The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each o...
Choosing the right server for a video surveillance application comes down to one question: What does the customer expect from the system? Is it a retail location with two cameras that only needs video stored for 24 hours? Does the system need failover protection? What are the ramifications if a system goes down? Does business have to stop? How fast does the customer need to have access to video? Is it a regulated industry where immediate access is a requirement? How mission-critical is the vid...
Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations....
Open Options, the provider of innovative access control solutions, recently completes a technology partnership with Schindler, one of the providers of elevators, escalators, and moving walks, allowing users yet another option with their access and elevator control solution. New with DNA Fusion version 188.8.131.52, the Schindler third-party database interface gives users the ability to manage their elevator dispatch control through the user-friendly DNA Fusion platform. All access information is se...
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
Suprema, a global leader in biometrics and ID solutions, announces that the company has entered into a commercial software license and distribution agreement with Qualcomm Technologies, Inc., a subsidiary of Qualcomm Incorporated, for the licensing of Suprema's BioSign, its under-display fingerprint recognition algorithm. Suprema has entered the smartphone segment with the Samsung Galaxy J5 in its fingerprint solution for smartphones last year. In February 2018, the company launched BioSign 3.0...
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud computing and mobile communications, VisitorPoint is being used at premises from hotels and campuses to corporate headquarters. It allows the whole process of visitor management to be streamlined in a way never previously possible. Diary Management Processes VisitorPoint is also ideal for busy reception teams who need to keep across who is entering their premises For example, it lets guests’ phones be used as access credentials, making it a perfect alternative to room keys in the hospitality sector. Compatibility of the VisitorPoint system with ASSA Abloy Hospitality products has proved to be particularly popular with hotels. VisitorPoint is also ideal for busy reception teams who need to keep across who is entering their premises. With the latest version of VisitorPoint, users can easily view pre-registered visitors in advance; manage and sign-in large groups in seconds; book meeting rooms; manage visitor car parking; and automate notifications and messaging. Now organizations can go even further in streamlining their people and diary management processes, thanks to integration with Outlook and Google calendars. Important Additions A new VIP feature allows automatically tailored welcomes for specified guests and/or groups; and a QR Scan App allows visitors and VIPS to be immediately verified. In addition, a new, sleek self-service kiosk will be unveiled at the show, which is ideal for positioning in hotels and high-end corporate lobbies. Meanwhile, with its versatile, open-technology software eFusion is proving a practical alternative to costly or complex conventional PSIM solutions. It offers the advantages of a modular, building block approach and gives users the freedom to integrate, customize and adapt their security systems to meet both current needs and emerging risks. Ensuring compatibility with leading surveillance, intruder, access and fire detection systems, eFusion now supports more than 60 off-the-shelf integrations and several important additions are confirmed for the show. Security Investments The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment" These latest integrations include IP intercom hardware from Jaquies; the mobile phone app GuardPoint; and the Metra locker system hardware. For users who want control and better value from their security investments, eFusion with its expanding choice of integrations is the ideal management platform, says Lee Copland, Managing Director, Maxxess EMEA. “The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment. Our technology is proving particularly popular because it gives users all the advantages of advanced PSIM without the associated cost or complexity.” eFusion can be easily scaled from one site to multiple sites globally and it can connect stand-alone systems for easy upgrades such as retro-fits with existing hardware. Allows Security Controllers Also on show, Ambit allows security controllers to communicate directly with both individuals and groups and to monitor the safety of everyone on site (or on multiple sites), for example employees, residents, visitors, or contractors. Now Ambit users will benefit from direct notification of a wide range of risks thanks to a new integration with the NC4 incident alert service. NC4 monitors risks and issues alerts in real time, covering potential threats ranging from terrorist incidents to weather events, from civil disruption to cyber-attacks. With this new integration, as N4C alerts arise they will be filtered by proximity/relevance and directly sent to Ambit users. Lone-Worker Monitoring Visitors to the Maxxess stand will also learn how Ambit’s latest life-saving technology comes with a choice of applications tailored to the user’s needs. For example, it can allow lone-worker monitoring; courtesy communications and remote escorting after-hours; panic alarm features; and individualised messaging during incidents. It can help security teams co-ordinate and work more effectively with emergency responders too as well as improving the efficiency of day to day operations It can help security teams co-ordinate and work more effectively with emergency responders too as well as improving the efficiency of day to day operations. With new customers and projects including Bluewater Island, TAJ Hotel & Residences JLT Dubai, TAJ Hotel & Palace on Palm Jumeirah, the Emirates Nuclear Energy Corporation, Emirates Flight Catering Extension, the Jewel of the Creek and Yahsat, 2019 will be an exciting year of growth for Maxxess in the Middle East. Better Optimized Workforces “We are well positioned to further capitalize on major infrastructure projects across the region such as hotels and leisure. The demand for increased operational efficiencies across the MENA region has seen many organizations look to automate tasks and at the same time mitigate against the potential for human error. This is evident in the demand we’re seeing for streamlined visitor management, the elimination of keys and better optimized workforces across security and facilities management functions.” “And as real-world applications for artificial intelligence become a reality, we are continuing to collaborate with our world leading video surveillance partners to bring these advanced analytics into the eFusion platform. Meanwhile, we will continue to support our customers in complying with revised fire and safety codes and new security regulations.”
Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announced the release of Pulse Policy Secure (PPS) 9.0R3 to extend its Zero Trust Security model to IIoT devices and smart factories. The new version enables factories to streamline machinery repairs and diminish costly production downtime through IT-managed secure access. It also secures networks by expanding its behavioral analytics to IoT devices, detecting anomalies and preventing their compromise. “Manufacturing customers are using IoT to retool their factory floors, creating smart production lines that report their health and operational efficiency. One benefit of this approach is that customers can proactively perform preventative or predictive maintenance on machines to avoid costly production outages,” said Prakash Mana, Pulse Secure’s vice president of product management. Remote Access For Service Technicians PPS dynamically profiles the network to discover, classify and apply policy to IoT devices, and includes a built-in IoT device identification library“Our latest Pulse Secure release helps customers not only secure the smart factory floor, but it also helps streamline their maintenance activities by giving service technicians remote access to the equipment they maintain. Regardless if they are on the factory floor or in their remote office, our Zero Trust Security limits technician access to the equipment they maintain and requires that they use secured end-user devices to perform their work.” Pulse Policy Secure (PPS) is an integral part of Pulse Secure’s combined VPN and NAC solution that provides corporate networks with Zero Trust Security through visibility, ‘comply to connect’ policy enforcement and security orchestration with popular network and security infrastructure. PPS dynamically profiles the network to discover, classify and apply policy to IoT devices, and includes a built-in IoT device identification library. The solution also integrates with Next Generation Firewall (NGFW) solutions to provide identity and device security state data, as well as to fortify micro-segmentation to isolate and manage IoT devices on enterprises networks. Provisioning IIoT Devices To NGFWs The latest Pulse Policy Secure release helps customers protect factory floor system integrity by providing technicians secure remote access" PPS 9.0 extends the Zero Trust Security model to IIoT devices used in smart factories and buildings, with blended IT and OT environments. It automatically discovers and profiles IIoT systems, such as factory floor SCADAs, PLCs and HMIs, or office building HVAC systems, providing dynamic visibility and securing them by enforcing policies for local and remote access by authorized users and contractors. PPS 9.0 also automatically provisions IIoT devices to next-generation firewalls (NGFWs) to facilitate remote access without provisioning overhead. “A top priority for manufacturing customers is complete visibility and security of IIoT devices on smart factory floor environments. Because failing systems may lead to loss of revenue or human life, customers must emphasize rapid remediation of machines to avoid system outages,” said Tony Massimini, Frost & Sullivan Senior Industry Analyst, Information & Network Security. “The latest Pulse Policy Secure release helps customers protect factory floor system integrity by providing technicians secure remote access. New Behavioral Analytics features also safeguard against attacks by detecting anomalous activity.” Preventing Attacks By Detecting Anomalous Activities The new PPS 9.0 IoT support provides practical relief for the frequent and costly issue of factory floor equipment outagesThe latest release of PPS also provides sophisticated behavioral analytics that alert security teams of anomalous IoT device behavior and automatically requires added factors of authentication. PPS 9.0 builds baseline behavior profiles for managed and unmanaged IoT devices utilizing information correlated from multiple sources such as NetFlow, user and device data. With these profiles, the platform detects anomalous activity, malware infections and domain generation attacks, allowing security teams to be more responsive to threats and take pre-emptive measures before attacks succeed. The new PPS 9.0 IoT support also provides practical relief for the frequent and costly issue of factory floor equipment outages. Aberdeen recently reported that 82 percent of companies reported unplanned downtime in the past three years, which can cost a company as much as $260,000 an hour. Authenticated Remote Secure Access The resulting downtime breaks production and lowers profit, because factory floor repairs often take days when security requirements mandate that service technicians physically visit the factory to diagnose and repair the problem. The latest PPS release works seamlessly with Pulse Connect Secure to solve the problem in an innovative way. These IIoT networks help our customers gain real-time system diagnostics, reduced downtime and overall lower operational costs"The combined NAC and VPN approach enables IT teams to grant remote secure access—authenticated and encrypted—to support contractors for expedited repair and return to service of factory IIoT systems for greater uptime and productivity. IT teams ensure security with remote zero-trust access via auto-provisioned NGFWs, and by enforcing security policies that authenticate contractors based on their technician role, endpoint device status and authorization to work on the targeted IIoT device. Real-Time System Diagnostics “Some of our customers operate among the manufacturing and transportation industry’s biggest and most distributed internet-connected device deployments. These IIoT networks help our customers gain real-time system diagnostics, reduced downtime and overall lower operational costs,” said Kirk Hanratty, vice president and chief technical officer at IT security and solutions company SynerComm. “For these and other customers, IIoT drives their business where assuring availability and secure access throughout an IIoT infrastructure is paramount. We have found Pulse Secure’s platform to offer our customers the usability, interoperability and reliability necessary to support large scale IIoT applications.”
Allied Universal, a security and facility services company, has named Andrew Vollero its new Chief Financial Officer. Vollero will replace Bill Torzolini, who will retire in 2019, after serving 15 years in the role. “Drew is an accomplished financial professional, evidenced by his expertise, background and achievements over his spectacular career,” says Allied Universal CEO Steve Jones. “I am confident that he is the right leader to propel our company forward over the next several years. We have accomplished so much in a short period of time under Bill’s guidance, and we thank him for his many contributions to our success. Our future outlook is incredibly bright with Drew onboard to continue to lead the charge.” Balanced Approach During his career that spans three decades, Vollero has led finance, strategic planning, development, investor relations and business operations for large consumer packaged goods, digital, and entertainment companies. Most notably, he spent 15 years at Mattel, where he was a division CFO and later Senior Vice President of Corporate Development, Strategy, and Investor Relations. While there, he partnered well with business leaders by taking a balanced approach to revenue growth and cost reduction to drive shareholder value. In the early stages of Vollero's career, he held senior posts at PepsiCo and later Yum Brand’s Taco Bell division, including Controller Following his tenure at Mattel, Vollero became the first CFO of Snap (formerly Snapchat), a camera, social media and technology company. There, he built the finance function from scratch, and helped to lead Snap to a successful IPO in less than 18 months. In the early stages of his career, he held senior posts at PepsiCo and later Yum Brand’s Taco Bell division, including Controller. Explosive Growth “Allied Universal is the well positioned market leader, and their explosive growth has been remarkable,” commented Vollero. “This role presents a terrific opportunity for me to join a talented team, profitably scale the global business, and continue Allied Universal’s trajectory into a world-class company.” Vollero earned a Bachelor of Arts in Math and Economics, with high honors, from Yale University and holds a Master of Science in Management from Oxford University. He resides in Laguna Niguel, California.
Hikvision’s PanoVu products are essential components of solutions in retail, hospitality, transportation and education Hikvision USA Inc., global supplier of security equipment and solutions, will provide training and demos of its multi-sensor camera technology at ISC East 2018, slated to take place at the Jacob Javits Center in New York City on Nov. 14 and 15. Product Showcase And Training Session Hikvision will exhibit from Booth 324 on the show floor on both the days. In addition to multi-sensor cameras, Hikvision will also showcase access control and intercom solutions. On Wednesday, Nov. 14, from 11:30 a.m. to 12:30 p.m. in Room 1A23, Hikvision will offer a free training session: ‘PanoVu Overview: Innovative Systems for Retail, Education, Hospitality and more’. "Ideal for retail, hospitality, transportation and education applications, Hikvision's PanoVu products offer multi-camera technology in one easy-to-install device," said Eric Chen, general manager, Hikvision North America. "We're excited to discuss and demo this key technology for integrators and end users at ISC East this year." Hikvision PanoVu Cameras Product Line Hikvision provides a wide variety of PanoVu products to meet every installer's needs: Everything from 180- and 360-degree view in a stitched image from multiple cameras, to cameras with adjustable gimbals for optimal views. A wide selection of cameras is available for both indoor applications or outdoor, longer-range viewing. Common applications include warehouses, large open spaces, lobbies, city centers, park entertainment venues, and harbors.
Antaira Technologies a global developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LNP-1600G, -1802G-SFP, and -2004G-SFP series. As PoE technology has become increasingly popular in many industrial markets including automation manufacturing, security surveillance, power/utility, water wastewater treatment plants, oil/gas/mining, and transportation industries have adopted PoE (Power-over-Ethernet) ready devices; such as, cameras, VoIP phones, wireless radios, and access controllers into their production networks. Works In Harsh Environments Antaira’s LNP series work well in harsh or outdoor environments that require rugged power sourcing equipment (PSE) with high-density Ethernet port connectivity, wide bandwidth, long-distance data transmission, and reliability. Antaira Technologies’ LNP-1600G, -1802G-SFP, and -2004G-SFP series are the latest industrial Gigabit unmanaged Ethernet switch series that offer high density for sixteen full gigabit Ethernet ports (-1600G, -1802G-SFP, and -2004G-SFP) with each port supporting PSE maximum of 30W and have two or four SFP gigabit fiber slots (-1802G-SFP and -2004G-SFP) for long distance connectivity. These product series have an IP30 rated metal casing design that can support DIN-Rail and wall mountable orientations. Overload Current And Reverse Polarity Prevention The devices provide a dual redundant power input range of 48 to 55VDC with an overload current and reverse polarity prevention. The series also has a high EFT, surge protection (2,000VDC), and ESD (6,000VDC) protection. Additionally, there is a built-in relay warning function to alert maintainers when power failures occur. Each unit is built to withstand industrial networking hazards like shock, drop, vibration, electromagnetic interference (EMI) and temperature extremes. Wide operating temperature version options include a standard (-10° ~ 65°C) model or an extended (-40° ~ 75°C) model. The units conform to the following dimensions of 67mm (W) x 99mm (D) x 142mm (H) and a unit weight of 2.69 pounds (LNP-1600G and LNP-1802G-SFP) or 2.75 pounds (LNP-2004G-SFP).
Senstar is pleased to announce a new, more compact version of its Flare Real-Time Locating System (RTLS) personal protection device (PPD), the PPD Compact. The Flare RTLS keeps staff working in high-threat environments safe by instantly identifying and locating personal duress alarms at the touch of a button. The original PPD is a robust, utility belt-holster device specifically designed for frontline correctional workers. The new PPD Compact provides a smaller, sleeker option for support and administrative staff in institutional environments. Technology For Staff Security Flare locates duress alarms and displays the location, status, and identity of the PPD on a map-based display in the control room“The PPD Compact was developed to address customer requirements to have a smaller device that could be worn in a variety of ways, including on a lanyard, and still determine the user’s location,” said Product Manager Todd Brisebois. “The new PPD Compact can be worn by non-uniformed staff that may not be wearing a utility belt, as well as by visitors.” In the event of danger, the user activates the PPD which emits an RF signal that is detected by a network of sensor units concealed throughout the facility. Flare immediately locates duress alarms and displays the location, status, and identity of the PPD on a map-based display in the control room. Flare operates in protected frequency bands that use dedicated spectrum, avoiding the potential for interference. Designed for reliability in institutional and industrial environments, Flare uses patented, proven, cost-effective technology to help keep staff safe.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
Consolidation persisted in the physical security industry in 2018, and big companies such as Motorola, Canon and UTC continued to make moves. Also among the mergers and acquisitions (M&A) news in 2018 was a high-profile bankruptcy (that ended well), continuing consolidation in the integrator market, and the creation of a new entity called “LenelS2.” Here’s a look at the Top 10 M&A stories in 2018: 1. Motorola Acquires Avigilon Motorola Solutions announced in February that it had entered into a definitive agreement to acquire video surveillance provider Avigilon in an all-cash transaction that enhances Motorola Solutions’ portfolio of mission-critical communications technologies. Avigilon products are used by a range of commercial and government customers including critical infrastructure, airports, government facilities, public venues, healthcare centers and retail. The company holds more than 750 U.S. and international patents. 2. UTC Climate, Control & Security Buys S2 Security UTC Climate, Controls & Security agreed in September to acquire S2 Security, a developer of unified security and video management solutions. UTC subsequently combined S2 with its Lenel brand to create LenelS2, “a global leader in advanced access control systems and services” with “complementary strengths.” 3. Costar Technologies Acquires Arecont Vision After Bankruptcy Arecont Vision, the provider of IP-based megapixel camera and video surveillance solutions, announced in July that the acquisition by Costar Technologies, Inc. of its assets had been approved by the bankruptcy court. After the closing of the sale, the company began operating as Arecont Vision Costar, LLC and is part of Costar, a U.S. corporation that designs, develops, manufactures, and distributes a range of products for the video surveillance and machine vision markets. 4. Allegion Acquires Access Control Company ISONAS Allegion plc, a security products and solutions provider, agreed in June to acquire ISONAS through one of its subsidiaries. ISONAS’ edge-computing technology provides access control solutions for non-residential markets. ISONAS' devices – like its integrated reader-controllers – utilize power over ethernet, making them easy to install and cost effective as they utilize existing customer infrastructures. The company is based in Boulder, Colo. 5. HID Buys Crossmatch for Biometrics HID Global announced that it had acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services. 6. BriefCam Announces Acquisition by Canon BriefCam, a global provider of video synopsis and deep learning solutions, announced its acquisition in May by Canon Inc., a global digital imaging solutions company. The addition of BriefCam to Canon’s network video solutions products portfolio complements the Canon Group’s previous acquisitions of Axis Communications and Milestone Systems. 7. Allied Universal Acquires U.S. Security Associates Allied Universal, a security and facility services company, finalized its acquisition of U.S. Security Associates (USSA) in October, further building on its position in the security services industry. This acquisition includes Andrews International (including its Government Services Division and Consulting and Investigations and International Division) and Staff Pro. 8. Johnson Controls Acquires Smartvue Corp. Johnson Controls announced in April that it had acquired Smartvue, a global IoT and video provider that empowers cloud video surveillance and IoT video services. The addition of the Smartvue cloud-based video platform will enhance Johnson Controls’ offering of an end-to-end, smart cloud-based solution that can provide superior business data and intelligence to customers and added value to partners. 9. ADT Acquires Red Hawk Fire & Security (and Others) ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., was the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. 10. Convergint Technologies Continues to Acquire Convergint Technologies announced in August the acquisition of New Jersey-based Access Control Technologies (ACT), bringing further electronic security systems experience to Convergint's service capabilities. Convergint has strategically grown its service footprint across the United States, Canada, Europe and Asia Pacific through strong organic growth and the completion of 18 acquisitions since early 2016. And it continues: Convergint announced acquisition of SI Technologies, Albany, N.Y., in November and Firstline Security Integration (FSI), Anaheim, Calif., in December. (And Convergint itself was acquired in February by private equity group Ares Management.)
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A Brief History Of 3D Technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialization, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modeling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialization, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organizations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What Does This Mean For The Security Or Facility Manager Today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example Benefits Of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example Benefit Of Reality Capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorization before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious Use Of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualization of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
GSX 2018 is both a new event for the security industry and the continuation of a 63-year tradition. Global Security Exchange (GSX) is the new branding for ASIS International’s annual seminar and exhibits, which have been held since 1955. In recent years, the ASIS event has joined forces with other organizations to expand its scope and to appeal to a broader audience. Partners include ISSA (Information Systems Security Association) and Infragard, a public-private partnership between U.S. businesses and the Federal Bureau of Investigation (FBI). The expansion is continuing this year with the addition of 30 supporting organizations representing industry verticals and reflecting ASIS’s intent to unite the full spectrum of security. Improving The State Of Cyber Security The Cyber Security Summit will co-locate with GSX, offering cyber security programming at a time when it is needed the most Held September 23-27 at the Las Vegas convention Center, GSX 2018 seeks to attract more than 20,000 operational and cyber security professionals and 550 exhibitors. Other elements will further expand the 2018 event’s scope. The Cyber Security Summit will co-locate with GSX, offering cyber security programming at a time when it is needed the most. Top government, industry and academic thought leaders will engage in a dialog to improve the state of cyber security. The 2018 Security Cares Program will address school violence prevention and response in a free education program. Topics will include pre-violence indicators, target hardening, and best practices to involve the entire community of school administrators, law enforcement, security professionals and mental health providers. Experts To Deliver Keynote Speeches Keynote speakers including CNN host Fareed Zakaria will bestow celebrity appeal. Air Force Major General Bradley D. Spacy will share details about the new AFWERX innovation and tech hub in Las Vegas and how the U.S. Air Force is collaborating with the private sector to bring new security product ideas to market. Spacy’s keynote on Sept. 26 will kick off Military and Law Enforcement Appreciation Day. Also, K.T. McFarland, former Trump Administration Deputy National Security Advisor, will share an insider’s perspective on critical foreign policy and defense industries. Attendees to ASIS International’s annual gathering typically list networking and education as big benefits of the event. Historically, the trade show aspect has existed separately from the educational program, and foot traffic to the exhibits has sometimes suffered from the competition. Beginning last year, and continuing in 2018, ASIS International has pursued innovative approaches to integrate the trade show more closely into the overall attendee experience. “The integration of programming and exhibits is truly seamless,” says one observer of the new approach. Held Sept. 23-27 at the Las Vegas convention Center, GSX 2018 seeks to attract more than 20,000 operational and cyber security professionals and 550 exhibitors X Learning Theatres GSX has sought to transform the exhibit hall into a ‘learning lab environment’ that features thousands of security products, technologies and service solutions (provided by the exhibitors), in addition to ‘immersive learning opportunities to connect the current and emerging threat landscape with solutions available in the marketplace’. There are several ‘X Learning Theatres’, including one (‘X-Stage’) focused on leading-edge technologies such as blockchain, cryptocurrencies, AI, drones, and robotics. There is also an ‘Xcelerated Exchange Stage’ to facilitate discussions among security practitioners and solution providers. The ‘Xperience Stage’ showcases case studies and best practices. Also attracting more attendees to the Exhibit Hall will be ‘Career HQ’, a free career fair and enhanced career center. ‘D3 Xperience’ (Drones, Droids Defense) will focus on unmanned systems with education and demos. The ‘Innovative Product Awards (IPAs) Showcase’ will highlight winners of an awards program. Focusing On Security Practices GSX is not as much about sales leads as about making connections and contributing to a larger conversation about how to protect people, facilities and assets ASIS International (now GSX 2018) is often compared to ISC West, the U.S. industry’s largest show held in Las Vegas in the spring. GSX 2018 this year may face even more scrutiny based on the changes, rebranding, and location (also in Las Vegas). However, GSX is a completely different show than ISC West, which focuses on the business of security. In contrast, GSX is much more about the practice of security than business. The international network of ASIS International members attend the yearly conference to make new connections, to learn and to benefit from the experiences of other security professionals around the world. The successful trade show exhibitors are the ones that approach the show with that understanding. GSX is not as much about sales leads as about making connections and contributing to a larger conversation about how to protect people, facilities and assets. ASIS International deserves credit for their efforts to integrate the trade show element into the larger goal of the event. Hopefully their new approach will enhance the overall experience for both attendees and exhibitors – and help to make the world a safer place as a consequence.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an interesting discussion about these topics presented by several business leaders from lock company Allegion at a press event at ISC West earlier this year. Here are some highlights from that discussion. Q: What new developments in emerging technologies do you see in the coming years? There’s opportunity for implementation of the technology to solve real problems" Mark Jenner, Market Development Director: Connected locks, other types of sensors and all the data being aggregated inside buildings provide opportunity for data analytics. The buzzwords around technologies can cause confusion for integrators and end users, such as artificial intelligence, deep learning and machine learning, and what’s the difference among all of them? My opinion is that they are important, but the big theme across them all is opportunities for new business models for the integrator, and opportunities to solve problems for end users. And it’s not just technology for technology’s sake. There’s opportunity for implementation of the technology to solve real problems. Devin Love, Market Development Manager: You can’t just have a solution looking for a problem. You see a lot of people who understand technology in their own lives, and they want to translate that into their businesses. That’s where I think it’s exciting. You now have all this technology, and people understand it to the extent that it improves their daily life. They go through their day with less friction, with more ease, and technology fades to the background. There are two levels of value. One is the longer, bigger, broader scope of what the technology can bring to a company using it, but on an immediate basis, there is the value of tracking how a business is running. These sensors are collecting data. For example, if you are a multi-tenant property, you can look at how amenities are being used. What do my residents really care about? That informs future decisions. Robert Gaulden, Project Based Business Leader, Electronic Access Control: I have been studying the multi-family space for the last couple of months. The customer experience is really driving a lot of that technology adoption. What you’re seeing today, whether it’s a mobile device or some other device, is the ability to move throughout the property, and gain access to the perimeter and to your tenant space. All of this adoption is around that experience. There’s multiple players coming into the space, from Amazon wanting to deliver packages into the tenant space to residents who don’t want the inconvenience of using a key. Technology adoption to solve problems, and also to drive experiences, is where a lot of the balance will play out. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently" Brad Aikin, Channel Led Business Leader, Integrator Channel: From an integrator perspective, there are two things. One is how they can approach end users, and the scope of what integrators consult with them about is wider. I think we as an industry are getting beyond those high-traffic, high-security applications. Those are still critical, but the value we bring around security and convenience is opening a new incremental opportunity. Also, the experience of the integrator and how they conduct their business is important, from generating quotes to communications to proactive servicing. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently. Gaulden: We as an industry, and we as manufacturers, need to understand what data we are generating so we can run our businesses more efficiently from every aspect, whether you’re the property manager, the building owner, the integrator, or whether you’re the manufacturer. These devices and technology are being pushed out everywhere and will generate the data. How we learn from that – especially when you apply security to it to be more proactive – provides huge opportunities. Jenner: What data is important and what’s not? Folks get overwhelmed with too much data at some point. What’s important for an application at the end user level? What do they really need to solve the problem? Love: Privacy gets involved as well, especially with consumer products. The attitude is “stay out of my private business.” But if you’re an employee now, all bets are off. Now you have a professional relationship with the people you work with, so there is a different lens that you look through when tracking data. You use the data to everyone’s benefit, and it’s a different paradigm than in your private life. Aikin: Also, where does that data create a better experience for the person? That’s what drives the money and value: What level of information sharing makes my experience better? The technology is also getting smarter in terms of “how do we sort through the valuable information?” Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control Q: As facilities connect more devices and sensors, the cybersecurity threats increase. We have already seen Internet of Things (IoT) devices being used as the attack point of cyber breaches. What are the vulnerabilities that make those attacks possible, and how can integrators protect their customers? Love: Certainly, this is an extremely – maybe the most important – piece of our industry. What is the point of everything we do if we can’t instill that trust? But what we need to solve here also comes with opportunity. There’s certainly hope. You’re not seeing a frontal attack on the technology. It’s usually some loophole, or some older device that hasn’t been updated, or wasn’t installed correctly, or it was social-engineered. The opportunity is, not that it can’t be solved, but that it absolutely needs to be solved – and it can. Gaulden: Integrators need the ability to understand that cyber layer and what it means. Nowadays, everything runs on the network, and you won’t even get past the IT department to get on the network if you don’t have the right staff, the right credentials. From an integrator standpoint, you need the ability to add to your staff, to understand everything from the product level to the firmware and the software level, all the way to the deployment of the holistic system. You can’t just say, “That’s not part of our responsibility.” All these devices are now riding on the network. They can be protected from a cyber perspective, or you will have vulnerabilities. As manufacturers and business consultants to integrators, we should facilitate the conversation, that it is one ecosystem" Aikin: Everything is a communication device. With the concern and need comes an opportunity for the integrator. But it’s also in making sure integrators are having that conversation with end users and setting the expectations up front. What I’m providing you on day one is the best in the industry at this time, but tomorrow it may not be. My accountability and service are to maintain that environment and keep it running. I may not physically change the device you see, but the service I’m bringing to you is that security, and that comprehensive dialogue. The IT stakeholders already have that expectation, but there is a chasm in some organisations between the physical security and the IT stakeholders, and the integrator is facilitating that conversation. As manufacturers and business consultants to integrators, we should facilitate that conversation. It is one ecosystem. Q: Aside from cybersecurity, what are some of the other threats that integrators should be aware of as they work with customers to implement the new trends and technologies we have mentioned? Aikin: It is diversifying, all the options and the capabilities. With that comes confusion and misapplication. If I look at the trends around just wireless; I go back 10 years ago, there were even questions of whether wireless was a secure technology. That has progressed and continues to be part of the cyber conversation, just like any hardwired product. It’s something you have to maintain and be aware of. Wireless has really diversified. There is still a need for education within the channel, and most importantly, to the end user. There are still end users that assume a WiFi widget is the same thing as a Bluetooth widget is the same thing as a low-frequency widget. But they are all different. There are reasons there are different technologies. Nothing stifles the adoption of technology more than misapplication. We have different architectures within our lock base and among our software partners to allow a mix of technology" Gaulden: Integrators understand the differences in how various doors are used and how those applications will work. In the K-12 school environment, you want the ability for an instant lockdown, and a WiFi deployment probably isn’t your best option. You need a real-time deployment. However, my office door at headquarters doesn’t necessarily need real-time communication. I can pull audits off it once or twice a day. You have to mix and match technologies. For a high security door, you would proactively monitor it. But for a door where convenience is the goal, we can put electronic security on it but we don’t need to know what’s going on at any moment in time. We have different architectures within our lock base and among our software partners to allow that mix of technology. Jenner: End users want the latest technology, but it may not be for their applications. Those things drive more costs into it, when end users need to be putting money into cybersecurity and some other things. That’s part of the misapplication. Another risk is interoperability. That’s a big piece of the technology and as things change. How do we do a better job of supporting open architecture? It may not be a standards-based protocol, although we use a lot of standards, but we just need to make sure whatever protocols we use are open and easily accessible so we can continue to work with them in the future. We know that when our devices go in, they will support other parts of the ecosystem from an interoperability perspective. That’s important for integrators to know: How is this going to be applied and integrate with something in three, four or five years from now? It’s an expensive investment, and I want to make sure it will work in the future. Main photo: Business leaders from Allegion discussed new trends in electronic and wireless locks at a recent press event: (L-R) Robert Gaulden, Devin Love, Brad Aikin and Mark Jenner.
A manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialization in some of the towns in Maharashtra while preserving their rich heritage. Wide Area Monitoring The company is spread across a wide area, employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing high resolution images and covering a greater area for monitoring was the primary requirement. The company is divided into various branches that are located at various places in Satara, Maharashtra. This gave rise to the need for a centralized solution at a centralized location from where all other sites can be monitored at a time. Matrix IP Bullet And Dome Cameras To cover the large monitoring area, Matrix provided IP bullet and dome cameras that have greater field of view when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images that aid in night time surveillance and provide enhanced security. For storing the streamed videos, Matrix offered network video recorders. These NVRs have features such as adaptive recording which aids in storing more data in a defined space. Moreover, it has intelligent video analytics such as intrusion detection and motion detection which were also applied. Instant notifications and alerts ensured real-time security of the premises.
Located southeast of Los Angeles, California, the City of Whittier hosts a water pumping utility installation that provides water to the businesses and residents of the surrounding Gateway Cities Region. In recent years, the installation routinely suffered attacks by vandals and looters, resulting in regular defacement with graffiti and the theft of copper components from pumping stations. This caused interruptions in service to businesses and residents across the surrounding cities. To ensure the security of the water installation and avoid public health and safety concerns, the City of Whittier turned to a virtual guarding solution from iNet Security LLC. iNet Security leveraged comprehensive monitoring from the Surveillance Acquisition Response Center (SARC), powered in part by IDIS technology, for a high-performance video surveillance solution that has already shown powerful results. Enhancing Multi-Site Security And Safety The City of Whittier turned to a virtual guarding solution from iNet Security LLC With the health and safety of the City of Whittier and its surrounding region potentially at risk, it was essential that any security solution deployed by the city be dependable, effective, and capable of low-maintenance 24/7 monitoring. The system also required ease of remote use as the installation is located in a remote wildlife preservation area far from the city center. Any surveillance solution had to: Secure multiple locations within a remote wilderness location Manage authorized access to installation premises Maximize security of the installation with encryption speeds capable of constant live monitoring Provide compatibility and integrate seamlessly with SARC virtual guarding systems Enable the coordination of live responses to security events Feature intuitive software that is easy for users to operate and master. Representatives of the City of Whittier reviewed systems from several manufacturers before they determined that the virtual guarding solution from iNet Security, powered in part by IDIS, would best meet their requirements. DirectCX Technology And Center VMS The industry’s most advanced analog HD solution, DirectCX, is based on High Definition Transfer Video Interface (HD-TVI) technology SARC and the City of Whittier leveraged technology from the high-performance and cost-effective IDIS DirectCX solution and IDIS Center video management software (VMS) to meet their remote monitoring needs. The industry’s most advanced analog HD solution, DirectCX, is based on High Definition Transfer Video Interface (HD-TVI) technology. IDIS incorporated its expertize in image processing to provide unrivaled HD recording performance at an affordable price point for the responsibly cost-conscious City of Whittier. Designed for simplicity, convenience, and performance, the DirectCX technology and the powerful, full-featured IDIS Center VMS incorporated by iNet Security have proved to be optimal components of the comprehensive solution, meeting the challenges faced by the City of Whittier. IDIS HD-TVI DVR The most powerful IDIS HD-TVI DVR, the TR-4116 16 Channel Full HD Recorder, offers: Support for HD-TVI, 960H, and analog cameras Up to 480ips Full HD recording Full HD display with HDMI and VGA output Support for CVBS spot monitor Long distance transmission over coaxial cable Support for HD-TVI camera OSD control over coaxial cable Expansion up to 32TB using 4 SATA interfaces and 1 eSATA storage interface One click network configuration using IDIS For Every Network (FEN) service Dependable Security Environment IDIS has helped to dramatically improve the security environment for the City of Whittier’s water installation and pumping stations In partnership with iNet Security and SARC, IDIS has helped to dramatically improve the security environment for the City of Whittier’s water installation and pumping stations. Within the first week of installation, a group of vandals was caught attempting to fault the installation fence and was successfully deterred remotely using SARC’s remote “voice-down” protocol. In a dramatic security and safety success, the system was used to coordinate a fast and effective response to two isolated fires as well as a dangerous wildfire that threatened both the utility and surrounding wildlife. SARC operatives utilized IDIS technology, in part, to accurately and quickly guide first-responders through the remote wilderness to the site of the fires, minimizing damage and risk to the surrounding areas. Thanks to the power and performance provided by the iNet Security solution, including IDIS DirectCX technology, the City of Whittier is benefiting from: Low total cost of ownership Unparalleled ease of use through the IDIS Center VMS Complete dependability of system components Lower system maintenance requirements A scalable solution to allow for expansion to additional installation sites
Critical infrastructure requires locks that are proven, tested and trusted. Sometimes electronic locking is the right choice; at other times, mechanical locking does the job. With CLIQ mechatronic locking technology, one water utility combined both in a single, secure system controlled by powerful, intuitive CLIQ software. O des Aravis is responsible for water capture, storage quality, analysis and delivery of around 700,000m3 annually to homes and businesses in the Aravis Mountains region of France. PROTEC2 CLIQ key-based access control with programmable, battery-powered keys now secures 30 opening points across their premises. These robust locking devices are suited to protecting high-security openings, including a potentially dangerous room with high-tension electrical cabling and equipment. They are already deployed at critical infrastructure sites all over Europe. Controlling And Modifying Access Rights The mechatronic CLIQ system enables the utility’s facility managers to control, modify and trace every important accessThe mechatronic CLIQ system enables the utility’s facility managers to control, modify and trace every important access. They know who goes where, and when. They are aware of activity affecting all critical doors; it is even impossible to leave one unlocked. Because CLIQ is a flexible, key-based system, O des Aravis can also retain some mechanical locks at the site, operated by the same secure keys and with the same PROTEC2 high-security disc cylinders. CLIQ software makes it easy and intuitive for O des Aravis to manage their entire locking system. “The programming software platform is very simple to use. We can easily grant or forbid access rights to any user,” explains Laurent Schutz, Water and Sanitation Process Manager. CLIQ Web Manager Software The CLIQ Web Manager software is built to help companies like O des Aravis manage complex workflows. System administrators can program, amend or delete keys remotely. It’s straightforward to generate time-stamped audit trails for any lock or key, to track access in detail. The Web Manager can generate attendance reports for staff and contractors. Yet despite all these features, the CLIQ Web Manager requires minimal IT investment: it runs in the cloud and is accessed via an encrypted connection to a standard web browser. On Demand Audit Trails Of Lock/Key If a key is lost, a security manager can deactivate it instantly with a couple of clicksAt O des Aravis, comprehensive audit trails for any lock or key are available on demand. These also sync automatically when a user key is updated or revalidated. If a key is lost, a security manager can deactivate it instantly with a couple of clicks, ensuring buildings and clean water supplies are not put at risk. “There is very good communication about software updates,” says Laurent Schutz. “It is highly professional.” We live in a world of diverse threats to our critical infrastructure. For Aravis Mountains residents, winter skiers and summer hikers, these refreshing alpine waters are safely locked down — thanks to CLIQ wireless access control.
MARSS NiDAR system has been selected to secure and protect a critical national infrastructure (CNI) site in the form of a major dam facility. The NiDAR command and control (C2) system has been selected to integrate a thermal camera and a sonar system to protect the dam from potential underwater and surface approaches. NiDAR is an advanced long-range surveillance system designed to protect maritime and land-based critical infrastructure from air, surface and underwater approaches. Tracking Objects In Real Time NiDAR is sensor agnostic, enabling it to integrate with any existing hardware or systems, and due to its modular design, not only does it meet the current contract needs, but it also offers the flexibility to meet any future expansions or requirements. NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time, of over 1000 known and unknown, air, surface and underwater objects thanks to the software algorithms. It can intelligently analyze and rank unknown objects to determine potential threat levels and automatically trigger the appropriate alert. When the user determined warning and alarm zones are breached the system can automatically or manual deploy integrated countermeasures to deter potential approaches and de-escalate threats. Enhanced Awareness Picture The intuitive C2 interface provides an enhanced awareness picture, in real-time, through a touchscreen user interface and multi touch control. Rob Balloch, Sales Director of MARSS said, “NiDAR was chosen for this critical national infrastructure as it is robust and suited to all environments, however challenging. Its high availability and reliability, low maintenance and cost effectiveness makes it the perfect choice for any future growth, or change of requirements, with minimum disruption.”
Security installation specialist Vision Security Services installed Vanderbilt’s ACT365, a cloud-based access control and video management system, at Work.Life, a co-working and private offices facility in London Fields, east London. ACT365 solution was implemented late in the construction stage, as initially, the client had used a conventional system, before realizing late-on the benefits available from cloud management. Essentially, the client needed unified management of access points and video, both locally and remotely. It was for these reasons that ACT365 was chosen for the task. Remote Monitoring Capabilities ACT365 allows the system user to activate doors and analyze their status from any major web browser or the ACT365 appImportantly, ACT365’s remote monitoring capabilities deliver a force that gives business owners far greater visibility and control of their property. For instance, at the London Fields site, ACT365 allows the system user to activate doors and analyze their status from any major web browser or the ACT365 app. This allows Work.Life to make immediate remote adjustments to a user’s details, including updating access privileges when a lapsed membership is renewed. Crucially, ACT365 can also generate muster reports during a building evacuation, with marshals being able to see instantly from their phone or smart device if members have mustered out. Again, this function can be used remotely if required. Controlling Doors Through Smartphone Devices Vision Security Services operates as an integrator across access control, video surveillance, intruder alarms and barrier systems across the south of England and London from a base in Sittingbourne, Kent. Commenting on the installation of ACT365, Reg Butler, Director of Vision Security Services, stated: “There are very few true cloud-based access control solutions, and the ability of Vanderbilt’s ACT365 to synchronize access control events instantly to camera footage from a single platform means no time is wasted searching through video. Vanderbilt’s ACT365 appeals to our end-users regarding functionality and price point. They also appreciate being able to view sites and even open and lock doors based on what they see on a camera feed, all from a smartphone or web browser.” Protecting People And Assets During Emergency ACT365’s real-time management enables the kind of flexibility that system users need to instantly protect people and assets in the event of an emergency Overall, ACT365’s real-time management enables the kind of flexibility that system users need to instantly protect people and assets in the event of an emergency. Essentially, ACT365’s remote monitoring feature puts business owners first by eradicating once heavy responsibilities that can now be promptly completed through the click of a button on smartphone or desktop devices. This gives business owners convenience through simplicity. As explained by Ross Wilks, Head of Marketing Communications at Vanderbilt: “ACT365 deals with convenience. It deals with things that are at the heart of customer pain points. Vanderbilt has always looked to invest in technology that will match our values of agility, flexibility, and dependability. "Products like ACT365 excel with these criteria. ACT365’s distinguishing characteristics deliver information rapidly, cost-effectively, and can be upgraded with the latest features as and when they become available.”
Technology company Nedap has provided physical access control and long-range readers for vehicle identification at the new AZ Zeno medical care center in Knokke-Heist (Belgium). AZ Zeno, which opened in April 2018, consists of a hospital with rehabilitation center, an outpatient clinic, auditoria, public event space and a heliport. Nedap Identification System and Nedap Security Management have worked together on this extensive project. It is AZ Zeno’s highest priority to guarantee the security of patients and employees. With Nedap’s TRANSIT long-range identification readers, emergency vehicles get swift access to the hospital’s premises. Physical Access Control AZ Zeno combines functionality and sustainability and respects the rural character of the local landscapeWith AEOS, Nedap provides the medical care center with a complete solution for physical access control, and the system will also be used to manage staff lockers. By combining Nedap’s solutions, AZ Zeno is able to offer both patients and employees the best possible security and accessibility. AZ Zeno combines functionality and sustainability and respects the rural character of the local landscape. The link between inside and outside and between medical facilities and public spaces is almost seamless. And the center’s sustainable design focusses on its surroundings, ecological energy and the use of reclaimed materials. Better Accessibility Nedap-CEO Ruben Wegman: “We are proud that two of our business units contribute to the security of this exceptional and innovative center and to a better accessibility for its users. The simultaneous implementation of AEOS and TRANSIT is a great example of the complementary character of Nedap’s products.” To implement the system, Nedap collaborated with partner Electro Enterprise Gullegem.