Internet of Things (IoT)
Pulse Secure, the provider of Secure Access solutions, announced that analyst firm Frost & Sullivan recognized Pulse Secure among the top four major NAC leaders in the SMB to Large Enterprise segment by market share and among the top three NAC vendors showing the most significant market share gains. The recent Frost & Sullivan ‘2018 Network Access Control (NAC) Market, Global, Forecast to 2022’ report states that network visibility is critical. Every device on a network is a...
Antaira Technologies is a developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the STM-60XC series of Serial to Modbus Gateways. Modbus networks have been around for a very long time. Markets are driving the need for Modbus RTU and ASCII devices to communicate with Ethernet and ultimately cloud devices with the h...
The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression. “Just learning about this made the whole trip worthwhile,” said one GSX attendee at...
NAPCO Security Technologies, known for developing innovative technology and reliable security solutions and services, is pleased to share that the all-new décor-neutral, iBridge Touch Touchscreen is gaining high popularity, especially used in conjunction with its new matching iBridge App, recently debuted on iTunes and Google Play. iBridge Touch is an advanced, neutral-color, décor-friendly, wall-mounted touchscreen that controls security and/or video and smart autom...
Audio over IP pioneer Barix announced that the company has promoted Reto Brader to CEO, following a highly successful tenure as Vice President of Sales and Marketing. The change in company leadership correlates with the availability of new products that Barix introduced in 2018, including its award-winning RetailPlayer platform for background music distribution. Barix Appoints Reto As New CEO The remaining Barix management team, which has worked together effectively for the past several years,...
Eagle Eye Networks, the global provider of cloud-based video surveillance solutions, and mozaiq, a marketplace for IOT services, announced a technology partnership that will add Eagle Eye surveillance video to the mozaiq market. The Eagle Eye CameraManager video surveillance system is now available in the mozaiq market, so businesses, alarm companies, security integrators, and individuals can more easily integrate their IOT and security systems to Eagle Eye CameraManager. Real-Time Video Acces...
GlobalPlatform, the standard for secure digital services and devices, publishes a configuration that simplifies the implementation of Secure Element (SE) specifications for the protection of internet of things (IoT) devices. “At the moment some of the IoT sector are not taking security seriously enough,” explains Gil Bernabeu, Technical Director, GlobalPlatform. “Recent attacks demonstrate that any device can be attacked or infected with malware. Devices can then be used for DDoS attacks or to mine end user data, or even exploited to share their source code and other intellectual property. All of this can have significant reputational and financial impact on brands. This is why security needs to be foundational, considered at the start of the design phase.” Secure Digital Services The GlobalPlatform Compact IoT Configuration v1.0 answers IoT-specific market requirements by giving service providers and device manufacturers the means to interact seamlessly when deploying secure digital services across constrained IoT devices. The use of standardized secure components makes the mass marketing of secure digital services possible, while bringing time and cost efficiencies to stakeholders within the ecosystem and enabling new business models. SEs can form the keystone for constrained IoT devices - balancing the flexibility of GlobalPlatform specifications, that cover a range of connectivity options including LoRaWAN and HTTPS, with the restrictions of low-end IoT devices using m-class processors. The configuration supports root of trust (RoT) device identity, the protection of critical assets, state-of-the-art AES cryptography for device management This entry-level configuration enables manufacturers to identify the best solution for devices with limited operating environments by providing the subset of specifications that they need to develop and deploy IoT devices and services. The configuration supports root of trust (RoT) device identity, the protection of critical assets, state-of-the-art AES cryptography for device management and authentication, allowing automatic enrolment to online cloud services. Publish New Interfaces 100% of SEs embedded in mobile devices are GlobalPlatform compliant. This shows that the SE configuration is perfectly fit-for-purpose for the mobile world, and GlobalPlatform expects the Compact IoT Configuration to achieve similar market penetration. “The next step for GlobalPlatform is to publish new interfaces that connect the SE to the rest of the platform and support the latest industry protocols” Gil continues. “This, along with a new standard for connecting embedded SEs to the device bus, will further enhance the integration of SEs into IoT devices and bring greater protection for services and IP.”
March Networks, a global provider of advanced video surveillance and video-based business intelligence solutions, is pleased to announce its complete lineup for Global Security Exchange (GSX) 2018. Intelligent Video Solutions In addition to the company’s solutions for financial, retail and transportation organizations, March Networks will showcase its newly launched Software as a Service (SaaS) offering for quick service restaurant (QSR) and convenience store (c-store) franchisees, as well as its seed-to-sale tracking and compliance solution for the cannabis market. It will also demonstrate its mobile RideSafe MT Series video recording platform for enhanced security and risk mitigation in college and healthcare transit applications. All March Networks products and services deliver the exceptional reliability, scalability and enterprise-class video management customers have come to expect from the brand. They reflect March Networks’ long-standing commitment to developing intelligent video solutions that help solve everyday business challenges in customer service, corporate compliance and operations, in addition to security and loss/fraud prevention. The secure, hosted service delivers all the benefits of March Networks’ powerful Searchlight for Retail solution SaaS Offering for QSRs And C-Stores GSX will be the first opportunity for show attendees to see March Networks Searchlight for Retail as a Service. The secure, hosted service delivers all the benefits of March Networks’ powerful Searchlight for Retail solution – including loss prevention, data analytics and operational audits reporting. The service is easy to deploy and eliminates the need for franchise owners to purchase and maintain servers within their own IT infrastructure. It includes all software licensing, and the administration of camera and recorder processing, health management, user management and software upgrades, performed by March Networks Network Operations Center staff working in cooperation with certified systems integrators. Better Seed-to-Sale Tracking And Compliance March Networks will also demonstrate its solution for the cannabis industry at GSX. The solution provides enhanced seed-to-sale security, tracking and compliance at every stage in the process – from the cultivation facility, in transit and through to the dispensary. It includes purpose-built video recording and management systems to ensure clear surveillance video is reliably captured and stored as long as required under government legislation. Uniquely, the solution also integrates video with data from fixed Radio Frequency Identification (RFID) tags – which are required by law throughout the cultivation process in some U.S. states – and point-of-sale (POS) systems used in dispensaries. The video and data are correlated in March Networks Searchlight for retail software, providing operators with advanced search, investigation, loss prevention and reporting capabilities. Enhanced Security For Student Shuttles The RideSafe MT Series IP recorders address a common gap for college, healthcare and other campuses operating shuttle or transport services The March Networks’ transit portfolio will also be on display at GSX. The RideSafe MT Series IP recorders address a common gap for college, healthcare and other campuses operating shuttle or transport services. The compact recording platform is ruggedized to ensure reliable operation in demanding mobile environments and enables automated video downloads over WiFi, 4G and other wireless networks to keep vehicles in service longer. Equally important, the mobile recorders can be managed seamlessly with March Networks Command Enterprise video management software in parallel with the company’s entire fixed video recording portfolio – giving customers a single, end-to-end video solution that simplifies system administration and management significantly. All visitors attending the show in search of proven video surveillance systems and differentiated solutions that deliver relevant video-based business intelligence for their broader organization, are invited to see March Networks in Booth 3515 at GSX 2018.
More good news for exhibitors on the second day of the Global Security Exchange (GSX) in Las Vegas. Brisk attendance continued early in the day, and then slowed somewhat in the afternoon, but most comments from exhibitors were positive. Exhibitors such as Lenel were “thrilled” with the show, and noticed the steady, good traffic and lots of sales leads. Lenel’s position at the front of the hall probably helped. New developments in mobile credentialing are a big trend at GSX, and Lenel’s BlueDiamond mobile credentials are traveling on a new path, so to speak. The access control company is introducing the idea of “Pathways” as a way of automatically signaling intent to a Bluetooth-enabled smart phone to open a door. A recognizable “pathway” is programmed into the phone, based on signals from nearby readers and locks and also geolocation signals. The system recognizes when a user travels along the pathway and automatically signals the correct door(s) to be opened along the way without the user having to touch his smart phone.A recognizable “pathway” is programmed into the phone, based on signals from nearby readers, locks and also geolocation signals Providing A Lightweight Alternative “When you trigger a pathway, it’s signaling intent to open the door,” says Greg Berry, Vice President Mobile Credentialing, Global Security Products, for United Technologies, parent company of Lenel. “Pathways are customized to a user’s needs and are the common places you are going all the time.” A user who walks the same path daily to the door of an office will find that door opens automatically. Previously using mobile credentials has been “slightly more work than using a badge,” says David Weinbach, Manager of Identity and Product Innovation for Lenel. “Now with Pathways, it’s less work than using a badge.” Specifically, a user no longer has to take out his phone and push a button to signal intent. “Rather than trying to emulate the badge, you create an experience that is better than the badge,” adds Berry. “We want to change the paradigm and turn the market on its ear.”New browser-based clients are being released with each new version of OnGuard software Other news from Lenel includes the release of more mobile and browser-based clients for OnGuard to be used for greater convenience alongside the Window-based clients. Providing a “lightweight” alternative enables some of the functionality of the Windows client in a format that is easy to access on the go. New browser-based clients are being released with each new version of OnGuard software. Cloud-hosted systems using Microsoft Azure are also among the plans for OnGuard, which ultimately will offer on-premises and cloud options. There’s not much comment from the Lenel folks about their parent company United Technologies’ plan to acquire S2 Security, which was announced days before the show. They would only say that the acquisition is waiting for regulatory approval, and that the expectation is that the two companies’ products will be complementary, given S2’s focus on the SMB (small and medium-sized business) market and Lenel’s strength at the enterprise level. The acquisition strategy is to grow both businesses. More details to come about the new combined company. Modern Network Infrastructure NVT Phybridge, a PoE connections company located near the back of the hall, also reported steady booth traffic on Day 2. “There are lots of customers and partners here,” said Steven Fair, Executive Vice President. “We are pleased with the quality of people, but not overwhelmed with the quantity.” FacePRO AI facial recognition is used for real-time searches of terror suspects or criminals throughout a location NVT Phybridge, which provides IP networking products for the telephony industry as well as security, is focused on networking concepts at GSX, in particular the changing requirements for network infrastructure in the age of IoT. We are pleased with the quality of people, but not overwhelmed with the quantity.” Fair uses the term “Modern LAN” to describe the new, changing requirements and in consideration of the specific networking needs of each edge device, whether cameras, sensors, or door access control devices. “Start with the edge device — what does it need from the network? What are its needs and have there been any innovations to enable you to connect to the network more economically?” asks Fair. There is also a green aspect to designing network infrastructure. Can existing equipment, such as coaxial or single twisted-pair cabling, be used, and thus save on disposal costs of the used cabling as well as lowering installation costs? Among NVT Phybridge’s offerings that can serve the changing networking needs in the IoT era is Smart Path PoE, which offers smart power, smart network access and secure connections. The CLEER family of products provides ethernet over existing coaxial cabling to enable easy transition from analog to IP cameras. The PoLRE products supply ethernet and power to travel over a single unshielded twisted pair cable with reach over 400 meters. The products have been used recently to transition a series of cruise ships from analog to IP video without having to replace cabling and spending only two days in dry dock for the installs. A New Focus Away From AI Panasonic is looking to apply AI-based capabilities to vehicle recognition in the near future, with the ability to identify vehicle characteristics Deep learning and artificial intelligence (AI) seem to be taking a lower profile at this show, perhaps signaling the end of the hype. Companies that mention AI point to specific products that use the technology and are currently available. For example, Panasonic is featuring its FacePRO AI-based facial recognition system. The system uses face images captured from video — grabbing up to 30 to 35 faces a second as video is recorded. The system saves the best of those face images, eliminating extensive duplication, as thumbnails, which are linked to the video footage where the faces appear. To find video in which a face appears, the operator merely drags-and-drops the thumbnail image and commands the system to “go fetch” video that contains that face. The system then produces a timeline showing where the face appears in the feed from each video camera on the premises, so an operator can track the movements of a suspect throughout a facility. The tool helps to simplify and shorten the workflow of locating a suspect in real-time and is affordable for a wider range of uses beyond the traditional airports or high-end applications. The FacePRO software is offered on any Panasonic camera, and works with a separate FacePRO server that is integrated with the video recorder. The system can be added easily to existing systems and is useful for such applications as real-time searches for terror suspects or other criminals throughout a location. Panasonic is also looking to apply AI-based capabilities to vehicle recognition, too, in the near future, with the ability to identify vehicle characteristics such as color, type of vehicle and direction of travel. On the VMS side, Panasonic is transitioning its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved That’s just a sampling of what I saw on Day 2 of the show. I have more to share in a final show report, including what I see tomorrow on the final (shortened) day.
The Open Security & Safety Alliance (‘the Alliance’) is a non-profit, non-stock corporation that brings together like-minded organizations in order to outline specifications for a common standardized platform for security and safety solutions which are accessible for everyone. The Alliance was formed in reaction to today’s market characterized by the continued evolution of the Internet of Things and the aggregation of data. Security and safety solutions are fragmented due to a lack of collaborative approach to common challenges including cyber security and common operating systems. This is holding back innovation and seamless integration. Many market players are competing on technical topics that do not necessarily make a significant difference for customers. The market needs a new direction, a framework that will enable the industry to focus on innovation and developments that add real value for customers. New Application Possibilities This framework will help the market and parties involved to focus on the aspects that really add value for their customers The Alliance brings together organizations that recognize the need for a new market direction and who are willing to contribute to the framework, providing standards and specifications for common components including an industry specific operating system, IoT infrastructure, collective approach for data security and privacy, and a drive for improved levels of performance. This framework will help the market and parties involved to focus on the aspects that really add value for their customers and open up new application possibilities, even beyond security and safety. The key tasks of the Alliance are: Create and promote the use of commonly-agreed standards, best practice and specifications. Address commonly-agreed challenges shared by the players in the industry, like data security and privacy. Enable market players to focus on innovative solutions which their customers find of higher value. Members will see accelerated innovation, more commercial opportunities, and an enhanced level of trust for security and safety solutions. Achieve Mutual Goals System integrators and distributors have been consulted to ensure that the Alliance covers the needs of all relevant parties Over the last year, the founding members have been working closely together and discussing with over 50 companies, varying from early adopters to established technology companies, to verify initial concepts. System integrators and distributors have been consulted to ensure that the Alliance covers the needs of all relevant parties. This initial input will help shape the standards and specifications that will eventually be consolidated in the Alliance framework. Starting off with the five founding members Bosch Building Technologies, Hanwha Techwin, Milestone Systems, Pelco by Schneider Electric and VIVOTEK Inc. and early adopters including Ambarella Inc., Anixter Inc., AndroVideo, Kings Security Systems Ltd and NetApp, the global alliance will focus on building standards, specifications, best practices, references and implementation guidelines. Together, the members of the Alliance can combine knowledge, expertise and experience in order to achieve mutual goals and create a new approach to the market.
DICE Corporation is pleased to announce it has formally completed its full integration with the CHeKT visual monitoring platform. “CHeKT brings a new, simplistic approach to providing visual monitoring at the protected premises by the professional integrator. The CHeKT Bridge pairs alarm panel zones and IP cameras or HD over coax recorders to present event and live-view video to central station operators in seconds,” said John Milliron, CHeKT vice president. The Bridge, CHeKT’s flagship product, has the power to turn any alarm panel and cameras into a single video alarm system and an internet of things (IoT) solution—creating a visual alarm verification system for DICE central stations. Providing Central Stations Installations can be completed by alarm technicians using only a smartphone within 30 minutes. CHeKT and DICE use additional XML integration to provide the monitoring station with the supervision of the location internet status, camera health and CHeKT equipment at all times. DICE is committed to providing central stations and believes CHeKT’s platform helps monitoring centers handle the high rate of false alarms DICE is committed to providing central stations with access to evolving technologies and believes CHeKT’s platform helps monitoring centers handle the high rate of false alarms that have plagued the alarm industry and have eroded trust with business owners and first responders. CHeKT’s technology enables operators to immediately see the cause of an alarm and provides a solution for dealers to utilize their existing alarm systems and cameras. Alarm Detection Devices Efficiency is an important component of the CHeKT integration. The technology gives DICE customers a turnkey video monitoring solution while creating increased RMR opportunities for the dealer. Because the Bridge uses traditional alarm detection devices, it does not increase signal traffic into the central station. Events triggered from an alarm panel are delivered into DICE, presenting an operator with the CHeKT video monitoring portal for visual verification of an alarm within three to five seconds. The integration requires no additional equipment at the central station. DICE central station operators are provided with clear guidance on how to handle an alarm, saving time and ensuring operator consistency. “Wow, this is awesome – you can tell that this came from a company who understands the alarm monitoring industry,” said Troy Astrope of ProTELEC Alarms.
Viakoo, a provider of a proven means to proactively automate surveillance and access control system verification in the security industry, is demonstrating solutions to assist in proving and maintaining regulatory or organizational compliance at GSX 2018. The dynamic capabilities of this system help customers ensure – and prove – consistent compliance with physical security regulations across a wide range of applicable industries including: transportation, payment card processing (PCI), electrical distribution and many more. This solves a persistent challenge in these industries to help avoid the risk of fines or service interruptions. Cyber-Risk Management Working in conjunction with Coalfire, a cyber-risk management and compliance firm, the Viakoo Predictive product was found to fully or partially automate the audit process for 38 specific physical security controls. Using automated discovery and push-button reporting from Viakoo can save significant time during an audit, and can help avoid the risk of expensive penalties, recalls or other service interruptions as a result of failing an audit. Additionally, Viakoo sits on the TIA-942 Edge Data Center working group, providing a focus on physical security requirements and cyber hardening of data centers to the group. Viakoo provides the only patented solution available to prove data retention compliance. Viakoo offers the only proactive and automated solution assessed by forensic auditors from Coalfire for physical security controls" Physical Security Compliance Viakoo has joined with the Telecommunications Industry Association (TIA), which represents the global information and communications technology industry, to comprehensively and proactively participate in providing compliance solutions for protecting telecommunications facilities and products. “Viakoo offers the only proactive and automated solution assessed by forensic auditors from Coalfire for physical security controls,” said Bud Broomhead, CEO, Viakoo. “By working with Coalfire, and joining with the TIA, Viakoo continues to work with industry leaders to provide proactive, automated solutions for ensuring physical security compliance across industries.” Surveillance Systems Many organizations that employ surveillance systems are required by regulations, industry standards, or internal compliance standards to retain video evidence for a period (typically 30 to 90 days). Auditors for industry standards such as PCI, NERC, NIST, TIA-942, FedRAMP and others, are now required to confirm that organizations systematically retain video data for the required retention period in order to achieve compliance certification.
HID Global, a worldwide provider of trusted identity solutions, was selected by Skanska, one of the world’s project development and construction groups with operations in Europe and North America, to incorporate HID’s mobile solution for secure access to its new office complex in Warsaw. Powered by Seos, HID Mobile Access improves the user experience and increases security throughout the entire building – from the parking lot and elevators to areas with limited access to the public. Located at 173 Solidarności Avenue in Warsaw, the new Spark office complex is not only the new headquarters of Skanska, but a large part of the 70,000 square-meter office building has also been set aside for other tenants. Because the building is intended to be a mixed-tenant space, it was crucial to restrict access to secure areas from unauthorized visitors. Using Smartphones For Access The Spark building was designed to enable mobile access so that employees can now use their smartphones to open doors and enter secure areas. Skanska, with help from system integrator Sharry Europe, created a new system for building occupants that integrates numerous building applications, including HID Mobile Access. As a result, all building applications have been incorporated into an integrated mobile app, which marked an advancement in creating a more streamlined and convenient experience for the users. HID Mobile Access enhances the security for accessing our entire building" Both Spark building employees and their guests can now move throughout the building with nothing more than a smartphone, without the risk of them gaining access to restricted areas – unless the proper access rights are granted. When users arrive at the door, they simply tap their iOS and Android devices to an iCLASS SE reader using Near-Field Communications (NFC) or Bluetooth Low Energy (BLE) and HID’s ‘twist and go’ feature to gain access from a distance. Any changes to the user’s access rights are remotely managed by the administrator through a cloud-based portal. Integrating All Building Applications Into One “HID Mobile Access enhances the security for accessing our entire building. In one application, we have integrated all building applications, such as parking, virtual reception and other Internet of Things functionality, bringing the whole user experience to a new level,” said Renata Nowakowska, Innovation Manager at Skanska. “One of the most pressing objectives for facility managers in smart buildings is to crack the code on how to enable as many building applications and services on mobile devices as possible in order to simplify how occupants move through a facility and interact with building services,” said Hilding Arrehed, Vice President of Cloud Services, Physical Access Control. “Skanska’s integration of HID Mobile Access into their mobile platform is a perfect example of how organizations are leveraging the power of mobile credentials and the cloud to realize the full potential of creating a connected and more intuitive experience for their users, while increasing security at the same time.”
Rasilient Systems, Inc., the pioneer in video surveillance systems purposely architected for IP video recording, has been chosen to provide video surveillance server and storage solutions for Zero 6 Mall, the impressive new-generation shopping destination that opened in April this year in Sharjah, United Arab Emirates. Zero 6 is a 16,000 square-meter complex that offers a diverse selection of dining, retail and entertainment attractions. Strategically located in Al Juraina, in close proximity to prominent city landmarks like University City and Sharjah International Airport, Zero 6 celebrates Sharjah’s evolving lifestyle community experience. Security Integration Software “Security is always the top concern in designing and developing a popular tourist and resident destination like Zero 6 Mall. Rasilient is honored to have been chosen to help secure this impressive and unique facility,” said Sean Chang, CEO of Rasilient Systems. Rasilient worked with UAE-based system integrator Exceed Communications, LLC, on the Zero 6 Mall project. Exceed Communications is a leading provider of IT infrastructure and security system needs including network design, installation and management and video surveillance and IPTV systems. Video surveillance at Zero 6 is managed by SeeTec Video Management Software (VMS). An OnSSI Company, SeeTec is one of the leading solution providers for video surveillance in Europe. Unmatched Data Integrity “Video surveillance storage is critical for security point of view and we are fortunate to have the services of Rasilient Systems, which is a trusted name for unmatched data integrity and storage reliability,” said Issa Ataya, Managing Director, Alef Group. We are confident that Rasilient Systems will provide the most innovative and state-of-the-art technology for Zero 6 Mall" “Zero 6 Mall is a one-stop destination in Sharjah that appeals more to a new generation as it’s a premier lifestyle-oriented place. We are confident that Rasilient Systems will provide the most innovative and state-of-the-art technology for Zero 6 Mall,” Ataya said. Video Management Software Rasilient provided video surveillance storage for Zero 6 that offers unmatched data integrity, storage reliability and scalability to address future growth. Rasilient’s purpose-built technologies lower CAPEX and OPEX by extending product life expectancy and enabling scheduled maintenance instead of reactive maintenance as systems age. The video surveillance system in place at the mall provides petabytes of storage using Rasilient’s fully redundant ApplianceStor AS85R Server and PS5000 Rackmount IP Storage. Rasilient’s ApplianceStor AS85R is a modular server system which packs four high performance server modules in a single 2U rack mount platform providing unmatched performance and density. Each module can be used to integrate VMS, failover, archive, administration and access control servers in a single high density 2U system. The AS85R significantly reduces cost over a separate VMS server, reduces cabling and the ordeal of integrating VMS, OS, commodity server and storage. Because the AS85R is ideally suited for use in conjunction with Rasilient’s PS5000 Rackmount IP storage, the Zero 6 project also utilizes the PS5000. Rasilient’s PS5000 Rackmount IP storage provides a simple-to-use, high performance, and large capacity video surveillance solution Large Surveillance Installations Rasilient’s PS5000 Rackmount IP storage provides a simple-to-use, high performance, and large capacity video surveillance solution. The purpose-built storage array is optimized for high performance megapixel and large video surveillance installations – both key characteristics of the video solution used at the Zero 6 Mall. Rasilient's patented advanced video caching technology – VAN, FlowThrough, StreamAlign – enables no recording gaps and data locking and increases read/write performance. This allows the capability of using both high resolution megapixel cameras and heavy camera loads. With Rasilient’s video surveillance storage solutions, every single camera frame is processed and recorded – which is essential for the variety of mall security scenarios that might call for video retrieval. The Rasilient system is also engineered to monitor its own “health” and operations to ensure that the system doesn’t fail when it’s most needed. This Proactive technology monitors the health of every disc drive in the system to enable cloning right before an actual drive failure. Reliable Video Surveillance Solutions Zero 6 Mall is just one of many projects Rasilient has completed in the UAE and surrounding areas over the last few years, said Chang. “With the successful implementation of quality and reliable video surveillance solutions for projects like Zero 6, Rasilient continues its growth in the very important Middle East market,” he added.
HID Global, a worldwide provider in trusted identity solutions, announced that 85-year-old fire protection provider RAEL Automatic Sprinkler Company and integrator Automated Decision have deployed HID Trusted Tag Services at one of Manhattan’s most iconic skyscrapers. The combined solutions help secure, digitize, automate and streamline inspection and maintenance of the building’s massive fire and safety sprinkler system. "HID Trusted Tag Services are a real competitive differentiator for us when we bid for projects now," said David Israel, President, RAEL Automatic Sprinkler Company. "We plan to deploy it in other noteworthy buildings and we’re exploring using it for other mission-critical equipment we inspect and repair as well." The RAEL solution incorporates HID Trusted Tag Services into Automated Decisions’ work order management system and mobile inspection app HID Trusted Tag Services HID Trusted Tag Services empower robust Internet of Things (IoT) applications by attaching unique and trusted identities to virtually any object that can be read by mobile devices. Smartphones and other devices can then be used for innovative use cases, without compromising the privacy of end users. The RAEL solution incorporates HID Trusted Tag Services into Automated Decisions’ work order management system and mobile inspection app. The deployment includes HID’s trusted and tamper-evident NFC tag using dual NFC and QR code technology; unique cryptographic authentication and a unique QR code placed on every component of the RAEL sprinklers. After authenticating to HID’s cloud authentication service, RAEL technicians move through the building, tapping each applied tag with their mobile devices to authenticate upon completion of their component inspection or repair. Proof Of Presence Each individual tap generates a unique encrypted code appended to a URL to provide proof of presence. This process confirms the technician was physically at the site and conducted the required sprinkler inspections and repairs. "Proof of presence was critical for us,” said Israel, “as property managers are now expected to deliver a much higher level of compliance reporting." The solution also logs the user, tap time and date into the Automated Decisions work order management platform. Mobile online access provides inspectors with service request maintenance records, sprinkler part specifications, diagrams and photographs. Combined HID and Automated Decisions solution has enabled faster, more efficient inspections and repairs Combined Tag Services And Mobile Devices "That RAEL and Automated Decisions are leveraging our offering for fire and safety at an immense, iconic skyscraper reinforces the breadth of IoT use cases that our identification and sensing portfolio addresses," said Mark Robinton, Director of Business Development & Strategic Innovation, Identification Technologies with HID Global. "Facility managers are also increasingly seeking to combine the use of HID Trusted Tag Services and mobile devices to automate other safety and security functions, including guard tour and key management, as buildings become more intelligent and connected." In addition to providing peace of mind to RAEL and their property management clients, RAEL also reported the combined HID and Automated Decisions solution has enabled faster, more efficient inspections and repairs, improved first-time fix rates and fewer repeat visits.
The Palacio de Congresos, celebrating its 20th anniversary, is a state-of-the-art conference and exhibition center in the heart of Valencia, Spain. Also known as the Palace of Light, due to its glass-fronted façade and distinctive roof design, the Palacio regularly accommodates large-scale international conferences organized by multinationals, trade associations and government organizations. Most events gravitate around the main auditorium with room for up to 1,481 participants, as well as smaller auditoria with capacities for 467 and 270 people. If needed, an IP-based video and audio network can connect up to 2,250 participants across these separate conference rooms. Bosch - DICENTIS Conference System Given the international character of most of the conferences it hosts, simultaneous interpretation is essential at the Palacio. The building management sought a solution that would take this into account, along with the facility’s existing architecture and infrastructure. Two of its three auditoria are equipped with fixed interpreter booths. Although the smallest auditorium and the conference center’s ten smaller meeting rooms do not include interpreter booths, simultaneous interpretation is also often required in these spaces. It was also important that the new conferencing system would not require any additional investment for wiring or cable connections. The OMNEO Interface allows transportation of the language channels via the IT network from the auditoria with fixed interpreter booths The DICENTIS Conference System from Bosch provided the perfect solution. Because the system is IP-based and Ethernet compatible, the existing IT infrastructure of the Palacio de Congresos could be used. The OMNEO Interface allows transportation of the language channels via the IT network from the auditoria with fixed interpreter booths to the meeting areas that don’t have these facilities. DICENTIS streams the language channels from the interpreter desks to the DICENTIS Conference devices in the main auditoria, and also to all the active conference devices in the Palacio’s smaller meeting areas. The floor languages of the active conference devices, regardless of their location, are streamed back to the interpreter desks. Mobile Installation To serve the smaller meeting areas, the DICENTIS central equipment is installed in a small mobile rack for easy transportation and setup. Additionally, the DICENTIS Conference devices with channel selector can be transported from one room to another in specially made, high-quality, lightweight and sturdy cases for protection during transit. The mobile rack simply connects to the room’s IT network plug to connect to the equipment in the various meeting rooms. This smart, mobile DICENTIS solution meets the requirements of all the meetings held in the Palacio de Congresos. The capacity for simultaneous interpretation in all the meeting areas means 2,250 participants can be connected across all conference areas big and small.
Pulse Secure, the provider of secure access solutions to both enterprises and service providers, has announced that Entegrus has successfully deployed Pulse Policy Secure advanced network access control (NAC), to strengthen overall visibility and access security across their hybrid IT infrastructure. Entegrus, a Canadian energy company, leveraged their existing Pulse Secure virtual private network (VPN) implementation to expedite NAC deployment and fortify their infrastructure in accordance with National Institute of Standards and Technology (NIST) and North American Electric Reliability Corporation (NERC) guidelines. As a result, their security organization extended visibility for remote and on-premise users and devices, as well as enhanced endpoint compliance and Internet of Things (IoT) risk mitigation. With a widely distributed IT infrastructure, we considered NAC as an effective way to improve our security posture without dramatically altering how we operate" Role Of IT Security In Energy Delivery Entegrus serves over 58,000 customers throughout Ontario. They bring electricity, renewable energy and water across three large regions, with a workforce spread out over 2,300 square miles. Entegrus’ objective is to provide safe, reliable and cost-effective provision of energy and related billing services, while providing high levels of service to its customers, partners and the communities it serves. IT security plays a critical role in protecting their delivery of energy and data services. “The threat landscape is constantly evolving, forcing us to always consider how we can go one step further. With a widely distributed IT infrastructure, we considered NAC as an effective way to improve our security posture without dramatically altering how we operate,” said Dave Cullen, manager of information systems for Entegrus. “We have a long-standing relationship with Pulse Secure. The level of integration between Pulse Secure secure sockets layer (SSL) and NAC, as well as the extended feature set, made it a straightforward choice for us. Perhaps the two most important things are that we have increased our security posture, and for the most part, there has been zero impact on our end users.” NAC provides foundational endpoint intelligence, resource access enforcement and IoT defenses that support industry and regulatory compliance guidelines Endpoint Intelligence And IoT Defenses Ensuring always active control while maintaining flexible, seamless access to network and application resources is an essential requirement for utility providers. Within such highly regulated industries, best practices dictate a constant cycle of security readiness review and improvement to meet an increasingly potent threat posed by cyber threat actors. NAC provides foundational endpoint intelligence, resource access enforcement and IoT defenses that support industry and regulatory compliance guidelines. These compliance requisites apply to both regional and large national critical infrastructure providers. For stretched IT departments, Pulse Secure’s Secure Access solutions are designed to streamline deployment and on-going administration using an easy, integrated, policy-driven platform that works with a customer’s existing installed base and network infrastructure. In addition, Pulse Secure’s VPN solution utilizes the same endpoint client, policy engine and appliance management as the NAC solution. Multiple Advantages With Single Management Console Entegrus took advantage of this platform capability to rapidly implement NAC. As a result, they gained dynamic intelligence, unified policy management, automated enforcement and threat response through a single management console.We needed to make sure our secure access technologies could adapt to new regulatory requirements and new business needs" Cullen highlights numerous benefits, including a simplified method of managing complex policies and user access rights, as well as an enforceable method of checking end-point devices to ensure that only properly patched operating systems can connect to the network. Another advantage of Pulse Policy Secure was evident after Entegrus recently merged with London, Ontario-based St. Thomas Energy. “We needed to make sure our secure access technologies could adapt to new regulatory requirements and new business needs, as the recent merger added new, unqualified infrastructure and grew our customer base by around a third, which also led to the hiring of 28 new staff members,” Cullen added.
Pulse Secure, a provider of Secure Access solutions to both enterprises and service providers, has announced that Entegrus has successfully deployed Pulse Policy Secure advanced network access control (NAC), to strengthen overall visibility and access security across their hybrid IT infrastructure. Entegrus, a Canadian energy company, leveraged their existing Pulse Secure virtual private network (VPN) implementation to expedite NAC deployment and fortify their infrastructure in accordance with National Institute of Standards and Technology (NIST) and North American Electric Reliability Corporation (NERC) guidelines. As a result, their security organization extended visibility for remote and on-premise users and devices, as well as enhanced endpoint compliance and Internet of Things (IoT) risk mitigation. We have increased our security posture, and for the most part, there has been zero impact on our end users" Pulse Secure-Entegrus Collaboration Entegrus serves over 58,000 customers throughout Ontario. They bring electricity, renewable energy and water across three large regions, with a workforce spread out over 2,300 square miles. Entegrus’ objective is to provide safe, reliable and cost-effective provision of energy and related billing services, while providing high levels of service to its customers, partners and the communities it serves. IT security plays a critical role in protecting their delivery of energy and data services. “The threat landscape is constantly evolving, forcing us to always consider how we can go one step further. With a widely distributed IT infrastructure, we considered NAC as an effective way to improve our security posture without dramatically altering how we operate,” said Dave Cullen, manager of information systems for Entegrus. “We have a long-standing relationship with Pulse Secure. The level of integration between Pulse Secure secure sockets layer (SSL) and NAC, as well as the extended feature set, made it a straightforward choice for us. Perhaps, the two most important things are that we have increased our security posture, and for the most part, there has been zero impact on our end users.” Active Control With Seamless Network Access Ensuring always active control while maintaining flexible, seamless access to network and application resources is an essential requirement for utility providers. Within such highly regulated industries, best practices dictate a constant cycle of security readiness review and improvement to meet an increasingly potent threat posed by cyber threat actors. NAC provides foundational endpoint intelligence, resource access enforcement and IoT defences that support industry and regulatory compliance guidelines. These compliance requisites apply to both regional and large national critical infrastructure providers. For stretched IT departments, Pulse Secure’s Secure Access solutions are designed to streamline deployment and on-going administration using an easy, integrated, policy-driven platform that works with a customer’s existing installed base and network infrastructure. In addition, Pulse Secure’s VPN solution utilizes the same endpoint client, policy engine and appliance management as the NAC solution. Entegrus took advantage of this platform capability to rapidly implement NAC. As a result, they gained dynamic intelligence, unified policy management, automated enforcement and threat response through a single management console. We needed to make sure our secure access technologies could adapt to new regulatory requirements and new business needs" Secure Access Solutions Cullen highlights numerous benefits, including a simplified method of managing complex policies and user access rights, as well as an enforceable method of checking end-point devices to ensure that only properly patched operating systems can connect to the network. Another advantage of Pulse Policy Secure was evident after Entegrus recently merged with London, Ontario-based St. Thomas Energy. “We needed to make sure our secure access technologies could adapt to new regulatory requirements and new business needs, as the recent merger added new, unqualified infrastructure and grew our customer base by around a third, which also led to the hiring of 28 new staff members,” Cullen added.