Johnson Controls, a global provider of smart and sustainable buildings, is launching OpenBlue - a complete suite of connected solutions and services that combine the Company’s 135 years of building expertise with cutting-edge technology. This open digital platform, when integrated with Johnson Controls core building systems and enhanced by Fortune 100 technology partners, will make shared spaces safer, more agile and more sustainable. Johnson Controls OpenBlue is the culmination of years...
ProLabs ProTune™ Tuning and Coding system offers a powerful solution to resolve network issues that require fast and immediate responses. Controlling and maintaining inventory levels to meet network emergencies involves holding spare transceivers and will directly impact one’s bottom line. The ProTune™ coding and tuning system consists of an appliance and a powerful cloud-based platform that codes or tunes ProLabs transceivers in one simple step. Transceivers and form factors...
LenelS2 and FLIR Systems, Inc. announces that they had signed an agreement to integrate select FLIR thermal cameras with LenelS2’s OnGuard® access control system. The integrated, non-contact solution joins the Carrier Healthy Buildings Program suite of offerings to support reopening and to assist in slowing the spread of COVID-19 and possibly other viruses in the workplace through thermal screening. FLIR is a pioneer company specializing in the design and production of thermal imaging...
Boldon James Ltd, a technology company providing data classification and military messaging solutions which enable customers to effectively protect data, enforce controls and manage data distribution, announces it has partnered with Germany’s solutions specialists for cryptography and Public Key Infrastructure, cv cryptovision GmbH. This partnership will provide government agencies and defense organizations with the ability to email securely across different security domains. The two orga...
Pivot3, the provider of intelligent hyperconverged infrastructure solutions for mission-critical video, announces significant automation and intelligence enhancements to its Acuity software platform to address the system administration, maintenance and availability challenges often faced in large-scale video surveillance deployments. The new intelligent system health and best practices analysis features provide significant reductions in total cost of ownership, ensure 24 x 7 system uptime in la...
Ping Identity, the Intelligent Identity solution for the enterprise, announces the launch of its revamped Global Partner Program, which provides Ping Identity’s extensive network of global technology and channel partners with the tools, resources and technology to grow their business and ensure the success of their customers. There is a booming demand for tailored identity and access management solutions as enterprises continue to expedite their digital transformation initiatives. In a pr...
Pulse Secure, the renowned provider of software-defined Secure Access solutions, announced the launch of Pulse Zero Trust Access (PZTA), a cloud-based, multi-tenant secure access service that enables organizations to provide users easy, anywhere access to multi-cloud and data centre applications with Zero Trust assurance. PZTA simplifies access management with single-pane-of-glass visibility, end-to-end analytics, granular policies, automated provisioning, and advanced threat mitigation that empowers organizations to further optimize their increasingly mobile workforce and hybrid IT resources. As enterprises advance workforce mobility and business digitization, users require access to on-premises and cloud applications from any device, from any location, and at any time. Trust and adaptive control Meanwhile, cyberattacks, data breaches and compliance obligations have grown significantly, making trust and adaptive control critical. PZTA offers users streamlined application access while allowing organizations to govern every request by automatically verifying identity, device and security posture before granting a direct, encrypted connection between that user's device and applications residing in public clouds, private clouds or data centers. IT leaders are driving business transformation in the hybrid digital era while also defending assets" “IT leaders are driving business transformation in the hybrid digital era while also defending assets during the ‘age of hyper-converged access’ - for any user, from any device, anywhere to any application, at any time. Pulse Zero Trust Access is designed for the elastic digital workplace, providing a unified, cloud-based service that enables greater accessibility, efficiency and risk reduction,” said Rohini Kasturi, Chief Product Officer at Pulse Secure. Maximizing deployment flexibility “From inception, Pulse Secure has focused on providing secure access solutions that enhance productivity, visibility and compliance as companies migrate to the cloud and take advantage of utility computing. PZTA exemplifies our on-going commitment to innovate while maximizing deployment flexibility, scale, interoperability and investment protection for companies of all sizes.” PZTA is based on Pulse Secure’s new cloud-native, microservices-based, multi-tenant platform deployed globally in Microsoft Azure Cloud. The PZTA service consists of the Pulse ZTA Controller, which is hosted and managed by Pulse Secure, the virtual Pulse ZTA Gateway that customers deploy on-premises or in the cloud, and the unified Pulse ZTA Client which runs natively on each user’s Microsoft Windows, Apple macOS and iOS, and Google Android device. Adaptive control advantages According to the Gartner Zero Trust Network Access (ZTNA) market guide: “ZTNA improves the flexibility, agility and scalability of application access, enabling digital businesses to thrive without exposing internal applications directly to the internet, reducing risk of attack.” Further, “ZTNA augments traditional VPN technologies for application access, and removes the excessive trust once required to allow employees and partners to connect and collaborate. Security and risk management leaders should pilot ZTNA projects as part of a SASE [Secure Access Service Edge] strategy or to rapidly expand remote access.” Pulse ZTA Gateways are deployed in the customer’s on-premise and cloud environment Pulse Zero Trust Access aligns with the Software Defined Perimeter (SDP) architecture of the Cloud Security Alliance, incorporating extensive identity and device authentication, separate control and data planes, centralized granular policy management, and micro-segmentation to thwart unauthorized access and attack propagation. Threat mitigation actions While every user device access requires explicit authentication and authorization by the Pulse Zero Trust Access service, the Pulse ZTA Gateways are deployed in the customer’s on-premise and cloud environment closest to the application or resource. This proximity optimizes user experience, reduces latency, and enables hybrid IT deployment at scale. Since encrypted application traffic only flows between the ZTA Clients and ZTA Gateways, customers gain full data privacy and data sovereignty. PZTA governs each access request and session via a centrally deployed and managed policy. Building upon Gartner’s Continuous Adaptive Risk and Trust Assessment (CARTA) framework, PZTA augments contextual and identity-centric policies with built-in User and Entity Behavior Analytics (UEBA) whereby attributes for every session are monitored and assessed, applying proprietary risk scoring algorithms to identify non-compliant, malicious and anomalous activity, and take expedited threat mitigation actions. Cloud-based service “Our customers trust us to identify and deliver advanced solutions that enable their digital business and protect their valuable resources. Pulse Secure has been our key partner for many years as they offer one of the most versatile, integrated and scalable secure access solutions in the market." PZTA can co-exist with Pulse Secure’s network access solution portfolio including the Pulse Access Suite "We jumped at the opportunity to test out their new Zero Trust Access cloud-based service and our teams have been impressed with its simplicity, manageability and overall feature-set”, said Herve Rousseau, the Chief Executive Officer at Openminded. “Pulse Zero Trust Access service does indeed offer users an easier means to access network and cloud applications while providing organizations greater hybrid IT access agility, oversight and management.” Secure access solution PZTA allows enterprises of any size to gain comprehensive Secure Access with a simple, scalable, cloud-native service that can be implemented in a matter of hours. The solution provides deployment flexibility and cohesive policy management for enterprises migrating applications from data center to cloud, while also offering comprehensive secure access capabilities to those organizations with pure multi-cloud environments. This allows broad support for legacy applications and popular cloud apps such as those from Amazon, Atlassian, Box, Google, Microsoft, Oracle, Salesforce, SAP and Zoom. PZTA can co-exist with Pulse Secure’s remote, mobile and network access solution portfolio including the Pulse Access Suite. Multi-factor authentication Leveraging the unified, multi-tunnel Pulse ZTA Client, users can enjoy transparent, uninterrupted, and simultaneous access to applications and resources from their device of choice regardless of access method - SDP, VPN or NAC. Organizations gain implementation and operational efficiencies, investment protection and tool consolidation to realize lower overall cost of ownership. Additional features of PZTA include: Extensive identity, endpoint and security posture authentication prior and during each access transaction to negate unauthorized user and vulnerable device access Broad application support, including HTTP, TCP/UDP based applications, multi-factor authentication (MFA), single sign-on (SSO) and protected connectivity options User and device resource shielding prior to PZTA Controller authorization, establishing a Dark Cloud defense to eliminate target visibility for attackers and malware propagation End-to-end analytics to expedite alerting, reporting, auditing, issue triage, and investigation processes Hybrid IT deployment According to a 2020 Zero Trust Progress Report, more than half of cybersecurity decision makers (53%) plan to adopt Zero Trust access capabilities with a hybrid IT deployment. PZTA service is available now at an annual subscription MSRP starting at $180 per user for up to 500 users with volume and multi-year discounts being offered. Managed Security Service Providers (MSSPs) can take advantage of flexible deployment options with plans to allow MSPs to host the ZTA Controller in their or their customers’ infrastructure, and the ZTA Gateways across any hybrid environment.
Red Lion’s FlexEdge Intelligent Edge Automation Platform now combines the scalability of Linux with the power of Crimson 3.2 software into one user-friendly operating system. This fusion enables a single FlexEdge controller to provide advanced networking, security, and automation. By integrating information technology and operational technology, FlexEdge helps customers reduce costs, improve data security, and increase productivity. Powered by Crimson 3.2 software, the FlexEdge platform provides customers with maximum flexibility to easily modify controller functionality as application needs change. From advanced networking to automation, one controller does it all. Customers can enable additional functionality through field-unlockable software upgrades that eliminate the need to purchase or add more equipment, saving both money and unnecessary downtime. Critical communications applications These new capabilities open doors to new product combinations, further expanding the applications to which the FlexEdge platform can be deployed. With FlexEdge’s modular communications sleds, users can now deploy multi-cellular radio gateways for critical communications applications. And, for environments with demanding requirements, the platform offers multiple isolated serial ports, routable Ethernet ports, optional serial, USB, Wi-Fi, and cellular communications sleds, and field-installable I/O.
BlackBerry Ltd. has announced that it has partnered with Dedrone, a globally renowned market and technology solutions company in airspace security, to deliver advanced counter-drone technology to secure the world’s most critical sites. Advanced counter-drone technology As part of this embedded technology partnership, Dedrone, is integrating BlackBerry AtHoc software into its products, to enable real-time secure alerts, when a malicious or unauthorized drone is detected in airspace. “When an unauthorized drone enters restricted airspace, time is of the essence. The more effectively the on-site personnel can respond, the better their chances of countering whatever the drone is there to do. BlackBerry AtHoc’s advanced alerting capabilities combined with Dedrone’s drone detection technology, enable our customers to react precisely and in time to control the situation,” said Aaditya Devarakonda, President and Chief Business Officer, Dedrone. Dedrone technology The Dedrone technology portfolio combines machine-learning software with state-of-the-art hardware sensors The Dedrone technology portfolio combines machine-learning software with state-of-the-art hardware sensors, electronic attack methods like smart jamming, and defeat weapons to provide early warning, classification of, and mitigation against drone threats. Dedrone’s capabilities are used by hundreds of customers globally, including the U.S. military, allied and coalition forces, correctional facilities, airports, utilities, as well as other public and private organizations. Integration with BlackBerry AtHoc software Working with the BlackBerry AtHoc API, Dedrone has integrated directly to BlackBerry AtHoc’s extensive and granular alerting functionality. This allows the creation of automated, highly targeted alerts based on a range of criteria, including flight zones, drone behavior, and user groups – for a more efficient, focused response to the presence of an unauthorized drone. “New advanced technologies have the potential to solve some of today’s most pressing challenges, however, they also introduce new security risks,” said Christoph Erdmann, Senior Vice President of Secure Communications, BlackBerry. Countering rising threat of unauthorized drones He adds, “Drones are one of the many IoT endpoints that add to the growing chaos that security experts must navigate. We’re excited to partner with Dedrone to offer a critical solution that organizations around the world can use to keep citizens and the public safe.” BlackBerry is a globally renowned company in secure communications and the BlackBerry AtHoc software is used by key organizations around the world, including 70% of the US Federal Government.
As part of the German Army's "qualified air defense" drone defense program, sensor specialist HENSOLDT is supplying the latest version of its "Spexer 2000 3D" radar to system integrator Kongsberg Defence & Aerospace. Spexer will be part of the C-UAS system (Counter-Unmanned Aerial System), which is based on Kongsberg's remote-controlled "Protector" weapon station, both mounted on an armored GTK "Boxer" vehicle. Initially 10 systems are under contract. Radar deliveries will start at the end of this year to meet the requirements of NATO VJTF (Very High Readiness Joint Task Force) 2023. The contract was awarded after a test firing at the Baumholder military training area. The third generation of HENSOLDT's "Spexer 2000 3D" radar demonstrated outstanding classification performance of small targets in very demanding scenarios. Ground-based air defense Due to the small radar cross section, high maneuverability and high optical reconnaissance performance of these micro-drones, they pose a particular threat to mobile land forces. The new Spexer radar generation additionally closes the gap in the reconnaissance capability of close-range small targets within ground-based air defense. Parallel to drones, the classic air and ground target catalog - such as helicopters, combat aircraft, armored vehicles etc. - can also be detected and classified. These capabilities set new standards in the field of radar-based self-protection. Of the previous generations of Spexer radar, over 150 systems have already been delivered to customers and are in operational use worldwide.
ISS - Intelligent Security Systems announced that it has received LenelS2 factory certification and joined the LenelS2 OpenAccess Alliance Program (OAAP). ISS’ SecurOS™ Video Management System (VMS) now interfaces with the OnGuard® Access Control System, providing users with a seamless surveillance and access solution that accommodates ISS’ comprehensive portfolio of natively developed, intelligent analytics. "ISS has completed required factory testing at LenelS2 to validate the functionality of its interface to the OnGuard system. The combination of these powerful surveillance and access solutions provides users with a versatile solution that can be custom configured for many application requirements," said John Marchioli, OAAP Product Management, LenelS2. "We look forward to their continued involvement in the LenelS2 OpenAccess Alliance Program." Interfacing LenelS2 OnGuard and ISS’ SecurOS VMS “The interface of the LenelS2 OnGuard access solution and ISS’ SecurOS VMS provides new and existing customers with a highly effective and cost-efficient pathway to implement an advanced security system solution,” said Shawn Mather, Director of Sales for U.S., ISS. “It also allows users to easily leverage ISS’ portfolio of intelligent analytics, which have all been natively designed to work across the SecurOS VMS platform.” The solution uses SecurOS’ ACS user interface to receive and display events and cardholder data from the OnGuard platform, as well as send commands back to the OnGuard system. Other SecurOS features, such as multi-layer mapping, rules-based engine, notifications, user right management, and the SecurOS Face Recognition module, can be used in conjunction with this interfaced solution.
The ESA Leadership Summit - the strategically efficient annual event for company pioneers in the electronic security and life safety industry - has announced it will take the summit experience virtual in 2020 as ESA Leadership Summit Stay Connected. This virtual event will be held Sept 29 - Oct 1, connecting leaders with the content and contacts they need to thrive amidst uncertainty. The summit will still deliver top-notch education, self-selected one-on-one meetings with vendors and purposeful networking events. “Our ESA Members are continuing to drive value to their customers, evolving with safety standards and enriching their services,” says Merlin Guilbeau, CEO of the Electronic Security Association. “We can’t imagine a year without delivering the valuable content and connections that help them do this.” Interactive virtual platform The virtual #ProSecurity event will deliver all the components the industry has come to love about the one-on-one meeting event, driving premier content to the industry’s pioneers in an innovative and responsible way. “Our world today is seeing a digital transformation and it is incumbent on us to evolve along with it,” says Guilbeau. “I’m working with our team to accelerate and further deliver on a digitally enhanced experience for our industry. We’re taking our sessions, networking events and one-on-one meeting experience to an engaging and interactive virtual platform.” From Sept 29 - Oct 1, the Stay Connected virtual version of the ESA Leadership Summit event will deliver presentations and workshops from The Ritz Carlton’s customer experience experts, sales leadership experts and published author of “Leadership Isn’t for Cowards,” Mike Staver. Weinstock and Jackson award The Electronic Security association will also deliver its annual Weinstock and Jackson award presentations on Wednesday, Sept. 30 and will play host to an interactive trivia night on Tuesday, Sept 29. In addition to the networking, presentations and one-on-one meetings with vendors, leaders from integration and monitoring companies will have the opportunity to watch 15-minute Tech and Service Lightning Presentations from the industry’s vendors. This is yet another avenue the summit provides leaders to stay abreast of the latest services that could help them deliver value to customers. “This is what our industry does. We don’t give up. We adapt,” says Guilbeau.
Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localization. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymized and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Within days, a rule will take effect that bans from U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and Dahua. The Federal Acquisition Regulation (FAR) rule implements the “blacklist” (or “Part B”) provision of the National Defense Authorization Act (NDAA), which is understood in the security industry as prohibiting dealers and integrators that do business with the federal government from selling Chinese-made video products to any of their customers (even for non-government projects). The rule, which is officially still interim, states: “On or after August 13, 2020, [federal] agencies are prohibited from entering into a contract, or extending or renewing a contract, with an entity that uses any equipment, system, or service that uses covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system.” Federal rules Within days, a rule will take effect that bans U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and DahuaFederal agencies issuing the rule are the Department of Defense (DoD), the General Services Administration (GSA) and the National Aeronautics and Space Administration (NASA). GSA provides centralized procurement for the federal government. Because the COVID-13 crisis delayed issuance of the rule, the usual 60 days will not be allowed for public comment before the rule is implemented. However, public comments are welcome and will be addressed in subsequent rulemaking. “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giants. The rule also specifies that it applies to “certain video surveillance products or telecommunications equipment and services produced or provided by Hytera Communications Corp., Hangzhou Hikvision Digital Technology Company, or Dahua Technology Company (or any subsidiary or affiliate of those entities).” Hytera is a Chinese manufacturer of radio systems. Hikvision and Dahua are major international manufacturers of video surveillance equipment. Limits and prohibitions The rule states: “This prohibition applies to the use of … equipment or services, regardless of whether that use is in performance of work under a Federal contract.” In the industry, this clause is taken to mean that integrators that “use” any of the covered equipment are prohibited from selling to the government. “Use” presumably covers an integrator deploying the equipment in their own facilities and/or selling it to other customers. The rule also prohibits “service … related to item maintenance,” which in the case of a security integrator would include providing service contracts on previously installed systems. Security Industry Association (SIA) The Security Industry Association (SIA) comments: “Due to applicability [of the rule] to uses by entities with federal contracts even unrelated to their federal work, this broad interpretation is expected to have widespread impact on the contracting community across many sectors, as covered video surveillance equipment is some of the most commonly used in the commercial sector in the United States.” Security integrators that do business with the federal government have largely anticipated the new rule and already switched their Chinese camera lines for NDAA-compliant competitors. However, as SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. Easing compliance burdens The interim rule adopts a “reasonable inquiry” standard when an offeror (government contractor) represents whether it uses covered equipment. “A reasonable As SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. inquiry is an inquiry designed to uncover any information in the entity’s possession about the identity of the producer or provider of covered telecommunications equipment or services used by the entity. A reasonable inquiry need not include an internal or third-party audit.” SIA notes that this provision may be aimed at easing the compliance burden by suggesting that contractors only need to inquire based on what information they already possess. The 'blacklist' The new rule covers Paragraph (a)(1)(B), which has informally been referred to as the “blacklist” provision of the NDAA, the John S. McCain National Defense Authorization Act for fiscal year 2019. However, the “Chinese ban” provision [Paragraph (a)(1)(A)] already went into effect a year after the law was signed by President Trump (August 13, 2018). “Part A” covers use of Chinese-made products in fulfilling government contracts. A growing threat Seeking to justify the new restrictions, the FAR rule states: “Foreign intelligence actors are employing innovative combinations of traditional spying, economic espionage, and supply chain and cyber operations to gain access to critical infrastructure and steal sensitive information and industrial secrets. The exploitation of “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giantskey supply chains by foreign adversaries represents a complex and growing threat to strategically important U.S. economic sectors and critical infrastructure.” SIA has urged a delay in implementing the “Part B” provision, stating: “The federal government estimates that it will cost contractors well over $80 billion to fully implement this prohibition on the use of certain Chinese telecommunications and video surveillance equipment, yet endless delays in publishing the rule now mean that federal suppliers have just weeks to understand and comply with the new rule, which raises as many questions as it answers.” SIA continues: “Federal suppliers across a wide range of industries have increasingly concluded that Part B is unworkable without clarification of the scope and meaning of key terms in the provision, which the rule does not do enough to define. For example, Part B bans agencies from contracting with a provider that “uses” any covered equipment or service. This term is not clearly defined in law or regulation, yet contractors must certify compliance beginning Aug. 13, 2020.” The Part B rule, which only applies to prime contractors, enables agency heads to grant a one-time waiver on a case-by-case basis, expiring before Aug. 13, 2022.
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analog with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cybersecurity requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available”“We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organizations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organizations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Read parts one and three of our healthcare mini series here and here.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
ISONAS Inc., a globally renowned IP access control and hardware solutions provider, and part of the Allegion family of brands, has announced that the ISONAS Pure IP access control solution has been installed at a new flagship distribution center for Premier Packaging, an international packaging solutions company, with facilities in 14 locations nationwide. ISONAS Pure IP access control In the summer of 2018, Premier Packaging was looking to implement an access control system to help secure their brand-new 320,000-square-foot facility in Louisville, Kentucky. After working closely on a recent project with Orion Networks, a trusted IT infrastructure provider, Premier Packaging relied on their recommendation to implement a cutting-edge access control solution from ISONAS. With no access control system in place at any of their 14 locations and a combination of office workers, support staff, truck drivers and warehouse employees entering and existing the building daily, a process to control access was a necessity. Monitoring and tracking visitors to distribution center A major challenge facing the new distribution center was truck drivers, who came into the facility, were not company employees. With on average 250 people coming in and out of the new facility in Kentucky daily, monitoring and tracking who those people were and if they belonged there was imperative. They were also looking for the flexibility to manage the locking and unlocking of doors remotely, rather than having to rely on physical keys. “After comparing ISONAS to other access control systems out there, we knew that ISONAS was the right flexible access control solution to meet Premier Packaging’s security needs,” states Brock Jamison, VP and Director of Sales at Orion Networks. ISONAS RC-04 reader-controllers installed ISONAS Pure Access software was implemented to give the packaging company remote access capabilities The initial project consisted of 18 ISONAS RC-04 reader-controllers installed at their new distribution center in Louisville. The RC-04 reader-controllers from ISONAS delivers advanced technical functionality with an easy installation process. In addition to the ISONAS hardware, the ISONAS Pure Access software was implemented to give the packaging company remote access capabilities. Pure Access Pure Access, ISONAS’s industry-renowned software, is a cloud-based access control application that provides users the ability to manage their access control from anywhere at any time, on any device. “We are extremely happy that our unique access control solution could help Premier Packaging improve safety and security at their new distribution center seamlessly,” states Jonathan Mooney, ISONAS Sales Leader. ISONAS cloud-based platform By using both the ISONAS hardware and software solution together, Premier Packaging was able to improve security and keep employees safe. With the ISONAS cloud-based platform, Premier now required all Louisville employees to enter the building using their ID badges to gain access. If an employee was not in the database and verified, then access would be denied. Future plans include rolling out the ISONAS access control solution to additional buildings and possibly integrating it with other security systems.
With Razberi Monitor™, security professionals can securely and remotely monitor their physical security network during a time of social distancing. IT professionals can quickly review the cyber posture data in case of a cyber-breach. Razberi Monitor™ provides secure, remote visibility into the availability, performance, and cyber posture of servers, storage, cameras, and other networked security devices. Remote monitoring The tool simplifies the monitoring and support of a multi-site enterprise security system, predicts and prevents problems for security professionals while providing a centralized view that benefits both IT and Physical Security departments. We have listened to the surveillance industry and created our software platform to enhance relationships" According to Tom Galvin, Chief Product Officer, Razberi Technologies, "We have listened to the surveillance industry and created our software platform to enhance relationships and align Physical Security and IT departments. Razberi Monitor allows security professionals to be proactive by predicting problems." Aligning network and surveillance departments Razberi Monitor's software platform, paired with Razberi's video recording and switch appliances, has enabled Tropical Shipping to save on the cost of sending maintenance crews to check on potential issues in their US and Caribbean facilities. "Our network is highly distributed across the US and Caribbean with up to 125 users viewing camera feeds at one time. Razberi Monitor has helped us increase our camera uptime assurance and align our network and surveillance departments," said Chad Nelson, Director of Security, Facilities and Cargo Compliance, Tropical Shipping. "They now have a clear view of all operations, and it puts me in the driver's seat to be able to provide specific alerts to each port remotely, quickly and more efficiently than sending a tech to troubleshoot."
NEC Corporation, NEC Corporation of America and their partner, Infrared Cameras Inc., were selected by the Hawaii Department of Transportation (HDOT) to provide thermal temperature screening and facial recognition technology at Hawaii's public airports to help protect the community and identify passengers with a potentially elevated body temperature. The companies combined resources to submit a unified proposal for the project. Preventative measures against COVID-19 "Taking these steps to implement the technology at our airports shows our commitment to providing preventative measures against COVID-19 for the community," said Hawaii's Governor David Ige. "We recognize that temperature screening won't catch every infected passenger, but it is an available tool that can be implemented and combined with the additional measures the State is providing to help prevent the spread of this virus, while helping rebuild the economy." NEC technology deployed at Hawaii's public airports We believe NEC's technology will help to ensure the safety and health of visitors and residents of Hawaii against COVID-19" "We are honored to become a part of this significant project for Hawaii towards the revival of tourism and business in the state," said Toshifumi Yoshizaki, Senior Vice President, NEC Corporation. "We believe NEC's technology will help to ensure the safety and health of visitors and residents of Hawaii against COVID-19, and our team will make every effort to ensure the success of this public and private joint project together with all of the partner companies." Multi-person thermal screening solution "Team NEC's approach is predicated on enhancing existing processes and services rather than introducing a bottleneck or negative impact to processing speed," said Raffie Beroukhim, Chief Experience Officer for NEC Corporation of America. Raffie adds, "We look forward to working with the State of Hawaii to further automate and enhance the travelers' experiences with our high throughput, multi-person thermal screening solution." NEC and Infrared Cameras selected NEC and Infrared Cameras were selected with a proposal of US$ 23.3 million for equipment and installation and a 10-year maintenance plan of US$ 1.42 million annually for a total contract amount of US$ 37.5 million. The companies were selected in part because of their innovative concept and functionality to deliver accurate and efficient thermal temperature screening for people traveling to Hawaii. The selection committee evaluated various systems and technologies and NEC and Infrared Cameras were determined to be the best fit for Hawaii's needs. Thermal temperature screening equipment The thermal temperature screening equipment will be installed in three phases at the Daniel K. Inouye International Airport (HNL), Kahului Airport (OGG), Lihue Airport (LIH), Ellison Onizuka Kona International Airport at Keahole (KOA) and Hilo International Airport (ITO). Phase 1 will have the temperature scanners installed this month at the gates currently being used for arriving trans-Pacific flights. Phase 2 will have the temperature scanners installed at the remaining gates in the coming weeks. Phase 3 expects to have the facial recognition equipment installed by December 31, 2020. Leveraging facial recognition technology The system incorporates privacy protections from design to deployment While the Hawaii airports system will leverage facial recognition technology, people should not think of the features they may have seen in a movie. The system incorporates privacy protections from design to deployment and NEC will work with HDOT throughout this process to ensure the solution meets the requirements of the State of Hawaii. Furthermore, the system will only temporarily retain a picture of a person with an elevated temperature of 100.4 degrees and above to help airport representatives identify them and conduct an additional assessment to determine if health precautions are necessary. Use of thermal image capture technology The picture will be erased within 30 minutes and will not be shared with any outside agencies. Anyone with a temperature below 100.4 degrees will not have their image retained at all. The system will not automatically have a person's personal information, such as their name, address or driver license number. It will not contain information about criminal history or outstanding warrants. The use of the thermal image capture technology is anticipated to be safer and more cost effective than manual temperature checks. Without the use of facial recognition technology, an employee would need to be next to each camera at all times to pull a person aside as they walk by the camera, creating bottlenecks and further exposing employees to travelers and, thus, possible COVID-19 infection.
Schools and heritage sites present their own unique difficulties for security and access control. But what about a school that is also a heritage site of exceptional value? This was the challenge facing security administrators at the Colegio Diocesano Santo Domingo in Orihuela, Spain. The Colegio Diocesano is more than just a school. Its historic buildings date to the 1500s, a heritage site as well as a place of learning - with a museum which requires the protection of the same access system. Hence, the brief for a new access system required minimal disruption on two fronts. The college buildings are a Resource of Cultural Interest and on Spain’s heritage registry: they must not be damaged. School leaders also required little disturbance of everyday school learning. Wireless access control was the obvious answer. Wireless access control devices The school chose SMARTair Wireless Online management for their new keyless access system SMARTair wireless access control devices now control access through 300 doors around the school. A mix of battery-powered escutcheons and weather-proof escutcheons, knob cylinders and wired wall readers (including for lifts), are connected to SMARTair’s intuitive software by a network of 38 wireless communication hubs. The school chose SMARTair Wireless Online management for their new keyless access system. This powerful management option enables real-time security control to limit free access to and around the site, even if the school data network is down. Automated emails inform security staff of any incidents, keeping students, staff, equipment, and precious heritage safe. Issue access credentials “The main benefit is the ease of real-time key management - from any place and at any time - via the wireless online management system,” says IT Manager, Francisco Fernández Soriano. “This increases security for children and for staff, because no unauthorized people can enter the school.” SMARTair locks and readers provide a streamlined way to manage access. Student and staff carry credentials programmed to allow access to specific authorized areas. SMARTair TS1000 software makes it easy to issue and cancel access credentials for temporary visitors such as parents. Installation and integration The system was installed without a hitch and also without any disruption to classes" “In addition to the main entrances and classrooms, access to private spaces such as lifts, offices, staff rooms, the church, the museum, the library and the IT room is constantly monitored,” he adds. “Thanks to our SMARTair devices installed at more than 300 doors, the security team can find out who has accessed which space and when, at any time.” Installation of the school’s new SMARTair system demanded minimal work. Some school doors date to the 16th century, so major alterations to door hardware were not possible. “The system was installed without a hitch and also without any disruption to classes,” confirms Fernández Soriano. Because SMARTair is a modular system, scalability is built in. They can extend or fine-tune their access system when they choose. Indeed, SMARTair’s “Phase II” is already under discussion. Education management software SMARTair software also easily slotted into the school’s existing management workflows. The Colegio Diocesano has used iinventi education management software for the past five years. Integration with SMARTair software was simple: access control, the library and canteen are managed from an integrated system. “SMARTair gives the school’s security team the answers they need,” concludes school director, Reverend José María Fernández-Corredor.
The cloud-based access control and video management system was recently installed at the city’s marina where it has integrated with their booking system, Harba. There are 750 members with boats in the Vejle marina, and through the Harba booking system, they are issued a 6-digit personal PIN code or a tag. With this PIN code, they can then access and use the facilities of the marina, such as the toilets, showers, laundry rooms, and kitchen. The PIN is inputted into the ACT365 reader at each entry point of the marina facilities. All services are then automatically billed on a monthly base via the Harba booking system. This access control booking strategy ensures that the marina’s facilities are kept free for member use only. Readers with RFID tags and smartphone access ACT365’s readers were well suited to this installation because they are made of robust polycarbonate housing and are suitable for both indoor and outdoor mounting. The reader controls a single door and uses a voltage free relay contact. ACT365 has a modern and user-friendly design and a limitless number of users. Both RFID tags and smartphone access availability. For non-member boaters who are visiting the Vejle marina, a self-service terminal, the Harba Kiosk, is also available to use. This self-service terminal allows non-members to use their credit card to pay for the use of the marina facilities. Similar to the Harba app for members, non-members will receive a PIN code from the Harba kiosk via email or SMS which they can then input into the ACT365 readers.
Auto Trader is an FTSE100 technology company and is an agile, fast-paced business, and so needs to have a robust risk management framework which gives the ability to manage risks on a real-time basis. It had an existing risk and compliance management framework; however, this relied on multiple spreadsheets, and so action tracking and reporting were a manual and lengthy process. They were looking for a solution that could bring together multiple risk registers, give them the ability to assign actions to risk owners for them to maintain and provide real-time reporting and dashboards at different levels of detail. Auto Trader wanted a solution that out of the box met most of their requirements, but also needed a flexible solution and so recognized the need for professional services to configure to meet specific requirements. Gartner’s Magic Quadrants They saw that SureCloud’s solutions could allow them to aggregate risks across different business functions, to track actions and to report on a real-time basis. The fact that SureCloud also has a vast portfolio of GRC solutions that may be useful to Auto Trader in the future as they expand their GRC journey attracted them to Platform, as the business could grow into the solution over time. Auto Trader needed a solution that was easy and intuitive to operate, to ensure users will feel confident in how to navigate the software and therefore gain quick value. They also wanted users to be able to "dip in and out" of the Platform quickly. After reviewing several solutions, many on Gartner’s Magic Quadrants like SureCloud. Auto Trader found that other vendors lacked the flexibility that SureCloud offered. Manage complex risks We were attracted to SureCloud due to the flexibility of the solution in comparison to other GRC solutions" Claire Baty, Governance, Risk and Compliance Director at Auto Trader, commented: “We were looking for a solution that would be simple to use, yet provide the ability to manage complex risks, while complementing our agile ways of working." "We were attracted to SureCloud due to the flexibility of the solution in comparison to other GRC solutions, as it gave us the ability to design our own user journeys and reporting tools, and the modular approach that means we can continue to enhance our framework over time. We are looking forward to working with SureCloud on this important project.” Digital automotive marketplace Nick Rafferty, COO at SureCloud commented: “We are thrilled to be working with Auto Trader, the UK and Ireland's largest digital automotive marketplace. Not only to help them meet their Risk and Compliance needs but also to be chosen due to our level of agility in our Platform. I look forward to seeing the relationship grow as our technology flexes to their way of working while automating and streamlining their programs." "SureCloud is proud to be helping another market-leader ditch spreadsheets for good.”
Round table discussion
Retrofit projects provide new levels of physical security modernisation to existing facilities. However, retrofits come with their own set of challenges that can frustrate system designers and defy the efforts of equipment manufacturers. We asked this week’s Expert Panel Roundtable: What are the biggest challenges of retrofit projects, and how can they be overcome?
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
Products are the building blocks of the security industry. Historically much of the industry’s sales effort has been focused on highlighting product features and functionality. At the end of the day, however, an end user is less interested in the performance of any individual system component than in the system as a whole. Lately, the industry has embraced a changing sales approach by emphasizing systems rather than products. We asked this week’s Expert Panel Roundtable: What are the benefits of a transition from selling security products to selling security solutions?