experts’ forum, practical experts designed a non-stop programme with more than 90 presentations. The guided tours were expressly aimed at architects, planners, installers, operators, authorities and employees of construction and planning departments and stopped at thematically suitable exhibitors.
Topic Of DigitizationCooperation between Western Business Exhibitions and Messe Essen offers a comprehensive platform for business
The organizers are already setting the course for the next Security Essen, which will take place at Messe Essen from 22 to 25 September 2020. The new thematic hall structure will be further expanded and the topic of digitization will be explored in greater depth. Numerous exhibitors have already confirmed their registration for the next event. 88 percent of the visitors have already stated their intention to participate in Security Essen 2020.
The fair is also taking a further step towards internationalization: From 9 to 11 April 2019 ‘The Security Event - powered by Security Essen’ will take place for the first time in Birmingham, Great Britain. This cooperation between the British trade fair organizer Western Business Exhibitions and Messe Essen offers the European security industry a comprehensive platform for business in Great Britain. Over one hundred of the world's leading security brands are exhibiting.
950 exhibitors from 43 nations presented innovations in the field of civil security at Messe Essen. The projection for the last day of the fair estimated 36,000 visitors from 125 nations including conference participants, VIP guests, delegation participants and journalists (including FKM projection of 33.000). The proportion of professional visitors was 99 percent.
The hall distribution was particularly great success this year
Andreas Straubinger, Region Manager D/A/CH, Vanderbilt International GmbH said, “Our stand position in the new Hall 6 was a very good choice. Visitor footfall was above average and the results were even better than we saw at the last Security 2016 trade fair. We thought the hall distribution was a particularly great success this year. The number and quality of our D/A/CH trade fair contacts were very good; not only this but we were delighted to see how many trade fair visitors attended from around the world, which was a great fit for Vanderbilt’s global orientation. The trade fair contributed to further developing the level of awareness of the Vanderbilt brand. We consider Security to be the leading trade fair for our industry. It is an excellent platform from which to present our solutions to a broad audience.”
Extremely Well Informed
Security Essen set up its own exhibition hall for cyber security this year for the first time, to us it was a logical step to come and present our products"
Bernd Hohlfeld, Management Board, ALVARA Cash Management Group AG commented, “For us, Security Essen has been our most successful trade fair to date. The high levels of demand for our ALVARA Logistic App and ‘Digital Driver Legitimation’ were one reason, but not the only reason by any means. In particular, the BMWL joint stand brought together all of the stakeholders in cash services, offering an overall solution for efficient cash circulation. The joint stand was well placed not only to present the route to innovation but also to confirm it. The concept is very impressive and we will be back in 2020.”
Knud Brandis, Managing Director of PwC Cyber Security Services GmbH said, “PwC Cyber Security Services GmbH is Germany’s leading consultancy firm for data security. As Security Essen set up its own exhibition hall for cyber security this year for the first time, to us it was a logical step to come and present our products and services here. The topics which were in particularly high demand were information security, data protection, emergency services and cyber security. The trade visitors were extremely well informed and precisely our target audience.”
Invaluable Validation Stamp
Sebastian Mosbacher, Managing Director, Stölting Service Group commented, “Stölting Security was extremely satisfied with Security Essen 2018 in Essen. As a large security services provider operating in Germany, we were able to present our services and position ourselves in the best possible manner. The second day saw high footfall and was of great significance for us as a trans-regional personnel service provider operating in the sector of cleaning, security and staffing. Stölting Service Group will be back in 2020!”
Dr. Alejandro Ojeda, CEO and Founder of UrbanAlps AG said, “Security Essen was beyond our wildest expectations; it has been one of our best platforms to get in direct contact with our target audience at an international level. Furthermore, winning the Security Innovation Award 2018 for our core product the Stealth Key, the worlds’ first 3D metal printed key, has been an invaluable validation stamp from arguably the world’s leading security fair. It is clearly the place to be for security and we eagerly look forward to come back once again in 2020.”
Topics discussed at Security Essen were information security, data protection, emergency services and cyber security
Convenient Contactless Handles
Rainer Schratz, Marketing Manager, HOPPE AG, Stadtallendorf commented, “HOPPE presented at Security Essen for the first time this year – and so far, we are extremely satisfied with the results of the trade fair. Security Essen is a good platform for HOPPE innovations and expertise in the field of protection and amenities; this is also clear from the high number of contacts we made at the trade fair – both with customers as well as visitors who came from segments which are new to us, for example from the electrical wholesale trade.”
“Of course, the quality of the new contacts can only be evaluated after the trade fair but we are delighted with the high level of interest shown by visitors in our products – both from trade visitors and from the media. Visitors were particularly appreciative of our innovations such as the burglar-proof window handles SecuForte with automatic locking function and convenient contactless front door handles or the wireless window handle offering central locking.”
Diverse Possibilities Offered
Current aspects such as ‘Security technology in the smart home’ and ‘Digitisation and cyber security’ were afforded a great deal of attention"
Norbert Schaaf, Chairman of the Federal Association of Security Technology (BHE) and Chairman of the Advisory Board for Security Essen said, “Trade fair visitors from around the world were able to seek information about the diverse possibilities offered by modern security technology from around 950 exhibitors. The new layout, with six primary areas, also received very positive feedback. The profile of the Security trade fair offers the right background for the entire security industry.”
“As a specialist trade fair, it specializes in security and therefore offers the ideal platform for providers and users to share information and views. Current aspects such as ‘Security technology in the smart home’ and ‘Digitisation and cyber security’ were afforded a great deal of attention. The innovative spirit of the security providers also became particularly clear at the presentation ceremony of the Security Innovation Awards 2018.”
Secured Connectivity Platform
Serge Coppens d'Eeckenbrugge, Regional Manager BNL - DACH, Managing Director DACH, UTC Fire & Security commented, “Smart buildings and smart homes were the focal point of this year’s Security Essen. Thanks to UltraSync, the new secured connectivity platform, integrated smart home or smart building security solutions can be managed using the internet. UTC Fire & Security presented their Lenel range, which offers various security technologies (video, access, fire and burglary), which are integrated into both the home and larger-scale environments in a user-friendly manner.”
“The trade fair offered us the ideal platform to present our upcoming new product range of cable and wireless fire alarm systems. The feedback we received from both the domestic market and neighboring countries was outstanding. The relaxed stand design provided the perfect environment for intense yet enjoyable conversations. Security Essen was very successful for us and we are looking forward to taking part again.”
The relaxed stand design provided the perfect environment for intense yet enjoyable conversations
Digital Burglary Protection
Dr. Florian Scharr, Press Spokesman, VdS Schadenverhütung GmbH said, “Our goals were surpassed at Security Essen. At times, our stand was besieged! The burglar protection was particularly important and the topic of digital burglary protection was in high demand, which was very pleasing. We are delighted that so many industry representatives as well as numerous installers and planners came to find out more about VdS. Security Essen is a very important trade fair for us.”
For the first time, the three security associations -BDGW, BDSW and BDLS – presented themselves together at Security Essen"
Dr. Harald Olschok, Managing Director, BDSW Bundesverband der Sicherheitswirtschaft commented, “Once again we can look back on a successful trade fair week. For the first time, the three security associations – Federal Association of German Money and Value Services (BDGW), Association of private security industry (BDSW) and Federal Association of Aviation Security Companies (BDLS) – presented themselves together at Security Essen.”
Buy Something Specific
“The expert visitors and interested guests were informed about the work of the security associations through various events and lectures in the trade fair forums. Alone on the ‘Day of training and further education’, which takes place in cooperation with Messe Essen, around 300 visitors again took part.”
Friederike Nielsen, VP of Marketing, Dedrone GmbH said, “Two years ago, our subject area ‘protection from civil drones’ was still very new. Even then, we made a great deal of interesting contacts with German and international customers and partners at Security Essen. Since then, our market has seen a great deal of additional growth. A great deal of visitors has come to our stand with a specific intention – many of them have an intention to buy something specific. We are leaving the trade fair very satisfied and will definitely be back.”
By leveraging each other‘s technologies as companies sharing the dormakaba banner, LEGIC and Farpointe Data are at the forefront of the new expanding market for secure mobile credentials. LEGIC‘s 6000 series reader ICs and the mobile service LEGIC Connect are at the heart of Farpointe‘s new, award-winning Conekt mobile smartphone access control solution.
Farpointe’s first Conekt products are the K-BLE mobile access credentials and K-SMART3 electronic access readers with Wiegand output that support both mobile and traditional physical credentials. Electronic access control mobile smartphone-based credentials are an evolution of traditional RFID cards and tags, joining proximity and smartcard credentials to identify a user as he moves about a secured facility.
Mobile Access Credential
Mobile credentials Gartner suggests that by 2020, 20 percent of organizations will use mobile credentials for physical access
Mobile credentials make it possible for smartphones, such as the Apple iPhone and the range of Google Android devices, to be used as an electronic access control credential. Mobile credentials Gartner suggests that by 2020, 20 percent of organizations will use mobile credentials for physical access.
Security professionals creating electronic access control systems need to be aware that over 95 percent of all adults between the age of 18 and 44 own smartphones. Plus, 69 percent of the entire population already uses smartphones. And, the average smartphone user touches their device 2617 times a day (Dscout Research). Thus, practically anyone using an access system already carries a smartphone. Another way to look at it is that every smartphone user, or almost everybody, could now easily download a mobile access credential.
Sensitive Confidential Information
High security Conekt recognizes the latest cybersecurity responsibilities expected of access control system providers. Original solutions often compelled end users to disclose sensitive confidential information about themselves and their installation.
Classic access control is only the beginning of the uses of mobile credentials. More opportunities are on the way"
The new Conekt solution provides an easy way to distribute credentials with features that allow the user to register only once, needing just the smartphone’s number, and requiring no other portal accounts or activation features. “Classic access control is only the beginning of the uses of mobile credentials. More opportunities are on the way.” Scott Lindley, General Manager, Farpointe Data, Inc.
Classic Access Control
Classic access control is only the beginning of the uses of mobile credentials. More opportunities are on the way. How about using a smartphone as an intelligent key for a car? Want to know where a child or loved one is driving, how fast, if he/she added gas or oil or if anyone else is in the car? How about using it to access the gym, automatically sync to a piece of equipment, immediately gain expert advice or analyze the effectiveness of the workout?
Use a smartphone for everything, forget all those other tags and cards. a smartphone will become the passport to all aspects of life, from work to home to avocations. And at a fraction of the investment in traditional credentials, secure mobile Conekt credentials are all anyone will need.
Living in the era of global village, everything is rapid change. To keep up with the pace, the large-scale enterprises need to take every movement of branches in control, ensuring every policy has delivered well. HQ-Branch management, including central control, alarm synchronization, data retention and protection is becoming a great important challenge to enterprises nowadays.
Without integrating lots of systems and management tools, Surveon HQ-Branch security solutions provide VMS with easy remote deployment, advanced VA for alerts and post events search, storage with large capacities for 365-day recording, and local /remote replication through NAS or ISCSI, supporting headquarters (HQ) to easily manage all branches.
Surveon Control Center And Enterprise NVRs
Surveon Control Center provides enterprises with an easy remote deploymentUnlimited number of cameras, users, NVRs, and monitors are supported in one domain architecture, Surveon Control Center (SCC), which provides enterprises with an easy remote deployment. Its monitor wall can be set up with any combination of camera views, making HQ can be easier awarded every branch's movements.
Surveon NVR embedded 12 Video Analytics which can identify and initiate alerts for various user-defined events, offering effective monitoring, detections, alerts, and responses to events for enterprises. For example, intrusion detection can prevent uninvited people from entering the sensitive areas. Moreover, the advanced Post VA Search provides enterprises an efficient tool to quickly identify useful information and relative footage from hundreds of hours of video recording, reducing the time and efforts of HQ security manager, making HQ-branch surveillance system more efficient.
Data Retention And Storage
Surveon Enterprise NVRs provide large capacities for 365-day non-stopping recordingThe data retention of recorded videos and the system which can support hundreds of camera records are of great importance to the planning of enterprise surveillance. Surveon Enterprise NVRs provide large capacities for 365-day non-stopping recording, fulfilling the long-time storage requirements from enterprises.
Surveon NVR supports remote replication through NAS or ISCSI. Enterprise can keep 1st copy in local branch and 2nd copy in remote HQ. If the source data fails due to system malfunctions or disasters, enterprise can leverage the remote copy to restart services in a few minutes.
Agribank, the largest commercial bank in Vietnam, and House Green, a home improvement retail chain in Taiwan, has adopted Surveon HQ-branch solutions. “Different from PC-based NVR solutions, Surveon adopts a system design fully customized for surveillance applications. This offers higher value for SIs, including advanced levels of integration and stability.” said the Sales Director of Surveon partner in Vietnam.
Hoverfly Technologies Inc., global supplier of tether-powered aerial drone systems, is pleased to announce it has engaged retired Deputy Chief of Los Angeles Police Department Mike Hillmann to consult and provide expertise to Hoverfly and public safety officials of cities, counties and special law enforcement agencies who are considering the use of Small Unmanned Aerial Systems (sUAS) to assist in keeping their cities safe.
Small Unmanned Aerial Systems (sUAS) When incidents and/or events happen, having ‘real-time, situational awareness’ from above the scene is critical to managing risk and upholding public safety
“With 24-hour news cycles, a never-ending stream of social media posts, mid-term elections and potential threats to the public at large, getting fast, accurate situational awareness from the air during an incident has never been more important when it comes to keeping the public safe. We are thrilled to have Chief Hillmann advising on use cases and how best to implement and integrate this new technology,” says Hoverfly SVP of Systems, Lew Pincus.
When incidents and/or events happen, having ‘real-time, situational awareness’ from above the scene is critical to managing risk and upholding public safety and the safety of those who serve our communities.
He adds, “We typically have relied on manned aircraft to provide aerial coverage over a variety of incidents. On occasion, those assets have not always been available, deemed too disruptive or too expensive to deploy in certain situations where an aerial view clearly could have helped an incident commander better understand the situation. Deploying small tether-powered, highly portable, unobtrusive persistent cameras positioned high above the scene can now be used as either a standalone capability or integrated system with existing networks, security infrastructure and even manned aircraft.”
Hoverfly tether-powered sUAV (Small Unmanned Aerial Vehicles) systems solve short battery-life problems associated with free-flying dronesToday, Mr. Hillmann is helping chiefs of police, local city and county officials and other public safety personnel understand how Hoverfly’s tether-powered LiveSky systems can be deployed from police or EMS vehicles providing incident commanders with actionable intelligence from high above the scene within minutes of arrival. “Tactically, having the ability to stay in the air monitoring the situation from above for hours, days, even weeks at a time represents an amazing capability we never had before. During my career, I can think of hundreds of situations where having a drone in the air to provide real-time intelligence, surveillance and reconnaissance would have helped keep my officers and the community much safer. It’s a force multiplier that should be exploited by public safety,” says Hillmann.
Hoverfly’s LiveSky Systems
Hoverfly tether-powered sUAV (Small Unmanned Aerial Vehicles) systems solve short battery-life problems associated with free-flying drones because they operate using a standard 120VAC power source or vehicle inverter. The power, command and control information and video are transmitted over the tether making the entire system completely secure from jamming, hacking or spoofing, ensuring the privacy of the data and improving safety. Perhaps the biggest benefit of Hoverfly systems is they are autonomous and require no piloting skills. The CEO of Hoverfly likes to say, “if you can operate an elevator, you can operate our LiveSky system.”
As prime targets for criminals, banks have always faced major security challenges. But today, when banks are pressed to increase revenues, improve operational efficiency, and mitigate risk, defending against security threats is increasingly expensive. Two key drivers in the banking sector are customer trust and operational efficiency. Both are significantly strengthened by a quality integrated ‘smart’ banking security solution.
Smart Banking Security Solution
A robust security strategy is of the highest priority and is usually embedded within the bank’s Risk Management Plan. This enables banks to manage operational risk and compliance demands. The modern approach to bank security design incorporates IT, Channel Management and Identity and Access Management systems into one solution.
At the heart of Vanderbilt, systems are compliance with some of the highest industry and regulatory standards. These systems impact all bank functions and help deliver greater trust, operational efficiencies, and excellent customer experience.
Vanderbilt Video Surveillance Vanderbilt can provide live video surveillance that continuously monitors and provides quality images should a suspicious event need to be investigated
In the bank’s self-service area, Vanderbilt can provide live video surveillance that continuously monitors and provides quality images should a suspicious event need to be investigated.
Meanwhile, Vanderbilt’s Seismic detectors protect ATM's 24/7. These detectors give immediate and reliable alerts of attacks on the enclosure, but unlike other detectors, do not register false alarms triggered by passing traffic or the vibrations of the ATM itself.
Seismic Detectors And Interlocking
Electronic security measures are also used in other banking situations – for example, when a customer claims he tried to withdraw cash from an ATM and was issued a receipt, but no cash – the bank can check with a specialized data department to ascertain whether the money was deducted from the customer’s account.
When a staff member unlocks the vault, the door to the secured area simultaneously locks
Unique codes grant workers who fill ATMs access to secured areas and the ability to unlock ATM's. The worker's code over-rides any ‘delayed unlock function,' so he can immediately access the ATM and fill it. There are set time limits for the work to be done. The ATM buzzes for a pre-determined time before the machine is due to auto-lock. If the worker needs more time, he can delay this. Once the job is done – the ATM automatically locks.
Another example of bank security involves interlocking. When a staff member unlocks the vault, the door to the secured area simultaneously locks. This prevents anyone else from gaining entry until the vault is once again locked. This ensures the safety of staff members and the security of vault contents.
There are many layers of electronic security protecting the bank. If the manager arrives early, he uses his card to gain access to the branch office and a PIN to disarm the alarm. His code disables the office and secure area, but the ATM's, vaults and safe deposit boxes remain armed. A Central Monitoring Station is alerted to the early entry. They need to know whether the entry is routine or under duress. The monitoring station views the manager on live video as he executes a pre-determined security procedure and until he hits an ‘All is OK' button. If there is a problem – the manager can send a silent ‘Duress Alarm' rather than the ‘All is OK.' The Monitoring Station can listen in – and if necessary can call the police.
Security in banking is an essential issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability – flagship traits of the Vanderbilt brand. Banks wish to operate in an open and friendly layout while ultimately safeguarding their customers, staff, and assets. Vanderbilt's solutions respond to these expectations and enable active safeguarding foundations to be laid.
Established by the French Government’s Ministry of Finance and Economics, the ACCORD project was commissioned to design and implement financial system modernization. The charter of the ACCORD initiative team, composed of representatives from multiple government ministries, is to architect solutions that enable the French government to manage the finances of the country with the same level of accountability as private sector enterprises. The technology-based infrastructure selected was a smart card solution to confirm and authenticate users across 40 departments.
HID Global’s Identity Assurance Software
The systems operated in parallel but could not leverage the benefits of a unified system.
AIFE – Agence pour l’Informatique Financière de l’Etat – chose HID Global’s Identity Assurance software coupled with smart cards for the solution.
Ensuring users are ‘who they say they are’ over the course of several decades, individual French government departments had developed separate and distinct applications to manage activities such as budgeting, processing purchase orders, and other accounting activities. The systems operated in parallel but could not leverage the benefits of a unified system.
Enterprise Resource Planning System
With the inception of the ACCORD project, the government committed to streamlining finance management by moving to one system for centralized control of the country’s budgeting and finance operations – with a goal that by 2004, all government central entities will be using the standard Enterprise Resource Planning (ERP) system. The transition to an online application that consolidates financial reporting and transactions requires an organization to determine how it will identify users with certainty prior to granting them access to the system and to valuable data.
The solution must be easy to use to ensure departmental acceptance of the new application and authentication process. It must also minimize the IT staff time required for day-to-day administration and helpdesk activities for a large population over 7,000 dispersed users. These multiple challenges presented an opportunity to leverage proven digital identification solutions from HID Global.
Smart card-based PKI Identification Solution
HID Global’s Security Client software solution and smart card readers are key elements for securing the finance system at all user points of entrySmart card-based solution using digital certificates with PKI, The French government-wide implementation securely links multiple departments, such as the Ministries of Education, Justice, Transportation and Housing, and Foreign Affairs, to the unified ERP application, enabling the exchange and ultimate consolidation of digital information.
In 2000, the Ministry of Finance began deploying HID Global’s smart card-based PKI solution. HID Global’s Security Client software solution and smart card readers are key elements for securing the finance system at all user points of entry – any of which could become a source of fraudulent or malicious activity in the absence of strong authentication and confirmation of digital identity. Today, employees regularly use the card with a microchip that holds their unique credentials in the form of an Entrust digital certificate.
HID Global’s Gold Entrust-Ready certification ensures a smooth deployment to large numbers of users, and the combined solution with Entrust TruePass delivers the following benefits:
Enhanced Security: HID Global’s multi-factor authentication reinforces the fundamental security and intent of a PKI by requiring something the user has (a smart card) and something the user knows (a PIN code) in order to use the private keys stored on the card. To further enhance security, the key pair is generated on the cryptographic smart card itself, so that the private key is never exposed to the insecure PC environment. The tight integration of HID Global’s client software with Entrust ensures certificate key updates are transparently and automatically made on the card.
Non-Repudiation: To support non-repudiation, it is essential that ERP system users provide undeniable proof that they are who they say they are. Keys used for that authentication can never be stored on the potentially vulnerable user workstation. Those sensitive keys must remain under the sole control of the user, and HID Global’s client software ensures private keys are generated on the card and remain in the rightful owner’s possession at all times.
User Simplicity: HID Gobal’s Security Client software provides a familiar ATM-like user interface that makes complex digital identity and PKI technologies transparent, so employees can focus on their work responsibilities and financial application activities to easily access the system. HID Global’s commitment to openness and industry standards ensures that the French Government’s initial investment in digital identity products and smart card client software infrastructure is capable of supporting multiple PKI vendors and other forms of identity credentials in the future.
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?
Finding the exact right technology to solve an end user’s problem is challenging, but the rewards are great when an integrator gets it right. A wide range of available product types, price levels and added features increases the likelihood of identifying a technology to solve any problem. But with so many technology and product choices in the marketplace, identifying that one solution can be akin to finding a needle in a haystack. We wondered whether a vast range of product choices is always a good thing. We asked this week’s Expert Panel Roundtable: Are security integrators and end users overwhelmed by “too many choices” related to security equipment and systems? How can they make sense of it all?
Consolidation – a decrease in the number of companies in a market achieved through mergers and acquisitions (M&A) – has been an important trend among manufacturers in the physical security market for many years. More recently, the trend has also appeared to extend to the integrator market. Larger integrators have been buying up other large integrators; in some cases, they have also been buying up smaller, regional integrators to expand their geographic coverage area. We wondered if this week’s Expert Panel Roundtable has noticed the trend. We asked: Has consolidation among security companies shifted to the integrator/installer market? What is the impact?