Internet of Things (IoT)
AAEON Atlas helps increase safety, energy efficiency, and cut costs for Smart Cities thanks to the power of Intel Movidius Myriad X. AAEON, globally renowned provider of Smart City solutions, announces AAEON Atlas, a rugged outdoor edge node built to provide cities with flexible solutions for AI and edge computing. Featuring the Intel Movidius Myriad X, AAEON Atlas offers real-time processing for a range of Smart City applications. AAEON NanoCOM-APL board AAEON Atlas is based on the compact A...
Pivot3, a provider of intelligent infrastructure solutions, announced that it is providing its hyperconverged infrastructure (HCI) software platform to Lenovo Datacenter Group (DCG) to deliver integrated edge computing solutions optimized for mission-critical Smart City and Safe Campus environments. As part of Lenovo’s ON DEMAND program, Pivot3 and Lenovo have developed fully qualified solutions for edge deployments that are available through Lenovo’s network of channel partners worl...
In large-scene applications, it is difficult for a panoramic surveillance equipment to acquire real-time round-the-clock data due to a lot of factors such as blind spots, aperture limitation, fixed monitoring scene, etc. Aiming to solve these common problems that most general panoramic equipment are facing, Dahua Technology, a video-centric smart IoT solution and service provider, launches its new Hunter SDT5X Series Camera to bring more benefits to its users. Featuring smart tracking, per...
MOBOTIX is exhibiting at the International Security Exposition (ISE) 2019, global show for the UK Government, in the London Olympia venue at Stand J30, from Dec 3 to 4 2019. International Security Expo 2019 ISE is bringing Government, Industry, Academia and the entire end-user community in charge of regulation and procurement together under one roof to debate current challenges and to source the latest security technologies and services. The demonstrations will show visitors the newly launche...
Konica Minolta is making the next big advance in intelligent video technology by launching the MOBOTIX 7 smart solution platform and the M73 IoT camera that uses it. The latest generation of MOBOTIX video cameras offers a whole new set of functions plus application solutions based on deep learning, opening up new possibilities far beyond traditional video security. The M73 comes with more than 15 apps integrated into its camera software, which can be used to optimize business processes in pract...
Rhombus Systems, a provider of enterprise cloud-managed physical security solutions, announces a suite of new sensors - asset tags, door sensors, environmental sensors – to transform how organizations manage their physical security. The new sensors are battery operated and use the Rhombus security cameras as a local intelligence hub to capture sensor events, corresponding video footage, and data of the physical environment. By seamlessly combining enterprise video security with IoT sensor...
Displaying a collective enthusiasm to build a safer future, 8,576 industry professionals journeyed from all corners of Asia to attend the 7th edition of Secutech Thailand, which finished its four day run on 31 October. With smart city solutions as a core theme, exhibitors and visitors alike were united in their consensus that the Thai security market is full of potential, particularly due to the government’s commitment to smart city initiatives. Positive sentiment also surrounded the successful synergies created between Secutech Thailand and Digital Thailand Big Bang, which were held alongside each other for the first time this year. Under the banner of ‘smart city solutions week’, the two fairs together with Thailand Lighting Fair and Thailand Building Fair created a one-stop shop for a wide variety of smart city solutions. Secutech Thailand 2019 We are delighted that Secutech Thailand has once again built bridges for important business connections to be made" At the conclusion of the show, Ms. Regina Tsai, the Deputy General Manager of Messe Frankfurt New Era Business Media Ltd, said “We are delighted that Secutech Thailand has once again built bridges for important business connections to be made. The introduction of new show elements such as the Zhejiang Smart City area, as well as pavilions from Korea, Singapore and Taiwan has connected the market with innovative products that can solve important security, fire safety and smart living challenges”. She adds, “What’s more, our successful collaboration with the Digital Economy Promotion Agency to run Secutech Thailand and Digital Thailand Big Bang concurrently has helped to further build the profile of Thailand’s growing smart city scene.” High-level security solutions released More than 280 exhibiting brands participated at Secutech Thailand, with many commenting favorably about the connections that they made at the fair. “Every year that we attend Secutech Thailand we notice a different scale, and our company uses the platform to release a different high-level solution,” said Mr. Jeff Yang, the CTO of ZKTECO. Jeff added, “This year, we are showcasing our ‘one-face’ AI facial recognition technology. Many visitors have come to our booth and their feedback has been very good. Interest is coming from many different industries. We have met with system Integrators, government officials and interestingly yesterday we met with two visitors from banks.” Public and private sector collaboration Tasked by the government to lead Thailand’s digital transformation, the Digital Economy Promotion Agency has said that public and private sector collaboration will be crucial to achieve the government’s smart city goals. With government officials from both Thailand and the wider ASEAN region in attendance, Secutech Thailand’s exhibitors had the opportunity to showcase their innovative smart solutions to a relevant audience. More than 20 VIP tours connected exhibitors with various government agencies, including - the National Municipal League of Thailand, the Mass Rapid Transit Authority of Thailand, the Fire and Rescue Department, as well as representatives from the UTAPAO airport authority, Suvarnabhumi Airport and Don Mueang Airport. ISS security solutions on display ISS, an exhibitor of video analysis software saw opportunities to promote their smart city and transportation solutions at the fair ISS, an exhibitor of video analysis software saw opportunities to promote their smart city and transportation solutions at the fair. Mr. Nikolay Bushev, Vice President for international markets of the company said, “In the past we supplied our solutions to a smart region in Russia, where 15 different cities were linked to one monitoring center, and at Secutech Thailand we have the possibility to show the Thai government our achievements. We are aiming to meet with traffic police and city authorities. Apart from these buyers we have noticed a lot of visitors from Myanmar, Laos, Vietnam and Indonesia.” Mr. Jonathan Chan, the Regional Product Manager of Singaporean company New DVR(s) was also enthused by the prospects in the smart city sector. He said, “The government has been talking about establishing 100 smart cities in Thailand, and we can see many changes. The mindset of people in Thailand is very accepting and they increasingly know what the IoT is about." IoT solutions and open source IoT platform Jonathan adds, ”Secutech Thailand continues to be very supportive of the smart city scene. We can see that the organizers continuously attract relevant industry players that are looking for IoT solutions. We see bright prospects in Thailand for our open source IoT platform.” In addition to thousands of visitors from across Thailand, the fair also attracted buyer delegations from Cambodia, Myanmar, Malaysia, Indonesia and Laos. Helping these buyers to forge new relationships, 167 successful business matching sessions and 181 personalized buyer tours took place throughout the show. Security cameras and digital locks exhibited Mr. Hoeung Kongkeasambath, the Managing Director of Bridge Real Estate came to the show as part of a delegation from Cambodia and was impressed with the connections that he was able to make at the fair. He said, “From year to year Secutech Thailand is improving and growing in size. This year I have found some interesting partners whose factories I will visit over the next few months. I am interested in their security cameras and digital locks”. He adds, “One is from Thailand and the other is from China. By working with these types of suppliers, I can help to improve the level of technology available in Cambodia. The organization of the fair has been very smooth and I very much appreciate the business matching sessions where I have been able to have one-to-one conversations with potential partners to find scope for cooperation.” High-tech CCTV surveillance solutions exhibited We are looking for new technology and business partners and I feel that we have been able to find that here" The President of the Malaysian Chapter of the Asia Pacific Security Association (APSA), Mr. Dato’ Sri Haji Mustapa Bin Haji Ali, was also impressed with the relationships he was able to build at the fair. He said, “We are looking for new technology and business partners and I feel that we have been able to find that here. The other day, I found a CCTV surveillance solution that I can introduce to our members, and perhaps introduce to the government for possible applications in our country”. He adds, “The business matching service is good; it has helped me find the new business partners that I was looking for. For sure, we will be back here next year. This year we brought 24 members and next year, we want to bring more than 40 members to visit Secutech Thailand.” Fire & Safety Thailand Delegation members also applauded the fair as a great place to network with security associations from different countries: “We have found a lot of opportunities to generate business in the surveillance and access control segments at Secutech Thailand,” said Ms. Wah Wah Min, Secretary of the Private Security Services Association of Myanmar. “But we also come to the fair because it’s a good occasion to network with other associations from across ASEAN. This helps us to expand our network and learn from each other.” Concurrent Fire & Safety Thailand event facilitates transfer of disaster prevention and emergency equipment from Taiwan and Korea. Extinguishing systems, fire alarms on display On top of high-tech surveillance, video analytics, management software and access control systems, visitors to Secutech Thailand could also locate extinguishing systems, alarms, sensors and personal protection equipment at the concurrent ‘Fire & Safety Thailand’ event. A highlight of the event was the Korea Fire Institute Pavilion which hosted internationally certified brands. NARLabs, an organization founded by the Taiwan Ministry of Science and Technology was also in attendance at the event. Explaining the organization’s reasons for joining, Mr Kuang-Chong Wu, the Vice President of NARLabs said, “Thailand is one of the most important countries in Southeast Asia for us. Two of our centers – the National Center for Research on Earthquake Engineering and the National Center for High-Performance Computing – are participating at Secutech Thailand 2019 to exhibit our smart technology related to disaster prevention and mitigation. We hope that by showing our technologies, we can enable and initiate more cooperation between our two countries.” Floods, weather monitoring solutions The services that we provide such as flood mapping can help the government better deal with the issue" Another Taiwanese organization, the Taiwan Association of Disaster Prevention Industry (TADPI) brought a number of companies to share solutions for pollution monitoring, advanced weather forecasts, and flood defense to name a few. “When it comes to Thailand, I think we all remember the floods of 2011”, said Mr Daniel Yao, the Executive Director of the association. “Because of ground sediment issues in Bangkok we are likely to see flooding again. The services that we provide such as flood mapping can help the government better deal with the issue. Taiwan is recognized by the United Nations as an area most effected by natural disasters. So the people of Taiwan have accumulated experience of how to deal with natural disasters that we can share. That’s why we are here at Secutech Thailand, to use the fair as a bridge to connect with those people who are in need of our services.” Smart Factory Conference While new business relationships were being formed in the exhibition hall, important industry insights were being gained at the fair’s Smart Factory Conference. The conference updated industry professionals on topics such as security automation, smart disaster prevention and industry 4.0. Following his presentation at the conference, Mr. Somwang Boonrakcahroen, President of the Thai – German institute underlined the value that the conference delivered, “Today I talked about digital technology and how it can be used to achieve industry 4.0. At the moment, Thailand can be described on average as being at a level of industry 2.5. One of the first steps we need to take to reach industry 4.0 is to build awareness. This conference helps to achieve this goal by informing attendees about what technologies are involved in industry 4.0 and how they can be implemented.”
Aeroturn LLC, global turnstile manufacturer that offers 100% Made in The USA turnstiles, has announced that the company will be returning to the ISC East 2019 show once again to showcase its groundbreaking turnstile solutions to the East Coast in booth #550. The show will take place at the Jacob Javits Center on November 20th and 21st 2019 from 10 a.m. to 5 p.m. and 10 a.m. to 4 p.m. ISC East is the Northeast’s largest security trade show where over 7,000 security and public safety professionals convene in New York each year to meet experts from over 300 leading security brands. The combination of one-on-one conversations with the industry’s top innovators, special events, and cutting-edge education makes ISC East the security industry’s most comprehensive east coast event; making it a perfect venue for Aeroturn to continue making its mark on the security industry. Optical portal turnstiles Aeroturn recently joined forces with IPVideo Corp to deliver a one-of-a-kind security solution At the show, attendees will be able to view live demonstrations of Aeroturn’s Optical portal turnstiles with forced entry resistant glass along with a brand-new self-service security screening solution at booth #550. Aeroturn recently joined forces with IPVideo Corp, global manufacturer of audio/video recording, passive weapons detection systems and IOT sensor technology, to deliver a one-of-a-kind security solution that allows visitors/employees to be fully screened for weapons without a physical guard. Once a person enters IPVideo’s ViewScan metal detector and is cleared for entry, the Aeroturn X-Wing turnstile opens automatically and allows access. AeroScan remote integrated metal detector and turnstile “We are looking forward to not only bringing our individual turnstile solutions to the show floor; but introducing our new joint solution with IPVideo Corp. - the first remotely operated all-in-one integrated metal detector and turnstile solution called AeroScan,” states Michael Stoll, VP of Technical Sales & Marketing. He adds, “Aeroturn is proud to have joined forces with such an innovative company as IPVideo Corp. and looks forward to pushing the envelope even further with this new security screening solution.” In addition, Aeroturn will continue the tradition of giving away its complimentary Aeroturn hats in booth #550 at the ISC East 2019 show in New York till supplies last. Aeroturn turnstiles Aeroturn has built a solid reputation by gaining recognition as the industry standard when it comes to quality turnstilesOver the past 15 years, Aeroturn has built a solid reputation by gaining recognition as the industry standard when it comes to quality turnstiles. What makes Aeroturn turnstiles unique is the fact that it can accommodate forced entry resistant glass, which has become extremely important to schools. Moving forward, more and more schools and businesses will be implementing bullet resistant glass at entry points. At this year’s ISC East show, attendees will be able to see first-hand at booth #550 how Aeroturn’s optical portal mantrap turnstile can be used at critical checkpoints and implemented with a full height school guard glass set of moving panels. Self-service security screening A huge benefit of a single or dual portal mantrap turnstile is the engineered flexibility in creating customized solutions that are able to be integrated with metal screening technologies in high throughput locations. There are many options out there for turnstiles; however none offer a dual front door forced-entry resistant passage mantrap that can be fully integrated with metal detectors. The future of self-service security screening is here with one integrated security system working together to protect people and assets. Based out of Oxford, Connecticut, USA, Aeroturn LLC has been offering integrators and end users this century’s turnstiles that include a comprehensive range of turnstile products.
MOBOTIX, the manufacturer of premium-quality and secure IP video systems, will showcase its latest advancements in Internet of Things (IoT) video surveillance technology at ISC East from November 20-21, at the Javits Center in New York (Booth #760). Furthering its mission to go ‘Beyond Human Vision,’ MOBOTIX will be showcasing the new MOBOTIX 7 Platform and the award-winning M73 camera that uses it, along with the company’s flagship Mx6 IoT series and MOVE line. Artificial intelligence and deep learning MOBOTIX will preview its latest video surveillance solutions, including the 2019 IoT Integration Award winning M73 camera. The M73 IoT camera features high-octane processer technology, combining three separate image and environmental sensors with AI-based analytics for unparalleled performance. The Mx6 line provides intelligence at the edge with video analytics and programmable logic Additionally, MOBOTIX will highlight the new MOBOTIX 7 Platform. The MOBOTIX 7 open solution platform comes with pre-installed applications supported by artificial intelligence and deep learning, covering a wide range of vertical-deployment needs. MOBOTIX will display the flagship Mx6 IoT camera line, featuring cutting-edge 6MP moonlight sensor technology for brilliant images. The Mx6 line provides intelligence at the edge with video analytics and programmable logic and can be easily integrated into existing infrastructure, thanks to a decentralized architecture. Enabling seamless integration MOBOTIX will also showcase the MOBOTIX MOVE line, featuring enhanced infrared technology and pan-tilt-zoom functionality. Both product lines are embedded with MOBOTIX’s layered cybersecurity protocols and support ONVIF standards to enable seamless integration into third-party systems. “We are excited to introduce our latest innovations in intelligent video solutions at this year’s ISC East,” said Joseph Byron, Vice President: America’s MOBOTIX. “We look forward to sharing our new MOBOTIX 7 platform and M73 camera, highlighting the nearly endless customizable solutions this new system can offer our customers.” All MOBOTIX solutions are manufactured and hand-tested in Germany, featuring low failure rates and exceeding product warranty standards.
The highly acclaimed Dubai Health, Safety & Environment Forum returns to Dubai from 24-25 November, with a stellar line-up of confirmed speakers from Ministry of Health & Prevention, UAE, Dubai Municipality, ADNOC, DEWA, Emirates Global Aluminum as well as senior executives from leading international and regional companies. On the agenda for this year’s forum are topical health, safety and environment issues. With a raft of infrastructure and construction developments underway in the UAE in the run up to Expo 2020, safety and sustainability issues will be highlighted by speakers and delegates. Taking place from 24-25 November 2019 at Habtoor Grand Resort, Autograph Collection Dubai, the Dubai Health, Safety & Environment Forum brings together industry experts from across the region; including health and safety professionals, government regulators, policy makers and solution vendors. Monitoring hazardous environments with IoT The forum presents an opportunity for attendees to gain deep insights on policy, strategies and technical expertise Advisory panellists include Raed Marzooqi, head of HSE, Dubai Municipality; Dr Rehab Al Ameri, director of National Accreditation System Emirates Authority for Standardization and Metrology; Salman Dawood Abdulla, executive vice-president of HSSEQ, Emirates Global Aluminum; Professor Janvier Gasana, chair of department of Occupational Health, Kuwait University; Nasser Al-Buhairi, head of Emergency Unit, Kuwait Oil Company; Dr. Ola Ahmed Mira, Accredited Physician, International Coach Federation. Topics that will be discussed at The Dubai HSE Forum 2019 include wellness and prevention management, challenges to occupational health and safety, changing the construction industry safety mindset in the industry 4.0 era, human factors vs. process safety, the impact of digital transformation on workplace health and safety, mitigating work-related risks using artificial intelligence (AI) and monitoring hazardous environments with IoT (Internet of Things). These topics are crucial for major sectors such as oil and gas, construction, utilities, logistics and transportation, manufacturing, and food and beverage. Strategies and technical expertise The forum presents an opportunity for the attendees to gain deep insights on policy, strategies and technical expertise. Held in association with Vin Technology, Lloyds Register, Clyde &Co, Ideagen, Board of Certified Safety Professionals, JLG, Universal Site Monitoring, and Arasca, the Dubai HSE Forum builds on the success of the highly acclaimed inaugural event that was first held in September 2015. “The forum gives a chance to step out of the daily routine and to think and reflect about the subjects that have been spoken about – to relate experiences to what is going on. It gives the visitors a platform to connect and network,” said Andrew Barker, general manager – Group Health and Safety, Rezayat Group. AI and IoT Soumen Chakraborthy, event producer, Dubai HSE Forum 2019 commented: “While the UAE’s vision and ambition is showcased in events such as Expo2020, there is a need to significantly strengthen the workforce by providing appropriate training in issues related to occupational health, safety and environment. The Dubai Health, Safety and Environment Forum is the perfect platform for safety professionals to explore how new technology such as AI and IoT is transforming their profession. We look forward to delivering an informative, enriching and vibrant fifth edition of the Dubai HSE Forum."
On October 27th, Dahua Technology, a pioneer in video-centric smart IoT solution and service provider, hosted its annual summit "Dahua Heart of City – Leading The Intelligent Twins Evolution" in Shenzhen, China. More than 400 industry representatives, industry experts, and mass media have witnessed the achievements of Dahua Heart of City (HOC) on empowering various industries and leading the smart applications in the era of "Intelligent Twins", as well as the release of cutting-edge technologies based on 5G, AIoT, and big data. Dahua HOC Leads The Intelligent Twins Evolution Dahua President, Mr. Ke Li, delivered a speech on behalf of the company and expressed warm welcome and gratitude to the guests. By reviewing the strategy and achievements of Dahua HOC in the past year, Mr. Li shared the situation in which AIoT built digital twins and promoted the new growth of smart economy. According to him, the continuous evolution of technology has caused users' needs to be constantly updated, forging user value to lead "The Digital Twins" to "The Intelligent Twins". Supported by security and network systems, Dahua Technology has released five products of the third generation of "Ruizhi" series Based on its years of expertise in the industry and understanding of customers' business, Dahua Technology has been continuously enhancing its core capabilities in AIoT and big data with focus on intelligent twins, in order to create closed-loop management from the sensing level to the business level, and to build a new smart city architecture with closed-loop value chain. At the same time, Dahua Technology will continuously work together with its partners to strengthen the new driving force of closed-loop customer value. Sensing, intelligence and computing Mr. Jun Yin, Vice President of Dahua R&D Center, delivered a keynote speech regarding "AIoT, Building The Cornerstone of The Intelligent Twins" and explained the significance of Dahua Technology's AIoT strategy: video as the core, to build leading sensing and intelligent capabilities; and reliance on whole network computing, to fully and truthfully build the data value of intelligent twins. Based on the company's "4 Full" strategy, Dahua Technology has comprehensively upgraded its three core capabilities of "sensing, intelligence, and computing". Supported by both security and network systems, Dahua Technology has released five major products of the third generation of Dahua "Ruizhi" Series. Mr. Yin also added that Dahua Technology will continue to accelerate the commercialization of new technologies, build a four-dimensional digital world to support the application of AIoT, and join hands with partners to strengthen the openness of AIoT capability in order to create new value for users. Video-centric cloud architecture In order to achieve customer value for better service and to enhance the flexibility and adaptability of video-centric cloud and software architecture, Dahua Technology released a new DAHUA GAIA big data platform that drives the city from digital to intelligent. The vigorous development of smart cities relies on the participation of all partners in the value chain With the topic "DAHUA GAIA Creates Intelligent Twins Value", Mr. Wenkai Zhou, General Manager of Dahua Software Product Department, shared: "DAHUA GAIA includes 'four ones' – one storage computing network, one intelligent video & image engine, one intelligent data engine and one business-enabled platform – which is a set of architecture that supports online data, value computing and business application". Healthy and orderly development Mr. Zhou added that DAHUA GAIA is the powerful foundation of Dahua HOC. It strengthens Dahua HOC's top-level design and scenario application capabilities, and boosts the construction of new smart cities, entering the "Intelligent Twins" together with customers. He also elaborated the DAHUA GAIA series software products and outstanding industry cases, which attracted lots of interest from guests and media. The vigorous development of smart cities relies on the participation of all partners in the value chain. Dahua Technology has always adhered to the concept of open cooperation and win-win. Together with its partners, the company has been injecting vitality into Dahua HOC, exploring a more refined city governance method and applying it to every aspect of city development, creating a more attractive and distinctive city that leads to a healthy and orderly development of new smart cities in the country.
ISC Security Events and the Security Industry Association (SIA) are pleased to announce that security and public safety leaders Deanne Criswell and Angela Stubblefield will headline the 2019 SIA Education@ISC East Keynote Series. These keynote sessions are open to all attendees at ISC East – the Northeast’s largest security trade show – taking place Nov. 20-21 at the Jacob K. Javits Convention Center in New York City. Criswell will share her insights on emergency preparedness, crisis management and disaster response In the Day 1 keynote Leveraging Technology to Improve Decision Making: A New Direction in Emergency Management and Disaster Preparedness, Criswell – commissioner of the New York City Emergency Management Department – will highlight how the department is leveraging technology to make informed, data-driven decisions and discuss the department’s strategic vision and the importance of public-private partnerships. Criswell will share her firsthand experiences and insights on emergency preparedness, crisis management and disaster response, including lessons learned and best practices to take back to your business and organization. FAA Perspectives on Addressing Risks In the Day 2 keynote UAS Security: FAA Perspectives on Addressing Risks Posed by Errant or Malicious UAS, Stubblefield – who has served as the deputy associate administrator for security and hazardous materials safety at the Federal Aviation Administration (FAA) since 2013 and will assume the role of FAA chief of staff on Nov. 4 – will discuss the FAA’s holistic approach to aerial drone security, working across the full spectrum of risk mitigation from prevention to deterrence, detection and response. Stubblefield will highlight how the FAA is working with security partners to consider how to set requirements for the aircraft, airspace and airman in order to help reduce security risks, how intent can be difficult to determine and how different tools help to differentiate the clueless and careless from the criminal, which require different response capabilities. sessions on access control, drones “ISC East is thrilled to welcome Deanne Criswell and Angela Stubblefield as our 2019 keynote speakers; their demonstrated expertise and success in emergency preparedness, planning, operations and response, threat analysis and response, national security and critical infrastructure policy and more will provide valuable insights to our attendees,” said Will Wise, group vice president, security portfolio at Reed Exhibitions. “These keynote sessions will share essential knowledge to help security and public safety professionals stay up to date on the emerging risks and response strategies in our evolving connected world.” In addition to the Keynote Series, ISC East attendees will have access to over 25 free education sessions and four paid workshop offerings through the 2019 SIA Education@ISC East program. SIA Education@ISC East will offer all-new content on the most current business trends, technologies and developments in the security and public safety industry. Workshop on OSDP, cyber security terminology and strategy Free sessions covering topics like video analytics in access control, drone security policy and securing public venues They will offer free sessions covering topics like video analytics in access control, drone security policy, securing public venues, cyber-physical-operational convergence and preventing hostile vehicle attacks – and paid workshops on the SIA Open Supervised Device Protocol (OSDP), cybersecurity terminology and strategy, active shooter response and video surveillance installation and configuration. “Each year at ISC East, in addition to learning about a wide array of cutting-edge technologies on the show floor, conference attendees have the opportunity to unlock top-quality education and hear from the industry’s leading luminaries through the ISC East Keynote Series,” said Dr. Elli Voorhees, director of education and training at SIA. ISC East She adds, “These keynote presentations from Deanne Criswell, an esteemed emergency management expert, and Angela Stubblefield, a respected leader in national security, safety and crisis response, combined with dozens of other engaging SIA Education@ISC sessions will deliver a high-impact content program for ISC East 2019.” At ISC East, over 7,500 security and public safety professionals will convene in New York to meet experts from over 300 major security brands. With opportunities to engage with the industry’s top innovators, special events and cutting-edge education encompassing everything from video surveillance and access control to smart home technologies, the Internet of Things and drones and robotics, ISC East 2019 will provide a comprehensive security industry event experience and help attendees find the products and solutions that will benefit their organizations and clients.
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimization easier. In most cases, digital transformation will fundamentally change how an organization operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-Driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more. As the data from each of these sensors is collected and analyzed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organizations are using for enhancement and improvements is comprehensively protected from unauthorized access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organizations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-Connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organizations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognize the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognize the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT Increases Threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organization recognize and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organizations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organizations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognizing and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
Airport environments have become more sophisticated and complex over the course of the last 20 years. What was once a simple structure to facilitate travel from point A to point B has now been transformed into a hustling and bustling setting that offers passengers the comforts and conveniences of a small city. As a result, the complexity of risks that airport operators face has grown exponentially. Security personnel must now mitigate risks like terrorism, theft, personal safety and insider threats all while streamlining operations to help preserve a positive passenger experience. Beyond the visual of long and winding security checkpoint lines, most travelers are unaware of the vast amounts of work that take place behind the scenes to ensure their safety. Increasing passenger numbers On top of the typical, day-to-day concerns security operators face, airports are only becoming busier. According to the United States Department of Transportation’s Bureau of Transportation Statistics, 2018 was a record-breaking year for air passenger travel. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017. As these numbers continue to increase, the demand on airport security personnel to keep people and property safe also increases. This is why the latest advancements in security technology are critical as part of a comprehensive and cohesive airport security strategy. Let’s take a look at some of these advancements and how they are helping airport security operators mitigate risk. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017 Video-based command and control Airports are operational 24 hours a day, 7 days a week, which means it is paramount (and typically mandated) to have video as the heart of modern-day security operation centers (SOC). In today’s data-focused environment, security personnel rely on a multitude of solutions and systems, which often include video surveillance, access control, alarm notifications, and more, to ensure comprehensive protection of passengers. What’s needed is a single, unified platform with integrated event management and response The rising influx of information from these systems can often be overwhelming, and in most cases, manual processes are used to manage across these domains in an attempt to achieve a coordinated response. These manual processes are not scalable. What’s needed and is now being introduced to the market is a single, unified platform with integrated event management and response to allow security operators to maximize situational control and determine the appropriate intelligence-powered response. Real-time situation management The combination of real-time video, with information from a variety of additional sensors, devices and applications is changing the game for airport security personnel. Now, in the event of an incident, security officials can use this data to gain enhanced situational awareness of what’s happening and deliver actionable insights to efficiently and effectively respond to the incident. Through numerous information sources and security systems, airports can benefit from a modernized and enriched investigative experience for a broad and deep understanding of routine or emergency situations. Advanced analytics Analytics are a powerful resource that gives security teams the ability to discover significant patterns and obtain insightful knowledge from video surveillance data. Advanced algorithms can be the key in providing early warnings to assist in detecting threats, helping to establish a proactive security strategy. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations. Additionally, analytics can automate predefined standard operating procedures to help minimize human error and optimize resource utilization. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations Mobile reporting The Internet of Things (IoT) and ubiquitous connectivity have brought remote capabilities to airports, where instantaneous information sharing is paramount. Mobile reporting solutions allow passengers and employees to act as additional “eyes and ears”, bringing critical safety alerts to the attention of security officials. Information shared by passengers and employees can be extremely beneficial to help shed light on a security incident and enable faster and more efficient response. Some solutions even offer the ability to share video and audio with the command center through a passenger’s smartphone. Facial recognition technology Facial recognition can provide situational intelligence through detecting, tracking, and alerting on persons-of-interest A powerful and versatile security solution, facial recognition can provide situational intelligence to security operations centres through detecting, tracking, and alerting on persons-of-interest appearing in video streams across multiple sites and thousands of cameras simultaneously. These systems are capable of forensic-search recognition capabilities and can be compared against national, local or custom databases to make investigations faster and more efficient. Interest and adoption of the technology is growing, with new use cases being introduced daily. The solution is sure to become a valuable tool in the years to come. In short, airports are very much like small connected cities, featuring a landscape with a variety of assets, a wide range of stakeholders, and numerous sites that keep safety at the forefront of the public eye. However, while global risks and day-to-day challenges can be difficult for security operators to manage, today’s advanced and intelligent technologies can ultimately help improve the overall traveler experience.
As security embraces IT-centric solutions, it can provide business value over and above security. Now in charge of managing a variety of data – e.g., from video platforms – a company’s security function has access to a range of new metrics. While security may use video to analyze a security event, machine learning can analyze the same data for other business capabilities, such as quality control or when a policy has been breached. “It’s the same camera, but with dual purpose,” says Matt Kushner, President of STANLEY Security. STANLEY Security, one of the largest integrators with a global footprint, has positioned itself at the center of the industry’s transformation by information technology (IT) and the Internet of Things. “Security will become an expanded business partner with corporations,” Kushner comments. In response to the trend, STANLEY is hiring more IT-oriented technicians and salespeople within the IT community and who can “speak at the C-level,” Kushner comments. Sonitrol is the most recognised brand by law enforcement for verified response Data centers, higher education and logistics STANLEY manages very large, multi-national clients. As a consequence, the STANLEY security organization has some of the best and brightest minds for enterprise-class security. To maintain that level of talent, STANLEY is committed to education. “We bring them into the family and focus on education, such as IT and IoT training. That’s critical in a world where unemployment is less than 3%. Finding good people, growing good people, and retaining good people – we do that exceptionally well at STANLEY,” says Kushner. STANLEY’s strong vertical markets including data centers, higher education, and logistics. They are also strong in multi-location installations (such as banking.) STANLEY has a big footprint throughout North America and Europe. PACOM access control and 3xLOGIC cloud-based solutions In addition to STANLEY’s core integrator business, the company also manages several manufacturing brands such as PACOM access control and 3xLOGIC cloud-based solutions. Mergers and acquisitions have been commonplace in the integrator spaceBeyond its company-owned integrator locations under the STANLEY brand, the company also owns Sonitrol, the strongest brand in the market for verified response with 65 franchises in North America. Sonitrol is the most recognized brand by law enforcement for verified response. Mergers and acquisitions have been commonplace in the integrator space, and Kushner says that STANLEY is “open and actively looking for properties that fit our commercial growth strategy.” He notes that STANLEY focuses on the commercial side of the market, where there are good margins and continuing growth. They pay less attention to the residential side which is “being heavily disrupted.” Strong partnerships with manufacturers STANLEY has strong partnerships with several manufacturer partners, through which they bring new breakout technologies to market from emerging companies. An example is Evolv Technology, a manufacturer of gun and bomb detection technology. “We see them as a leading provider of the technology, and they are, in my mind, a very disruptive provider,” says Kushner. STANLEY is also collaborating with a company – to be announced – that provides a unique gunshot detection technology, he says. STANLEY is also cooperating with dormakaba to implement Switch Tech, a Bluetooth wireless core that can replace any standard mechanical lock core. Existing locks can be transformed into electromechanical locks in minutes. STANLEY is also developing a tight integration with Lenel’s mobile credentialing system. STANLEY is also cooperating with dormakaba to implement Switch Tech GSX 2019 and ISC West 2020 At the recent GSX 2019 show in Chicago, Kushner says STANLEY heard a lot about cybersecurity, especially customers wanting to make sure they are investing in cyber-hygiene and who are looking to expand into providing cyber protection. “In concert with cyber-hygiene, they are looking for health monitoring or assurance that network devices are operating properly,” he says. “They want to ensure their security platforms are cyber-secure and up to date with the latest software versions.” STANLEY is also a big proponent of cloud offerings, and Kushner hints at a big announcement at the upcoming ISC West show in Las Vegas of additional cloud offerings and/or partnerships. “There will be a variety of new solutions to be introduced, including hosted solutions and applications that benefit both security and that add new value to businesses overall.”
Securing New Ground, the security industry’s annual executive conference this week in New York, offered food for thought about current and future trends in the security marketplace. Highlights from SNG 2019 included keynote remarks from security leaders at SAP, Johnson Controls and the Consumer Technology Association, discussions on how CSOs mitigate security risks, topic-focused thought leadership roundtables and a lively networking reception. Top trends observed at the event include cybersecurity, data privacy, facial recognition and artificial intelligence. A "View from the Top" session covered the need for companies to consider responsible use and ethics around technology; responsibility should extend throughout the organization. A panel of security leaders emphasized the need to understand the diversity of risks that end users face. As the Internet of Things (IoT) expands connectivity, the inputs, outputs and "attack surface" also expand. It's critical to have security "baked" into products themselves, and also to undertand the mission of the organization being protected, the context and correlation. Technologies transforming security market Keynote speaker Gary Shapiro, President and CEO of the Consumer Technology Association, listed the many technologies that will impact the consumer electronics market – and the security market – in the near future: artificial intelligence (AI), voice recognition, the transition to 5G and self-driving cars.As the Internet of Things expands connectivity, the inputs, outputs and "attack surface" also expand “What we're seeing today is a huge turning point in where the world is going,” said Shapiro, whose organization presents the giant CES trade show each year in Las Vegas. “It’s not just about jobs and technology, but who we are and how we address fundamental human rights.” Privacy is a component of human rights, but “in the world of AI, there is a tradeoff between innovation and privacy”. Balance between security standards Shapiro sees Europe as representing one extreme of privacy, epitomized by General Data Protection Regulation (GDPR), which he sees as stifling innovation. Meanwhile, China is pushing innovation using massive amounts of data with no regard to privacy. The United States, therefore, should look for a balance that acknowledges the inevitability of innovation while respecting privacy and realizing it is “always situational.”With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place" Too much concern for privacy comes at a cost, Shapiro said. “Privacy zealots are killing facial recognition, step by step by step,” he said. “Regulators should not throw away the baby with the bathwater. Every technology in history has been used to cause evil and to do good. Throughout history any new technology could have been banned and made illegal.” Shapiro offered encouraging words to the security marketplace, even in the wake of large tech firms such as Amazon entering the market. “With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place,” he said. “There is opportunity. There will be increasing new things people want, and always new threats. People will want what you're providing, which is physical and technology security in their facility.” Scott Schafer, Chairman of the Board of the Security Industry Association (R), interviewed Steve Jones, CEO, Allied Universal, on stage about the importance of merging technology with security officers Allied Universal CEO Steve Jones discussed holistic approach Steve Jones, CEO, Allied Universal, was interviewed on stage about the importance of merging technology with security officers for a holistic approach to securing a facility. “Today, customers are asking us to look at their facility holistically and asking: What is my best approach?” said Jones. A holistic approach includes protecting people, the facility, intellectual property (IP), and how to handle visitors. Manguarding perspective on security Allied Universal looks at security from a manguarding perspective and also from a technology perspective, based on their daily experience managing security for 40,000 customer sites across the United States and Canada.Allied Universal has a new handheld technology platform that uses AI “We are in a unique position in the channel,” said Jones. “We know the stats at any customer site. We know the last time there were repairs on cameras, which card reader is malfunctioning, how long the systems company takes to respond to a call. We are at these locations 24/7 and have an intimate relationship with customer. We are a significant influencer in the decision-making process. We have an opportunity to have a voice, and to build a business around it.” Predictive security “We are looking for technology that will enhance the security of the customer,” said Jones, including situational awareness and analysis of data to predict patterns. Allied Universal has a new handheld technology platform that uses artificial intelligence (AI) to analyze data, predict outcomes, and prescribe optimum responses. Workforce development – hiring and training new employees – is a big issue for Allied Universal, which last year interviewed more than a million applicants to find around 100,000 employees. They are targeting every demographic, and last year hired 33,000 veterans. The company is using technology to help with the massive recruiting effort, including AI to analyze applicant qualifications and a computer-generated avatar to conduct the first online interview. Future security challenges Jones sees the rapid increase in the homeless population in the United States as one of the biggest security challenges of coming years. The rapid increase in the US homeless population is one of the biggest security challengesMany businesses face the prospect of homeless individuals living in front of their buildings, possibly using drugs or approaching customers. “It has become a real threat,” he said. “When they are living in front of your buildings, in many cases, there are ordinances that allow them to be there so the police will not get involved. It falls on the facility owner and private security to address the problem. Given the large homeless population we have now during good economic times, I don’t know what it will look like in an economic downturn.” Human side of security An SNG session on the human side of security observed that people are the biggest source of vulnerability. Companies should foster a "safety climate" in which security is integral to operations and viewed as something that helps employees rather than create hassles. Human resources is now a technology field and should work together with security to achieve shared goals. At the consumer and small business level, cybersecurity must also be top-of-mind and built into a security companies' DNA. SNG attendees heard about opportunities to move beyond providing products and devices to providing experiences, by partnering with customers to protect what matters most to them. While a bit of inconvenience comes along with security, products should be built in a way that is easy to use, with security baked in. The results are systems people are comfortable engaging with every day. Securing New Ground is presented by the Security Industry Association (SIA).
The boundaries between the smart home market and security market at large are narrowing. Amidst a wave of expansion, suddenly everything is becoming digital. Home automation has been around for close to 30 years but hasn’t really hit it big because integration hasn’t been that simple. Now that the Internet of Things has stepped into the market, home automation is really taking off. As technology in the smart home market advances, the gap between the residential and professional security markets is growing smaller. Additional revenue for security industry There will continue to be more opportunity for interoperability, and home automation will continue to grow and eventually become a norm. Growth in the residential security market and its position as the channel for smart home solutions, have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras and other products suffice for their security. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. Data capture form to appear here! Residential security solutions Growth is going to be slow and steady. Everyone needs to be realistic about that" The trend has no doubt accelerated in the last couple of years. New collaborations are being made between audio-video (AV) suppliers and security solution providers. The clientele of high-end AV products is becoming increasingly concerned with home security and property protection. So, in recent months, the requirement for residential security solutions has been increasing as technical solutions can go hand in hand with AV installers’ capabilities and client base. “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” says Michael Philpott, Senior Practice Leader, Consumer Services at Ovum. "This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” Pressure to upgrade security standards Surprisingly for what has historically been something of a grudge purchase, in the context of home automation, security is seen as a solution some consumers are looking for. Another security aspect of home automation is cybersecurity, in particular how it applies to various IoT devices in the home. Now as connected devices gather personal information from realms long considered private and protected – the bedroom, the kitchen counter, the nursery – the risks are higher than ever. All of the data that various devices and sites have collected can be combined, shifted and then exploited by marketers or even stolen by hackers. Both manufacturers of smart home products and the companies that install them are feeling pressure to upgrade security standards. They are moving to set policies that will regulate who has access to data and how it is used. Ease of installation Advances in the home market are increasing customers’ expectations as well as adoption of newer technologies A recent revelation that some “smart TVs” might be listening to conversations and transmitting them to "third parties" caused an uproar. These sets have voice activated features that enable users to change channel, turn on a DVD or browse the internet by speaking to the screen or remote. The fine print in privacy policies contains warnings that general conversations are also being heard, and one company even told owners to turn off this function if they were concerned. Another impact of smart homes on the security marketplace is to raise expectations about the capabilities of commercial systems. Products made today for residential applications are very high quality, easy to install (do-it-yourself, or DIY), and have very rich feature sets. End users expect their commercial solutions to have a similar ease of use and ease of installation. Geofencing in commercial applications The quality of video that people are seeing at home is motivating some legacy commercial customers to finally move to IP video from lower resolution analog cameras. A higher percentage of commercial customers use cellphone applications to view integrated video and access control data. People’s experience with smart thermostats has them asking for geofencing in some commercial applications. In short, advances in the home market are increasing customers’ expectations as well as adoption of newer technologies. Read part two of our smart home mini series here.
Device and application security solutions provider, Trustonic has announced that OPTOLANE has selected Trustonic Secured Platform (TSP) to bring security and trust to the company’s new connected medical diagnostic device. The product is primarily used at the point-of-care for early diagnosis and preventative healthcare, particularly for diagnosing cancer, infectious diseases and congenital abnormalities. Healthcare devices have become top targets for cybercriminals due to their critical nature, the valuable intellectual property they employ and the sensitive personal information that they collect and store. Research shows that there were 8.2 attempted cyber-attacks per connected healthcare endpoint in each month of 2018. Smart diagnostic platform OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform To ensure security, privacy and high performance, OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform, which integrates Trustonic’s Trusted Execution Environment (TEE). OPTOLANE’s in vitro diagnostic (IVD) platform, called LOAA (Lab on an Array) Analyzer, examines blood and tissue samples for multiple targets, including DNA, RNA, proteins and metabolites, in real-time. It was developed to satisfy market demand for ‘sample to answer’ IVD tools and enables sample extraction through to analysis with a single cartridge. “Investment in connected healthtech is increasing and IVD is an important segment in the global diagnostics industry,” comments Ben Cade, CEO of Trustonic. “These solutions add significant value to diagnosis and treatment, enhancing the well-being of the general public while increasing productivity and reducing costs. But, where personal data this sensitive is being captured, processed, and transmitted, the appropriate steps must be taken to protect it from malicious actors.” Trustonic security platform Trustonic’s hardware-backed security platform, TSP, enables secure and private data extraction, processing, storage and transmission. The technology: Enables a secure image processing channel from the sensor to the application processor; Provides cryptographic tools to protect individuals’ sensitive medical data; Ensures data integrity; Creates a secure environment to run algorithms analyzing raw data from the sensor; Encrypts sensitive data when being shared with the cloud. Do Young Lee, CEO of OPTOLANE, says “There is clear demand for innovative new diagnostics solutions that go from ‘sample-to-answer’ in real-time. Importantly, though, we fully understand our responsibility to protect patient data." Enhanced data security To deliver connectivity while protecting the sensitive personal data collected by diagnostic devices, we needed a proven hardware-backed security foundation. Trustonic’s experience protecting smartphones, wearables and IoT hardware, and securing critical mobile applications in the financial and automotive sectors, is assurance that our devices and patient data are secured to the highest standard.” OPTOLANE expects to receive FDA certification for the new device in the first quarter of 2020. Once certification is achieved the product will be available to clinicians in healthcare facilities around the world.
Located in Eastern China, Hangzhou is the capital and most populous city of Zhejiang Province. It has registered population of 9,800,000, with total area of 16,596 km². Jianggan District is one of the five main urban areas of Hangzhou. With a floating population of about 1.06 million, Jianggan District ranks first among Hangzhou's main urban areas. As the new administrative center of Hangzhou, it boasts the most important CBD and the largest train station and car hub in Hangzhou, bringing together various traffic elements such as highway junctions and bridges across the river. The entire Jianggan District is promoting vital transformation in urban areas Intelligent surveillance system Covering 8 streets, 141 communities and 4 villages, the entire Jianggan District is promoting vital transformation in urban areas. Nevertheless, the non-registered population, accounted for about 40% of the total population, makes it hard for the local government to improve urban management in the district. Every policeman needs to manage 1,700 citizens on average. The shortage of police force affected their work precision and led to difficulties in providing timely police response. In addition, insufficient surveillance coverage and limited intelligence system in the area resulted in inactive security measures, making it difficult for the police to achieve their goals Integrating DoT, IoT and the internet Based on the Dahua Heart of City (HOC) architecture supported by "Full Sensing, Full Intelligence, Full Computing and Full Ecosystem (4 Full) capabilities, Dahua Technology firmly focused on the construction needs of the area and built the overall plan of establishing an ‘online police’. Integrating the Internet, DoT and IoT, Dahua Technology has successfully assisted the Hangzhou Jianggan Public Security in building a multi-dimensional network that targets customer value, and combines AI, big data, and cloud computing in order to obtain accurate real-time data and strengthen the current technology of “online police” operations. Sensors and monitoring products Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network Moreover, Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network. It also set up 46 actual police investigation models to provide accurate instructions for Jianggan police, including property crimes analysis, situation analysis, vehicle management, people management, psychiatric control, online apprehension of violators, as well as missing person search, etc. Compared with traditional police operation, Dahua HOC Safe City Solution has built an “Online Police” mechanism to obtain the most authentic real-time data through information technology, and carry out accurate computer applications for a more scientific service deployment, efficient police force and powerful security control. Dahua HOC Safe City Solution It ensures that the Jianggan police can perform properly at a given time. It also promotes the transformation of police affairs from passive to active, from extensive to subtle, from imprecise to accurate, and from offline to online, gradually carrying out the prediction, early-warning, and prevention measures of police operations. Since 2016, the Dahua HOC Safe City Solution has helped Jianggan Public Security achieve outstanding results including enhanced police intelligence, reduced crime cases, increase in case closure rate and efficiency, improvement in public service, and speedy recovery of missing individuals, opening a new chapter for intelligent police operations.
Located at the very heart of Amman, Jordan, Landmark Amman Hotel is one of the most renowned 5 star hotels in the city, as well as a true local landmark in more than one ways. Boasting seventeen flexible event spaces for everything from small intimate meetings to large-scale exhibitions and 258 rooms that are among the largest hotel accommodation in Jordan, Landmark Amman Hotel is an ideal choice for high-end customers of many types. Dahua Technology, a video-centric smart IoT solution and service provider, is trusted, for the first time in Amman, with the job of keeping Landmark Amman Hotel safe in its phase 2 CCTV improvement. Need of a competent surveillance system The other challenge concerned old system’s storage, which couldn’t meet the requirement of local policeIt is difficult for a large-scale hotel like Landmark Amman to patrol the grounds and premises of the hotel relying only on security personnel. Moreover, there might be no standardized evidence for the police to check without a competent surveillance system when an accident happens. There are two aspects of the old system to be improved. The analog system the hotel was using was not easy to manage, the problem which was exacerbated by the condition that a great number of cameras were broken. The other challenge concerned old system’s storage, which couldn’t meet the requirement of local police. IP camera and NVR solution Dahua Technology’s CCTV solution comprising IP camera and NVR solves the problems just right. IPC-HDW1431S, the 4MP WDR IR Eyeball Network Camera, supports Smart Coding (H.265+ & H.264+), Intelligent Video Analysis(IVS), Wide Dynamic Range(WDR), Smart IR Technology, etc., which is fully capable of smartly capturing the 4MP resolution images in hotels. NVR4216-4KS2, the 32 Channel 1U 4K&H.265 Lite NVR can be served as edge storage, central storage And NVR4216-4KS2, the 32 Channel 1U 4K&H.265 Lite Network Video Recorder, which supports 4K and H.265 encoding technology, can be served as edge storage, central storage or backup storage with an intuitive shortcut operation menu for remote management and control. Compatible with ONVIF 2.4 protocol Easy to install, it is compatible with numerous third-party devices making it the perfect solution for surveillance systems that work independently of video management system (VMS). It features an open architecture that supports for multi-user access and is compatible with ONVIF 2.4 protocol, enabling interoperability with IP cameras. Dahua surveillance system has helped Landmark Amman Hotel find a new way to enhance the guest experience through improving the level of security with reduced property damage and thefts in hotel. It also improved team cohesion and work efficiency of the hotel employees. Furthermore, the hotel could increase revenue by monitoring and invoicing according to actual numbers of guests, and be compliance with local authorities’ security and safety regulations.
Todd Burgess has an easy answer when asked why he’s used a March Networks video solution in his Quik-E Food convenience stores for more than 15 years. “It’s simple. The system is constantly saving us money.” Networking and IT In his role as Vice President of Quik-E Food Stores, Burgess oversees all the networking and IT requirements for the Lynchburg, Virginia business, which includes 13 convenience stores and gas stations, six car washes, a laundromat and a craft beer pub called The Filling Station known for its unique combination of ‘growlers, grub and gas’. Finding those incidents and stopping them quickly can directly impact Quik-E’s profitability While many things about the family-owned business have changed since its founding in 1973, the need to keep a close eye on each location’s inventory hasn’t. Like every retail organization, Quik-E can cite numerous examples of theft, fraud and inventory errors that have cost the business thousands of dollars in lost revenue. Finding those incidents and stopping them quickly can directly impact Quik-E’s profitability, and that’s where its March Networks intelligent video solution really proves its worth. Video system helps curb thefts “I can’t tell you how many thefts I’ve caught with the help of our video system,” said Burgess. “I had a former employee just finish paying me back $13,000 they owed us in stolen goods, and we recently caught another employee who was stealing probably $50 worth of cigarettes each day.” “And just this morning I was reviewing video of a weekly delivery with one of our managers,” continued Burgess. “We were able to confirm that we’d been charged for $77 worth of gloves that we didn’t actually receive. The video showed the delivery guy come into the store and put everything down. Two boxes of gloves is easy to spot, so it was obvious that that portion of the delivery was missing.” Quik-E Food Stores has upgraded its video solution over the years and Burgess uses the Searchlight software regularly to check for any unusual or suspect transactions and review the data when an incident occurs New software capabilities Over the years, Quik-E Food Stores has upgraded its video solution to take advantage of better performance and new software capabilities. The March Networks video recorders first installed more than a decade ago have been slowly replaced by new generation 8000 Series Hybrid NVRs, able to support both analog and IP cameras or a full complement of IP-only video. Hosted networking solution Burgess has also overseen the transition from older Visual Intelligence software to March Networks Command Enterprise software working with Integrated Technology Group (ITG), the retailer’s long-time systems integrator and March Networks certified partner. That’s in addition to moving the organization from office servers to a hosted networking solution and switching from an existing point-of-sale (POS) system to a new Gilbarco Passport POS solution. “We’ve been proactive about upgrading our IT infrastructure over the last few years, and our video system has always come back online, except in one instance where we couldn’t get the cameras connected again in a couple of locations,” said Burgess. “March Networks Tech Support was wonderful. They managed to diagnose the issue, which wasn’t related to the video products in the end. They were just a big help.” March Networks Searchlight™ Burgess says that he’s a satisfied customer and he won’t be looking for another video solution anytime soon Quik-E is also using March Networks Searchlight™ for retail, a software application that integrates surveillance video with the retailer’s POS transaction data to provide powerful search and investigation tools. Burgess uses the Searchlight software regularly to check for any unusual or suspect transactions and review the data when an incident occurs. “I use Searchlight primarily to look for voids and cancellations, or high dollar value transactions,” said Burgess. “We actually just used it to help catch a manager who probably stole thousands of dollars from us. I knew I was short in inventory, so I pulled up the video and transaction data to see if things were being rung up. It was clear they were not and we had the evidence to prove it. Now we’ll use that evidence to hopefully recoup our losses.” Satisfied customer Ultimately, Burgess says that he’s a satisfied customer and he won’t be looking for another video solution anytime soon. “I think it’s one of the best video surveillance systems on the market. March Networks has been good to me over the years and I’m a very happy customer.”
Vanderbilt’s SPC Wireless is an ideal fit for the retail sector. First off, SPC Wireless devices’ aesthetically appealing design is perfect to fit in with retail environments and compliment the surrounding environments of a modern-day retail store. But, as well as featuring a sleek design, the Wireless devices also have many standout features that specifically benefit the retail sector. Automatic power saving One of these benefits is long battery life as the devices are supported by an automatic power saving mode for a battery life on average of five years. In fact, the SPC Wireless smoke detector comes with a battery life of over ten years. This means retail owners won’t have to worry about continually changing out batteries, giving them peace of mind that their shop is under consistent protection against intruders. More so, Vanderbilt also uses conventional batteries meaning they are accessible to source, again focused on making life easier for the system user. Vanderbilt’s SPC Wireless devices are a cost-effective and reliable intruder alarm range Extended range for every detector In commercial environments, the SPC Wireless range can extend to 500 meters meaning one single detector can cover a whole building. This is more cost effective than having to wire an entire building with cable, thus cutting down on install time, and ultimately cutting down on expenses. Easy and seamless installation Lastly, SPC Wireless device installs can be hassle-free. The installer just puts up the control panel, wires the mains to it, positions the wireless device in the shop, and the retail owner is good to go. In contrast, a wired solution can take, at a minimum, a day’s work fitting cable. By reducing the installers time on site, retail owners don’t have to worry about losing out on potential customers due to the disruption to their business that a lengthy install might cause. Efficient intruder alarm range Overall, Vanderbilt’s SPC Wireless devices are a cost-effective and reliable intruder alarm range. The range is a two-way wireless technology that delivers ease of installation without compromising on the reliability of a wired system. The demand for integrated solutions and the growing influence of the Internet of Things (IoT) is an area that Vanderbilt has been paying close attention toward. We believe that wireless technology is coming of age, with two-way communication capabilities now cementing the technology’s potential and reliability.
HID Global, a global provider of trusted identity solutions, announced that Tasmania’s Old Kempton Distillery (OKD) has deployed its Internet of Things (IoT) enablement platform, HID Trusted Tag Services, to combat counterfeiting of its world class whiskeys, gins and other liquor products. HID’s innovative IoT platform for brand protection, combined with the web application developed by local integrator AusNFC, enables Old Kempton Distillery to guard against gray market activities and allows customers to authenticate their product at the point of sale. It also strengthens the appellation registration for the Australian island state of Tasmania, which boasts some of the most pristine water and climate conditions for manufacturing premium, top-shelf liquor products. Taking Measures To Prevent Counterfeiting HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience"“Old Kempton Distillery makes one of the world’s finest whiskeys, and with counterfeiting in our industry becoming a global issue, we recognized the need to take proactive steps to protect our brand,” said Robbie Gilligan, Business Manager and Brand Ambassador for Old Kempton Distillery. “We were seeking the best brand protection technology available and a solution that would also allow us to securely engage with our customers, long after a sale. We believe that HID Trusted Tag Services and the support provided through AusNFC provide just that.” Beyond its anti-counterfeiting features, HID’s IoT offering opens a new and powerful avenue for Old Kempton Distillery to stay connected with customers via direct and hyper-personalized communications that helps the distillery build brand loyalty in a privacy-preserving, closed environment. “We find HID’s solutions to be applicable to many different industries,” said Larry Hower, CEO of AusNFC. “HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience.” Working Of The System The distillery’s solution incorporates HID Trusted Tag Services into the AusNFC web application that drive the front-end mobile experience on customers’ phones. A HID cryptographically secure Near Field Communication (NFC) tag is embedded into the label of every liquor bottle, which links to HID’s cloud authentication service. By tapping their iPhone or Android phone to the bottle, the customer activates a secure communications channel that authenticates the provenance of their premium product – down to the actual bottle number. Each tap generates a unique URL, preventing counterfeiters from copying, spoofing or manipulating the URL for false verification. Combining Cloud Authentication With NFC Tags The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied“HID’s IoT technology is enabling mass adoption of brand protection by major brands worldwide that are seeking to address more sophisticated attempts by fraudsters focused on imitating their products,” said Mark Robinton, Director of Business Development and Strategic Innovation at HID Global. “Manufacturers and consumers alike can rest assured that their product can be authenticated at every stage of its lifecycle – from production to the shopping bag.” HID Trusted Tag Services combine HID’s cloud authentication services with its trusted NFC tags that come in many form factors for variety of product shapes and sizes requiring brand authentication. HID’s trusted NFC tags are embedded into each product during the manufacturing process, and are easily read using NFC-enabled smartphones (both Android and iOS v11 and newer). The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied, and the extended security features in HID’s cloud authentication service provide privacy-preserving brand authentication and consumer engagement in a closed and trusted environment.
Round table discussion
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?