The Security Industry Association (SIA) and SecureIDNews have selected five distinguished biometrics and security experts as the 2020 winners of the Women in Biometrics Awards – a globally recognized program co-founded by SIA and SecureIDNews and co-presented with sponsors IDEMIA, Biometric Update and the SIA Women in Security Forum. The honorees will be recognized during the 2020 SIA GovSummit, SIA’s annual government security conference, which will be hosted as a free virtual even...
Businesses, large and small, create data which needs protecting, whether in an onsite server room or co-located at a data center. When a business imagines a corporate data breach, they’re probably picturing black-hat hackers pursued by cybercrime investigators. The reality is often more mundane. Only around a half of breaches involve hacking, according to one recent report. Gaps in the physical security, the business’ data and servers are equally important targets. Perhaps the compa...
Sectigo, a globally renowned provider of automated digital identity management and web security solutions, has joined the Cloud Signature Consortium to help drive standards in the rapidly-growing document signing space. Sectigo, the international commercial Certificate Authority, with expertise in automating document signing certificate issuance and renewal, will work closely with the Consortium to define and promote standards as the demand for electronic signatures continues to rise. Expansio...
Exabeam, the Smarter SIEM™ company, announces updates to the Exabeam Partner Program, including the rollout of a formalized practice for managed security service providers (MSSPs) and managed detection and response (MDR) providers, both key segments of its partner ecosystem. The program will provide structure and support for multiple MSSP and MDR provider business models for its managed service practice, which contributed to 12% of the company’s overall business revenue in 2019. The...
Panasonic has launched a free online resource for businesses to help them to continue to learn, change and share in the ‘new normal’ work environment. Panasonic BizTalk Panasonic BizTalk brings together a series of digital talks, webinars, training and Q&A’s with Panasonic experts and partners across its entire range of business technology. Areas of interest covered include mobile computing, security, broadcast, business communication and visual solutions, as well as ind...
Maxxess Systems, a global renowned provider of event response management and collaboration systems, is pleased to announce their partnership with Seek Thermal, an advanced imaging technology company, to deliver a complete temperature screening solution to help manage health risks. Temperature screening solution Unlike stand-alone systems for temperature screening, this new complete solution helps organizations not only detect health risks in real time, but also to trigger immediate automated s...
Identiv, Inc. announced the availability of Hirsch Velocity Software with Contact Tracing. Available via download for Hirsch customers, the free feature has been launched to support worldwide office re-openings with improved health and safety management tools. Based on the Centers for Disease Control and Preventions’ (CDC) recommendations, contract tracing is a key strategy for preventing further spread of the novel coronavirus (COVID-19). Hirsch Velocity Software with Contact Tracing is a means of proactively and reactively protecting visitors. If a person enters a building and is later found to be symptomatic of an illness, Velocity can pull a report of everyone who entered the same door who can then be notified to either get tested or self-quarantine. The feature is free, easy to download, and simple to implement into existing Velocity physical access control system (PACS) platforms. Manage access control While this is useful during the days of COVID-19, it can also be used for other applications, such as seasonal influenza" “While this is useful during the days of COVID-19, it can also be used for other applications, such as seasonal influenza,” said Mark Allen, Identiv GM, Premises. “This means your office can be proactive in responding to potential outbreaks, while simultaneously providing your employees with the peace of mind that there are measures in place to keep them safe.” Hirsch Velocity Software provides the security and functionality expected from high-end systems with the ease-of-use found in entry-level packages. Velocity is an integrated platform that manages access control and security operations in thousands of different facilities, from single high secure rooms to multi-building, multi-location campuses with the most stringent security compliance. Prevent unwanted access With Velocity, users can control doors, gates, turnstiles, elevators, and other equipment, monitor employees and visitor behavior, prevent unwanted access, maintain compliance, and provide a robust audit trail. The latest version of the software platform is designed to deliver the highest level of security, interoperability, and backwards compatibility, and it accommodates the evolution of security technology.
Sectigo has seen demand increase significantly for its cloud-based Certificate Manager solution as large enterprises seek better protection from service interruptions and vulnerabilities during the global pandemic. The company’s digital identity management platform is helping complex organizations apply enterprise-grade Public Key Infrastructure (PKI), automation, and no-touch authentication to quickly secure and maintain operations across dispersed organizations. “In recent months, Sectigo has seen three times the inbound information requests from large enterprises seeking to automate, consolidate, and manage the digital identities of employees and endpoints across their organizations,” said Jonathan Skinner, CMO, Sectigo. “Digital certificates are the gold standard for ensuring identity. Across the globe, our teams are helping customers rapidly deploy PKI solutions that solve today’s authentication challenges while future-proofing their businesses for tomorrow.” Digital identity as new perimeter Enterprises have historically provided protection within a firewalled network architecture Sectigo Certificate Manager, the heart of Sectigo’s Digital Identity Management Platform, delivers the automation, orchestration, and visibility required for a Zero Trust strategy. The platform’s unique cloud-based system offers compelling advantages over on-premise alternatives. Compatible with all popular devices, operating systems, protocols, and chipsets, Sectigo Certificate Manager provides visibility into certificates of all types through a single cloud-based solution. Enterprises have historically provided protection within a firewalled network architecture. However, this approach has evolved to accommodate complex environments with cellphone devices, multi-cloud, DevOps, BYOD, IoT, and more, thus elevating digital identity as the new perimeter. Digital Identity Management Platform In this modern organization, security teams often work toward a Zero Trust model where access and permissions are granted narrowly and as needed on a case-by-case basis to users, devices, and processes in the environment. For Zero Trust to be effective, enterprises need a proven digital identity mechanism, driving demand for automated cloud-based management of digital certificates. The Sectigo Digital Identity Management Platform protects the Software-Defined Perimeter (SDP) of the modern enterprise for all certificate use cases, including: TLS / SSL certificates for websites, internal servers, and DevOps environments Device and user certificates for easy-to-use, fool-proof access control Cellphone device certificates to control access for BYOD and company-assigned devices S/MIME certificates to encrypt and authenticate email communication IoT certificates for securing connected devices Code signing certificates to ensure the integrity of all code running in an environment Securing Remote Workforce More than ever, IT teams understand how digital identities fit into their secure, geographically dispersed architecture. Automating the discovery, issuance, and renewal of public certificates saves time for security and operations personnel and reduces enterprise risk. Sectigo’s automation platform can be instrumental when rapidly migrating people, processes, and data to WFH environments—limiting risk and burden to employees—by following three steps: Replace passwords with user identity certificates — PKI-based identity certificates are the strongest form of identity and make life easier for employees, reducing the burden of remembering, updating, and managing passwords. Replace multi-factor authentication with no-touch authentication — Unlike hardware-token multi-factor authentication (MFA), or SMS-based MFA, Sectigo digital certificates simplify the employee experience by easing the burden of security when a workforce is remote. Security maintenance Current pandemic is just one example of the risk organizations face when normal work processes are disrupted Certificate-based authentication also offers the highest assurance that the people, devices, and processes are, in fact, legitimate. Automate the issuance of all identity certificates — Automation provides benefits across the certificate lifecycle, enabling IT security teams to issue, revoke, and replace certificates quickly, reliably, and at scale, while alleviating their management burden. The current pandemic is just one example of the risk organizations face when their normal work processes are disrupted. During the 2018 U.S. government shutdown, many employees who managed security maintenance were furloughed, resulting in sweeping outages. In a single week, as many as 130 federal websites and services went offline or assumed risk due to certificate expirations. Web Security Platform Organizations must protect against the danger of outdated certificates as business continuity is tied to the livelihood of employees now more than ever. Sectigo helps prevent certificate-related outages through a broad range of automation technologies, including Enrollment over Secure Transport (EST), Secure Certificate Enrollment Protocol (SCEP), and Automated Certificate Management Environment (ACME), which integrates with a wide range of web servers, load balancers, and other networking gear, as well as DevOps environments. Sectigo’s official website can be visited to learn more about the company’s Digital Identity Management Platform, IoT Identity Management Platform, or Web Security Platform.
Pivot3, the globally renowned provider of intelligent hyper-converged infrastructure solutions for mission critical video, has announced a new platform for video surveillance solutions that enable organizations to do more with less in supporting their mission-critical security operations. Powered by the next generation Lenovo ThinkSystem SR655 server platform with 2nd Gen AMD EPYC processor, the new Pivot3 solutions deliver 10% lower cost per terabyte, 14% better capacity density and 100% more bandwidth than similar solutions. The result is improved camera density at a lower overall TCO for customers who consider their video mission critical. Pivot3 Surveillance Series “More and more customers are juggling how to enable better business decisions through technology, including capturing, storing and analyzing massive amounts of video data to enable real-time decision making with tight budgets,” said Kamran Amini, Vice President and General Manager of server, storage and software defined infrastructure, Lenovo Data Center Group. He adds, “Lenovo is collaborating with Pivot3 to deliver innovative solutions that empower customers with the performance they need to handle today’s fast-paced environments while eliminating their challenges.” Powered by Lenovo ThinkSystem SR655 server platform Pivot3 Surveillance Series appliances provide the performance of a dual-socket server at a lower acquisition cost With the Lenovo ThinkSystem SR655 server platform, the new Pivot3 Surveillance Series appliances provide the performance of a dual-socket server at a lower acquisition cost. The single-socket configuration also offers the potential of up to 50% savings on software licensing compared to the dual socket x86 alternative without sacrificing any performance. These savings are due to the solution’s use of one CPU instead of two CPUs. Because the Lenovo ThinkSystem servers include the 2nd Gen AMD EPYC processors they also support PCIe 4, which delivers 100% bandwidth increases compared to PCIe 3. Enhanced bandwidth for video recording With this update, customers get significantly more bandwidth for video recording and 150% increase in networking speed, with 25GbE support to enable faster video transfer from the edge to the core. The new Pivot3 solutions empower organizations dealing with the enormous growth of video to capture, store and analyze massive amounts of video data while controlling infrastructure investments. Optimized for video workloads The new solutions combine the power of the AMD EPYC processors along with Pivot3’s software optimized for video workloads to help ensure video loss and degradation never occur and video is always accessible and available. The Pivot3 solution also enables non-disruptive scalability and provides intelligent monitoring and analytics capabilities for real-time system health monitoring to maximize system uptime and reduce time to repair. Mission-critical IoT, security and video deployments AMD EPYC processors provide an additional layer of value to the new Pivot3 platforms" “The combination of Pivot3, Lenovo and AMD delivers the resilience and optimal performance organizations need to support mission-critical IoT, security and video deployments,” said Greg Gibby, Senior Product Marketing Manager, Data Center Products, AMD. He adds, “AMD EPYC processors provide an additional layer of value to the new Pivot3 platforms, empowering customers to make the most of their budgets upfront while increasing cost-effectiveness over time, critical for businesses that seek to expand their video deployments as needs evolve.” Single, modular software-defined platform The flexibility of the Lenovo ThinkSystem SR655 allows servers to be configured to support the massive processing requirements of new video analytics applications as well, meaning customers can deploy one modular, flexible software-defined platform to meet all their mixed security-workload requirements. This significantly reduces complexity and cost of ownership over traditional 3-tier proprietary systems or bare-metal servers. Enhanced security and safety measures “While video data output is growing, budgets have remained the same and this leaves security and IT professionals challenged on how to deliver on security and safety imperatives,” said Ben Bolles, Vice President of Product, Pivot3. Ben adds, “Building on more than a decade of experience creating solutions purpose-built for video and leveraging the latest in processing technologies, Pivot3 delivers the performance and economics that today’s security decision-makers require.”
Sensor solutions provider, HENSOLDT together with the renowned Additively Manufactured Electronics (AME)/Printed Electronics (PE) provider, Nano Dimension, has achieved a major breakthrough on its way to utilizing 3D printing in the development process of high-performance electronics components. 10-layer Printed Circuit Board Utilizing a newly developed dielectric polymer ink and conductive ink from Nano Dimension, HENSOLDT succeeded in assembling the world-wide first 10-layer Printed Circuit Board (PCB), which carries high-performance electronic structures soldered to both outer sides. Until now, 3D printed boards could not bear the soldering process necessary for two sided population of components. Military sensor solutions “Military sensor solutions require performance and reliability levels far above those of commercial components,” said HENSOLDT Chief Executive Officer, Thomas Müller. Thomas adds, “To have high-density components quickly available with reduced effort by means of 3D printing gives us a competitive edge in the development process of such high-end electronic systems.” High Performance Electronic Devices Nano Dimension’s relationship with HENSOLDT is the type of partnership with customers we are striving for" “Nano Dimension’s relationship with HENSOLDT is the type of partnership with customers we are striving for,” commented Yoav Stern, Nano Dimension President & Chief Executive Officer. Yoav adds, “Working together and learning from HENSOLDT led us to reach a first-of-its-kind in-depth knowledge of polymer materials applications. Additionally, it guided us in the development of Hi-PEDs (High Performance Electronic Devices) that create competitive edges by enabling unique implementations with shortest time to market.” AME engineering methodology AME is useful to verify a new design and functionality of specialized electronic components before production. AME is a highly agile and individual engineering methodology to prototype a new electronic circuitry. This leads to significant reduction of time and cost in the development process. Furthermore, AME allows for a verified and approved design before production starts, leading to higher quality of the final product. 3D printing electronics HENSOLDT started working with Nano Dimension’s DragonFly 3D printing system in 2016, in order to examine the possibilities of 3D printing electronics. Last year, HENSOLDT successfully implemented the DragonFly Lights-Out Digital Manufacturing (LDM) printing technology, the industry’s only additive manufacturing platform for round-the-clock 3D printing of electronic circuitry.
Temenos, the banking software company, has announced a joint effort with Microsoft to enable access to its AI-powered, Financial Crime Mitigation (FCM) SaaS solution to allow banks to protect both their customers and their organization from financial crime increase during the ongoing COVID-19 pandemic, particularly as banks have moved to remote working to protect their staff. AI-powered security solution Temenos AI-powered, Financial Crime Mitigation SaaS solution based on Microsoft’s fast, scalable and secure Azure cloud platform can be deployed within weeks. Temenos and Microsoft are opening up access to banks for a 14-day trial, available until 30 of June. As part of the collaboration with Microsoft, Temenos is offering system access and online tutorials for users to familiarize themselves with navigation of the system and learn how it can support them in a revized operating landscape. Financial Crime Mitigation SaaS solution Temenos FCM provides enterprise-wide financial crime protection for a highly regulated and fast-changing environment Temenos is slated to exhibit the open access initiative of its FCM software at its event, Temenos Community Forum, slated to take place from Oct 20th to Oct 22nd, 2020 at the Dublin Convention Center in Dublin, Ireland. Temenos FCM provides enterprise-wide financial crime protection for a highly regulated and fast-changing environment. It allows banks’ operators to respond to alerts and collaborate with team members while working remotely. Banking and financial security Throughout the Covid-19 crisis, Temenos customers from Tier 1 banks to regional banks and neobanks have continued to benefit from Temenos FCM’s comprehensive coverage regardless of the fact that their teams are working remotely. Financial regulators worldwide and organizations such as the European Central Bank are warning that the Covid-19 pandemic may result in an increase in financial crime and other misconduct due to market disruptions, reduced staff, and other factors, as has been the case during past global crises. Countering money laundering and terrorism financing Opportunistic fraudsters and criminals are adapting their methods of targeting people and countries in distress as new threat vectors open up. The Financial Actions Task Force (FATF), the global standard setter for combating money laundering and terrorism financing, warns businesses to remain vigilant for emerging money laundering and terrorist financing risks as criminals may seek to exploit gaps and weaknesses in Anti-Money Laundering/Combating the Financing of Terrorism (AML/CFT) systems under the assumption that resources are focused elsewhere. Cloud-native, AI-based technology We are proud to be able to offer our cloud-native and AI technology to support banks in the fight against financial crime" Fraudsters have already been very quick to adapt well-known fraud schemes to target individual citizens, businesses and public organizations. These include various types of adapted versions of telephone fraud schemes, supply scams and decontamination scams. Jean-Michel Hilsenkopf, Chief Operating Officer, Temenos, said, “We are proud to be able to offer our cloud-native and AI technology to support banks in the fight against financial crime, which has increased as a result of the pandemic.” Temenos Financial Crime Mitigation solution He adds, “As a strategic global banking software partner of Microsoft, we are pleased to join efforts to deliver Temenos Financial Crime Mitigation as SaaS on Microsoft Azure’s resilient, secure and proven cloud platform.” Jean Michel further stated, “We are committed to providing robust and up-to-date sanction screening, AML, KYC and fraud management protection combined with powerful AI-driven transaction monitoring and sanction screening to help banks worldwide.” Combating financial crime Marianne Janik, Country General Manager, Microsoft Switzerland, said “We have been pioneering with Temenos in the cloud for a decade. We are proud to join forces to help banks use the power of Temenos’ market-renowned Financial Crime Mitigation solution based on our secure, scalable and resilient global Azure cloud platform to combat financial crime surge due to Covid-19.” More than 200 banks use Temenos FCM SaaS solution, which covers watch-list screening, anti-money laundering, fraud prevention - suspicious activity prevention - and KYC, delivering industry-high levels of detection and false positives of under 2% versus industry average of 7% and above. Integration with Temenos Transact and Infinity platforms Temenos FCM can be deployed as a standalone, or integrated to any banking or payments platform including cloud-native, cloud-agnostic Temenos Transact and Temenos Infinity. It provides unrivalled levels of detection and resilience against financial crime and Total Cost of Ownership (TCO) savings of more than 50%. Temenos FCM provides banks with the next generation of AI-driven FCM capabilities that can run on any public cloud, as a service or on premise.
PSA, one of the world’s largest consortium of professional systems integrators, announced the addition of Arxys to its network. Arxys solves complex industry application challenges by leveraging a deep understanding of the complete environment to create a purpose-built, highly optimized appliance solution. “We are pleased to welcome Arxys as a vendor partner,” said Tim Brooks, PSA’s Vice President of Sales and Vendor Management. “Their VideoX line provides an elegant solution to complex problems, helping our integrators bring more value and solidify their client relationships.” Security systems integrators Arxys has been crafting data protection and data analytics appliances for the most demanding organizations for more than 27 years. By combining storage, compute, networking and virtualization on commodity hardware, Arxys orchestrates the complexity of disparate systems into a synthesized solution. PSA Security is a unique organization that is delivering superior value to the security industry" “PSA Security is a unique organization that is delivering superior value to the security industry. Arxys and PSA Security are together bringing new levels of performance, protection and efficiency to security systems integrators,” said Deborah Inman, Arxys’ President. “Our VideoX Appliances are changing the equation for security integrators and helping them win new deals in these challenging times.” Video motion detection VideoX Appliances deliver hardware accelerated technologies like video motion detection and encryption to drive enterprise grade video surveillance recording for leading VMS’s in a powerful, efficient and high-performance network video recorder appliance. Certified and Validated with the world’s leading VMS platforms, VideoX Appliances offer GPU powered video motion detection, enterprise class storage and retention. The VideoX Appliance platform includes Enterprise, Professional and Base models to bring activated hardware acceleration and advanced data protection to mid-size to massive security projects. For more information about Arxys or other offerings from PSA’s trusted partners, users can visit the company’s official website.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilized than others: financial services were quick to recognize the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realize is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-Effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimize displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyze and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analog with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cybersecurity requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available”“We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organizations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organizations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Read parts one and three of our healthcare mini series here and here.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
One of the common characteristics of trade shows is booths with walls and walls of new products. Sometimes exhibitors seem intent on displaying everything in their portfolio, even though the displays appear cluttered and may not be welcoming. In an age of system sales, in particular, the emphasis on products can seem off kilter. Discussions with exhibitors at this year’s GSX show reveal a new awareness of the need for less cluttered booths, but the equipment walls persist. Here’s a review of Day 2 from the show floor. Allegion embraces more open booth design At GSX 2019, Allegion is among the exhibitors embracing a new, more open booth design that encourages engagement with customers and puts less emphasis on product displays. Discussions at the Allegion booth have centered around the value proposition and lower complexity of network-connected access control systems. The approach has been gaining a higher profile at Allegion since the company acquired Isonas, whose system configuration involves a reader-controller connected to the network via power-over-Ethernet cable. “Customers are also asking about Bluetooth technology and mobile applications,” said Jonathan Mooney, Allegion sales leader. Allegion is looking to deploy the Isonas software in other products in their portfolio; it will be offered in the range of Schlage wireless locks by the middle of 2020.The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control" “The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control,” said Mooney. Bosch offers complete security solution Bosch is introducing 55 new products at GSX 2019, but when it comes down to it, the company’s overarching message is not about individual products but about how they can be combined into a larger system. “At the end of the day, the message from Bosch is ‘how do I create a complete security solution?’” said Paul Garms, Bosch Director, Regional Marketing Security. “That’s what we are trying to demonstrate: How do all these things integrate?” Most of interest to attendees are actual demonstrations, which are a unique aspect of the trade show experience. “It’s nice at a show where we can really demonstrate what we are talking about when we say ‘integrated solution,’” said Garms. “And people can say, ‘oh yeah, if I trip this video analytic, the speaker will warn me I am approaching a restricted area.’ Or, when the manager signs in on the intrusion panel, now the associate can access a door he wasn’t able to before. It’s that integration and the complete solution that resonates. People are also interested in new products. At a show, they like to see them in operation.” At the Bosch booth, there is a big wall that illustrates some integration possibilities. An array of cameras was among the 55 new products introduced by Bosch, which also emphasized systems. Machine learning and advanced video analytics One implementation featured on the wall is Bosch’s Camera Trainer machine learning system. The system can “train” a camera to recognize a car in a parking lot, for example. Among the new Bosch products is the Autodome 7000i, the next generation of a best-selling camera, now with H.265 encoding and analytics such as line crossing. There is also an outdoor panoramic camera that is adjustable to 180-degree or 360-degree views. The new, less expensive 3000i series cameras provide an affordable option with edge analytics and Bosch’s data security protection included. Integration from Honeywell as well as 'the big picture' At Honeywell Security Group, Senior Product Manager G. Eric Green said the show seems to be much better attended than last year, “and we have had a lot of interest in our products.” Even end-user attendees typical of the GSX show are interested in the details of technology, as well as “the bigger picture,” commented Green. “Some of our booth visitors want to get into the weeds,” he said. “They say they want this piece of hardware. But they also also interested in the big picture. How things are interacting is very important.”Honeywell announced the 30 Series IP cameras, which can be used as part of video systems that comply with National Defense Authorization Act Section 889" “Most customers have installed products from other vendors that they expect us to work with. So integration is always at the top of the list. Can you work with these guys? Do you have an API? Do you support this piece of equipment? We always hear that a lot,” said Green. “There are customers who want best-in-breed products, but they’re not necessarily concerned about that coming from one manufacturer,” he said. “Other customers want ‘one throat to choke.’ When something goes wrong, they don’t want any finger-pointing.” Web-based security console and frictionless access control Honeywell is showing a beta version of its Pro-Watch 5.0 product, which is coming out in Q1 next year. It is an integrated security console that provides a map view of access control, video management, intrusion and other third party systems. The web-based platform offers access to each element, all controlled by permissions. “We are also building in an incident workflow engine that allows an operator to see exactly what steps he should take when something occurs as defined by the supervisor or a security director,” said Green. “It can literally walk you through, and it is completely freeform. Whatever you want it to say, it will say. This works in conjunction with access control, video, and all the things we talk to.” The Honeywell booth was a busy place on day two of GSX 2019 Another new Honeywell product is the OmniAssure Touch reader, a “frictionless” device that can read a credential off a smart phone in a user’s pocket. The user merely touches the reader, and it scans the area for a nearby mobile device that is authorized, and you can walk through the door. Honeywell also announced the 30 Series IP cameras, which are encrypted and can be used as part of video systems that comply with National Defense Authorization Act Section 889. They are made in Taiwan. Arcules' cloud security solution “There are fewer people here at GSX 2019, but we have seen a lot of really big companies looking for a cloud service,” said Andreas Pettersson, CEO of cloud video company Arcules. At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive: They say “we want to move to the cloud.” Pettersson theorized that concerns about a possible weakening economy may prompt some companies to avoid the large capital expenditure of procuring a new on-premise system and instead opt for the minimal investment needed for a cloud system. Monthly operating expenses of a cloud system are also predictable and more easily managed, said Pettersson.At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive Arcules is proactive on the subject of cybersecurity and has a two-page handout that summarizes the cybersecurity advantages of their system. They are eager to talk about cybersecurity as it relates to cloud systems, said Pettersson. He said that, in his experience, on-premise systems tend to have more cybersecurity issues, whether because ports are left open or a firewall is implemented incorrectly. Users may also seek to bypass the firewall — a dangerous practice that is not an option with cloud systems. Security patches may not have been implemented; in a cloud system, such updates are pushed out automatically. The recurring monthly revenue (RMR) aspect of cloud systems are a windfall to integrators who embrace the cloud. “One integrator said he went on vacation for the first time in years because he had the extra money coming in,” said Pettersson. Control room integration from Vistacom "We're still fairly new to GSX, as our first show was 5 years ago, but what we have noticed is that the show continues to attract valuable attendees and drive critical conversations around what companies like ours must bring to the table in order to be successful in this space," said Dan Gundry, Director of Sales and Marketing, Vistacom. "We've had so many chances to learn from and share with potential customers and partners, and as a result, we continue to forge great relationships.” Vistacom is highlighting its control room integration and the value enterprise organizations can gain from implementing one in their facility. The company works alongside end-user customers and security integrators to build a command center space, taking into account video wall display technology, operator consoles and furniture, audio and lighting considerations, as well as temperature and more, in an effort to optimize these centers. Stay tuned for the full GSX 2019 show review.
The Office for Students (OfS) is the independent regulator of higher education in England, responsible for ensuring that all undergraduate and postgraduate students, whatever their backgrounds, have a fulfilling experience of higher education which enriches their lives and careers and delivers value for money. They are headquartered in Bristol, United Kingdom with a workforce of around 450 people. GDPR Data Privacy Management Higher Education Funding Council for England (HEFCE), Office for Students’ predecessor, became a client of SureCloud back in 2017, implementing the GDPR Data Privacy Management Suite to support and enhance their GDPR program. As a new organization and a successor of HEFCE, Office for Students has been looking to mature its approach to risk management. The focus of this for the team was initially to improve risk policies and procedures, to develop internal capability, enhance reporting to show transparency and allow challenge, and to identify and manage risks enterprise-wide systematically. Effective Risk Management approach Office for Students needed a single, seamless, enterprise-wide solution to manage all aspects of risk management These improvements established a highly effective risk management approach, but the organization soon hit the ceiling in terms of their process supporting risk systems, with technology being a limiting factor rather than an enabler. The organization was relying on numerous disparate spreadsheets to assess and monitor different types of risk, these were inconsistent, time-consuming and error-prone. Office for Students needed a single, seamless, enterprise-wide solution to manage and monitor all aspects of risk management. Data privacy Risk Management solution Office for Students has been a SureCloud client for cybersecurity services since March 2017 and began deploying SureCloud’s governance, risk and compliance (GRC) solution in July 2017 to assist with their responsibilities under GDPR. Knowing that SureCloud also offered a comprehensive risk management solution (recognized on Gartner’s IRM Magic Quadrant), which could be tailored to their precise needs, Office for Students opened a conversation with SureCloud about how best to configure their existing SureCloud Data Privacy Risk Management solution to enable enterprise risk management. SureCloud’s Risk Management solution delivers: A central view of risk across the organization via a single intuitive dashboard Risks organized across divisions, legal entities, business functions, and geographies The ability to provide a central repository for enterprise risk, allow the organization to show the entirety of the risk environment and consider overlaps and interdependences A range of risk management methodologies to understand the likelihood, impact and overall risk rating Configurable drillable dashboards and reports to provide a real-time snapshot of risk at any time Centralized, cloud-based platform SureCloud’s centralized, cloud-based platform underpins the Risk Management product SureCloud’s centralized, cloud-based platform underpins the Risk Management product, allowing anyone from across an organization deploying the application to add information at any time, from anywhere. Office for Students worked with SureCloud to configure the Risk Management application to their precise needs and was ready for rollout ahead of schedule. Rapid implementation services “SureCloud got to grips with our requirements incredibly quickly,” said Ben Whitestone, Head of Governance at the Office for Students, adding “As the only independent regulator for higher education in England, we regulate in the interests of hundreds of thousands of students, and we take that responsibility very seriously.” Ben adds, “Managing the risks we face is an important part of our governance. But with our legacy systems, we were focused more on updating spreadsheets than actually managing risk. SureCloud’s platform is enabling us to take a far more agile approach to risk management, focusing on taking action to mitigate threats and exploit opportunities, with substantial time and cost savings as a result.” Streamlined, centralized Risk Management “SureCloud’s Platform has moved us away from using a series of disparate spreadsheets and countless emails for recording risk, with all of the potentials for errors that entails, to a single, centralized source of risk information for every member of staff,” said Whitestone. He further adds, “It’s dynamic and agile, if we want to get a snapshot of risk for a particular department or function, we can.” Intuitive, user-friendly platform We are very pleased with how quickly staff can get to grips with the SureCloud Platform" “Despite us being at the start of our risk management journey, we are very pleased with how quickly staff can get to grips with the SureCloud Platform, this was a key factor for us” commented Whitestone. Whitestone adds, “They can more or less log on and go – it’s extremely intuitive and easy-to-use. In turn, this means that it frees up a huge amount of time spent manually inputting or transferring information, which is a great advantage for us.” Systems and culture working in-sync “We undertook a great deal of work to evolve our culture of risk management, to one that was far more consistent and proactive.” stated Whitestone He adds, “With SureCloud’s Risk Management solution in place, we have the systems to underpin that culture, and enable us to take a far more streamlined, agile and accurate approach to help manage risk across the organization.”
Rishikul Vidyapeeth is a reputed residential school built across 43 acres of land located in Sonepat, Haryana with separate hostels facilities. It is one of the best CBSE boarding schools in Delhi/NCR with international faculty and tie-ups. Rishikul Vidyapeeth is an eco-friendly residential school, housed in well-defined infrastructure rich with architectural extras including well-furnished and well-ventilated modern buildings, smart classrooms and sophisticated labs to suffice the needs of 21st-century learners and educators. The school is big on quality teaching and on helping the students to reach their full potential. Managing attendance data Rishikul Vidyapeeth has its presence in three places - Sonepat, Jagos Bhaghpat and Alipur. Managing the attendance data of various locations from a central place was a major challenge for the organization. The system they used was inefficient to address their challenges. The officials were looking for a comprehensive time-attendance solution for efficiently tracking the movement of its staff situated at different locations from a central place. Moreover, they required an effective solution that would notify on exceptions - missing in/out punch, attendance summary, etc. Fingerprint-based time-attendance solution Matrix has installed a total of 10 fingerprint-based time-attendance terminals at three different locations After a comprehensive discussion with their team, Matrix has proposed a comprehensive time-attendance solution for managing their attendance and tracking their staff movement from a centralized location. Matrix has installed a total of 10 fingerprint-based time-attendance terminals at three different locations. These devices are connected via LAN with the COSEC CENTRA server installed at Rishikul Vidyapeeth, Sonepat. COSEC CENTRA server integrated with SMS web server Moreover, with the help of the solution, they could generate customized reports in different file formats. Matrix has integrated COSEC CENTRA server with an SMS web server for instant notification on exceptions. With that, the users were instantly updated on occurrences of such events. Results include: Efficient time-attendance management Improved accuracy in attendance calculation with SMS notification Proper user database management Centralized monitoring and control Increased productivity Customized reports as and when required Products and solutions offered: COSEC DOOR FOT - Optical fingerprint and card-based time-attendance terminal COSEC LE PLATFORM - COSEC software platform for up to 1000 users COSEC LE TAM - Time-attendance and leave management module for COSEC software platform
ExcelRedstone is implementing an ambitious integration project, using Maxxess eFusion technology, at the first high-rise residential and hospitality development in the City of London for many years. Currently under construction, the £300m 43-story One Bishopsgate Plaza development will see security and building management technology operating seamlessly together in a setting that includes both new-build and listed conservation area structures. As well as having 160 new private apartments, when completed the development will include a 237-bed five star Pan Pacific Hotel, a public plaza and a Pacific Ballroom, promoted as the Square Mile’s first dedicated banqueting venue. ExcelRedstone selected eFusion for the project because of the flexibility it allows, enabling rapid integration, off-the-shelf, with a wide choice of security, safety and business-critical technologies. Umbrella management system “The customer wanted a seamless, single interface that allows front of house guest services to be linked to back of house functions and give the highest operator efficiency and enhanced customer experience,” says Matt Salter, Director, ExcelRedstone. eFusion provides an umbrella management system for an expanding choice of preferred technologies With its modular, building block approach, eFusion provides an umbrella management system for an expanding choice of preferred technologies for commercial, hospitality and mixed-use settings, including guest check-in, reservation & visitor management, access control, surveillance, and building systems. In use, eFusion drives efficiency and eliminates gaps in security by removing the need for operators to continually switch between systems. Video management system Two of the most important technologies being integrated by eFusion at One Bishopsgate Plaza are the full-featured, Oracle Hospitality Opera property management & guest service system, and a 266 door ASSA ABLOY wireless electronic locking solution. ExcelRedstone is also using eFusion to integrate Zenitel IP intercoms, a KONE elevator system, and the building management (BMS) system using the BACnet protocol, which will enable estate managers to optimize energy efficiency based on usage and occupancy. The eFusion integration also allows a more flexible approach with the surveillance system - for example, making it easy to use a choice of Axis cameras, with specialist mounts, in the listed conservation areas of the site, integrating them with over 350 Mobotix fixed lens and panoramic cameras through the highly-secure Wavestore video management system (VMS). Networking and AV systems ExcelRedstone is also responsible for networking and AV systems at the development The surveillance and other security systems will be monitored live from two separate control rooms, one for the hotel and one for the wider estate. As well as integrating these and fitting out the control rooms, ExcelRedstone is also responsible for networking and AV systems at the development. “Our engineers are pre-staging the entire system off-site,” explains Salter. “This is allowing us to test everything in advance and to reduce packaging waste and environmental impact on site. It also lets us work more efficiently, in step with the ongoing construction schedule, floor by floor.” Providing secure solutions One Bishopsgate is the latest of a growing number of mixed-use developments - including hotels, retail, office and residential complexes - to use eFusion to streamline security, safety and facilities management. “We are seeing a growing trend towards automation and centralized management, and the solutions being deployed at these locations are increasingly sophisticated – but that doesn’t mean they have to be complex,” says Lee Copland, Managing Director EMEA, Maxxess. “Quite the opposite in fact. By keeping things simple and integrating off-the-shelf with the widest choice of technologies, Maxxess is providing secure solutions that are easier to install and to use than traditional alternatives.”
Combining radio detection and ranging (RADAR) with thermal imaging technologies produces unparalleled monitoring coverage and perimeter protection for power plants and electrical substations. By integrating SpotterRF Compact Surveillance Radars (CSR) with FLIR PT-Series cameras, end users gain exceptional situational awareness, both inside the substation and beyond the fence line. This cost-effective solution requires substantially less infrastructure than other fence line detection systems and yields higher accuracy. Video surveillance of electrical substations There are over 55,000 electrical substations in the United States. These substations, along with power plants and transmission lines, provide power for millions of people. It is imperative that these locations remain secure from intrusion and sabotage. If just a handful of these substations were rendered inoperable, the U.S. could face a serious blackout. The 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, which knocked out several transformers and totaled over US$ 15 million in damages, was considered to be a catalyst for the Federal Energy Regulation Commission (FERC) establishing new security standards for utilities. Critical Infrastructure Protection Standard 014 One of the most notable policies introduced was the Critical Infrastructure Protection Standard 014 (CIP014) One of the most notable policies introduced was the Critical Infrastructure Protection Standard 014 (CIP014). This statute requires utilities to identify ‘mission critical’ facilities and assets, conduct a security inspection to identify threat, and implement a security system to address those risks. In response to security incidents such as Metcalf and other FERC activities, a large electrical utility with hundreds of substations across the country, looked to expand security beyond its fence line. Enhanced perimeter protection solutions The end user wanted to enhance and possibly replace traditional fence protection systems, including fiber optics, microwave barriers, and video analytics as these systems all proved to be costly, as well as time and labor intensive. In the end, the utility company relied on VTI Security for a recommendation. VTI Security, based in Burnsville, Minnesota, is an industry-renowned integrator that has been servicing security needs in the commercial, utility and oil and gas sectors for over 35 years. To determine the best system for its end user, VTI reviewed six different technologies, including some with multiple vendors of various solutions. Cost-effective total surveillance solution VTI also tested systems in in field deployments and conducted a cost analysis. The integrator concluded that SpotterRF’s product was superior to all others and selected it as its sole radar standard for perimeter solutions. “Our findings were that SpotterRF not only provided the most comprehensive detection in a substation environment, but SpotterRF was also by far the most cost-effective total solution based on the ability to mount equipment on existing structures,” said Jerry Klapak, Senior Account Manager for VTI Security. SpotterRF Compact Surveillance Radar system CSRs enable security monitors to never be blind, providing 100% coverage, 24/7, in all weather conditions SpotterRF, based in Orem-Utah, provides perimeter protection through its patented Compact Surveillance Radar (CSR) systems, which provide up to 300 acres of radar tracking power in a hand held, four-pound device. The CSRs enable security monitors to never be blind, providing 100 percent coverage, 24 hours a day, in all weather conditions. They are designed to detect threats up to 3300 feet beyond the fence line and provide early warnings to staff before situations escalate. FLIR PT-Series cameras Upon selecting a radar system, VTI needed a video manufacturer to supply cameras to deploy with the radar. In 2015, the integrator approached the globally renowned thermal imaging and perimeter security solutions expert, FLIR Systems, for a solution. FLIR’s PT-Series was selected for the project. “The ability for FLIR’s products to perform beyond published performance specifications was a surprise we don’t often see,” said Klapak, added “Each product exceeded published performance metrics on our field testing and actual deployments.” The PT-Series is FLIR’s offering of high performance, multi-sensor pan/tilt dual cameras that feature both thermal and visible-light imaging. The system is known for providing the highest precision. The pan/tilt mechanism gives end users accurate pointing control, while providing fully programmable scan patterns, as well as radar slew-to-cue and slew-to-alarm functions. Seamless integration With the radar and thermal technologies selected, VTI worked to ensure seamless integration and performance between the systems. “We worked with each company’s support and development teams as well as the VMS manufacturer to ensure the technologies not only worked with one another, but also met the client’s needs for bandwidth consumption and VMS interface and display,” said Klapak. Maximum coverage and perimeter security SpotterRF C20 and C40 radars and FLIR PT-Series cameras deliver maximum coverage and perimeter protection Together, SpotterRF C20 and C40 radars and FLIR PT-Series cameras deliver maximum coverage and perimeter protection. “The FLIR PT-Series, when deployed with SpotterRF, can cover a wide area of substation footprint. It is a cost-effective solution for substations needing to monitor the perimeter as well as inside the yard,” said Michael Chaffee, Director of Business Development at FLIR Systems, adding “The speed at which the FLIR PT-Series slews to the cue of the SpotterRF detection is impressive.” Effective intrusion detection solution When someone walks into the field of view of SpotterRF’s C20 or C40 radar, the radio waves bounce off the person and back to the radar, which then calculates the precise GPS location of the target and target size. The radars then tell the FLIR PT-Series camera to zoom to that location. The camera automatically stays on the target, moving with and tracking it. Because the radars control the cameras, the cameras only move upon detection, which significantly extends the shelf life of the cameras and allows them to last for years without replacement. Technology impact This FLIR and SpotterRF solution addresses an important pain point for the perimeter security and intrusion detection market. “In the past, utilities tried to use video analytics to find targets. Because these systems were outdoors, a number of environmental factors affected performance, including weather, lighting and moving trees,” said Logan Harris, CEO of SpotterRF, adding “However, by combining our radar with FLIR’s pan tilt thermal cameras, you will be able to solve this problem.” Radar technology and thermal imaging integration Logan adds, “Together, SpotterRF’s radar technology and FLIR’s thermal imaging are able to locate a person in a 15 or 100 acre space, see hundreds of yards beyond the fence line, cue the camera, and alert the personnel all without the help of an operator.” In the past, only military organizations could access this level of advanced technology. Now, the FLIR and SpotterRF solution makes this security capability accessible and affordable for critical infrastructure, power distribution and commercial applications. High-level security for critical sites Our client is very pleased with the ability of the technologies to provide security for their critical sites" “Our client is very pleased with the ability of the technologies to provide security for their critical sites. One surprising benefit was the ability to use both the thermal cameras and radars for additional security and production uses.” said Klapak. He adds, “They now use the radars to activate security lighting based on motion within and outside the fences. This provides not only a green approach to security by lowering energy costs but also improves customer relations by reducing light pollution in residential neighborhoods.” Minimal installation time The entire team was also impressed by the solution’s minimal installation time. Unlike deploying fiber optic cables on fence lines, which requires months for digging trenches, the FLIR and SpotterRF solution allows one to mount the radars and cameras on control shacks and lattice poles. This process only requires a week for installation. “The deployment occurred 4x faster than was anticipated,” said Harris, adding “VTI installed the systems at 25-30 sites in just three months.” Phased deployment VTI began installation in 2016 with plans to roll out the solution in a phased approach as part of a multi-year plan. Approximately 50- 75 sites will deploy the solution. On average, each substation has two FLIR PT-Series cameras and four SpotterRF radars (two per camera). Some of VTI’s other clients are also expected to deploy the same solution at 10-20 sites over the next few years based on the success VTI has proven in the utility environment.
Delta Scientific, the manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, announces that Bradley Air National Guard Base in East Granby, Connecticut., has installed a Delta Scientific HD300EM shallow mount wedge barricade system at the home of the ‘Flying Yankees,’ the 103rd Airlift Wing, the third-oldest Air National Guard unit in the country. Installed by American Barrier and Controls LLC, Foxboro, Massachusetts., the ‘Stop Control Safety’ ACP (Access Control Point) provides security at this constrained location with a relatively low traffic volume of less than 800 vehicles per hour per lane. Extensive history of electronic integration "Security forces and the engineering firm at Bradley chose the Delta Scientific HD300EM because of Delta's proven leadership and quality in the vehicle barrier industry," explains Dave Abromson, vice president of American Barrier and Controls. "They chose American Barrier and Controls LLC as the installer of the barrier and ACP system because of our 20-plus years as a Delta installer and service provider and our extensive history of electronic integration at such facilities as the US Army, US Navy, FBI field offices and multiple NASA locations." With only a 24 in (61 cm) foundation and a fully electric control unit, the HD300EM barrier stops a 15,000 lb (6800 kg) truck impacting at 50 mph (80 km/h) dead in its tracks with zero penetration. Fiber optic communication lines The HD300EM obviates the concerns of interference with buried pipes Upon impact, the barrier remains in its foundation and the opening stays blocked, providing a multiple hit capability. The barrier is independently test lab certified to 1 million cycles. In its M50 crash test, the HD300EM completely disabled the test vehicle, causing severe damage to the occupant compartment and power train. The maximum penetration recorded was an outstanding -1.8 m. A solid road plate design permits multiple hits and will handle low speed bumps and corner strikes for day to day reliability. The design is ideal for heavy vehicle traffic as it is rated at 66,000 lbs per axle load. The HD300EM obviates the concerns of interference with buried pipes, power lines and fiber optic communication lines. The shallow foundation also reduces installation complexity, time, materials and corresponding costs. Total protection against dust The HD300 is perfect for high water table locations and areas with corrosive soils. It provides low maintenance as all components are accessible from the sides or top of the barrier. For increased security, the HD300EM leverages Delta's proprietary counter-balanced technology to provide a 1.5 second emergency fast operation (EFO), responding to attacks very quickly. The electric actuator provides IP67 protection, meaning that the unit is totally protected against dust and the effect of immersion between 15 cm and 1 m. The HD300EM barricade provides foundation space in which maintenance personnel can easily work. There is space for heaters and sump pumps. Access is available from either the top plate or front.
Eagle Eye Networks, the provider of cloud video surveillance, announces one of the fastest completions of a large scale, fully integrated citywide surveillance program, installing 13,720 cameras in 4 months. This project has been a large success for Mexico City C5, contributing to Mexico City's larger ‘Citizen Safety’ mobile application. This mobile application facilitates content sharing for more effective neighborhood watch and a panic SOS button. “Effective citywide surveillance is more than installing cameras in a few key locations, it’s about creating a platform that meets the unique needs of each municipality.” Unique web application The cameras are all operational, remotely monitored, and providing safety and security to citizens today “In partnership with Eagle Eye Networks we leveraged the Eagle Eye Video API and SDK to customize a unique web application that is designed to integrate fixed, mobile body worn, and vehicle cameras into one interface, providing an unprecedented level of insight and awareness into our cities operations, ” said Jaime Abad Valdenebro, CEO, Omnicloud.mx. 4G connectivity with Eagle Eye Networks’ bandwidth optimization was utilized in order to facilitate this quick deployment, installing approximately 250 cameras per day at its peak. The cameras are all operational, remotely monitored, and providing safety and security to citizens today. Integration of new technologies This fast-paced install occurred amidst the global supply chain challenges caused by COVID-19, however, Eagle Eye Networks’ strong partnership with both the Reseller, Omnicloud.mx, and suppliers provided alternatives and solutions to keep the project on schedule. Eagle Eye Networks solution was chosen because the Eagle Eye Cloud Video API Platform provides an open solution that allows integration of new technologies (AI, advanced analytics, search, license plate recognition), new suppliers, and new cameras at any time. Future and cybersecurity proofing the city’s investment and eliminating the headaches associated with managing large premise based data centers was crucial in their decision. City-Wide surveillance project Eagle Eye’s cloud video retention and massive on demand scalability make it ideal for large scale deployments" “When deploying a city-wide surveillance project, scalability, retention, and cellular transmission must be considered. Eagle Eye’s cloud video retention and massive on demand scalability make it ideal for large scale deployments. To operate your own large data center system for video recording is expensive and challenging.” “With Eagle Eye’s subscription service we provide a more robust and lower cost answer for large scale deployments. Furthermore, our open platform provides a future proof solution, integrating AI, video analytics, and advanced search at the click of a mouse,” said Dean Drako, CEO of Eagle Eye Networks. Cost-Effective solution “More than half of the world’s population resides in cities, creating an increased demand for smart, accurate insights to help streamline everyday operations including public safety, traffic flow management, infrastructure and transportation. Enormous amounts of data collection, aggregation, and storage are necessary to drive the deep analysis that is required to produce these smart insights.” “The only way to efficiently manage this data is to aggregate and analyze in the cloud,” said Jeff Kessler, Managing Director of Imperial Capital and Publisher of the Security Industry Annual Report. The Eagle Eye Cloud is a robust, scalable and cost-effective solution, purpose-built to support the data storage and analysis demands that city-wide deployments require.
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
Products are the building blocks of the security industry. Historically much of the industry’s sales effort has been focused on highlighting product features and functionality. At the end of the day, however, an end user is less interested in the performance of any individual system component than in the system as a whole. Lately, the industry has embraced a changing sales approach by emphasizing systems rather than products. We asked this week’s Expert Panel Roundtable: What are the benefits of a transition from selling security products to selling security solutions?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload