Electronic security systems
TE Connectivity, a renowned provider of connectivity solutions and sensors, has maintained its place for the fourth year in a row among a growing number of employers to be named a Best Place to Work for LGBTQ Equality in the United States. Corporate Equality Index (CEI) By adopting policies ensuring antidiscrimination, equal medical benefits, internal training and education and more, TE earned a perfect 100 percent ranking on the Corporate Equality Index (CEI), a national benchmar...
ETSI's new Industry Specification Group on Securing Artificial Intelligence (ISG SAI) announced that they met recently for their second meeting and appointed Alex Leadbeater (BT) as the Industry Specification Group’s new Chair. Dr. Kate Reed (NCSC) was appointed as First Vice Chair and Tieyan Li (Huawei) was appointed as Second Vice Chair. The second meeting of the ISG SAI, after the launch of the group in October 2019, was also the place to discuss work priorities and future scope of act...
Building upon the success of previous editions, India Trade Promotion Organization (ITPO) and Exhibitions India Group are set to return with the 28th edition of Convergence India Expo, co-located with the Internet of Things India Expo, EmbeddedTech India Expo and Mobile India Expo. This year also marks the launch of the much-awaited Fintech India Expo, as well as the Gamethon Expo. Convergence India 2020 Expo Convergence India 2020 Expo is an international platform for overseas and Indian exhi...
Bird Home Automation records a positive balance for 2019. Compared to the previous year, the German manufacturer of DoorBird IP video intercoms increased annual revenues by more than 20 percent. The demand for the company’s smart intercoms rose worldwide. The strongest performing markets were the United States, Germany and France. Last year, Bird Home Automation also increased its staff, and now has over 120 employees working in the company´s headquarters in Berlin and its sales off...
Evolis, global company involved in personalization solutions and instant printing systems, has announced launching a new Card Lamination Module (CLM) for Avansia, compatible with its Avansia card printer. In a very demanding market, the Evolis Card Lamination Module reduces the risk of card fraud and increases significantly the useful life of the official identity documents or the access control badges. Avansia Lamination system The Avansia Lamination system combines the Avansia Printer with...
VIZpin, designer and manufacturer of the VIZpin smartphone-based, Bluetooth enabled access entry system, has recently announced the addition of Rui Manuel Barreira to its executive leadership team. Barreira joined the Lancaster, PA-based company in the role of vice president of technology. Barreira will be responsible for managing VIZpin’s global engineering and product teams, execute VIZpin’s product strategy and expand VIZpin’s patent portfolio. He will also develop and mana...
In a world increasingly exposed to technology-based cyber security threats, the global insurance industry is well-positioned to play a greater role in rewarding those organizations that take cyber security seriously and have standard solutions in place to counter them. This is the call from globally renowned cyber analytics company, CyberCube in a report timed for release to coincide with the World Economic Forum annual meeting in Davos, where its chief executive is participating. Cyber security best practices Pascal Millaire, Chief Executive Officer of CyberCube, outlined in discussions in Davos that in addition to offering beneficial terms to organizations demonstrating best practice in cyber security, insurers must work closely with governments to help enforce minimum security standards. Insurers were also well-placed to offer approved vendor cyber security schemes He also argued that insurers could help clients reduce cyber losses by sharing information they gain from managing large volumes of cyber claims. Insurers were also well-placed to offer approved vendor cyber security schemes. Enterprise security Furthermore, businesses need to think differently about how they approach cyber risk. Rather than viewing it as an issue for their IT departments, they need to address it across their entire organizational structure in a much more holistic way. CyberCube is one of the globally renowned providers of cyber risk analytics to the insurance industry. Its report, Understanding the Societal Impact of the Fourth Industrial Revolution and The Role of Insurance, explores society’s growing vulnerability to digital risks and the steps the insurance industry can take to address the threat. Rise of 5G network The report notes that the arrival of 5G networks being rolled out around the world will provide criminals with faster and wider access to critical infrastructure and associated online services. As 5G becomes widespread, larger data packages will facilitate easier and more impactful cyber-attacks without any geographic boundaries. Pascal Millaire of CyberCube explained, “For centuries, the insurance industry has been the key to unlocking the economic potential of new technology. Part of this has always been insurers’ ability to drive improvements in safety and regulation. That ability will be critical as global cyber risk increases”. Digitize services and products He adds, “We’re at a point at which the global economy is racing to digitize services and product offerings. This has far-reaching implications for society. With the exponential rise in the connected economy, there is a huge opportunity for both innovation and exploitation. As tangible and intangible items become hyperconnected, the implications of failing to get security and privacy right have much bigger consequences than they did in the past”. Pascal further added, “Given the risks attributable to cyber can never be reduced to zero, insurance provides a way to transfer some of an organization’s cyber risk. For a company spending $20 million on cyber security, it is appropriate to ask whether that company is best served by spending an incremental US$ 1 million on more cyber security or by buying cyber insurance, when a holistic risk management lens is considered.” Countering disruptive cyber-attacks and ransomware Electoral systems are also vulnerable, as was demonstrated in the Ukrainian elections of 2014 The report highlights a range of digital threats including disruptive cyber-attacks, ransomware, as well as the targeting of infrastructure and transportation systems. Electoral systems are also vulnerable, as was demonstrated in the Ukrainian elections of 2014. Pascal Millaire was taking part in a workshop at Davos titled ‘Market Incentives for Secure and Responsible Innovation’. He was invited to attend as CyberCube was named by the World Economic Forum as one of its Technology Pioneers in 2019. Deploying advanced digital technologies, innovations Technology Pioneers are early to growth-stage companies from around the world that are involved in the design, development, and deployment of new technologies and innovations, and are poised to have a significant impact on business and society. The report notes that US$ 1.25 trillion was spent on digital transformation globally last year, a figure projected to rise to US$ 1.97 trillion by 2022. The use of models to simulate cyber threats and assess their financial and societal impact will be a useful tool. CyberCube’s models are already used by a range of insurance businesses to analyze and stress test their portfolios of cyber insurance.
GlobalPlatform, the standard for secure digital services and devices, alongside prime sponsor Oracle and supporting sponsors STMicroelectronics and Able Device, is hosting a free technical workshop in Nuremberg on Thursday February 27, 2020. The full day workshop will educate delegates on the value of Secure Elements (SEs) to secure and enrich the deployment of Internet of Things (IoT) devices. Workshop on Secure Elements (SE) The workshop offers project managers, security experts, product suppliers, technical consultants, developers and systems integrators an opportunity to gain insight into why SEs can add value to IoT devices and how they can be quickly and cost effectively integrated to offer Root of Trust services. Beginning with an overview of the SE itself and the latest SE technologies for IoT, the workshop will be focused on use cases and demonstrations which expose key IoT security and implementation challenges and how the SE can be used to solve them. Integration of connected devices into our everyday lives emphasizes the need for standardized security platforms" “The increasing integration of connected devices into our everyday lives emphasizes the need for standardized security platforms on which innovation can thrive,” comments GlobalPlatform Executive Director Kevin Gillick. “The free technical workshop is an unparalleled opportunity for anyone involved in the deployment and management of IoT devices. Delegates will gain first-hand insight into the technologies themselves and be exposed to real use cases for how the SE can solve IoT security implementation challenges for any device.” SE technology and use in IoT devices The workshop will be presented by GlobalPlatform Technical Director, Gil Bernabeu, alongside Oracle’s Senior Director of Java card, Calinel Pasteanu. The opening two sessions will include an introduction to SE technology and its uses in IoT. Oracle will offer an in-depth overview of how Java Card technology, as an open and standards-based application engine, delivers security and connectivity services to suppliers of IoT devices and solutions. The final session will focus on use cases for multi-cloud authentication and secure communication using Java Card, onboarding technologies, attestation and chip to cloud data protection. For many of these cases, a demonstration and / or source code explanation will be shared. The workshop is scheduled at a time and location that will be convenient for those attending Embedded World.
TE Connectivity Ltd., a globally renowned provider of connectivity solutions and sensors, has been named to FORTUNE magazine's List of the World's Most Admired Companies for the third year in a row. The annual survey, conducted by FORTUNE and Korn Ferry, is given to top executives, directors and financial analysts to identify the companies that enjoy the strongest reputations among their peers and across industries. TE Connectivity was ranked fifth in the electronics industry. TE Connectivity TE's teams globally innovate products that are integral in making all of our lives safer and more sustainable" "TE's teams around the world innovate products that are integral in making all of our lives safer and more sustainable, as well as more productive and connected," said CEO Terrence Curtin. "I am proud that we have once again been recognized by business leaders across industries and geographies and I am appreciative of the work of our global teams for their continued dedication to our customers and our purpose." TE Connectivity helps customers in approximately 150 countries create the technology of tomorrow in industries including transportation, aerospace, industrial applications, medical technology, energy, data communications and home appliances. Separately, FORTUNE honored TE Connectivity last year by ranking the company fourth on its 2019 Change the World list for its technological contributions to medical devices used for minimally invasive procedures. World's Most Admired Companies list The World's Most Admired Companies list is the definitive report card on corporate reputation. To compile the rankings, corporate reputation and performance are measured against nine key attributes: innovation, people management, use of corporate assets, social responsibility, quality of management, financial soundness, long-term investment, quality of products and services, and global competitiveness. TE Connectivity is a global industrial technology solutions firm, involved in creating a safer, sustainable, productive, and connected future. Their broad range of connectivity and sensor solutions, are proven in the harshest environments, enabling advancements in transportation, industrial applications, medical technology, energy, data communications, and the home.
Copp Systems, a Dayton, Ohio-based security and communications systems provider, is celebrating its 100th anniversary this year. Copp Systems (formerly Copp Integrated Systems) was founded in 1920 by Roy Stanley Copp, an engineer and member of the “Dayton Boys,” a group of young engineers and students interested in technology. Copp began selling and servicing RCA living room consoles from his Monument Avenue storefront to prominent Dayton families, including the Wrights, Deeds, and Ketterings. As the business grew and new technologies emerged, Copp Systems added numerous communications systems to its offerings. Today, Copp Systems consults, designs, installs and maintains systems that integrate fire/life safety, video surveillance, access control, nurse call, audio-visual systems and monitoring applications. The firm is also proud to be one of the licensees of Footprint, an innovative web-based situational software developed in partnership with the University of Dayton Research Institute’s Software Systems Group. Video monitoring systems We’re always looking for ways to add new facets to our business to meet our customers’ changing needs" Footprint brings together information from multiple video monitoring systems and sensors into one platform, enabling law enforcement to solve cases quicker using data-driven decisions. "Copp Systems’ hundred-year anniversary is a monumental milestone and a testament to our dedication to customer service,” said David Markham, President of Copp Systems. “Our customers know they can depend on us as their trusted advisors to maximize their resources and deliver a superior level of support. We’re always looking for ways to add new facets to our business to meet our customers’ changing needs.” Copp Systems serves a broad range of industries, including public safety, commercial and industrial, health care, education, government and military, transportation, logistics, financial and retail. Under the leadership of owner and CEO Bill DeFries, the company became verified as a Service Disabled Veteran-Owned Small Business (SDVOSB), opening more opportunities to serve Wright-Patterson Air Force Base and the local veteran community. Electronic security industry DeFries says the key to the company’s future success will be its ongoing commitment to education and eagerness to embrace new technologies. “It says a lot about any company to survive – and thrive — for a hundred years,” said DeFries. "But especially in the electronic security industry, it takes forward-thinking and flexibility to stay ahead of the curve and adapt as new technologies are developed. As Copp Systems propels into a new decade, we’re looking forward to unifying organizations and simplifying lives with the latest technology, all while maintaining our long history of quality customer service.”
Checkpoint Systems came out with a major release of the IoT software platform HALO which comes with omni-channel and task management functionality. HALO now supports in-store fulfillment of omni-channel orders, that is ‘buy online, pick up in store’ and ship-from-store. Using Radio Frequency Identification (RFID) technology and accurate inventory data, HALO helps distributing the orders among stores based on availability. HALO mobile app The HALO mobile app shows store staff the order information, helps scheduling the fulfilment, locating the items and preparing for pickup or shipment. The new functionality will increase in-store productivity, raising the units per hour fulfilled, and boost sales together with customer satisfaction. “Today, to pack an order, the store associate typically uses a printout from the ERP system to look for products in the store. Some items might be already sold, some misplaced. The associate will lose time looking for them and will sometimes have to reject the order. HALO uses near real-time inventory data and supports the associate with an easy to use app throughout the in-store fulfillment process, making it fast and efficient,” says Phil Fisher, product manager for HALO. Radio Frequency Identification (RFID) technology Inventory accuracy poses a problem for 56% of retailers who are implementing omni-channel programs, according to the market research company Forrester and the National Retail Federation. With RFID, inventory accuracy can be elevated from 65-75% to 93-99%, as found by GS1 and the ECR Community Shrinkage and On-shelf Availability Group. We continuously invest in logistics and IT to streamline the consumer-oriented omni-channel model" “We continuously invest in logistics and IT to streamline the consumer-oriented omni-channel model. With HALO’s new in-store fulfillment functionality, we expect to further optimize operations through inventory accuracy, creating a new level of customer satisfaction.”, says Daniel Muñoz, Operations Director of Desigual, the Spanish-headquartered international fashion brand. HALO Software-as-a-Service platform HALO is a Software-as-a-Service platform that is part of Checkpoint’s RFID solution for retail. HALO tracks every tagged piece of merchandise across a retailer’s supply chain by collecting data from RFID readers in the stores and distribution centers. The platform synchronizes with enterprise resource planning (ERP) and warehouse management system (WMS) software, driving inventory accuracy, on-shelf availability and efficiency across the supply chain. Apart from omni-channel order fulfillment, task scheduling and locating items, store associates use HALO for cycle counts, receiving goods, replenishing shelves and display compliance.
Intersec 2020 in Dubai (United Arab Emirates) from 19th to 21st January 2020 is an internationally renowned trade fair for security, safety and fire protection, where participants will be presenting their latest technology innovations. Intersec Dubai 2020 With 1,200 exhibitors and more than 31,000 visitors from 135 countries, Intersec 2020 will consist of three days of expansive B2B interactions and discussions on new technological developments and expertise in the global security industry and sector. The 22nd event of Intersec Dubai 2020 will be held under the patronage of his Highness Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum. Architect access control readers On the occasion of this global security showpiece event, STid will be exclusively presenting two innovations integrated into the company’s exclusive range of Architect access control readers: A new facial recognition solution A new QR Code module Intersec Dubai 2020 is slated to feature innovations that make access control even smoother and more natural. Visitors can come and check out the various technologies and discuss upcoming projects at Intersec 2020 at the Dubai International Convention & Exhibition Centre on stand SA-F41.
It seems that only a few days pass between cyber security stories of concern to the public such as personal data leaks and DIY home camera hacks. With this in mind and the need for increased connectivity, the industry is in need for guidance in cyber security. 2020 is set to be a year of change for the physical security industry. Here are the top four predictions to stay head of market trends in the year ahead. 1. There will be more clarity for installers about industry-standard for cyber security The professional security industry will next year see the launch of a new set of cybersecurity guidelines Through the work being conducted by the BSIA Cyber Security Product Assurance Group (CySPAG), the professional security industry will next year see the launch of a new set of cybersecurity guidelines. This will provide the industry with the guidance and clarity that is currently missing. A key area of clarification is the chain of responsibility. It is not just the responsibility of the manufacturer to keep everything secure from a cyber-perspective. The whole supply chain is responsible - once a product leaves the lab where they’re manufactured, conditions change. Those who maintain, install and operate the product have a shared responsibility to ensure that a product or system remains cyber secure. As the sector develops and more cyber-enabled products become available to the market, this cyber security approach will become more important, and a key differentiator to the DIY market, which can only be a good thing. 2. Cloud and 4G connectivity are giving end-customers better physical security The percentage of panels connected to cloud services is now increasing every year Manufactures have been producing cloud-ready products for several years. Initially, not all installers had been taking advantage of benefits of cloud-connected panels, however the percentage of panels connected to cloud services is now increasing every year. Trust and education have improved, meaning that installers and end-users have realised that connectivity is positive, enabling consumers to check on their properties remotely and allow installer to remotely support their customers. However, one area of constraint has been the dependency on customers networks which may, or may not, offer the level of performance that a robust and resilient security system demands. With the introduction of mobile data connectivity to connected products over the past few years, and as connectivity becomes more widespread across physical security products there will also be a greater shift toward mobile technologies such as 4G, either as a back up to a router connection or for complete network independence. 3. Connectivity is changing the way installers work Installers are a vital part of the chain of when a new alarm system is fitted into a property Installers are a vital part of the chain of when a new alarm system is fitted into a property, providing both installation and maintenance services. Traditionally maintenance activities have always been delivered on-site. With the increased ease of connectivity for security systems and the advancements in how these systems are used, installers are provided further opportunity to enhance customer service around the delivery of maintenance. It is no longer a requirement to have a customer wait until an engineer can attend a property to remedy a fault, as many can now be addressed within minutes from any location in the world. This ability allows installation businesses to focus their engineers on more critical tasks while delivering an overall higher level of customer service. Indeed, some installation businesses are moving to a model of having dedicated remote support engineers in addition to the road-based team. 4. Manufacturers are ready for IP-only alarms, ahead of the 2025 analog switch off The PSTN switch off being conducted by BT and other service providers is due to be completed in 2025 The PSTN switch off being conducted by BT and other service providers is due to be completed in 2025 as part of the move to Next Generation Networks, ending the use of analog phone lines and moves communications technology into an all IP-only space. Although some service providers have indicated that there may be some type of initial PSTN simulation, those providers that are doing this are also making it clear that this is only a temporary solution. The switch off will be a huge change for the security industry. Where heritage, analog alarm systems are in use, installers will need to plan to reconfigure existing systems to use the temporary PSTN simulation functions (where available) or upgrade systems to an all IP solution. Although 2025 feels a long way off, installers and end-users need to start planning now and taking the necessary action. In our sector, manufacturers are ready for IP-only alarms through the provision of cloud-based solutions and the use of techniques such as SIA IP for ARC monitoring.
Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’. The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall success. Secure work environments For years the tug of war in the security industry has pitted the need for a secure environment against the desire for technology that is convenient for users. However, finding a happy medium between the two has often seemed elusive. I believe you can design and have operational convenience at the same time as achieving high security" Jeff Spivey, a security consultant and the CEO of Security Risk Management, has this to say about it, “If there is an understanding of the security-related risks and their separate and/or collective impact on the organization’s bottom line business goals, a resolution can be reached.” Jeff also does not think that convenience and high security have to be opposing each other. He says, “I believe you can design and have operational convenience at the same time as achieving high security.” Importance of secure access control The premise is that for organizations and spaces to be truly secure, they must be difficult to access. So, by its very nature, access control is designed to be restrictive, allowing only authorized staff and visitors to access a facility or other secured areas inside. This immediately puts convenience at odds with security. Most people will tolerate the restrictive nature of a controlled entrance using badge, card or biometric because they understand the need for security. When that technology gets in the way of staff traversing freely throughout the facility during the course of a business day, or hindering potential visitors or vendors from a positive experience entering the building, they become less tolerant, which often leads to negative feedback to the security staff. Enhancing corporate security Security consultants like Spivey and security directors all stress that understanding the threats and risk levels of an organization will most likely dictate its physical security infrastructure and approach. All the technology in the world is useless if it is not embraced by those who are expected to use it and it doesn’t fit the culture of the organization. Once employees and customers are educated about what security really is, they understand that they're not losing convenience, they're gaining freedom to move safely from point A to point B. Converged data and information shape new access options Migration of physical access control systems to a more network-centric platform is a game-changer for security technologies The migration of physical access control systems to a more network-centric platform has been a game-changer for emerging security technology options. The expansion of the Internet of Things (IoT), Near-Field Communication devices powered by Bluetooth technology, and the explosion of converged information systems and identity management tools that are now driving access control are making it easier than ever before for employees and visitors to apply for clearance, permissions and credentials. Wireless and proximity readers Advancements in high-performance wireless and proximity readers have enhanced the user’s access experience when presenting credentials at an entry and expediting movement throughout a facility. A user is now able to access a secured office from street-level without ever touching a key or card. Using a Bluetooth-enabled smartphone or triggering a facial recognition technology, they enter the building through a security revolving door or turnstile. A total building automation approach adds extra convenience, as well as seamless security, when access technology is integrated into other systems like elevator controls. A total building automation approach adds extra convenience and seamless security How to Meet Security Concerns at the Entry While security managers are charged with providing their facilities the maximum level of security possible, there is always the human element to consider. But does the effort to make people comfortable with their security system ecosystem come at a cost? Does all this convenience and the drive to deliver a positive security experience reduce an organization’s overall levels of security? And if so, how can we continue to deliver the same positive experience including speed of entry – while improving risk mitigation and threat prevention? Door entrances, barriers Users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through Let’s examine some of the various types of entrances being used at most facilities and the security properties of each. With some entrance types, there is the possibility for security to fall short of its intended goals in a way that can’t be addressed by access control technology alone. In particular, with many types of doors and barriers, tailgating is possible: users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through. To address this, many organizations hire security officers to supervise the entry. While this can help to reduce tailgating, it has been demonstrated that officers are not immune to social engineering and can often be “talked into” letting an unauthorized person into a facility. Deploying video cameras, sensors Some organizations have deployed video surveillance cameras or sensors to help identify tailgaters after the fact or a door left open for longer than rules allow. This approach is not uncommon where facilities have attempted to optimize throughput and maintain a positive experience for staff and visitors. Security staff monitoring the video feeds can alert management so that action can be taken – but this is at best a reactive solution. It does not keep the unauthorized persons from entering, and so is not a totally secure solution. Optical turnstiles, speedgates Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself. Not all security entrances work the same way. And, there will always be a balance between security and convenience – the more secure the entry, the less convenient it is for your personnel and visitors to enter your facility. For example, it takes more time to provide 2-factor authentication and enter through a mantrap portal than to provide only one credential and enter through an optical turnstile or speedgate. Perimeter protection So, it is an important first step to determine what is right at every entrance point within and around the perimeter. Remember that convenience does not equate to throughput. Convenience is the ease and speed of entry experienced by each individual crossing that threshold, while throughput relates to the speed at which many individuals can gain access to the facility. A more convenient entry makes a better first impression on visitors and is good for overall employee morale. Throughput is more functional; employees need to get logged in to begin their workday (and often to clock in to get paid), and they quickly become frustrated and dissatisfied when waiting in a long line to enter or exit the premises. Considering form and function when designing a security entrance can ensure that those requiring both high-security and convenience are appeased.
Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customizable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customize devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarized, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analyzing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyze massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyze massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognize residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorized person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.
Using computed tomography (CT) security technology for cabin baggage screening at airports can eliminate the need for passengers to remove liquids and laptops from their bags, thus helping to make the security process easier and more efficient. As the latest in checkpoint scanning technology, CT provides 3D images with much more information to improve threat detection capabilities so decisions by the operator can be resolved quickly and more accurately, without the need for manual search. The whole experience is better and safer for everyone. The use of computed tomography The Netherlands were the first to introduce CT at the checkpoint and the Transportation Security Administration (TSA) in the United States plans to install 145 units in its airports by the end of the year. Australia is already installing and using CT at some of its airports. The United Kingdom is the first country to mandate use of CT for screening cabin baggage, and it is expected that the EU will also mandate this type of technology in the near future. It is expected that the EU will also mandate this type of technology in the near future The process of deploying CT is another level in the evolution of passenger screening and aviation security. Since 9/11, the traveling public has become increasingly educated about aviation security, says Steve Revell, Senior Director of Aviation CT at Rapiscan Systems. “What passengers expect is courtesy, professionalism and, most of all, to be able to travel safely without fear of harm,” he says. “Each level of security we have seen introduced over the years, I believe, shows commitment from all stakeholders to meet these key deliverables.” Rapiscan Systems' 920CT Rapiscan Systems' 3D cabin baggage screening system, 920CT, utilizes patented Dual-Energy technology and a sophisticated algorithm to provide the highest level of automatic detection of highly dense items, as well as automatic detection of explosives based on the most stringent global regulatory requirement. It also has a truck wheel design and contactless power and data transfer, both of which reduce maintenance costs and downtime and make the 920CT more efficient and robust. Rapiscan's 920CT provides the highest level of automatic detection Rapiscan’s 920CT is equipped with advanced software and detection algorithms that are designed to be upgradeable. With 3D volumetric imaging, the 920CT is superior to 2D systems as it provides improved visualization of potential threats. It has also been engineered to integrate seamlessly with Rapiscan’s TRS tray return solution to create a more efficient checkpoint experience, for both passengers and staff. “As a manufacturer, we strive to provide the very best quality service and equipment we can – working closely with regulators and airports alike to ensure the evolution and expansion of air travel is both collectively understood and fit for purpose,” says Revell. Portfolios and partnerships Rapiscan has a wide portfolio of products and capabilities. However, one company cannot do it all. “For this reason, we will always look to best-of-breed technologies that complement our offerings and provide a cohesive solution and, more importantly, long-term partnership,” says Revell. “The partnership deliverable is what drives the future. Our mission is one of an open platform that invites other technologies to work in conjunction with ours and integrate in such a way that can provide meaningful reports and controls systems to our clients, driving core efficiencies and security enhancements.” Our mission is one of an open platform that invites other technologies to work in conjunction with ours “The efforts borne by each of the key stakeholders is done for one very important and aligned reason, to ensure to the very best of our abilities that passenger safety is put first, is always put first and is done in the most courteous, professional way possible, without any undue inconvenience,” he adds. Increasingly, airports are asking for suppliers’ systems to talk to each other. Many airports have security screening equipment from multiple manufacturers and want to put images from these into a single, searchable database, to track missing items, improve productivity and efficiency, or comply with regulations. The Digital Imaging and Communication for Security (DICOS) is an industry standard that defines an interoperable data format for integration of security screening technologies across multiple vendor platforms. It facilitates the development and use of improved security screening technologies and third-party software. Rapiscan’s 920CT supports DICOS, and the company is working with multiple vendors to help create a single platform for airports.
The boundaries between the smart home market and security market at large are narrowing. Amidst a wave of expansion, suddenly everything is becoming digital. Home automation has been around for close to 30 years but hasn’t really hit it big because integration hasn’t been that simple. Now that the Internet of Things has stepped into the market, home automation is really taking off. As technology in the smart home market advances, the gap between the residential and professional security markets is growing smaller. Additional revenue for security industry There will continue to be more opportunity for interoperability, and home automation will continue to grow and eventually become a norm. Growth in the residential security market and its position as the channel for smart home solutions, have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras and other products suffice for their security. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. Data capture form to appear here! Residential security solutions Growth is going to be slow and steady. Everyone needs to be realistic about that" The trend has no doubt accelerated in the last couple of years. New collaborations are being made between audio-video (AV) suppliers and security solution providers. The clientele of high-end AV products is becoming increasingly concerned with home security and property protection. So, in recent months, the requirement for residential security solutions has been increasing as technical solutions can go hand in hand with AV installers’ capabilities and client base. “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” says Michael Philpott, Senior Practice Leader, Consumer Services at Ovum. "This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” Pressure to upgrade security standards Surprisingly for what has historically been something of a grudge purchase, in the context of home automation, security is seen as a solution some consumers are looking for. Another security aspect of home automation is cybersecurity, in particular how it applies to various IoT devices in the home. Now as connected devices gather personal information from realms long considered private and protected – the bedroom, the kitchen counter, the nursery – the risks are higher than ever. All of the data that various devices and sites have collected can be combined, shifted and then exploited by marketers or even stolen by hackers. Both manufacturers of smart home products and the companies that install them are feeling pressure to upgrade security standards. They are moving to set policies that will regulate who has access to data and how it is used. Ease of installation Advances in the home market are increasing customers’ expectations as well as adoption of newer technologies A recent revelation that some “smart TVs” might be listening to conversations and transmitting them to "third parties" caused an uproar. These sets have voice activated features that enable users to change channel, turn on a DVD or browse the internet by speaking to the screen or remote. The fine print in privacy policies contains warnings that general conversations are also being heard, and one company even told owners to turn off this function if they were concerned. Another impact of smart homes on the security marketplace is to raise expectations about the capabilities of commercial systems. Products made today for residential applications are very high quality, easy to install (do-it-yourself, or DIY), and have very rich feature sets. End users expect their commercial solutions to have a similar ease of use and ease of installation. Geofencing in commercial applications The quality of video that people are seeing at home is motivating some legacy commercial customers to finally move to IP video from lower resolution analog cameras. A higher percentage of commercial customers use cellphone applications to view integrated video and access control data. People’s experience with smart thermostats has them asking for geofencing in some commercial applications. In short, advances in the home market are increasing customers’ expectations as well as adoption of newer technologies. Read part two of our smart home mini series here.
A larger proportion of cyberattacks in the first half of 2019 can be attributed to electronic criminals (eCrime adversaries) compared to state-sponsored or unidentified attacks. CrowdStrike, a cybersecurity company that provides the CrowdStrike Falcon endpoint protection platform, observes that 61% of targeted cybersecurity campaigns in the first half of 2019 were sourced from eCrime adversaries, compared to 39% from other sources. Technology was the top vertical market targeted by cyber-attacks in the first half of the year CrowdStrike Falcon Overwatch platform The eCrime portion more than doubled since 2018, reflecting an escalation of criminal players in search of more and larger payouts. The trend is among the information presented in CrowdStrike’s Overwatch 2019 Mid-Year Report: Observations from the Front Lines of Threat Hunting. Falcon OverWatch is the CrowdStrike-managed threat hunting service built on the CrowdStrike Falcon platform. Technology was the top vertical market targeted by cyber-attacks in the first half of the year, followed by telecommunications and non-governmental organizations (including think tanks). Other targets (in decreasing order) were retail, financial, manufacturing, transportation and logistics, gaming, entertainment and engineering. Hospitality disappeared from the list so far this year, although Crowdstrike expects an increase in intrusions aimed at the hospitality industry to put it back in the top 10 by the end of the year. Intrusion adversaries In terms of intrusion adversaries, the top players so far in 2019 are Spiders (eCrime) and Pandas (China). Regarding initial access techniques, the most common remain, in order of prevalence, valid accounts, spear-phishing and exploitation of public-facing applications. 2009 is proving to be an active year with a significant increase in eCrime and the inter-relationships occurring across different groups as they strengthen their organizations, forge alliances and expand their footprint. Need for a proactive security posture Basic hygiene form the foundation for a strong cybersecurity program Many of the techniques used by eCrime actors are easily defensible through strong security products and a proactive security posture, says CrowdStrike, which recommends the following measures to help maintain strong defense in 2019: Be attentive to basic hygiene such as user awareness, asset and vulnerability management, and secure configurations, which form the foundation for a strong cybersecurity program. User awareness programs can combat the continued threat of phishing and related social engineering techniques. Asset management and software inventory ensures that an organization understands it footprint and exposure. Vulnerability and patch management can verify that known vulnerabilities and insecure configurations are identified, prioritized and remediated. Multifactor authentication (MFA) should be established for all users because today's attackers are adept at accessing and using valid credentials. A robust privilege access management process will limit the damage adversaries can do if they get in and reduce the likelihood of later movement. Implementing password protection prevents disabling or uninstalling endpoint protection that provides critical prevention and visibility for defenders. Countering sophisticated cyber attacks As sophisticated attacks continue to evolve, enterprises face more than a "malware problem" As sophisticated attacks continue to evolve, enterprises face more than a "malware problem." Defenders should look for early warning signs that an attack may be underway, such as code execution, persistence, stealth, command control and lateral movement within a network. Contextual and behavioral analysis, when delivered in real time via machine learning and artificial intelligence, effectively detects and prevents attacks that conventional "defense-in-depth" technologies cannot address. "1-10-60 rule" in combating advanced cyber threats CrowdStrike recommends that organizations pursue a "1-10-60 rule" in order to effectively combat sophisticated cyberthreats. That is, they should seek to detect intrusions in under one minute; to perform a full investigation in under 10 minutes, and to eradicate the adversary from the environment in under 60 minutes. A source at CrowdStrike said "Meeting this challenge requires investment in deep visibility, as well as automated analysis and remediation tools across the enterprise, reducing friction and enabling responders to understand threats and take fast, decisive action."
Allot Ltd., globally renowned provider of innovative network intelligence and security-as-a-service solutions for communication service providers and enterprises, has announced that Altice Portugal’s MEO, the country’s largest fixed broadband and mobile service provider, has chosen Allot Secure, a unified Security-as-a-Service (SECaaS) solution to protect the company’s mobile users against a broad range of cyber threats and to provide parental control both on and off-network. Allot NetworkSecure security platform Allot Secure solution is a first-of-its-kind multi-layered platform that integrates network-based and endpoint security The Allot Secure solution is a first-of-its-kind multi-layered platform that integrates network-based and endpoint security. The Allot Secure solution to be implemented by MEO includes the Allot NetworkSecure mass-market network security platform, coupled with endpoint security provided by Allot EndpointSecure. The combined solution enables rapid mass-market user onboarding for cyber security that will protect MEO users anytime and on any network. Subscribers to the Allot cyber security solution will pay a monthly fee which is shared between Altice MEO and Allot. Protection against cyber security threats Enabled by the unified Allot Secure solution, Altice MEO will offer its customers a security service to protect them against emerging cyber security threats, including malware, phishing, ransomware and crypto-mining. Traditional security add-on solutions offered by operators never gained much traction because they rely on customers to install the protection themselves. Allot unified network-based and endpoint cyber security delivers effortless, device-independent end-user security, making it easy for operators like Altice MEO to deliver these security services directly to customers. Allot has reported that other telecom customers have achieved double-digit penetration rates with Allot Secure. Network and data security NetworkSecure, part of the Allot Secure solution suite, is a globally renowned company in the growing network-based, mass-market cyber security category, protecting more than 23M subscribers globally. Coupled with Allot consumer marketing services, the NetworkSecure solution has been proven to achieve penetration rates up to 50%. “Our millions of mobile users are in need of a proven and hassle-free security solution,” said Tiago Silva Lopes, Director Consumer Products at Altice Portugal/MEO. “With this in mind, we selected Allot to offer a mobile service that cannot be bypassed and removes the burden from our customers by protecting them wherever they are. This solution also enables parents to be worry-free about how their children are using their devices.” Unified Allot Secure solution “Altice MEO required a mature, unified solution that combined network and endpoint cyber security for their customers,” said Hagay Katz, VP Strategic Accounts, Cyber Security at Allot. “Our unified Allot Secure solution is a perfect fit. With our revenue sharing partnership, MEO can maximize their ARPU while strengthening their brand and increasing loyalty.”
HID Global, globally renowned provider of trusted identity solutions, has announced that the government of Argentina has selected its HID goID citizen identity technology to power the country’s digital version of its mandatory National Identity Document for its Mi Argentina app. The collaborative effort between HID, Argentina’s Ministry of Interior, Public Works and Housing through the National Registry of Persons (Renaper), and the Ministry of Modernization makes Argentina the first country in the world to offer a true national identity credential within a mobile app to its citizens. Currently, there are 47 million DNI cards in circulation and recent legislation has accorded full legal equivalence to the smartphone version of the card. Mi Argentina app The Mi Argentina app, which houses the National Identity Document, was developed by the Ministry of Modernization and allows citizens who download the app on their mobile devices to request appointments, receive health information and access credentials, such as their drivers’ license. Powered by HID goID technology, citizens can also access their National Identity Document on a mobile device on the app while offline. The Government of Argentina is leading the way in bringing the convenience and security of mobile identity to its citizens" “The Government of Argentina is leading the way in bringing the convenience and security of mobile identity to its citizens,” said José D’Amico, director of Renaper, adding “This innovative application is not only easy to get, but we also believe this could be the first step in digitiszng identity across the government in Argentina and potentially other countries in years to come.” Enhanced security of citizens’ mobile identity Citizens with the ‘Mi Argentina’ app can initiate their request for a mobile ID by visiting a Renaper office, where their identity is verified and authenticated. Once approved, they receive an email with a code to activate their National Identity Document. In the event a smartphone is lost or stolen, credentials can be immediately revoked, safeguarding the citizen from potential identity theft. The mobile ID is securely stored on the citizen’s smartphone, meaning it can still be accessed if the cell phone has no data plan or when connection to a network or Wi-Fi is not available. Storage on the phone brings additional security for the mobile ID ecosystem, as a channel back to the central database is never required. Superior identity solutions Renaper issues all citizens a National Identity Document at birth and requires two mandatory renewals: between the ages of 5 and 8, and at the age of 14. Adults are required to renew it every 15 years. Argentina’s implementation of our technology provides its citizens with innovative ID access" “HID Global is committed to providing identity solutions that meet the evolving standards of the 21st century,” said Jessica Westerouen van Meeteren, VP & Managing Director, Citizen Identity with HID Global. “The government of Argentina’s implementation of our technology provides its citizens with innovative ID access and the ease of a completely mobile experience from registration to issuance.” Enhancing Border Security The government of Argentina previously partnered with HID to upgrade the country’s ICAO electronic passport to a newer generation that was more cost efficient, improved security and enhanced data reading at border control checkpoints. The successful partnership was a key factor in the government’s decision to collaborate with HID Global and deploy the HID goID mobile identity solution. The HID goID technology mobile ID ecosystem powers a more secure and connected world based on field-proven identity technology. It enables the issuance, lifecycle management and verification of mobile identities, and is a customizable solution that delivers many more functions than physical identity documents.
Patriot One, developer of the PATSCAN Multi-Sensor Covert Threat Detection platform, is pleased to announce a collaboration partnership with Los Angeles Football Club (LAFC), part of Major League Soccer (MLS), to pilot its PATSCAN platform at Banc of California Stadium. Threat and intrusion detection “We are excited to announce this PATSCAN pilot deployment project with another U.S. major sport franchise,” said Martin Cronin, Patriot One CEO and president, adding “In the New Year, our installation team will begin work with the Los Angeles Football Club and Banc of California Stadium on this important game safety initiative. MLS fans will enjoy an added layer of security while attending their favorite team’s home games in Southern California”. Martin further said, “Our vision is to not only to create a world safe from acts of violence, but also to help save a way of life people have come to expect in their normal everyday lives, and that includes participating in professional sports and entertainment activities with their fellow fans.” PATSCAN Multi-Sensor Covert Threat Detection The PATSCAN Multi-Sensor Covert Threat Detection platform will ship in January 2020 to the security team at LAFC The PATSCAN Multi-Sensor Covert Threat Detection platform will ship in January 2020 to the security team at Los Angeles Football Club, where they will be joined by Banc of California Stadium security and Patriot One implementation engineers to begin the integration and pilot deployment project. Specific location of the Platform’s deployment will not be disclosed. “Customer safety is our number one priority at Banc of California Stadium,” said LAFC Vice President of Information Technology Christian Lau. “We are excited to work with Patriot One to give customers an extra layer of security while attending events at our world-class venue in the heart of Los Angeles.” Stadium security Following the initial pilot deployment of the PATSCAN platform with LAFC at an undisclosed location within Banc of California Stadium, Patriot One will work with the team and stadium management to broaden deployment throughout the complex.
Theft from stock rooms and shop floors is a persistent problem for retailers. With around €900 million lost annually to thieves in Belgium alone, upscale fashion boutique Patio sought an easy, low-cost deterrent. Code Handle locks fitted on key doors were the answer. A location on Leuven’s most exclusive shopping street did not insulate Patio from retail theft. Shoplifting is a growing problem in many European countries, and thefts had also proliferated at Patio. Thieves were using the store’s toilet to remove clothing tags. Some even went upstairs to Patio’s offices and stole valuable items. Access control system Code Handle proved an ideal solution for us to protect non-public spaces from the public" During a store renovation, manager Jeff Van den Bergh decided Patio’s offices and customer toilet needed proper security. Shoppers and visitors should not enjoy free, casual access to these sensitive rooms. However, he did not want staff wasting their time tracking physical keys when they could be helping customers. An expensive access control system was also ruled out. Door hardware had to look clean and contemporary, to meet the style-conscious standards of Patio’s interior. The store’s security contractor recommended Code Handle, which adds electronic PIN locking to doors without wires or an expensive access system. “Code Handle proved an ideal solution for us to protect non-public spaces from the public,” says Jeff Van den Bergh, Patio’s Store Manager. Door security Door security is operated by a discreet PIN-pad built into a brushed-chrome handle. Two standard batteries slot inside each Code Handle to power the digital security. These typically last for 30,000 lock/unlock cycles. "The design fits well within the store,” adds Mr Van den Bergh. Now, Patio customers still use the toilet — but not unsolicited. An employee unlocks the door for them without a key or pass. The door to Patio’s offices is closed to everyone, except staff who unlock it with a personal PIN. Code Handle comes with one Master PIN; the store manager issues up to 9 additional 4–6-digit PINs. When an employee leaves Patio, it’s simple to delete their PIN.
Security companies provide a type of service that tends to go unnoticed except when it’s missed. Small cities and towns are increasingly growing every day mostly due to internal migration and the high prices of rent in Los Angeles county USA. Veteran Los Angeles security services company, Hillquest Security & Patrol plans to meet this growth head-on. For that reason, Hillquest has decided to expand their already wide range of action (which included more than 60 cities by 2018) to all the Orange and Riverside counties. Hillquest’s security mobile patrols Hillquest Security started to provide security guard services in Orange County and Riverside since early 2019 Hillquest Security started to provide security guard services in Orange County and Riverside since early 2019. What was initially a test venture that turned out to be really successful for the company has now became a full-service activity. Furthermore, Hillquest started to offer its full range of security options for businesses and individuals in those areas. Businesses and other entities in the OC and Riverside can now hire Hillquest’s security mobile patrols, bodyguards, security systems, loss prevention and other security services for banks, construction areas, healthcare facilities, hotels, apartment complexes, movie sets, parking lots, schools and event venues. Manned Guarding and security services "We provide security services that are perfectly tailored for our clientele," said John Bouzy, Hillquest Security owner. "Our trained, licensed expert security officers can handle any and all of our customers’ security needs. Moreover, we can do that any time of day as well." According to Hillquest Security & Patrol’s corporate website, the company is insured with a US$ 5 million policy and its officers "meet the standards set by the bureau of security and investigative services."
Comelit has worked closely with its Gold Partner, MRFS Group at Inspired Living’s flagship Impact House development, to ensure residents in upgraded apartments can experience seamless smart home automation in one all-encompassing solution. Set in Croydon London, Impact House has undergone an extensive program of redevelopment from a largely vacant office building to create 197 contemporary one and two-bedroom micro-flats and 39 larger one, two and three-bedroom apartments, including four exclusive, larger duplex layouts. Comelit smart home automation solutions Comelit’s specialist SimpleHome system incorporates home automation, without compromising style Designed for modern, luxurious urban living, MRFS Group, who has worked closely with award winning Inspired Living on a number of projects from a security perspective, introduced Comelit’s specialist SimpleHome system to the top level apartments at Impact House to incorporate home automation, without compromising style. Adam Tokarski of Inspired Living, said “Impact House has been transformed into a light filled landmark setting for contemporary apartment living. Finished with high specifications throughout, we were keen to ensure the ground-breaking larger and duplex apartments offered the height of luxury.” Smart security Adam adds, “We turned to MRFS Group to advice on an integrated design to present new residents with smart security and home automation. On recommending Comelit’s SimpleHome we initially saw for ourselves its ability to control heating and lighting via the stylish door entry system and supporting app capability. Its flexible design allowed us to work with MRFS to create a bespoke solution for Impact House that was simple to use and finished in a sleek design.” Simplehome smart home automation system Simplehome is Comelit’s smart home automation system, which operates with door entry in one user-friendly integrated solution, providing homeowners with full control of their lighting, heating and ventilation. With an ability to program schedules for up to seven days, Simplehome can be operated remotely using Comelit’s dedicated app, available via smartphone or tablet and connecting to a home router. Ross Wilkins, MRFS Group Director of Projects and Integration added, “When it came to door entry and incorporation of home automation to the 39 top-end apartments, systems had to be considered in line with the change of purpose to the building and how to coordinate installation with minimal cabling requirements." Door entry monitor Using the door entry monitor as a master control unit for Simplehome reduces the wall clutter within each apartment" He adds, “Using the door entry monitor as a master control unit for Simplehome significantly reduced the wall clutter within each apartment. This combined with Simplehome’s control equipment being din rail mountable and very space efficient appealed to Inspired Living, as it allowed maximum footprint to each apartment.” Chris Carroll, Comelit Business Development Manager concluded “Technology continues to play a significant role in our daily life and increasingly driving the demand towards home automation. This is where inspirational developers such as Inspired Living, with the support of our Gold Partner, MRFS Group, are leading the way by integrating facilities such as SimpleHome in apartment offerings." Easy installation He adds, “The professional installation, especially in redevelopment programs such as Impact House, ensures homes can instantly benefit from the convenience and home control factors, without compromising on security or finishing design.”
Round table discussion
Delivering on customer expectations is a basic tenet of success in the physical security market. However, meeting expectations may be an elusive goal, whether because customer needs are not communicated effectively or because equipment doesn’t perform as promised. We asked this week’s Expert Panel Roundtable: what if a customer expects more than a security system can deliver?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
Electronic security systems: Manufacturers & Suppliers
- CyberLock Electronic security systems
- Alpro Electronic security systems
- Morse Watchmans Electronic security systems
- SALTO Electronic security systems
- ASSA ABLOY - Aperio® Electronic security systems
- TDSi Electronic security systems
- Dahua Technology Electronic security systems
- Corbin Russwin Electronic security systems
- Vanderbilt Electronic security systems
- EVVA Electronic security systems
- Baxall Electronic security systems