Internet of Things (IoT)
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organizations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains. User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anythi...
Users of security systems have long been willing to sacrifice certain aspects of security in favour of convenience and ease of use. The tide seems to be turning, however, with the industry at large showing significant concerns over cyber security. End user sentiments also seem to be following that trend, becoming more cautious when it comes to having their security systems connected to the internet. While it has become the norm for security systems to be accessible online, still it presents sec...
Trillium Secure, Inc. has appointed Mahbubul Alam as Chief Marketing Officer and Senior Vice President of Global Engineering. This move further deepensTrillium's experienced management team while the company launches an end-to-end trusted and secured data services platform for vehicles. Alam's expertise in platform as a service offerings and over-the-air update technology for connected vehicles is a perfect fit for driving Trillium's recently launched Trusted Mobility Platform and Services. Cr...
The Middle East is proving to be a hot bed of business for global suppliers of security, safety, and fire protection, with the world’s top industry players all set to converge at Intersec 2019 in Dubai to drive more double digit growth. From video surveillance technologies with Artificial Intelligence and deep learning capabilities, to cloud-based access control solutions and flame retardant protective clothing, Intersec 2019 will shine the spotlight on game changing solutions solving cha...
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality...
Home-grown technology firm Connexin has been announced winners of the IoT Breakthrough Award for Smart City Deployment of the Year, for the Newcastle Smart Road pilot. This year’s awards program attracted more than 3,500 global nominations covering a range of categories, including industrial and enterprise IoT, smart city, connected home, home automation and connected car. Connexin fought off stiff competition to join an impressive array of companies winning awards from other categories i...
NAPCO Security Technologies, Inc., one of the solutions providers and manufacturers of high tech electronic intrusion security, school safety lock down systems, Internet of Things (IoT) connected home, video and fire systems, as well as enterprise-class access control and door locking products, announces that its Board of Directors has authorized a new share repurchase program for the Company. The new stock repurchase program is for up to 500,000 shares of the approximately 18.6 million shares outstanding. The repurchase will be made from time to time in the open market or in privately negotiated transactions subject to market conditions and the market price of the common stock. Under the repurchase program authorized in 2014 to repurchase up to 1,000,000 shares the Company has the ability to repurchase approximately 52,000 shares. Recurring Revenue Richard Soloway, President & CEO of NAPCO stated "We believe that the future for NAPCO looks bright, our sales and profits continue to grow with fiscal 2018 being another record year for us. Our new products that have launched recently such as the Starlink Connect, and Dual Path communicators have performed well for us as evidenced by the continued growth of our recurring revenue, which grew 46% in our first fiscal quarter 2019 and has an annual run rate of $15.6 million based on September 2018.” School security remains a vibrant area for growth and the Company continues to win new business in this vertical" “The Company also saw growth in its hardware products offering during the first fiscal quarter 2019. School security remains a vibrant area for growth and the Company continues to win new business in this vertical.” Raise Awareness “We believe that the recent legislation passed by 26 different states in the US for funding school security, with the total sum being approximately $1 billion dollars, will be a positive for NAPCO's business. The Company has determined that repurchasing shares opportunistically will be an attractive use of our capital." In conclusion Soloway stated "We are always looking at ways to create shareholder value and with our senior management holding approximately 38% of the shares, our interests are aligned with our shareholders. NAPCO has been attending conferences and visiting with investors during the year and has plans to continue its outreach program to raise awareness of the bright future we believe is ahead."
GlobalPlatform, the standard for secure digital services and devices, announces its Board of Directors for fiscal year 2019. Six Board seats were open and after a close election, the following individuals were re-elected to serve a further two-year term: Consecutive Years Nils Gerhardt – Group VP and Head of Product and Project Management, Production IT and Professional Services for the Region Americas, Giesecke + Devrient Mobile Security. Marc Kekicheff – Vice President of Chip Innovation, Visa Inc. Eikazu Niwano – NTT Research Professor, Secure Platform Laboratories, NTT Corporation. Jeremy O’Donoghue – Principal Engineer / Manager, Qualcomm Inc. Christophe Colas – SVP Products, Trustonic. Mark Lipford – Director Global Standards & Ecosystem Development, Sprint. Nils Gerhardt has also been elected Chairman of the Board after serving as Vice Chairman for three consecutive years. Rob Coombs, Director of IoT Device IP at Arm, will serve as Vice Chairman and Stephanie El Rhomri, Vice President of Services at FIME, who joined the GlobalPlatform Board of Directors in 2015, will continue in her role as Secretary and Treasurer. Prevent Attacks Quality, security and privacy need to be of the highest priority for all involved in the development, deployment and management of digital services and devices" Nils comments: “Quality, security and privacy need to be of the highest priority for all involved in the development, deployment and management of digital services and devices, especially in fast growing markets like IoT, connected cars, digital identities and industry 4.0. Standardized, foundational security is fundamental to prevent attacks on networks, devices, data and intellectual property (IP).” “But security should not restrict innovation and time to market, which is why we work at GlobalPlatform to create specifications, such as the Device Trust Architecture (DTA) framework, that support the development of open, collaborative and fast-moving ecosystems. I look forward to working with my fellow Board colleagues, all GlobalPlatform members as well as our industry and media partners to promote greater security, privacy, simplicity and convenience for the evolving markets and their consumers.” Security Requirements Kevin Gillick, GlobalPlatform Executive Director, adds: “GlobalPlatform’s legacy of successful technical specification development has been made possible by strong leadership and cross-industry collaboration. As the industry evolves, the Board works to ensure that the technology specifications remain interoperable and ahead of the curve.” In 2019, GlobalPlatform will continue to work towards meeting the security requirements of the digital service and device ecosystem" “As discussed at our annual seminar, ‘Security in Our Connected World’, everyone is looking for the holy grail - a secure system that will do everything, is easy-to-use and, ideally, free. Although the industry has not reached that point yet, there is certainly commitment to getting there. In 2019, GlobalPlatform will continue to work towards meeting the security requirements of the digital service and device ecosystem, with a focus on the DTA framework.” Offering Secure Services DTA is a security framework which shows how GlobalPlatform’s standardized secure component technology can be used to build a Chain of Trust to protect devices and digital services. It does this by offering secure services, implemented within a secure component, which can be used at each level of a Chain of Trust: from the boot mechanism, to the device operating system and up to the application layer. It enables seamless interaction between stakeholders when deploying secure digital services, regardless of market or device type.
Milestone Systems, globally-renowned open platform company in networked VMS, released its Device Pack 10.0a in October this year and now supports the MOBOTIX MOVE camera series. MOBOTIX MOVE is an independent product line providing customers everything from a single source. “MOVE” stands for the use of mechanically moving parts in the cameras, meaning that MOBOTIX have parted with their previous product policy of only offering decentralized video systems on the market. The MOBOTIX MOVE product line is the first motorized devices and first ONVIF-based camera line from MOBOTIX. “We’re glad to be supporting the first ONVIF compliant products introduced by MOBOTIX as we believe this will enable us a faster release to market going forward,” said VP (Products), Jesper Just Jensen, Milestone Systems. Device Pack 10.0a With the Device Pack 10.0a, Milestone Systems also supports new firmware for MOBOTIX’ Mx6 camera series With the Device Pack 10.0a, Milestone Systems also supports new firmware for MOBOTIX’ Mx6 camera series. Mx6 cameras use a powerful CPU that delivers up to 34 frames per second in full HD. This allows for even better capture of quick movements. The camera line has more capacity for software applications such as 3D motion analysis and license plate capture in the camera. "Thanks to our market opening strategy, Milestone Systems is today one of the largest technology partners of MOBOTIX AG. Due to the growing global demand for our cyber-secure premium cameras, we are very pleased to announce the release of the Device Pack 10.0a, which now enables the integration of the entire MOBOTIX camera world into the Milestone VMS: our Mx6 IoT series as well as the latest MOVE cameras,” says Philipp Helmes, MOBOTIX Product Manager for Integration Solutions. IP-Based Physical Security Solutions Milestone Systems now supports more than 7,000 devices, and 40% of Milestone Systems’ drivers are now integrated through ONVIF, an open industry forum that provides and promotes standardized inter-faces for effective interoperability of IP-based physical security products.
ReconaSense, a provider of access control and security intelligence, announced two new members of the executive team. Pat Aiello joins as the vice president of global sales and Melanie Meyer Sommer serves as the vice president of marketing. Pat’s customer-centric and engaging leadership style will help accelerate the company’s go-to-market strategy to better serve its customers and partners. Melanie brings a passion for creating new market categories, brand building and digital marketing that will help drive awareness and visibility for ReconaSense’s award-winning technology and its unprecedented risk-based approach to security intelligence and access control. Experience In Marketing And Communications Melanie is a creative, performance-driven marketing leader bringing over 20 years of marketing and communications experience to ReconaSenseMelanie is a creative, performance-driven marketing leader bringing over 20 years of marketing and communications experience to ReconaSense. She has served as a marketing leader for some of the world’s largest technology brands including Dell, EMC and IBM as well as early-stage technology startups including SailPoint and Spanning. Prior to joining ReconaSense, she was the global marketing lead for RSA Security and their identity and access management product portfolio. A proven sales leader, Pat has a record of developing strong relationships with key integrators and end-users while also building high-performing sales organizations. With nearly 20 years of industry experience, Pat most recently served as the Director of Enterprise Sales at Hikvision and has also held leadership roles at March Networks, 3VR, CompuCom and Verizon. “I’m excited to be given this opportunity to leverage my experience in video surveillance and analytics,” said Pat. “Now I can help organizations truly integrate all of their physical security solutions into a unified security intelligence platform and to leverage the power of artificial intelligence that only ReconaSense can deliver.” Mitigating Risk Effectively ReconaSense is poised to solve critical problems to help organizations mitigate risk"“We are at a pivotal moment in the physical security industry,” said John Carter, president, CTO and co-founder, ReconaSense. “The advances in security technology, building automation and IoT devices bring an overwhelming amount of data and inputs for security teams to monitor and manage.” He further added, "ReconaSense is poised to solve critical problems to help companies and organizations mitigate risk quickly and effectively for overall improvements in security, life safety and operational costs.” “I am honored to join this team of security, AI and neural network experts,” said Melanie. “They understand the value of real-time, dynamic security and integrated risk intelligence and are delivering proactive, intelligent solutions that can help make the world a better, safer place for us all.”
Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announced the release of Pulse Policy Secure (PPS) 9.0R3 to extend its Zero Trust Security model to IIoT devices and smart factories. The new version enables factories to streamline machinery repairs and diminish costly production downtime through IT-managed secure access. It also secures networks by expanding its behavioral analytics to IoT devices, detecting anomalies and preventing their compromise. “Manufacturing customers are using IoT to retool their factory floors, creating smart production lines that report their health and operational efficiency. One benefit of this approach is that customers can proactively perform preventative or predictive maintenance on machines to avoid costly production outages,” said Prakash Mana, Pulse Secure’s vice president of product management. Remote Access For Service Technicians PPS dynamically profiles the network to discover, classify and apply policy to IoT devices, and includes a built-in IoT device identification library“Our latest Pulse Secure release helps customers not only secure the smart factory floor, but it also helps streamline their maintenance activities by giving service technicians remote access to the equipment they maintain. Regardless if they are on the factory floor or in their remote office, our Zero Trust Security limits technician access to the equipment they maintain and requires that they use secured end-user devices to perform their work.” Pulse Policy Secure (PPS) is an integral part of Pulse Secure’s combined VPN and NAC solution that provides corporate networks with Zero Trust Security through visibility, ‘comply to connect’ policy enforcement and security orchestration with popular network and security infrastructure. PPS dynamically profiles the network to discover, classify and apply policy to IoT devices, and includes a built-in IoT device identification library. The solution also integrates with Next Generation Firewall (NGFW) solutions to provide identity and device security state data, as well as to fortify micro-segmentation to isolate and manage IoT devices on enterprises networks. Provisioning IIoT Devices To NGFWs The latest Pulse Policy Secure release helps customers protect factory floor system integrity by providing technicians secure remote access" PPS 9.0 extends the Zero Trust Security model to IIoT devices used in smart factories and buildings, with blended IT and OT environments. It automatically discovers and profiles IIoT systems, such as factory floor SCADAs, PLCs and HMIs, or office building HVAC systems, providing dynamic visibility and securing them by enforcing policies for local and remote access by authorized users and contractors. PPS 9.0 also automatically provisions IIoT devices to next-generation firewalls (NGFWs) to facilitate remote access without provisioning overhead. “A top priority for manufacturing customers is complete visibility and security of IIoT devices on smart factory floor environments. Because failing systems may lead to loss of revenue or human life, customers must emphasize rapid remediation of machines to avoid system outages,” said Tony Massimini, Frost & Sullivan Senior Industry Analyst, Information & Network Security. “The latest Pulse Policy Secure release helps customers protect factory floor system integrity by providing technicians secure remote access. New Behavioral Analytics features also safeguard against attacks by detecting anomalous activity.” Preventing Attacks By Detecting Anomalous Activities The new PPS 9.0 IoT support provides practical relief for the frequent and costly issue of factory floor equipment outagesThe latest release of PPS also provides sophisticated behavioral analytics that alert security teams of anomalous IoT device behavior and automatically requires added factors of authentication. PPS 9.0 builds baseline behavior profiles for managed and unmanaged IoT devices utilizing information correlated from multiple sources such as NetFlow, user and device data. With these profiles, the platform detects anomalous activity, malware infections and domain generation attacks, allowing security teams to be more responsive to threats and take pre-emptive measures before attacks succeed. The new PPS 9.0 IoT support also provides practical relief for the frequent and costly issue of factory floor equipment outages. Aberdeen recently reported that 82 percent of companies reported unplanned downtime in the past three years, which can cost a company as much as $260,000 an hour. Authenticated Remote Secure Access The resulting downtime breaks production and lowers profit, because factory floor repairs often take days when security requirements mandate that service technicians physically visit the factory to diagnose and repair the problem. The latest PPS release works seamlessly with Pulse Connect Secure to solve the problem in an innovative way. These IIoT networks help our customers gain real-time system diagnostics, reduced downtime and overall lower operational costs"The combined NAC and VPN approach enables IT teams to grant remote secure access—authenticated and encrypted—to support contractors for expedited repair and return to service of factory IIoT systems for greater uptime and productivity. IT teams ensure security with remote zero-trust access via auto-provisioned NGFWs, and by enforcing security policies that authenticate contractors based on their technician role, endpoint device status and authorization to work on the targeted IIoT device. Real-Time System Diagnostics “Some of our customers operate among the manufacturing and transportation industry’s biggest and most distributed internet-connected device deployments. These IIoT networks help our customers gain real-time system diagnostics, reduced downtime and overall lower operational costs,” said Kirk Hanratty, vice president and chief technical officer at IT security and solutions company SynerComm. “For these and other customers, IIoT drives their business where assuring availability and secure access throughout an IIoT infrastructure is paramount. We have found Pulse Secure’s platform to offer our customers the usability, interoperability and reliability necessary to support large scale IIoT applications.”
Doug Dickerson has joined Razberi Technologies as CEO to propel its growth in the video surveillance security arena. He brings more than 25 years of technology industry experience to the role. Founder and former CEO Tom Galvin has been appointed chief product officer to spearhead continued development of the technology he originally invented. “I’m excited to be joining Razberi at this opportune time, because we see in the news every day the importance of securing our digital and physical infrastructures from hackers. Companies are also facing significant challenges managing video surveillance more effectively,” said Dickerson. Dickerson will focus on expanding sales of Razberi solutions across geographies and vertical markets such as energy, finance, city surveillance“Razberi has developed a unique set of solutions that enterprises across the globe are using to monitor their infrastructures and automatically secure their video surveillance and Internet of Things (IoT) devices.” Expanding Sales Of Razberi Solutions Dickerson will focus on expanding sales of Razberi solutions across geographies and vertical markets such as energy, finance, city surveillance, and more. These types of customers increasingly depend on Razberi’s data center, edge, and rugged applications to secure their critical assets and scale with them. The company sells through a growing list of security integrators and value-added resellers. “The addition of Doug as CEO gives us one of the industry’s best management teams and shows that Razberi continues to attract top talent to our team,” said Galvin. “His experience will be invaluable, because the growth in video surveillance and IoT devices has organizations facing security vulnerabilities and manageability challenges they’ve never experienced before. I look forward to working with Doug to help more customers take advantage of our technology.” Implementing Cybersecurity Best Practices CameraDefense hardens IP cameras, networks, and other IoT devices, defends the VMS, and provides 24x7 cyber threat monitoringBuilding upon Galvin’s invention of the Razberi ServerSwitchIQ appliance, Razberi has continued to innovate with award-winning products such as Razberi CameraDefense. This solution enables security pros to consistently implement automated cybersecurity best practices without requiring additional firewall products and special expertise. CameraDefense hardens IP cameras, networks, and other IoT devices, defends the video management system (VMS), isolates the camera network, and provides 24x7 cyber threat monitoring. Doug Dickerson has held leadership roles in both start-up and large public companies. Most recently, he served as CEO of Coban Technologies, a video SaaS company offering artificial intelligence-based mobile video systems. Before that, Doug was president of Danaher Tektronix Communications, a network management software and hardware company.
The Security Industry Association (SIA) looks forward to 2019, and it is apparent that physical security is moving into its most formative years. Changes presented by emerging technology, open systems and growing connectivity among devices and sensors will make a big difference for manufacturers, systems integrators/dealers and end users. With a more open, connected environment come cyber risk and data privacy concerns – which is why, in SIA’s 2019 Security Megatrends, cybersecurity’s impact on the physical security industry ranks number one on the list. Cybersecurity is affecting all areas of the industry landscape, from security implementation to attracting top talent to the workforce. Digital Transformation The digital transformation we are experiencing impacts many other parts of the security industry as well, bringing opportunities like evolving identity management and collecting and delivering big data to customers. At this critical point in the industry’s development, it is important to embrace change, leverage disruptive technology in ways that give companies a competitive advantage. To determine this year’s Megatrends, SIA surveyed hundreds of executives from member companies To determine this year’s Megatrends, SIA surveyed hundreds of executives from member companies, along with current and recent Securing New Ground speakers and attendees, to identify which previous trends were still relevant, which trends were no longer as impactful and which broad trends should be added to our report. This Year’s Security Megatrends 1. Cybersecurity’s Impact on Physical Security: It is important to prioritise cybersecurity for your business, your customers’ business and the vendors with which you work. This trend calls for continual process improvement and investment. 2. Internet of Things (IoT) and the Big Data Effect: The security industry makes use of IoT, analytics, artificial intelligence (AI), robotics and more, and data is coming from everywhere. The industry now faces the challenge of effectively managing and segmenting this information to be pertinent to the user. 3. Cloud Computing: Cloud platforms and applications are becoming prevalent across security solutions. This technology helps security integrators provide managed services and the advantages of off-site systems and services to customers. 4. Workforce Development: With historically low unemployment, finding skilled employees is a challenge to the whole security industry. Security stakeholders need talent with IT, cybersecurity, AI and even privacy expertise, presenting a need to grow students’ interest in the industry. 5. AI: Research firm Gartner predicts a new “democratisation of AI” that will impact more organisations than ever before. Companies are now testing this technology before offering it to customers and exploring how AI data can be used to improve security threat assessment and response. 6. Emphasis on Data Privacy: Growing connectivity brings new concerns over data privacy. Finding the balance between security and convenience is a dilemma the industry must now address. 7. Move to Service Models: The newest home security technologies are strongly impacting installing companies. Systems integrators must find ways to focus on services customers want and need and move to managed service models to make up revenues. 8. Security Integrated in Smart Environments: As everything becomes connected, smart environments will begin to proliferate. Buildings and cities are becoming more conscious, with connected systems now able to automatically respond to and even anticipate the needs of facility users and citizens. We must continue to find ways to make these environments smarter and safer. 9. Identity of the Future: With facial and voice recognition and biometrics growing in popularity and appeal, how will we enter buildings and access networks tomorrow? The industry will anticipate and adapt to constant technological change in identity and visitor management. 10. Impact of Consumer Electronics Companies: The influx of consumer electronics companies and DIY systems means changing rules and players in the security industry. This disruption presents both challenges and opportunities for security companies.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban On Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes A Splash With Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact Of Data-Driven Smart Cities On Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyze data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing The Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends For 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How To Prevent ATM Jackpotting With Physical And Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need To Look Beyond Technology For Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organization. 10. The Evolution Of Facial Recognition From Body-Cams To Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
The initials GDPR have become synonymous with the need for companies within the European Union to provide consumers greater transparency and better control over their personal data. The General Data Protection Regulation (GDPR) has also increased awareness of privacy concerns around the world. It’s not the only factor highlighting a need for greater privacy – high-profile privacy breaches by companies such as Facebook are also driving the trend. But GDPR’s global impact cannot be denied. In fact, no company should assume that the need to address “GDPR-style” requirements is limited to the EU. As awareness has extended to the four corners of the globe, it has emboldened a new wave of laws and regulations that physical security companies ignore at their own peril. GDPR has increased awareness of privacy concerns around the world, and encouraged other areas to take notice GDPR also regulates how and if data about EU citizens can be transferred outside EU member states’ borders; the receiving country should have equal or better data protection laws in place. This factor also expands the potential impact of GDPR globally. California's Consumer Privacy Act 2020 California, which has the world’s fifth largest economy, passed a law this year that some have called “GDPR Lite.” The law gives the state’s 40 million residents the right to view private data held by companies, to correct it, to request that it be deleted and to keep it from being sold to third parties. California’s Consumer Privacy Act takes effect in 2020 and could be amended in the interim. The California law was passed quickly – and unanimously – by the state Assembly and Senate and was signed by Gov. Jerry Brown when it became clear that a ballot initiative was being organized to address the issue of privacy. In California, initiatives can be placed on the ballot by collecting signatures to require a direct vote by the electorate. Once passed, ballot initiatives are difficult to amend, requiring a two-thirds vote of state lawmakers. By passing the law, California’s legislature averted a proposed privacy initiative on the fall ballot. GDPR also regulates how and if data about EU citizens can be transferred outside EU member states’ borders There are differences in the California law and the European Union’s GDPR. For example, the California law only applies to companies that have annual gross revenues in excess of $25 million, that hold data on more than 50,000 people or that derive more than 50% of their annual revenues from the sale of personal information. Therefore, most small businesses are immune to the law’s requirements. However, the existence of the California law is a harbinger of more regulations to come, on the state or federal level. In another development related to the physical security industry, California has passed an Information Privacy: Connected Devices bill that requires electronics manufacturers to equip Internet of Things devices with “reasonable” security features – no more passwords such as “admin,” “password,” or “1234.” California’s Consumer Privacy Act is modeled under the General Data Protection Act Expanding The Definition Of Personal Information Other states are also getting involved. All 50 U.S. states have enacted breach notification laws requiring businesses to notify consumers if personal information is compromised. For example, Alabama’s new law, passed in June, applies to “unauthorized acquisition of sensitive personally identifying information in electronic form.” Many state laws are expanding the definitions of personal information and increasing cybersecurity requirements as they relate to that information. Globally, rapidly growing adoption of data protection laws is often modeled on regulations such as GDPR The problem with a “patchwork” of state requirements is the possibility that businesses may be caught unaware when state laws have different specific requirements addressing the same general mandate. At the federal level, there have been calls for a data breach notification bill that would provide a single set of rules for organizations to follow. In general, privacy is seen differently in the U.S. than in the E.U., due in part to history and a U.S. commitment to the First Amendment. The U.S. also tends to address privacy rights based on the category of information being considered; i.e., HIPAA requirements cover health information and the Gramm-Leach-Bliley Act regulates financial information. Globally, rapidly growing adoption of data protection laws is often modeled on regulations such as GDPR or on the Organization for Economic Co-operation and Development (OECD) Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. According to the United National Conference on Trade and Development, more than 100 countries around the world now have data protection legislation in place. Protecting And Managing Data All 50 U.S. states have enacted breach notification laws requiring businesses to notify consumers if personal information is compromisedWhen you consider the impact GDPR has had on the physical security market, the possible new hurdles can boggle the mind as additional privacy requirements take hold in the U.S and around the world. Challenges range from worries about management of access control and video surveillance data to concerns about biometrics. The success of new technologies using artificial intelligence (AI) depend on access to large data sets, so ensuring that data is protected and managed correctly is paramount. The genie is out of the bottle. GDPR may be driving the first wave of privacy concerns, but there is much more to come. Anyone who dismissed GDPR as a “European” factor is missing an opportunity to address issues proactively and to ensure optimum management of data privacy and transparency in the future.
Security and Safety Things GmbH (SAST) is a new company that has announced its vision for an Internet of Things (IoT) platform for the next generation of security cameras. The Bosch startup plans to build a global ecosystem for the development of innovative security camera applications. Based on the Android Open Source Project (AOSP), SAST provides libraries, an API framework, and codecs for developers to work with. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphone applications. We presented some questions to Nikolas Mangold-Takao, VP Product Management and Marketing, about the new venture, and here are his responses: Q: Why a new company now? What technology innovations have made this a good time to launch this company? The time is right to bring market needs and technological innovations together on one platform"Mangold-Takao: From a technical perspective we see two main drivers: increasing computing power at the edge and increasing internet connectivity, which will enable devices to directly communicate with each other and bring new technologies such as artificial intelligence also to the security and safety industry. At the same time, we see that this industry and its users are hungry for more innovative solutions – addressing new security needs while at the same leveraging the possibility to improve business operations for specific verticals, e.g. retail and transportation. The time is right to bring market needs and technological innovations together on one platform for this industry. Q: Why does SAST need to be a separate entity from Bosch? Mangold-Takao: SAST is setup as a wholly owned subsidiary of the Bosch Group. We wanted to make sure that SAST is able to underline its role as an industry standard platform across multiple players. SAST is open to get additional investors and is being setup as a startup in its own offices in Munich to foster the environment where speed and innovation can more easily take place. Having said that, several entities of the Bosch Group are very interesting partners for SAST. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphone applications Q: Please explain your "value proposition" to the industry. Mangold-Takao: We will bring new innovations and possibilities to the security and safety industry by providing an open, secure and standardized Operating System for video security cameras, to also address pressing issues such as cyber security and data privacy concerns. Devices that run then with the SAST operating system will work with an application marketplace provided and operated by SAST. Integrators and users can then use these apps from this marketplace to deploy additional functionality on these devices. With our platform we will be able to build up a community of app developers, including the ones not yet developing for this industry who have expertise in computer vision and artificial intelligence. Q: It seems what you are doing has parallels with the Apple and Android "app" stores. How is your approach the same (and how is it different) than those approaches? We are setting up SAST as a user-centric company and involve selected users very early on in the process"Mangold-Takao: The approach is similar in the way that we plan to generate revenue by operating the application marketplace and thus participate in the app revenue. The difference is that there is much more needed than apps and cameras to create a complete working solution addressing a user problem in this industry – we need to make sure that our own platform as well as the new applications being created will work as a part of an end-to-end solution. Q: "Critical mass" and wide industry participation seem to be requirements for your success. How will you achieve those goals? Will you involve integrators, consultants, or other parties in addition to manufacturers (to drive awareness)? How? Mangold-Takao: SAST is in close exchange with device manufacturers, integrators and consultants, as well as application developers and large end-users at the moment to ensure that we are building the right platform and ecosystem for this industry. We are setting up SAST as a user-centric company and involve selected users very early on in the process. We will run dedicated programs and hackathons to attract app developers, already active and new to our industry. We will also run selected pilots with end-users throughout 2019 to ensure we have all partners involved early on. SAST sees the industry is hungry for more innovative solutions – with the retail vertical market a target for these solutions Q: What timeline do you foresee in terms of implementing these initiatives? Mangold-Takao: While we start with first app development programs and plan our first pilots already for this year, we are planning our commercial launch for end of 2019. Q: How does your new company relate to the new Open Security & Safety Alliance (OSSA)? Mangold-Takao: The Open Security and Safety Alliance has been working very closely with SAST over the past year, defining some important concepts and elements required. One of the most important elements is an open and standardized Operating System, specific to this industry, which will then bring forward new innovative technologies and solutions. SAST is actively working on this Operating System, based on Android Open Source Project (ASOP), but is evolved and hardened with industry-specific features. Q: What's the biggest thing you want the security industry to understand about SAST? What is your "message" to the industry? Mangold-Takao: Our message is simple: let’s build better security and safety systems – together! But for real, innovating an industry is a joint effort, we can only bring new innovation to this industry with partners who share our vision and are excited about new technology. At the same time, we strongly believe that our platform allows every partner to bring forward what they do best but also invite new partners to our industry.
The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression. “Just learning about this made the whole trip worthwhile,” said one GSX attendee at the Johnson Controls booth, referring to the company’s new PowerSeries Pro intrusion devices. It’s the kind of feedback that makes the expense of exhibiting at a big trade show worthwhile. The new PowerSeries Pro is an extension of Johnson Controls’ existing line that is expressly designed for the commercial security market. The ‘hybrid’ (wired or wireless) device offers ease of installation and full cybersecurity including 128bit AES encryption with spread spectrum for no jamming or interference. It employs frequency hopping technology first developed for the Israeli defense force. Wireless Technology For Cybersecurity PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product PowerSeries Pro uses PowerG wireless technology and expands the portfolio of PowerG devices from residential through commercial. For use in a wired solution, the main advantage is ease of installation; terminal blocks ‘pop out’ easily and can be wired and plugged back in. Alternatively, PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product – wireless at the same level of cybersecurity as wired. Johnson Controls addresses three big factors with the product line: cybersecurity, user control, and easy installation and dependability. It’s part of Johnson Controls’ broader approach to provide ‘one-stop shopping’, enabling an end user to control their environments, video and access, and protect their contents, according to the company. Need For More Security In K-12 Schools In addition to reaching end users, lock company Allegion sees the show as an opportunity to meet with technology partners. “It’s great to bring together a concentration of people in the industry,” said Brad Aikin, Channel Led Business Leader, Integrator Channel. “We have had good conversations with technology companies here at the show in terms of partnering, both physical access control and OEM partners. We have also had good conversations with the integrator channel.” From speaking with education end users at GSX, Aikin sees a large unmet need for security in K-12 schools, more so than in colleges and universities. “K-12 is underserved,” he says. “They need to identify their priority of needs, and now they can serve needs they couldn’t before, both layering levels of security and phasing in implementation over time. Now things can be applied and tried out without disrupting the environment.” An example is the Von Duprin RU RM (Remote Undogging and Remote Monitoring) door exit devices, which are being integrated by access control partners Sielox, IDenticard and Vanderbilt. Intelligence is added to the door exit device to enable inexpensive monitoring of secondary, previously unconnected doors. The doors can be monitored and locked or unlocked at various points in the day. Lock company Allegion sees the show as an opportunity to meet with technology partners Bridging The Gap Between IT And Physical Security One exhibitor – ADT – noticed more information technology (IT) professionals accompanying their physical security counterparts at this year’s GSX exhibition. “They come along to kill dreams on the spot,” said Morgan Harris, Senior Director Enterprise Solutions, noting the IT department’s frequent hesitancy to add untrustworthy elements to the network. ADT is looking to transform and expand its 144-year-old brand in the commercial security space and has completed eight acquisitions in the last year to accomplish the goal. Some of the acquisitions build on ADT’s expanding cybersecurity initiative, which is both a fully-functioning stand-alone business and an effort to bridge the divide between IT and physical security. ADT is positioning itself to manage enterprise risk in the broadest sense. Combining IT And Cybersecurity The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?" “The Internet of Things (IoT) is fueling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?” asked Harris. “Projects have failed because information was lost in translation.” ADT seeks to have skillsets, experience and certifications on both sides of the issue. “It enables us to be the in-between,” says Harris. “We can blend the two together and be the translator. It’s great for both sides, advocating for security counterparts and for the network simplifies deployment and processes.” Harris sees a trade-off between cybersecurity and convenience in the industry. For example, if a manufacturer says they have a simplified process and only offers firmware updates once a year, cybersecurity suffers, he said. Lack of third-party testing is another way that manufacturers sometimes trade cybersecurity for convenience, at heightened risk to integrators and end users. Training Courses For Integrators And Partners Milestone Systems is expanding its level of involvement with integrator partners, and now provides Partner Business Reviews (PBR) to assess an integrator’s activities, sales and training, pipeline and marketing initiatives. The partner reviews often uncover issues that can be easily rectified through additional training, says Megan McHugh, Milestone’s Training Marketing Manager, Learning and Performance. Milestone uses a dashboard to track each integrator’s completed training courses and can point out additional courses needed to ensure an integrator partner’s success. Milestone offers a variety of in-person, e-learning and YouTube video courses to train installing partners, systems integrators and self-integrators on best practices Milestone offers a variety of in-person, e-learning and YouTube video courses (in 12 different languages) to train installing partners, systems integrators and self-integrators on best practices. ‘Cloud Labs’ are instructor-led online classes. All courses are linked to a variety of support resources. Sometimes a simple checklist accessed on a smart phone can ensure that every aspect of an install is performed and can instill added confidence in customers. The open platform company’s new agile development cycle – releasing multiple versions of XProtect software throughout the year – creates extra challenges to keep learning initiatives up to date. Along with each new release, various existing courses are updated. The concepts of “training and certification” are being replaced at Milestone with “learning and performance,” says McHugh. Milestone is also looking to hire 170 new R&D staff and open a new center in Barcelona (in addition to current R&D centers in Copenhagen and Sofia, Bulgaria). Making Camera Installation Easy Hanwha Techwin is another company that is seeing more interest in cybersecurity, as well as concern about whether a product is supported professionally. They have doubled-up production in South Korea and added capacity in Vietnam to avoid manufacturing in China. Thinking about their integrators, Hanwha Techwin is putting more emphasis on making installation easy. Installation costs may be up to 50 percent of a job, so easier installation frees up money to buy more or better cameras. With a new design of their cameras, an electrical contractor can now install the camera base and conduit, and then the integrator can easily plug in the camera later. Camera bases are common across multiple models, so a customer could switch out a 5-megapixel for a 2-megapixel camera later on if they want to (same housing plate). ‘Skins’ allow the color of cameras to be changed to match surrounding décor. “We are changing the idea of how people approach selling a camera, and it’s a whole new idea of how to install cameras,” said Tom Cook, Senior Vice President, North American Sales, Hanwha Techwin. Hanwha cameras can include a sound classification analytic to detect sounds such as gunshots Cameras With Sound Detection Technology Hanwha offers more flexibility in the field – interchangeable parts are packed together to enable configuration on site. And there is no need to stand on a ladder to position cameras; stepper motors help with remote camera positioning. Multi-sensor cameras have modules (combining lenses and sensors) that can be switched out at installation. Hanwha Techwin cameras can also include a sound classification analytic to detect sounds such as gunshots, screams or glass breaks, especially useful in K-12 education environments. Unification and the customer journey were a key emphasis for Genetec at GSX 2018. Unification for Genetec means combining multiple functions on one platform, from one vendor and using one source code. The company approaches the market by analyzing each customer’s journey as it relates to Genetec products. A typical customer journey involves (1) a company looking for standalone systems; (2) the need to centralize systems through integration and unification; (3) increasing automation and workflow; and (4) adding intelligence for more informed decision-making. “Genetec wants to get more in-depth with customers, be more comfortable with their business, and understand their challenges,” said Derek Arcuri, Product Marketing Manager. “We want to get naked with our customers.” Machine Learning Engine For Crime Prevention In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur There was a big crowd at the Genetec booth, and not because the comment was applied literally. Genetec has divided itself into multiple parts, each focused on a vertical market such as retail or transportation. The approach is to operate as a ‘federation of startups’, with each market sector accountable to fill in the gaps in the portfolio to meet the specific needs of each vertical. For example, Genetec’s Citigraf is an unsupervised machine learning engine with an algorithm to detect anomalies and trends from a large pool of data in a municipal environment. In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur. The system alerts operators in a bureau or area that has a higher risk level and should beef up the number of first responders. Chicago has seen a 39 percent decrease in average response time of first responders as a result. In the retail market, Genetec leverages the security infrastructure to analyze shopping trends and provide data for merchandising and operations. “Each customer is getting a portfolio of products tailored to the industry they are in,” says Arcuri. Demonstrating IoT Devices Axis Communications displayed its range of products at GSX, demonstrating its almost total transformation from an IP camera company to a supplier of a full range of Internet of Things (IoT) devices. “Axis is broadening its portfolio to include more solutions,” said Scott Dunn, Senior Director, Business Development Systems and Solutions. “Our success is driven by continuing to innovate our portfolio. The market is continuing to grow, and Axis is continuing to expand its market share.” Eight ‘Axis Customer Experience Centers’ around the United States help Axis stay close to their integrators, customers, partners and prospects. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security Axis has offered access control IP edge devices since 2013, and now has a new A1601 door controller being sold with partner-only software (no embedded Axis software like previous A1001 devices). In audio products, Axis has a portfolio of speakers, intercoms, and public address systems. Acquisition Of IP Door Intercom Company Enhancing the audio line was acquisition in 2016 of 2N, an IP door intercom company headquartered in Prague, Czech Republic. In North America, the 2N team is now fully part of Axis. The line emphasises simple architecture, programmability, and the ability to integrate widely. The products use Session Initiation Protocol (SIP) to integrate through the cloud or peer-to-peer. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security. Retail, education and enterprise customers are gravitating to IP audio. An IP bridge can tie existing analog components into the IP system. For perimeter security, Axis offers a radar device to help eliminate false alarms, as well as thermal cameras.
Videowall technology supplied by Ultimate Visual Solutions (formerly eyevis UK) is at the heart of a new customer experience center unveiled by independent system integrator Capula. UVS Videowall Technology The installation allows Capula to showcase a wide range of software technologies, including the latest IoT solutions, to clients from within the energy, manufacturing and utilities sectors at its headquarters in Stone, Staffordshire. Ultimate Visual Solutions (UVS) installed four eyevis EYE-LCD-5500-XSN-LD-FX 55-inch LCD displays to make up the videowall, along with a custom-made sound bar and a Netpix 4900 video wall controller. Netpix 4900 Videowall Controller We are delighted to have been chosen to complete such an important project for Capula" The installation also includes two 65-inch Samsung DM-65E touch interactive whiteboards; which give the Capula team the ability to show content from the Netpix videowall controller and allow them to annotate over it mid-discussion and feed content back to any display. UVS managing director Steve Murphy said: “We are delighted to have been chosen to complete such an important project for Capula, which will showcase the solutions we provide to visitors to their headquarters.” Capula Business Manager, Neil White commented: “We are very pleased with the service provided by Ultimate Visual Solutions. The expertise, guidance and follow on support was second to none. The technology installed in our prestigious customer experience center has provided an excellent showcase for our business’ solutions.” Video Wall And Audio-Visual Solutions Burnley-based UVS, formerly eyevis UK, provides video wall displays and audio-visual solutions to a range of clients across the UK. Capula specializes in industrial control, instrumentation and automation and has decades of expertise, having worked in some of the most complex and demanding industrial environments. The Netpix 4900 is a network-based graphic controller for the management of video wall systems, single displays or projectors. The controller creates a big joined desktop for network-applications, video and graphic sources.
HID Global, a worldwide provider of trusted identity solutions, was selected by Skanska, one of the world’s project development and construction groups with operations in Europe and North America, to incorporate HID’s mobile solution for secure access to its new office complex in Warsaw. Powered by Seos, HID Mobile Access improves the user experience and increases security throughout the entire building – from the parking lot and elevators to areas with limited access to the public. Located at 173 Solidarności Avenue in Warsaw, the new Spark office complex is not only the new headquarters of Skanska, but a large part of the 70,000 square-meter office building has also been set aside for other tenants. Because the building is intended to be a mixed-tenant space, it was crucial to restrict access to secure areas from unauthorized visitors. Using Smartphones For Access The Spark building was designed to enable mobile access so that employees can now use their smartphones to open doors and enter secure areas. Skanska, with help from system integrator Sharry Europe, created a new system for building occupants that integrates numerous building applications, including HID Mobile Access. As a result, all building applications have been incorporated into an integrated mobile app, which marked an advancement in creating a more streamlined and convenient experience for the users. HID Mobile Access enhances the security for accessing our entire building" Both Spark building employees and their guests can now move throughout the building with nothing more than a smartphone, without the risk of them gaining access to restricted areas – unless the proper access rights are granted. When users arrive at the door, they simply tap their iOS and Android devices to an iCLASS SE reader using Near-Field Communications (NFC) or Bluetooth Low Energy (BLE) and HID’s ‘twist and go’ feature to gain access from a distance. Any changes to the user’s access rights are remotely managed by the administrator through a cloud-based portal. Integrating All Building Applications Into One “HID Mobile Access enhances the security for accessing our entire building. In one application, we have integrated all building applications, such as parking, virtual reception and other Internet of Things functionality, bringing the whole user experience to a new level,” said Renata Nowakowska, Innovation Manager at Skanska. “One of the most pressing objectives for facility managers in smart buildings is to crack the code on how to enable as many building applications and services on mobile devices as possible in order to simplify how occupants move through a facility and interact with building services,” said Hilding Arrehed, Vice President of Cloud Services, Physical Access Control. “Skanska’s integration of HID Mobile Access into their mobile platform is a perfect example of how organizations are leveraging the power of mobile credentials and the cloud to realize the full potential of creating a connected and more intuitive experience for their users, while increasing security at the same time.”
Rasilient Systems, Inc., the pioneer in video surveillance systems purposely architected for IP video recording, has been chosen to provide video surveillance server and storage solutions for Zero 6 Mall, the impressive new-generation shopping destination that opened in April this year in Sharjah, United Arab Emirates. Zero 6 is a 16,000 square-meter complex that offers a diverse selection of dining, retail and entertainment attractions. Strategically located in Al Juraina, in close proximity to prominent city landmarks like University City and Sharjah International Airport, Zero 6 celebrates Sharjah’s evolving lifestyle community experience. Security Integration Software “Security is always the top concern in designing and developing a popular tourist and resident destination like Zero 6 Mall. Rasilient is honored to have been chosen to help secure this impressive and unique facility,” said Sean Chang, CEO of Rasilient Systems. Rasilient worked with UAE-based system integrator Exceed Communications, LLC, on the Zero 6 Mall project. Exceed Communications is a leading provider of IT infrastructure and security system needs including network design, installation and management and video surveillance and IPTV systems. Video surveillance at Zero 6 is managed by SeeTec Video Management Software (VMS). An OnSSI Company, SeeTec is one of the leading solution providers for video surveillance in Europe. Unmatched Data Integrity “Video surveillance storage is critical for security point of view and we are fortunate to have the services of Rasilient Systems, which is a trusted name for unmatched data integrity and storage reliability,” said Issa Ataya, Managing Director, Alef Group. We are confident that Rasilient Systems will provide the most innovative and state-of-the-art technology for Zero 6 Mall" “Zero 6 Mall is a one-stop destination in Sharjah that appeals more to a new generation as it’s a premier lifestyle-oriented place. We are confident that Rasilient Systems will provide the most innovative and state-of-the-art technology for Zero 6 Mall,” Ataya said. Video Management Software Rasilient provided video surveillance storage for Zero 6 that offers unmatched data integrity, storage reliability and scalability to address future growth. Rasilient’s purpose-built technologies lower CAPEX and OPEX by extending product life expectancy and enabling scheduled maintenance instead of reactive maintenance as systems age. The video surveillance system in place at the mall provides petabytes of storage using Rasilient’s fully redundant ApplianceStor AS85R Server and PS5000 Rackmount IP Storage. Rasilient’s ApplianceStor AS85R is a modular server system which packs four high performance server modules in a single 2U rack mount platform providing unmatched performance and density. Each module can be used to integrate VMS, failover, archive, administration and access control servers in a single high density 2U system. The AS85R significantly reduces cost over a separate VMS server, reduces cabling and the ordeal of integrating VMS, OS, commodity server and storage. Because the AS85R is ideally suited for use in conjunction with Rasilient’s PS5000 Rackmount IP storage, the Zero 6 project also utilizes the PS5000. Rasilient’s PS5000 Rackmount IP storage provides a simple-to-use, high performance, and large capacity video surveillance solution Large Surveillance Installations Rasilient’s PS5000 Rackmount IP storage provides a simple-to-use, high performance, and large capacity video surveillance solution. The purpose-built storage array is optimized for high performance megapixel and large video surveillance installations – both key characteristics of the video solution used at the Zero 6 Mall. Rasilient's patented advanced video caching technology – VAN, FlowThrough, StreamAlign – enables no recording gaps and data locking and increases read/write performance. This allows the capability of using both high resolution megapixel cameras and heavy camera loads. With Rasilient’s video surveillance storage solutions, every single camera frame is processed and recorded – which is essential for the variety of mall security scenarios that might call for video retrieval. The Rasilient system is also engineered to monitor its own “health” and operations to ensure that the system doesn’t fail when it’s most needed. This Proactive technology monitors the health of every disc drive in the system to enable cloning right before an actual drive failure. Reliable Video Surveillance Solutions Zero 6 Mall is just one of many projects Rasilient has completed in the UAE and surrounding areas over the last few years, said Chang. “With the successful implementation of quality and reliable video surveillance solutions for projects like Zero 6, Rasilient continues its growth in the very important Middle East market,” he added.
HID Global, a worldwide provider in trusted identity solutions, announced that 85-year-old fire protection provider RAEL Automatic Sprinkler Company and integrator Automated Decision have deployed HID Trusted Tag Services at one of Manhattan’s most iconic skyscrapers. The combined solutions help secure, digitize, automate and streamline inspection and maintenance of the building’s massive fire and safety sprinkler system. "HID Trusted Tag Services are a real competitive differentiator for us when we bid for projects now," said David Israel, President, RAEL Automatic Sprinkler Company. "We plan to deploy it in other noteworthy buildings and we’re exploring using it for other mission-critical equipment we inspect and repair as well." The RAEL solution incorporates HID Trusted Tag Services into Automated Decisions’ work order management system and mobile inspection app HID Trusted Tag Services HID Trusted Tag Services empower robust Internet of Things (IoT) applications by attaching unique and trusted identities to virtually any object that can be read by mobile devices. Smartphones and other devices can then be used for innovative use cases, without compromising the privacy of end users. The RAEL solution incorporates HID Trusted Tag Services into Automated Decisions’ work order management system and mobile inspection app. The deployment includes HID’s trusted and tamper-evident NFC tag using dual NFC and QR code technology; unique cryptographic authentication and a unique QR code placed on every component of the RAEL sprinklers. After authenticating to HID’s cloud authentication service, RAEL technicians move through the building, tapping each applied tag with their mobile devices to authenticate upon completion of their component inspection or repair. Proof Of Presence Each individual tap generates a unique encrypted code appended to a URL to provide proof of presence. This process confirms the technician was physically at the site and conducted the required sprinkler inspections and repairs. "Proof of presence was critical for us,” said Israel, “as property managers are now expected to deliver a much higher level of compliance reporting." The solution also logs the user, tap time and date into the Automated Decisions work order management platform. Mobile online access provides inspectors with service request maintenance records, sprinkler part specifications, diagrams and photographs. Combined HID and Automated Decisions solution has enabled faster, more efficient inspections and repairs Combined Tag Services And Mobile Devices "That RAEL and Automated Decisions are leveraging our offering for fire and safety at an immense, iconic skyscraper reinforces the breadth of IoT use cases that our identification and sensing portfolio addresses," said Mark Robinton, Director of Business Development & Strategic Innovation, Identification Technologies with HID Global. "Facility managers are also increasingly seeking to combine the use of HID Trusted Tag Services and mobile devices to automate other safety and security functions, including guard tour and key management, as buildings become more intelligent and connected." In addition to providing peace of mind to RAEL and their property management clients, RAEL also reported the combined HID and Automated Decisions solution has enabled faster, more efficient inspections and repairs, improved first-time fix rates and fewer repeat visits.
The Palacio de Congresos, celebrating its 20th anniversary, is a state-of-the-art conference and exhibition center in the heart of Valencia, Spain. Also known as the Palace of Light, due to its glass-fronted façade and distinctive roof design, the Palacio regularly accommodates large-scale international conferences organized by multinationals, trade associations and government organizations. Most events gravitate around the main auditorium with room for up to 1,481 participants, as well as smaller auditoria with capacities for 467 and 270 people. If needed, an IP-based video and audio network can connect up to 2,250 participants across these separate conference rooms. Bosch - DICENTIS Conference System Given the international character of most of the conferences it hosts, simultaneous interpretation is essential at the Palacio. The building management sought a solution that would take this into account, along with the facility’s existing architecture and infrastructure. Two of its three auditoria are equipped with fixed interpreter booths. Although the smallest auditorium and the conference center’s ten smaller meeting rooms do not include interpreter booths, simultaneous interpretation is also often required in these spaces. It was also important that the new conferencing system would not require any additional investment for wiring or cable connections. The OMNEO Interface allows transportation of the language channels via the IT network from the auditoria with fixed interpreter booths The DICENTIS Conference System from Bosch provided the perfect solution. Because the system is IP-based and Ethernet compatible, the existing IT infrastructure of the Palacio de Congresos could be used. The OMNEO Interface allows transportation of the language channels via the IT network from the auditoria with fixed interpreter booths to the meeting areas that don’t have these facilities. DICENTIS streams the language channels from the interpreter desks to the DICENTIS Conference devices in the main auditoria, and also to all the active conference devices in the Palacio’s smaller meeting areas. The floor languages of the active conference devices, regardless of their location, are streamed back to the interpreter desks. Mobile Installation To serve the smaller meeting areas, the DICENTIS central equipment is installed in a small mobile rack for easy transportation and setup. Additionally, the DICENTIS Conference devices with channel selector can be transported from one room to another in specially made, high-quality, lightweight and sturdy cases for protection during transit. The mobile rack simply connects to the room’s IT network plug to connect to the equipment in the various meeting rooms. This smart, mobile DICENTIS solution meets the requirements of all the meetings held in the Palacio de Congresos. The capacity for simultaneous interpretation in all the meeting areas means 2,250 participants can be connected across all conference areas big and small.
Pulse Secure, the provider of secure access solutions to both enterprises and service providers, has announced that Entegrus has successfully deployed Pulse Policy Secure advanced network access control (NAC), to strengthen overall visibility and access security across their hybrid IT infrastructure. Entegrus, a Canadian energy company, leveraged their existing Pulse Secure virtual private network (VPN) implementation to expedite NAC deployment and fortify their infrastructure in accordance with National Institute of Standards and Technology (NIST) and North American Electric Reliability Corporation (NERC) guidelines. As a result, their security organization extended visibility for remote and on-premise users and devices, as well as enhanced endpoint compliance and Internet of Things (IoT) risk mitigation. With a widely distributed IT infrastructure, we considered NAC as an effective way to improve our security posture without dramatically altering how we operate" Role Of IT Security In Energy Delivery Entegrus serves over 58,000 customers throughout Ontario. They bring electricity, renewable energy and water across three large regions, with a workforce spread out over 2,300 square miles. Entegrus’ objective is to provide safe, reliable and cost-effective provision of energy and related billing services, while providing high levels of service to its customers, partners and the communities it serves. IT security plays a critical role in protecting their delivery of energy and data services. “The threat landscape is constantly evolving, forcing us to always consider how we can go one step further. With a widely distributed IT infrastructure, we considered NAC as an effective way to improve our security posture without dramatically altering how we operate,” said Dave Cullen, manager of information systems for Entegrus. “We have a long-standing relationship with Pulse Secure. The level of integration between Pulse Secure secure sockets layer (SSL) and NAC, as well as the extended feature set, made it a straightforward choice for us. Perhaps the two most important things are that we have increased our security posture, and for the most part, there has been zero impact on our end users.” NAC provides foundational endpoint intelligence, resource access enforcement and IoT defenses that support industry and regulatory compliance guidelines Endpoint Intelligence And IoT Defenses Ensuring always active control while maintaining flexible, seamless access to network and application resources is an essential requirement for utility providers. Within such highly regulated industries, best practices dictate a constant cycle of security readiness review and improvement to meet an increasingly potent threat posed by cyber threat actors. NAC provides foundational endpoint intelligence, resource access enforcement and IoT defenses that support industry and regulatory compliance guidelines. These compliance requisites apply to both regional and large national critical infrastructure providers. For stretched IT departments, Pulse Secure’s Secure Access solutions are designed to streamline deployment and on-going administration using an easy, integrated, policy-driven platform that works with a customer’s existing installed base and network infrastructure. In addition, Pulse Secure’s VPN solution utilizes the same endpoint client, policy engine and appliance management as the NAC solution. Multiple Advantages With Single Management Console Entegrus took advantage of this platform capability to rapidly implement NAC. As a result, they gained dynamic intelligence, unified policy management, automated enforcement and threat response through a single management console.We needed to make sure our secure access technologies could adapt to new regulatory requirements and new business needs" Cullen highlights numerous benefits, including a simplified method of managing complex policies and user access rights, as well as an enforceable method of checking end-point devices to ensure that only properly patched operating systems can connect to the network. Another advantage of Pulse Policy Secure was evident after Entegrus recently merged with London, Ontario-based St. Thomas Energy. “We needed to make sure our secure access technologies could adapt to new regulatory requirements and new business needs, as the recent merger added new, unqualified infrastructure and grew our customer base by around a third, which also led to the hiring of 28 new staff members,” Cullen added.