Matrix Comsec, global manufacturer and provider of Security and Telecom solutions, is participating in IT EXPO 2019 at Fort Lauderdale, Florida to be held from 30th Jan to 1st Feb 2019. Matrix will be showcasing its comprehensive range of people mobility management, IP video surveillance and unified communication solutions at the event. Matrix is known for its customer centric, innovative range of solutions for unified communications, IP video surveillance, access control and time-attendance applications catering to diverse and complex deployments especially for the SMB, SME and large enterprises.
SPARSH VP710 Video And COSEC ARGO Door Controller
Enterprise video collaboration solution, SPARSH VP710 that sets a new benchmark by offering enhanced video and voice capabilities.
SMB IP-PBX, SPARK100, an all-in-one communication solution with enterprise-grade unified communication and collaboration.
Next generation door controller, COSEC ARGO for the access control market. The new door controller is equipped with features like 3.5” IPS touchscreen LCD with Gorilla Glass, powerful processor for ultra-fast user identification, intuitive user experience, vandal resistant (IK08).
Matrix IP Video - Access Control Integration
Matrix will also be demonstrating seamless integration between Matrix IP video surveillance, access control and unified communications solutions, along with Matrix video management and device management software suite.
Additionally, at this event, Matrix will exhibit its range of Gateways. These gateways allow easy integration with most of IP-PBX, TDM PBX, Softswitch and hosted solutions. Award-winning series of Matrix Gateways are perfect for enterprise and carrier-class solutions for multi-site connectivity and remote survivability while offering superior voice quality and state of the art routing features.
ExtraHop, provider of enterprise cyber analytics from the inside out, announces new capabilities designed to help Security Operations Center (SOC) and Network Operations Center (NOC) teams identify and safeguard critical assets, rapidly detect late-stage and insider threats, and transform security analysts into threat experts with streamlined investigation workflows.
Demand for business agility and uptime have accelerated the rapid modernization of IT, which is now highly dynamic and distributed - from the data center, to cloud infrastructure and SaaS, to remote sites and device edges.
These changes introduce complexity and expand the attack surface, contributing to high rates of false positives and obscuring true threats. Analysts constantly waste time, through no fault of their own, working to validate the constant flow of alerts to determine if investigation is warranted.
Senior analysts get timely detail on users and devices to support rogue device detection, insider threat investigations, threat hunting, and forensics
The Winter 2019 release of ExtraHop Reveal(x) improves SOC and NOC analyst productivity through contextual discovery of the enterprise attack surface, full-spectrum detection, and one-click guided investigation for incident response. Advanced detections incorporate device and user context to identify known and unknown threats using an array of machine learning, rule-based, and custom techniques. Detections incorporate suggested next steps and are made actionable through clear evidence, enabling front-line analysts to validate, close, or escalate prioritized events with confidence. Senior analysts get timely detail on users and devices to support rogue device detection, insider threat investigations, threat hunting, and forensics.
Better Prioritize Monitoring
Significant features of the Winter 2019 release include:
User-to-Device Mapping: Easy correlation between users and devices allows analysts to investigate quickly, expediting validation without the need to cross-reference with other tools.
OS Auto-discovery: Operating system (OS) auto-discovery confirms and compares the OS each device is using with known behaviours of those systems to identify spoofing.
Enhanced Role Classification: Expanded role auto-classification uses behavior to automatically infer more device types (e.g., mobile device, DHCP server, domain controller or DNS server), and then maintains groupings to keep analysts focused on what matters most.
Dynamic Device Grouping: Sophisticated device grouping permits users to define complex rules for extensive attributes and behavior to better prioritize monitoring, detection, and triage.
Advanced Rules Engine: The advanced rules engine immediately detects known threats, policy violations, and risk-based detections.
Guided Investigation Workflows: One-click guided investigations link each detection to the right next steps, as well as the most relevant device's transaction and behavior details, for instant validation of threats and faster MTTR.
Expanded Integrations: ExtraHop now integrates with ServiceNow CMDB, QRadar SIEM, and Palo Alto Networks firewalls.
With ExtraHop, security and IT teams can detect threats up to 95 percent faster, reduce resolution time by nearly 60 percent
“Forcing analysts to switch between tools or manually pull together disparate data for an investigation increases cognitive load, delay, and the chance of missing a critical piece of evidence,” said Jesse Rothstein, CTO and Co-Founder, ExtraHop. “Our focus in this release is to bring authoritative data about every device's communications, OS, users, and network behavior into a contextual workflow that guides analysts to the right answer immediately.”
With ExtraHop, security and IT teams can detect threats up to 95 percent faster, reduce resolution time by nearly 60 percent, and decrease unplanned downtime by as much as 86 percent. The innovative ExtraHop approach has been recognized by numerous organizations including Credit Suisse, JMP Securities, and independent analyst firms including Enterprise Management Associates.
Ping Identity, the provider of Identity Defined Security, announces that it has made several significant updates to PingIntelligence for APIs, its AI-powered API cybersecurity solution. These latest enhancements include an AI-based cloud trial, the ability to detect new types of attacks, support for Splunk environments, and additional integration with API gateways.
The lack of visibility into how APIs are consumed is becoming commonplace in today’s enterprise environment. In fact, a recent Ping Identity survey conducted among security and IT professionals reveals that 45% of respondents aren’t confident in their organization’s ability to detect whether a bad actor is accessing their APIs.
Detailed Traffic Information
Fifty-one percent aren't even assured their security team knows about all of the APIs that exist in the organization
Fifty-one percent aren't even assured their security team knows about all of the APIs that exist in the organization. This data illustrates that the people trusted with securing APIs don’t have enough visibility into their activity to identify abuses and attacks, which has contributed to why recent API attacks were not discovered for months. In this latest product update of PingIntelligence for APIs, three important capabilities make protecting APIs, and the data and applications they expose, even more achievable:
PingIntelligence for APIs uses AI and machine learning methods to detect, block and report attacks, as well as deliver detailed traffic information for deep visibility into all API activity—which helps secure APIs and the digital assets they connect. To make it easier for organizations to experience this for themselves, Ping now provides a cloud-based intelligence trial.
Blocking Anomalous Behavior
While traditional enterprise security solutions aren’t designed to protect against attacks targeting the unique vulnerabilities APIs present, PingIntelligence for APIs fills these security gaps by detecting, reporting and blocking anomalous behavior and attacks on each API under its watch. These include attacks on login systems, data theft, remote application control, API-specific DoS/DDoS attacks, stolen credential attacks and more.
This update now extends the ability of PingIntelligence for APIs to stop additional threats, such as data exfiltration over extended periods of time
This update now extends the ability of PingIntelligence for APIs to stop additional threats, such as data exfiltration over extended periods of time, content scraping, and slow login attacks, along with delivering improved bot detection. In addition this release supports sending threat information to Splunk environments, thereby enabling teams to consolidate attack information across their full security spectrum.
PingIntelligence for APIs enhances the security provided by any API gateway by bringing in AI-based threat detection and blocking to their environments. Adding to its current integrations with PingAccess and Axway AMPLIFY, the Ping solution now integrates with the Apigee Edge platform.
“Ping is helping some of the world’s largest organizations protect against an ever-diversifying landscape of cybersecurity threats, including those against API infrastructures. Many of the recent API abuses and attacks took months and years to detect, further reinforcing the need for IT leaders to build API-security focused teams,” shared Bernard Harguindeguy, CTO, Ping Identity. “As evidenced by the new advancements to our PingIntelligence for APIs solution, we’re committed to delivering even more leading-edge technology to protect our customers’ API infrastructures against these emerging threats.”
Ava Group (AVA), a provider of security risk management services and technology will be showcasing its portfolio of security solutions at Intersec Dubai 2019, stand S3-C48. Intersec Dubai features a rich selection of exhibitors in Security, Safety & Fire Protection, attracting visitors from the Middle East, Africa, the Indian subcontinent and well beyond.
Ava Group will be presenting the latest exciting solutions from its technology division - which incorporates Future Fibre Technologies (FFT) and BQT Solutions. As a provider of risk management services and technologies, Ava Group offers a portfolio of complementary solutions encompassing both fibre optic intrusion detection and high security access control and locking.
As a key event for the region and beyond, Intersec Dubai is the perfect way for security providers and buyers to start 2019"
Mark Horton, Global Sales & Marketing Director commented, “As a key event for the region and beyond, Intersec Dubai is the perfect way for security providers and buyers to start 2019. Our solutions offer the very latest in security technology and the highest levels of protection, key benefits that we know are always well-received by visitors at the event.”
Mark continued, “Over the last couple of years we have seen a significant growth in demand for our products in the Middle East, with increased investment in infrastructure across the region as a whole. Because of continued growth in the market, we have also invested in the expansion of our Dubai-based office and regional support team to ensure we are perfectly placed to supply and service our customers.”
Reporting Multiple Disturbances
Future Fibre Technologies will be showcasing its enhanced Aura Ai-2 controller. Featuring unrivalled high-sensitivity detection, location accuracy, cut resilience capability and the industry’s longest linear range - this product features new ultra-low noise optical detection electronics. This ensures a single controller can cover a distance up to 110 kilometres, accurately detecting, locating and reporting multiple disturbances to just +/- two metres.
Also on stand S3-C48, BQT Solutions will be demonstrating the new high-strength Orca lock to the middle east market
Also on stand S3-C48, BQT Solutions will be demonstrating the new high-strength Orca lock to the middle east market. Building on the success of the award winning YG10, the Orca lock is designed for securing gates, roller doors, shipping containers and any other large door or entryway. Alongside the Orca’s impressive physical attributes, a unique feature is its ability to fully integrate into an access control system, surpassing any other solutions available in the market.
Security Risk Management
Orca is fully monitored, weatherproof, and user configurable - providing the perfect indoor and outdoor locking solution. As well as the products themselves, the Ava Group team will be on hand to explain how its solutions are being used in real-world projects to address the latest threats.
Mark concluded, “We are looking forward to discussing recent key examples of our technology in action, including a major military closed data network where our data network infrastructure protection solution is protecting against tapping and tampering. These projects illustrate the depth of our expertise in security risk management and highlight the level of protection which we achieve to client’s assets and infrastructure. If you are visiting the event come and have a chat with our friendly and expert team on Stand S3-C48 about your specific security needs.”
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organizations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains.
User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anything like the 5.4 billion user IDs on haveibeenpwned.com, their login has already been compromised. If it's not listed, it could be soon. Recent estimates state that 8 million more credentials are compromised every day.
Ensuring Safe Access
Data breaches, ransomware and phishing campaigns are increasingly easy to pull off. Cyber criminals can easily find the tools they need on Google with little to no technical knowledge. Breached passwords are readily available to cyber criminals on the internet. Those that haven’t been breached can also be guessed, phished or cracked using one of the many “brute-force” tools available on the internet.
It's becoming clear that login credentials are no longer enough to secure your users' accounts. Meanwhile, organizations have a responsibility and an ever-stricter legal obligation to protect their users’ sensitive data. This makes ensuring safe access to the services they need challenging, particularly when trying to provide a user experience that won’t cause frustration – or worse, lose your customers’ interest.
After GDPR was implemented across the European Union, organizations could face a fine of up to €20 million, or 4% annual global turnover
Importance Of Data Protection
So how can businesses ensure their users can safely and simply access the services they need while keeping intruders out, and why is it so important to strike that balance?
After GDPR was implemented across the European Union, organizations could face a fine of up to €20 million, or 4% annual global turnover – whichever is higher, should they seriously fail to comply with their data protection obligations. This alone was enough to prompt many organizations to get serious about their user’s security. Still, not every business followed suit.
Cloud Security Risks
Breaches were most commonly identified in organizations using cloud computing or where staff use personal devices
According to a recent survey conducted at Infosecurity Europe, more than a quarter of organizations did not feel ready to comply with GDPR in August 2018 – three months after the compliance deadline. Meanwhile, according to the UK Government’s 2018 Cyber Security Breaches survey, 45% of businesses reported breaches or attacks in the last 12 months.
According to the report, logins are less secure when accessing services in the cloud where they aren't protected by enterprise firewalls and security systems. Moreover, breaches were most commonly identified in organizations using cloud computing or where staff use personal devices (known as BYOD).
According to the survey, 61% of UK organizations use cloud-based services. The figure is higher in banking and finance (74%), IT and communications (81%) and education (75%). Additionally, 45% of businesses have BYOD. This indicates a precarious situation. The majority of businesses hold personal data on users electronically and may be placing users at risk if their IT environments are not adequately protected.
Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine
In a recent exposé on LifeHacker, Internet standards expert John Pozadzides revealed multiple methods hackers use to bypass even the most secure passwords. According to John’s revelations, 20% of passwords are simple enough to guess using easily accessible information. But that doesn’t leave the remaining 80% safe.
Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine. Brute force attacks are one of the easiest methods, but criminals also use increasingly sophisticated phishing campaigns to fool users into handing over their passwords.
Users expect organizations to protect their passwords and keep intruders out of their accounts
Once a threat actor has access to one password, they can easily gain access to multiple accounts. This is because, according to Mashable, 87% of users aged 18-30 and 81% of users aged 31+ reuse the same passwords across multiple accounts. It’s becoming clear that passwords are no longer enough to keep online accounts secure.
Securing Data With Simplicity
Users expect organizations to protect their passwords and keep intruders out of their accounts. As a result of a data breach, companies will of course suffer financial losses through fines and remediation costs. Beyond the immediate financial repercussions, however, the reputational damage can be seriously costly. A recent Gemalto study showed that 44% of consumers would leave their bank in the event of a security breach, and 38% would switch to a competitor offering a better service.
Simplicity is equally important, however. For example, if it’s not delivered in ecommerce, one in three customers will abandon their purchase – as a recent report by Magnetic North revealed. If a login process is confusing, staff may be tempted to help themselves access the information they need by slipping out of secure habits. They may write their passwords down, share them with other members of staff, and may be more susceptible to social engineering attacks.
So how do organizations strike the right balance? For many, Identity and Access Management solutions help to deliver secure access across the entire estate. It’s important though that these enable simplicity for the organization, as well as users.
Organizations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so
While IAM is highly recommended, organizations should seek solutions that offer the flexibility to define their own balance between a seamless end-user journey and the need for a high level of identity assurance.
organizations’ identity management requirements will change over time. So too will their IT environments. organizations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so.
Importantly, the best solutions will be those that enable this flexibility without spending significant time and resource each time adaptations need to be made. Those that do will provide the best return on investment for organizations looking to keep intruders at bay, while enabling users to log in safely and simply.
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters.
The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity.
Significant Public Safety
Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety
While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018.
Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism.
Massive Risk Reduction
Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers.
Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks
Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream.
Promising Detection Systems
The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organizations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organizations.
2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants
2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact.
Cyber Risk Profile
The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualizations and image recognition, that happens to also drive the FR solutions.
The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%.
The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access).
5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity
Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018.
Perimeter Intrusion Detection
One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry.
Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR
The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR.
Security Ecosystem Members
Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritize communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts.
At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realized.
With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
There’s growing noise around smart homes and smarter security. You’ve probably heard it. But there is a place where access control and more have been smart for decades: the workplace. Home automation and IoT are still playing catch-up with the commercial sector. A new insights report from ASSA ABLOY and IFSEC Global — “The Smart Door Locks Report 2018” — measures just how fast consumer smart technology is running.
According to a survey conducted for the report, 61% of households now claim to own at least one smart home device or system. Energy monitors, home CCTV cameras, intruder alarms and smart door locks are the most popular, according to the report. All these functions, of course, have been available to businesses for years.61% of households now claim to own at least one smart home device or system
Educating The Smart Home Consumer
Paradoxically, report data also questions how much consumers really know about their smarter home. A surprising 42% of those surveyed, for example, were unaware they could control a smart door lock from their phone. In fact, many leading smart door lock models offer this feature, delivered by Wi-Fi or Bluetooth and an app.
Despite a wealth of features offered by the latest smart door locks — remote and location-based locking/unlocking; voice activation; timed access; emailed entry alerts; and integration with smart camera and lighting systems — most people still have limited knowledge of their capabilities.
Smart technology is increasingly becoming the new norm in terms of home security
Only 14% of survey respondents described themselves as “very familiar” with what a smart lock can do. Even though most of them probably use smart access control solutions at their workplace.
Secure Homes Through Smart Technology
Monitoring and security are not the only drivers for smart home adoption. We humans also love convenience, and modern living presents us with problems that smart home technology can solve. Ironically, given the report’s findings, it takes a smartphone to really unlock the convenient possibilities of smarter living. The device that’s “always to hand” is central to the newest generation of smart door locks.A smart door lock is a convenient way for a landlord or agency to offer round-the-clock check-in and check-out
If homeowners wish to remotely manage property access for friends and family, many smart door locks oblige. You let in guests remotely, send them a virtual digital key, or provide a temporary or single-use PIN to unlock the door.
It is just as easy to revoke a digital key, if you don’t want its owner to come around anymore. This is a significant improvement over sharing physical keys — or hiding one under the doormat. We cannot be totally sure where a metal key ends up and have no way to track or cancel it once it’s “out in the wild”. Commercial access control offers such functionality as standard, of course.
In addition, smart door locks offer more than just stand-alone operation and clever functions. In a domestic setting, magic happens when locks work in harmony with a home automation system, connected by protocols like Z-Wave, ZigBee or Wi-Fi.
"Smart" Security On The Move
The smartphone is becoming a remote control for managing a connected life beyond just home (and even workplace) security. According to Accenture, the parcel delivery services market will grow by $343 billion by 2020. Just like home security, convenience is a major driver of change.
Homeowners can send guests a virtual digital key to their phones, or provide a temporary or single-use PIN to unlock the door
A recent PostNord pilot in Sweden aimed to remove the inconvenience of waiting home for a postal delivery. Selected customers of some major Scandinavian e-retailers could choose to have parcels delivered inside their front door, if it was equipped with a Yale smart door lock.
Home delivery is among potential smart services covered in “The Smart Door Locks Report 2018 ”. When asked whether the ability to receive parcels securely in a porch or lobby would make them more likely to invest in a smart door lock, 79% said it would.It is easy to revoke a digital key, if you don’t want its owner to come around anymore
Vacation Rentals And Smart Home Tech
ASSA ABLOY research published in 2017 forecasts continued growth in the European vacation rentals sector (at 5.8% CAGR). Smart door locks are also making an impact here, at both ends of the market: for service providers — agents and homeowners — and for travelers.
A smart door lock is a convenient way for a landlord or agency to offer round-the-clock check-in and check-out, without creating extra work or staff costs. Both Intersoft, in Croatia, and Hoomvip in Spain have built vacation rentals management systems around an app and the ENTR® smart door lock. Agents issue, revoke, track and manage virtual keys for all their guests, saving everyone time and hassle. travelers use their phones and an app to unlock their apartment.
For these visitors the smartphone is already an essential travel accessory. It is a boarding pass, a credit card, a travel guide, and a postcard home... why not a door key, too? And if this key is backed by a trusted home security brand — and a company with vast experience in the mature market for commercial “smart” security — better still.
There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event.
Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show?
Norman: I think there are numerous factors that play into the decline of trade shows in general and not something that is limited to the security industry. Those events that are suffering are no longer serving their target market or have failed to adapt to the changes in the industry they serve.However, what we are seeing now is the rise of focused, more “evolved” trade events which fulfill a gap in the industry event calendar and provide something new and fresh to a disillusioned audience.
Q: What will be unique about The Security Event, and what role will it serve in bringing together buyers and sellers in the market? Where (geographically) will attendees come from?What we are seeing is a rise of trade events which provide something fresh to a disillusioned audience
Norman: The driving ethos behind The Security Event is that we are “designed by the industry, for the industry.” We were able to start with a blank canvas and take on board all the feedback from stakeholders throughout the security buying chain and create an event that is sustainable and fit for purpose. We see the role of the event as a very important one – to truly reconnect the currently fragmented UK commercial security industry, back at the NEC in Birmingham.
We had originally anticipated that this would be an almost-exclusively UK event in year one. However, we have seen significant interest from potential visitors from across the wider EMEA region who are keen to do business in the UK. We formed a strategic alliance with Security Essen to help facilitate and strengthen our reach in these regions through additional marketing and PR activities. Consequently, early registrations indicate that it will be approximately an 80% UK and 20% international split.
Q: What conference programming is being planned to augment the trade show event?
Norman: Content will be delivered across three focused theaters, serving the needs of our audience throughout the buying chain. Emphasis will be placed on the latest technology innovations impacting the industry, practical advice on the most pressing issues facing security technicians, and important industry updates and insights.
All sessions are focused on delivering tangible benefits to ensure professionals are equipped to stay relevant and to grow their business and we’re excited to be working with key industry bodies, innovators and experts to deliver the program. We look forward to announcing those in coming weeks.
Exhibitors want to re-engage with the thousands of industry colleagues who no longer attend other events on offer
Q: Comparisons to IFSEC are inevitable. How will The Security Event be different than the IFSEC Security and Fire shows? What are the advantages of locating at Birmingham NEC?
Norman: Both The Security Event and The Fire Safety Event, based at the NEC are completely different to any other trade show in the UK. We pride ourselves in creating a business platform that puts the exhibitors’ needs first, by limiting the size of stands and total number of exhibitors as well as creating a comprehensive CPD accredited educational program for the visitors.
Q: Which big industry players are supporting the launch of The Security Event, and what feedback are you hearing in terms of why they signed up at the show's inception? If a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally
Norman: Our founding partners are Assa Abloy, Avigilon, Anixter, Comelit, Dahua, Honeywell, TDSi, Texecom, Tyco and Videcon. The full list of exhibitors and supporting partners can be found on our website.
The reasons why they have signed up are very simple. They all see the exact same gap in the industry event landscape as we do. We believe there is a need for a 3-day channel focused commercial security exhibition based at The NEC in Birmingham. Our exhibitors want to re-engage with the thousands of industry colleagues who no longer attend the other events on offer.
Q: Your 2019 show will be the same week as ISC West in Las Vegas. Do you think the competitive calendar will be a factor?
Norman: In terms of our both our audience and our exhibiting base there is very little overlap with ISC West. Generally, if a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally so we haven’t observed any issues so far.
We do acknowledge that having two shows at the same time globally isn’t ideal and we have moved our dates in 2020 to the 28-30 April to mitigate this going forward.
The Security Event 2020 will not clash with Las Vegas' ISC West 2020 as it will in 2019, says Norman
Q: How will you measure success in the first year of the show? What measurements (show size, number of attendees, exhibitor feedback, etc.) will constitute a "successful" first year for the show?The Security Event will continue to evolve year after year, but will intent to stay true to the event's original concept
Norman: Great question – the most important barometer of success for me and the team next April is the general industry reaction, after all, this show was created for them. Furthermore, it is vital to us that our exhibitors feel they have achieved their objectives for the show, whether it be quality, quantity of leads or raising awareness of a new product launch. We’ll also be keen to understand how satisfied visitors are with the event, including their views of the content, access to new products/services, effectiveness of the out of hours networking, etc.
We are anticipating 6,000 visitors over the 3 days and I believe if we achieve this goal, we will have a strong rebooking on site, laying a great foundation for our 2020 event.
Q: How would you expect/hope the show would continue to evolve in coming years?
Norman: I hope over the next few years The Security Event cements itself as the industry’s favorite trade show and that exhibitors and visitors alike look forward to every year for both the business opportunities at the event and the networking outside of it. The Security Event will continue to evolve year after year, but I am determined that we stay true to our original concept and the principles on which the show was founded. After all, it is this formula that has proved to be so popular to date.
School shootings continue, as does a search for answers. What solutions are there to prevent school shootings and/or to improve the response (and thus minimize the death toll)?
In the physical security industry, we like to think we have solutions that can help, if not “solve”, the problem, but realistically speaking, how effective are they at the end of the day? We like to think we have solutions that can help, if not “solve”, the problem: but how effective are they at the end of the day?
The sad answer – even after dozens of school shootings and even in the wrenching aftermath of the latest one – is that we don’t know. There is a gaping lack of knowledge and research when it comes to measuring the effectiveness of preventative measures as they relate to school shootings.
Scarce Resources For Preventative Measures
The dearth of knowledge on the subject leaves schools at risk of spending scarce resources on measures that don’t have any real impact, or worse, that have a negative effect on education environments.
The natural impulse following a school shooting is to do something – anything – to prevent the tragedy from happening again at any school, but especially at my school. But how is money best spent?Successful businesses are a good thing, but not at the expense of misspending education resources on solutions that don’t solve anything
Congress has passed the Stop School Violence Act of 2018 to provide $50 million per year to develop programs to train students, teachers and law enforcement to prevent violence, and to create anonymous reporting systems, such as hot lines, for school violence threats. The bill authorizes another $25 million for improvements to school’s physical security infrastructures.
Congress also provides $1.1 billion in Title IV block grants, which districts can use to pay for diverse needs such as security systems. Several states are providing additional funding for physical safety measures and campus police, and local districts are also stretching their budgets to address security concerns.
But is that money being targeted to measures that will help the situation? What is the role of technology in preventing school violence, and are we as an industry at risk of over-selling our preventative capabilities and diverting money from other measures that might have more impact? Successful businesses are a good thing, but not at the expense of misspending education resources on solutions that don’t solve anything.
More metal detectors, armed guards and police officers could cause anxiety in some students and even interfere with the learning process
Studies On School Safety And Protection
Researchers, advocates and educators gathered this fall at American University to consider the need for better research to inform decision-making on safety, reported Education Week.The field is in desperate need of more evidence on what works, and schools want this information presented to them"
A 2016 study by the Rand Corp. points to the problem: Lack of data and research on what works and what doesn’t. “Despite growth in the school safety-technology sector, rigorous research about the effectiveness of these technologies is virtually non-existent,” according to Rand. “The field is in desperate need of more evidence on what works, and schools want this information presented to them in vetted, digestible ways to help them with procurement.”
Jeremy Finn, a professor of education at the University of Buffalo, has pointed out the difficulty of assessing the effectiveness of measures designed to deter events that likely won’t occur anyway. “How do you know when you have deterred a school shooting?” he asks. “It didn’t happen.”
The Effects On Our Students
Might technologies aimed at making schools more secure have an adverse effect on the learning environment? More metal detectors, armed guards and police officers could cause anxiety in some students and even interfere with the learning process. The physical security industry should freely acknowledge that the technologies we offer are only part of the solution to school violence
Do security measures aimed at preventing active shooting incidents absorb resources that might better be used to address a more general and/or likely security threat such as vandalism or student discipline? Theoretically, security measures in general should help to prevent the probability of an active shooter at the same time they are addressing a wider range of concerns and threats. But do they?
At the very least, we in the physical security market should be aware, and should freely acknowledge, that the technologies we offer are only part of the solution to school violence. Schools should take the broadest possible approach to the range of security challenges, and technology should be one tool among many. Furthermore, better data to measure what works is sorely needed to illuminate the best path forward.
ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., is the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so.
Here’s a quick rundown of integrator companies acquired by ADT:
Protec, a Pacific Northwest commercial integrator (Aug. 2017);
MSE Security, the USA’s 27th largest commercial integrator (Sept 2017);
Gaston Security, founded in 1994 as a video surveillance integration company and whose services have since expanded to include intrusion, access control, and perimeter protection (Oct. 2017);
Aronson Security Group (ASG), which delivers risk and security program consultants and offers advanced integration services, consulting and design engineers and a National Program Management team (March 2018);
Acme Security Systems, among the largest privately held security systems integrators in the Bay Area, focusing on electronic security systems, access control, video networks and more (March 2018);
Access Security Integration, a regional systems integrator specializing in design, delivery, installation and servicing of electronic security systems including enterprise-level access control, video and visitor management solutions, perimeter security and security operation command centers (Aug. 2018);
In addition to their moves in the commercial integrator space, ADT has also sought to expand their presence in cybersecurity with the following two acquisitions:
Datashield, specializing in Managed Detection and Response Services (Nov 2017);
Secure Designs, Inc., specializing in design, implementation, monitoring, and managing network defense systems, including firewall services and intrusion prevention, to protect small business networks from a diverse and challenging set of global cyber threats (Aug. 2018).
ADT has acquired more than a half-dozen security system integration firms in the last year or so
For additional insights into ADT’s game plan and the strategy behind these acquisitions, we presented the following questions to Chris BenVau, ADT’s Senior Vice President of Enterprise Solutions.
Q: ADT has been actively acquiring regional integrators this year – more than a half a dozen to date. Please describe the history of how ADT came to embrace a strategy of acquiring regional integrators as a route to growth? ADT's acquisition of Red Hawk is set to close in December, and brings premiere fire and life/safety solutions
BenVau: Our acquisition strategy started at Protection 1 when we embarked on our journey to build out our commercial and national account business and add enhanced integration capabilities to our portfolio. The merger of Protection 1 and ADT brought that foundation to ADT which up to that point was primarily a residentially and SMB-focused company. After the merger, we set out to identify and acquire additional regional integrators that would continue to build on that foundation and deliver enhanced technical solutions, advanced technologies and an expanded service, install and support footprint. Through our acquisitions we now operate two Network Operations Centers and three Centers of Excellence. We are also unique in the industry with the number and variety of certifications, like Cisco and Meraki, our engineers hold which ultimately allows us to offer Managed Security as a Service. They have also enhanced our operational capabilities.
Q: What criteria do you use to evaluate whether an integrator is a good “fit” for ADT?
BenVau: First and foremost, we look at the culture of the companies. The companies that we target for acquisition must be metrics- and customer service-driven. Secondly, we look at the leadership teams. ADT view their acquisitions more like mergers and take a patient approach to integrating them into their business We have been fortunate in the fact the leadership of the companies we acquired remain with us today in key management and executive positions helping to drive continued growth within their organizations. We also evaluate their current customer base, unique solutions and their ability to complement and enhance our portfolio with the goal of becoming a leading full-service, enterprise commercial provider. Our acquisitions have bolstered our network capabilities, brought enterprise risk management services, and a broader solution set in high-end video and access control solutions. Our most recent acquisition – Red Hawk, set to close in December – brings us premiere fire and life/safety solutions.
Q: What changes are typically needed after an integrator is acquired in order to adapt it to the ADT corporate model?
BenVau: We view our acquisitions more like mergers and take a patient approach to integrating them into ADT while taking into account their culture. We want to ensure that we find the right positions for their people, embrace the right messaging and put the right processes in place. We acquire these companies because they are the best in their respective businesses and geographies and bring their knowledge and experience in markets or with solutions that we may not have had previous access to.
ADT can support clients with their own in-house technicians which helps to ensure a consistent security program
Q: How can regional integrators benefit from the ADT brand? Have your newly acquired integrators realised additional growth?
BenVau: The companies we have acquired, generally, have exceeded expectations and surpassed initial goals. ADT brings expanded opportunities for these companies as well with our national footprint. Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver. These integrators help to deliver on that. In the past, the regional players may have had to rely on sub-contractors to service their larger clients. With ADT, we can now support those clients with our own in-house technicians which helps to ensure a consistent security program across multiple locations.Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver"
Q: Are additional integrator acquisitions planned this year and into 2019? How much is enough and when will it end (or slow down significantly)?
BenVau: We expect to close on our latest acquisition, Red Hawk, before the end of 2018. Red Hawk brings a national footprint focused on fire/life safety and security to ADT. While ADT already had a robust security offering, Red Hawk will contribute significantly to the fire side of the business. In addition, we will continue to evaluate the companies in the industry to determine if additional acquisitions make sense.
Q: Do you expect greater consolidation of the integrator channel in the industry as a whole? Why is this a good time for consolidation? Is it a good M&A market for buyers like ADT?
BenVau: We will continue to evaluate companies in the industry to determine if further acquisitions make sense. As for the industry, we can only speak for ourselves.
Q: What other trend(s) do you see in the industry that will impact ADT (on the commercial side) in the next year or so, and how?Our focus is on investing in our field organization, in particular our service technicians, engineers and project management teams"
BenVau: Networking is a big one. As we continue to drive integration of devices and services, from AI, “the cloud,” machine learning and even analytics, there will be more focus on the network they ride on. A deeper knowledge of network design, bandwidth impact, and system integration will be critical. As part of our acquisition strategy, we focused on talent to add to the team and have been able to add to our bench strength in this area.
Q: Any other comments/insights you wish to share about ADT’s strategy, future, and role in the larger physical security marketplace?
BenVau: Our focus is on investing in our field organization, in particular our service technicians, engineers and project management teams. The cornerstone of our success lies in our ability to deliver outstanding customer support and service. It starts with sales and the ability to deliver security and life safety technologies, but it ends with a delighted customer who partners with us to help secure the things that matter most to them. Our recent acquisitions have more than doubled our commercial field operations teams and are key to establishing the ADT Commercial brand as a leading full-service provider of enterprise solutions to the marketplace.
A manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialization in some of the towns in Maharashtra while preserving their rich heritage.
Wide Area Monitoring
The company is spread across a wide area, employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing high resolution images and covering a greater area for monitoring was the primary requirement.
The company is divided into various branches that are located at various places in Satara, Maharashtra. This gave rise to the need for a centralized solution at a centralized location from where all other sites can be monitored at a time.
Matrix IP Bullet And Dome Cameras
To cover the large monitoring area, Matrix provided IP bullet and dome cameras that have greater field of view when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images that aid in night time surveillance and provide enhanced security.
For storing the streamed videos, Matrix offered network video recorders. These NVRs have features such as adaptive recording which aids in storing more data in a defined space. Moreover, it has intelligent video analytics such as intrusion detection and motion detection which were also applied. Instant notifications and alerts ensured real-time security of the premises.
A Manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialization in some of the towns in Maharashtra while preserving their rich heritage.
Centralized Surveillance Solution
Large area to monitor - The company is spread across a wide area employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing good quality image and can cover a greater area for monitoring was the requirement.
Matrix provided IP Bullet and Dome cameras that have greater Field of View when compared to other brands
Centralized control - The company is divided into various branches which are located at various places in Satara. This gave rise to the need for a centralized solution at a centralized location from where all other sites can be monitored at a time.
Low Light Images For Enhanced Security
To cover the large monitoring area, Matrix provided IP Bullet and Dome cameras that have greater Field of View when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images which aid in providing high-class security.
For storing the streamed videos, Matrix offered Network Video Recorders. These NVRs have features such as Adaptive Recording which aid in storing more data in a defined space. Moreover, it has Intelligent Video Analytics such as Intrusion Detection and Motion Detection which were also applied. Instant notifications and alerts ensured real-time security of the premises.
24x7 Real-time Surveillance
Higher Security with Intelligent Video Analytics
Grafisch Lyceum Utrecht (GLU) is a creative and safe school that specializes in various multi-media disciplines as well as communications, media management and marketing. With approximately 2,100 students, GLU is located in Utrecht, The Netherlands and as at any education establishment the protection of its staff and students is of paramount importance, which saw the school first implement a surveillance system in its new main building in 1998.
Unobtrusive Video Surveillance
In 2004, following several burglaries over the previous four years, Sead Hafizovic, GLU’s Safety and Security Supervisor identified the need to upgrade security provisions. The current surveillance systems consisted of five analog cameras connected to a video recorder that required the changing of video tapes daily, and Hafizovic recognized this was no longer fit for purpose. Located across two facilities in Utrecht, GLU’s the main building in Vondellaan features glass walls and multiple access points giving the school an open and creative feel that Hafizovic wanted to maintain, making the need for unobtrusive security measures an important factor.
Following a thorough assessment by both GLU and Trigion, a mix of 30 IDIS analog cameras together with motion detectors were implemented Hafizovic turned to trusted partner Trigion, a systems integrator responsible for all the school’s security measures encompassing intruder, access control and video surveillance. Acting as an advisor, Trigion was tasked to find the most effective surveillance solution that would meet the security and performance needs of the school, while having the flexibility to scale and adapt as security and operational requirements changed.
Migration From Analog To HD IP Surveillance
Following a thorough assessment by both GLU and Trigion, a mix of 30 IDIS analog cameras together with motion detectors were implemented. The new security system proved incredibly effective in reducing crime as well as health and safety incidents and was gradually extended over the next ten years to include cameras in all strategic locations.
In 2013, the GLU went about updating the school’s security policy to include the use of cameras and their related images. While working alongside Trigion to develop the policy, Trigion advised GLU to make the move from analog to high-definition IP to vastly improve performance and thereby further increase safety and security. Since the existing IDIS system was still reliably operating, GLU needed to be convinced of the investment.
IDIS HD IP Cameras And NVRs
GLU was operating a mix of IDIS analogue and HD networked cameras connected to IDIS NVRs all seamlessly managed through IDIS Center
Trigion first installed two networked HD cameras next to the existing surveillance system. Both systems could be viewed easily through IDIS Center, totally cost-free video management software (VMS). The improved performance in terms of crisp picture quality, fast retrieval of footage and the easy and rapid installation quickly convinced GLU to implement a phased upgrade from analog to IP. By 2014, GLU was operating a mix of IDIS analog and HD networked cameras connected to IDIS network video recorders (NVRs) all seamlessly managed through IDIS Center, providing a high performance, centralized monitoring capability.
Since implementation the number incidents of internal theft, harassment, fighting and drug taking has reduced to almost zero—a measurable result Hafizovic is very proud of. The security policy has been shared with students and they fully understand their rights and obligations when it comes to the use of surveillance in the school and the importance of personal safety.
Adapting To Safety And Security Provisions
The innate flexibility and backward compatibility of the IDIS solution allows GLU to continuously improve and adapt safety and security provisions, effectively enabling the school to upgrade to next generation IDIS technology when it comes online and integrate with other systems as required.
In 2015, GLU was voted the third best school in a nationwide survey, in which GLU scored top in the areas of safety and security. Later the same year, the King of The Netherlands, Willem Alexander and Jet Bussemaker, the Dutch Minister of Education, Culture and Science visited GLU to witness its achievements for themselves, proving a proud day for GLU staff and students.
Control and instrumentation specialist, CMR Philippines, has won undisclosed contract to supply and install advanced building management, CCTV and fire detection and alarm systems at one of the South East Asia’s pharmaceutical manufacturers.
The work, undertaken at Unilab Pharmaceuticals’ new oral medicines and capsules Delta Amherst plant production plant in Laguna, Binan, sees the design and installation by CMR of facility-wide Siemens Apogee BMS, Siemens Cerberus FDAS and Hikvision CCTV systems.
The advanced computer-based BMS system will be used to control and monitor the 22,000 sq. ft plant’s mechanical and electrical installations and equipment such as ventilation, lighting and power systems.
CMR is also providing engineering and testing services as part of a comprehensive package of technical support
CMR is also providing engineering and testing services as part of a comprehensive package of technical support, which covers the installation, programming and commissioning of advanced CCTV and FDAS capabilities. The systems will provide improved safety and security for Unilab employees working at Laguna as the manufacturer looks to expand its capabilities through new investment in state-of-the-art manufacturing and production facilities.
Critical Operational Requirements
Unilab produces a wide range of prescription and consumer health products covering all major therapeutic segments. Many of these products are sector brands across the Philippines, Indonesia, Thailand, Malaysia, Singapore, Hong Kong, Vietnam, and Myanmar. Rojel Rivera, general manager at CMR PH, said: “We are a valued and trusted supplier to Unilab and other regional manufacturers, providing cost effective and precision engineered system-based solutions.”
“We are building a strong reputation as a first-class supplier to customers such as Unilab, who are looking for technologies to meet critical operational requirements, alongside high levels of reliability and performance in demanding production environments.”
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
We are living in the age of Big Data, and businesses are inundated with large volumes of data every day. Success depends on capturing, analyzing and ultimately transforming that data into information and intelligence that can be used to improve the business. So, it is with today's physical access control and video systems, too, which also generate unprecedented levels of data. But how can we make the data useful to end users and how can they realize its full value? We asked this week's Expert Panel Roundtable: Relating to physical security systems, what is the value of data and how can that value be measured?
Video systems today offer more capabilities than ever. Consequently, the systems can be used in new ways. For a variety of reasons, however, many customers don’t take full advantage of the capabilities of their video systems and therefore are leaving value on the table. Education and training are tools to alleviate the situation, but the first step is to identify the new ways that video can be used. We asked this week’s Expert Panel Roundtable: How do customers under-utilize their video systems, and what should they do differently?