Philip Halpin, Senior Vice President & Head of Global Security for Brown Brothers Harriman, and James A. Gagliano, Retired FBI Supervisory Special Agent, CNN Law Enforcement Analyst, and Adjunct Assistant Professor, headline ISC East’s Keynote Series.
ISC East, sponsored by the Security Industry Association (SIA), is proud to announce not one, but two new keynote speakers for this year’s inaugural Keynote Series. The ISC East Keynote Series features veterans of the security industry who are well-known for their widely-respected accomplishments; and who are prepared to help security and public safety professionals gain new perspectives to arm them with the information they need to lead the security industry into the future.
Security Management & Analysis
Halpin plans to discuss how technology is poised to disrupt the physical security industryFeatured in the Day One Keynote on November 14th titled “Friend or Foe? Technology Disruption and the Physical Security Industry,” Philip Halpin, Senior Vice President & Head of Global Security for one of the country’s oldest and largest privately held financial firms Brown Brothers Harriman, will speak on how he deals with the demands on security and people management, while riding the wave of technology disruption. Halpin also plans to discuss how technology has changed how we work and live, and how it’s clearly poised to disrupt the physical security industry.
Day Two’s Keynote Series session on November 15th will highlight James A. Gagliano, a Retired FBI Supervisory Special Agent, CNN Law Enforcement Analyst, and Adjunct Assistant Professor at St. John’s University. Gagliano’s session, titled “Twenty-First Century Best Practices: Reporting from the Front Lines on How Law Enforcement and the Security Industry are Confronting Emerging Threats, ” will discuss some of the 21st Century changes in law enforcement and security postures, as well as address recent responses to contemporary challenges, such as active shooters, bombings, VIP protection, and drone applications by identifying and breaking down an ever-evolving threat matrix.
“ISC East is honored to have Philip Halpin and James Gagliano as Keynote Speakers for our 2018 event. Their extensive experience managing real-world security and safety issues will be very valuable for our audience at the Show. The ISC East Keynote Series spans from corporate and private sector security to law enforcement and public safety, reflecting essential content in line with our ISC Security Events theme of Comprehensive Security for a Safer, Connected World,” said Will Wise, Group Vice President, Security Portfolio at Reed Exhibitions.
The SIA Education@ISC East Program helps security professionals learn from experts and take their security to the next levelIn addition to the Keynote Series, ISC East features SIA Education@ISC, an inspiring free education program composed of over 25 sessions that provide critical information on the newest and most relevant technologies in the industry. Brought to you by SIA, the SIA Education@ISC East Program delivers all-new content on the most current business trends, technologies and latest developments to help security professionals learn from experts, keep up-to-date and take their security to the next level.
Public Safety & Security
“The security industry attends ISC East not only for the diversity of technology solutions on the Show Floor, but for the practical education and thought-provoking keynotes for which the event has become known for,” said Don Erickson, CEO of the Security Industry Association. “Keynote speakers like Philip Halpin and James Gagliano combined with more than two dozen compelling SIA Education@ISC sessions, create an exceptional content program for ISC East 2018.”
Taking place November 14-15, 2018 at the Javits Center, ISC East is Northeast’s largest security trade show where over 7,000 security and public safety professionals convene in New York each year to meet experts from over 250 leading security brands through exhibits, education, networking events, and more. New this year, ISC East will be co-located with Unmanned Security Expo and Infosecurity North America, creating a fully comprehensive event for the security industry in New York City.
ISC East, sponsored by the Security Industry Association (SIA), the Northeast's premier security industry convention for new products, solutions and technologies, announced its co-locating with Infosecurity North America and Unmanned Security Expo (USE). This move provides security professionals with even more opportunities to yield the benefits of robust educational sessions, listen to high-level speakers, explore new products and services, network with fellow security industry members and more. ISC East, Infosecurity North America and Unmanned Security Expo will take place November 14-15, 2018 at the Javits Center in New York City.
Cyber-physical Crime Prevention
"New York is considered home to some of the most influential technology brands in the world. And given the city's burgeoning cybersecurity space, bringing Infosecurity North America and Unmanned Security Expo here is a natural fit, as well as an excellent way to facilitate face time with the best and brightest the city has to offer," said John Hyde, Exhibition Director, Infosecurity North America. "We're on track to drive over 4,000 security professionals to the show this year - many of who are executive-level decision makers. Co-locating with these two additional leading security shows opens the door of opportunity, helping attendees meet new companies and professionals who all have one common goal: bringing home tangible tactics to fight complex, evolving cyber threats."
USE provides an area solely dedicated to Unmanned Aerial Vehicles (UAVs), Unmanned Ground Robotics & Vehicles (UGVs), counter-drone solutions
Counter-drone Security Solutions
The second year since its inception at ISC West in April 2017, USE provides an area solely dedicated to Unmanned Aerial Vehicles (UAVs), Unmanned Ground Robotics & Vehicles (UGVs), counter-drone solutions and the software and applications that support them. Attendees will have access to hands-on demos of the latest innovations in drone technologies, conversations with industry experts about changing FAA regulations, and more.
Infosecurity North America & USE
"With Infosecurity North America and Unmanned Security Expo co-locating with ISC East, attendees will have access to an abundance of resources and educational opportunities, arming them with the tools and skills needed to defend against today's emerging cyber-physical security threats," said Will Wise, Group Vice President of the ISC Security Portfolio at Reed Exhibitions. "We're looking forward to having these powerhouse conferences under the same roof for the first time and bringing the brightest minds in security together to knowledge-share."
Listed on Trade Show Executive's Fastest 50 Lists, ISC East was named one of the "Fastest 50" growing shows in the country by Net Square Feet of Exhibit Space and is continuing to expand. Through its partnership with Infosecurity North America and USE, ISC East will attract more attendees than ever before, providing them with access to new companies, associations and industry peers, all in the same convention center.
Paige DataCom Solutions, the developer of GameChanger, a new cable designed to significantly exceed the reach of traditional category cable, announced the results of an independent performance evaluation completed by UL LLC as part of its Marketing Claim Verification program. The UL assessment evaluated the performance of the award-winning GameChanger cable technology and verifies the claim that it delivers 1 Gbps performance and PoE+ over 200 meters.
"We are thrilled that the leading independent testing facility verifies that GameChanger delivers this type of performance at over twice the standard cable length," said David Coleman, VP of business development for Paige Electric Co., LP. “These results independently document that Paige’s GameChanger Cable really lives up to its name. With a reach that far exceeds traditional cable, it can save integrators and end-users an enormous amount of time, money and hassle across many different applications."
Paige’s GameChanger Cable
Paige’s GameChanger cable extends the reach for any Ethernet application including high definition video and PoE+ to 850’ without a repeater making it ideal for replacing a CCTV and for use in applications that are beyond the 100m reach of a traditional category cable. This cable eliminates intermediate IDF requirements and the need to install repeaters or transceivers, which are costly and introduce additional points of failure.
In April 2018, GameChanger was recognized by the Security Industry Association (SIA) as the best in Video Surveillance Hardware and Accessories in the New Product Showcase at the ISC West trade show. Previously, GameChanger was presented with the Platinum Award in the Cabling Installation & Maintenance 2017 Innovators Awards Program at the BICSI trade show.
HID Global, global provider of trusted identity solutions, sponsored a Mission 500 Care Pack initiative at the recent ISC West International Security Conference and Exhibition in Las Vegas. Mission 500 is a charitable organization that works closely with the security industry to serve the needs of children living in severe poverty across the United States.
HID’s Care Pack Build at ISC West
By using their intimate knowledge of the security industry, Mission 500 has helped focus industry efforts on sponsoring volunteer-driven initiatives. HID Global, a longtime supporter of Mission 500, sponsored a Care Pack Build at ISC West where volunteers loaded 500 bags with healthcare supplies. These packs were then distributed by The Children’s Health Fund and were personally delivered by Mission 500, HID Global, Freeman and the ISC West Security Events team.
Security 5k/2k Charity Run/Walk
In addition to the Care Pack Build, Mission 500 also hosted its ninth annual Security 5k/2k Charity Run/Walk at ISC West. Proceeds from this event, which raised $113,000, were donated to charity projects in both the US and Puerto Rico that help children living in poverty.
“HID Global is proud to sponsor an event with such a worthy cause,” said Rodney Glass, Senior Vice President and COO of HID Global. “HID remains committed to be a good corporate citizen by working with groups like Mission 500 and The Children’s Health Fund to help give back to communities in need.”
The physical security industry is rapidly changing, ever evolving, and one that is growing faster than most other sectors of the greater global market. The latest research shows that the forecasted growth rates will be a compound average growth rate (CAGR) of 7.2% and a total market revenue opportunity of $41.27B through 2022.
These economic indicators make the industry a very attractive investment for entrepreneurs and for investment from large corporations from other industries. At ISC West 2018, this was extremely evident as there was a palpable buzz from technologies such as artificial intelligence (AI), machine learning, cloud-based video management systems and cloud-based access control systems.
New market entrants such as Amazon, and a seemingly increased interest and investment from the likes of Intel, IBM, and even Microsoft were present and contributed strongly to the buzz of the industry’s largest tradeshow.The global managed security services market is projected to reach nearly $40.97 Bn, with a CAGR of 16.6% over the next five years
Need For Education And Enhanced Security
With the increased profile of the industry, one can clearly see that the physical security industry is expanding globally to new consumers; bringing with it an increased need to further secure products and services with comprehensive physical and cybersecurity protocols and the need for education.
This convergence of physical security and cybersecurity will create new industry leaders that will emerge to lead a new segment of the combined market through strong investment and leadership.
According to a report published from Allied Market Research (AMR), the global managed security services market is projected to reach nearly $40.97B, with a CAGR of 16.6% over the next five years.
Correlating these two market data points, the forecast for the physical security market is expected to have nearly 18% of the total market opportunity comprised of cloud services at nearly $7B.
Sharing Security Service Best Practices
In September 2017 at the Cloud+ Conference in Austin, Texas, the leaders of the Access Control as a service (ACaaS) and Video Surveillance as a Service (VSaaS) markets, converged to share industry trends, observations of customer adoption, best practices in implementation and service, financial models, and several in-depth discussions on securing physical security of cloud implementations through cybersecurity.
The physical security market will have nearly 18% of the total market opportunity comprised of cloud services
These cybersecurity discussions absolutely dominated every discussion with the clear message that as a cloud service provider, manufacturers and integrators must continue to create robust and scalable cybersecurity offerings to protect customer data and facilities.
Interestingly, an analysis of all of the past cyber breaches was presented by keynote speaker Dean Drako of Eagle Eye Networks, who, through a powerful visual diagram, noted that all existing breaches in the physical security industry were entirely on manufacturer provided hardware solutions; VMS physically installed on customer premises, and camera specific vulnerabilities across multiple providers.Network personnel, cybersecurity personnel, firewall experts, and cloud-specific software development staff all need to be added to core physical security engineering expertise
Cloud Versus Non-Cloud Services
The insight that one was able to glean from this information and, that of a greater analysis of cybersecurity hacks across all industries, was that manufacturers and providers of cloud services were more secure and reliable by orders of magnitude than non-cloud solutions.
The reason for these phenomena also became glaringly evident; the security protocols of a cloud service provider is central to the business’s value proposition and as such should be addressed across all levels of manufacturing, implementation, and customer utilization.
Conversely, non-cloud deployed products rely on field implemented cyber strategies from integrators and end users which often expose lack of skills, education and budget to fully secure these physical security products.
Ensuring Successful Deployment
As a SaaS service provider, the technical personnel makeup results in an expansion of staff and expertise. Network personnel, cybersecurity personnel, firewall experts, and cloud-specific software development staff all need to be added to core physical security engineering expertise to ensure that the product developed can be successfully implemented and deployed.Implementing a process to protect millions of customer’s data records and facilities begins with mapping out a strategy to secure software and hardware.
These new jobs in the physical security industry will astronomically expand as the market continues to grow $6 Bn in a little over 4 years providing new opportunities to existing and new personnel to enter the industry.
As a leader in access control hardware and an ACaaS provider, ISONAS has taken it upon themselves to implement a process to ensure that their customers can easily implement their products and gain great peace of mind in regard to the security of the solutions.
Data Security Strategies
Implementing a process to protect millions of customer’s data records and facilities begins with mapping out a strategy to secure software and hardware.
This means employing high-level, seasoned cloud deployment experts to create a strategy in our AWS infrastructure and all ancillary supporting technologies to minimize attack surfaces, create complex, proprietary associations in a multi-layered and multi-tiered connection throughout the application and lastly ensuring that all communication to and from customers’ devices are encrypted and secured.
Implementing a process to protect customer’s data records and facilities begins with mapping out a strategy to secure software and hardware
Once implemented ISONAS took it upon themselves to validate the infrastructure and the customers experience by subjecting the environments to 3rd party penetration tests.
Addressing Cyber Threats
These tests, taken up quarterly, ensure a customer that the latest in cyber threats are being addressed and that the manufacturer is providing the latest solutions available in the market.Integration implementation personnel should gain greater knowledge in networks and cybersecurity best practices for their solutions
An added benefit is that customers gain the scalable benefits of enterprise corporate cybersecurity protocols at a fraction of the cost of implementing these on their individual premises.
As an industry, however, it is not simply the responsibility of the cloud service provider to ensure that the customers data in video and access control are being protected.
It is also incumbent on the integrator to ensure that the installation and implementation of the products and solutions are deployed in an educated and skill-based manner.
Knowledge Of Networks And Cybersecurity Best Practices
The products and services utilized must be easy to implement, be clear in their requirements of the end user networks, and simplistic to apply. Nearly all manufacturers of these products are working diligently to ensure that the integrator has all of the tools at their fingertips to ensure a successful implementation.
However, it will remain important that the integration implementation personnel gain a greater knowledge in networks and cybersecurity best practices for their solutions.The products and services utilized must be easy to implement, be clear in their requirements of the end user networks, and simplistic to apply
In most cases, this will mean additional jobs for new higher-level personnel, access to additional services to provide to end users, and an elevation of networking and security expertise within their business.
Expanding The Reach Of Physical Security
These new-found skills and expertise will likely bleed into new markets and expand the reach of the traditional physical security market. It truly is an exciting time to be a part of a rapidly expanding market in the physical security space and to watch the industry react to the growing need for cybersecurity within products and services.
In the next four years, there will be new innovations, new investments, and new winners and losers in products and services. It seems clear that those integrators and manufacturers who have begun to create the strategies and products for tomorrow will be well ahead of those who are not actively addressing the need for SaaS products, yet the window to opportunity remains wide open.
Over the course of the past few months, I have discussed a myriad of topics, from Big Data, the Internet of Things and emerging video surveillance-use cases, to analytics, storage complexities and IT technologies like virtualization and hyperconverged infrastructure (HCI). All of these trends have a significant effect on the security market, and in April they were highlighted in spades at ISC West.
It’s great to talk about these trends but it’s far better to see how they are being leveraged in real-world applications. That’s really where we can all see the true value of new solutions and concepts. We’re lucky enough to work with some leading organizations that want others to benefit from their experience and I’m happy to have the opportunity to share two of these applications with you.
Protecting Educational Facilities
UCF has adopted advancements in technology, particularly video surveillance solutions, to help ensure stronger security on campus
Educational institutions face an increasingly complex risk environment. Recent high-profile incidents emphasize these risks and magnify the vulnerabilities that educational facilities face. These incidents have led to more public demand for improved security solutions across campuses.
The primary mission of these organizations is to deliver quality education to students, and they face the challenge of balancing between a highly secure facility and one that supports open interaction. The University of Central Florida is no different.
This organization, one of the largest universities in the country, has adopted advancements in technology, particularly video surveillance solutions, to help ensure stronger security on campus.
Active Shooter Incidents
In March 2013, UCF faced an active shooter situation in which a former student planned to pull the fire alarm in a residence hall and then attack his classmates as the building was evacuated. However, the shooter’s gun jammed, and as officers were closing in on the gunman, he took his own life. During the university’s response to the incident, accessibility to critical video data was a major issue.
Educational institutions face an increasingly complex risk environment
UCF had cameras in the area where the incident took place, but first responders had no way of viewing the footage without being at the physical location of the video recorder.
At the time, UCF had a wide variety of standalone systems in place, including non-integrated video surveillance, access control and intrusion systems. As a result, there was no way to centralize video management, viewing and analysis.
Upgrading From Analog Systems
Altogether, its security system consisted of older analog platforms that were reaching end of life, 58 standalone servers, 12,000 access points and a wide variety of DVRs — all being managed in a siloed manner. UCF needed a solution that would allow officials to centralize system management, store video data more effectively and reliably, and enable the security team to deliver situational awareness to responders when needed.
Security leaders sought a way to further modernize its security, surveillance, access control and IT infrastructure
The university deployed an HCI solution, one that is optimized for demanding, data-intensive workloads like video surveillance. Using standard off-the-shelf server hardware, the system aggregates the storage and compute resources from multiple servers into a single unified pool that all cameras can access, which maximizes performance and storage capacity utilization.
The platform also hosts the university’s video management solution, which serves as a centralized source to manage video and effectively protect its security data. Because of the growing demand for video across UCF's campuses — for both safety and business purposes — the HCI solution’s ability to eliminate the opportunity for data loss and easily scale were key components in its selection.
Protecting Air Travel And Airports
In 2012, Charleston International Airport embarked on an ambitious upgrade project dubbed the Terminal Redevelopment and Improvement Program. The $200 million initiative was designed to modernize and expand the facility to meet increased passenger demand.
While the aesthetics and amenities of the airport were under construction, security leaders sought a way to further modernize its security, surveillance, access control and IT infrastructure. The IT and security teams needed to address the challenges of their existing standalone server environment, which included siloed systems, management complexity and high administrative and equipment costs.
Charleston International Airport embarked on an ambitious upgrade project dubbed the Terminal Redevelopment and Improvement Program
Considering the high value of the airport’s video, security and IT data, it required a solution that could deliver reliable data protection, system resiliency and fault tolerance. The airport is required to store video for 30 days, but it seeks to expand its retention time to 60 days. Therefore, technology that can scale simply was key in the selection process.
Storage System Updates
It also required a storage platform that could manage the demanding and write-intensive nature of its nearly 250 IP surveillance cameras — a challenging task for traditional video recorders. The airport deployed HCI appliances to better manage captured video data and expand its archive capability for video surveillance.
Users rely on video to validate whether something did or did not happen - and this is essential in airports
HCI surveillance solutions are designed to provide industry-leading resiliency. Even if multiple hardware failures occur, including an entire appliance, video management servers will remain online and recording, and any previously recorded video will continue to be protected and accessible.
Reducing Expenses And Costs
The solution also reduced total cost of operations by consolidating servers, storage and client workstations into one enterprise-class solution that is easily managed from a single user interface, without the need for specialized IT skills.
These use cases demonstrate the value emerging technologies bring to these types of modern environments. And they show that solutions like HCI are no longer simply much-talked about technology trends. Video, IT and security data is critical to organizations of all types and they need to ensure their investment in capturing this data is protected.
From a security standpoint, users rely on video to validate whether something did or did not happen. If that video data isn’t protected, they lose a very valuable investigative tool. That isn’t an option in today’s complex environment. That’s is why it is paramount to understand how new technologies can help expand current capabilities and evolve security operations. This can’t be left to chance.
The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an interesting discussion about these topics presented by several business leaders from lock company Allegion at a press event at ISC West earlier this year. Here are some highlights from that discussion.
Q: What new developments in emerging technologies do you see in the coming years?
There’s opportunity for implementation of the technology to solve real problems"
Mark Jenner, Market Development Director: Connected locks, other types of sensors and all the data being aggregated inside buildings provide opportunity for data analytics. The buzzwords around technologies can cause confusion for integrators and end users, such as artificial intelligence, deep learning and machine learning, and what’s the difference among all of them? My opinion is that they are important, but the big theme across them all is opportunities for new business models for the integrator, and opportunities to solve problems for end users. And it’s not just technology for technology’s sake. There’s opportunity for implementation of the technology to solve real problems.
Devin Love, Market Development Manager: You can’t just have a solution looking for a problem. You see a lot of people who understand technology in their own lives, and they want to translate that into their businesses. That’s where I think it’s exciting. You now have all this technology, and people understand it to the extent that it improves their daily life. They go through their day with less friction, with more ease, and technology fades to the background. There are two levels of value. One is the longer, bigger, broader scope of what the technology can bring to a company using it, but on an immediate basis, there is the value of tracking how a business is running. These sensors are collecting data. For example, if you are a multi-tenant property, you can look at how amenities are being used. What do my residents really care about? That informs future decisions.
Robert Gaulden, Project Based Business Leader, Electronic Access Control: I have been studying the multi-family space for the last couple of months. The customer experience is really driving a lot of that technology adoption. What you’re seeing today, whether it’s a mobile device or some other device, is the ability to move throughout the property, and gain access to the perimeter and to your tenant space. All of this adoption is around that experience. There’s multiple players coming into the space, from Amazon wanting to deliver packages into the tenant space to residents who don’t want the inconvenience of using a key. Technology adoption to solve problems, and also to drive experiences, is where a lot of the balance will play out.
It’s important that we look at how integrators can use the technology to do business more effectively and efficiently"
Brad Aikin, Channel Led Business Leader, Integrator Channel: From an integrator perspective, there are two things. One is how they can approach end users, and the scope of what integrators consult with them about is wider. I think we as an industry are getting beyond those high-traffic, high-security applications. Those are still critical, but the value we bring around security and convenience is opening a new incremental opportunity. Also, the experience of the integrator and how they conduct their business is important, from generating quotes to communications to proactive servicing. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently.
Gaulden: We as an industry, and we as manufacturers, need to understand what data we are generating so we can run our businesses more efficiently from every aspect, whether you’re the property manager, the building owner, the integrator, or whether you’re the manufacturer. These devices and technology are being pushed out everywhere and will generate the data. How we learn from that – especially when you apply security to it to be more proactive – provides huge opportunities.
Jenner: What data is important and what’s not? Folks get overwhelmed with too much data at some point. What’s important for an application at the end user level? What do they really need to solve the problem?
Love: Privacy gets involved as well, especially with consumer products. The attitude is “stay out of my private business.” But if you’re an employee now, all bets are off. Now you have a professional relationship with the people you work with, so there is a different lens that you look through when tracking data. You use the data to everyone’s benefit, and it’s a different paradigm than in your private life.
Aikin: Also, where does that data create a better experience for the person? That’s what drives the money and value: What level of information sharing makes my experience better? The technology is also getting smarter in terms of “how do we sort through the valuable information?”
Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control
Q: As facilities connect more devices and sensors, the cybersecurity threats increase. We have already seen Internet of Things (IoT) devices being used as the attack point of cyber breaches. What are the vulnerabilities that make those attacks possible, and how can integrators protect their customers?
Love: Certainly, this is an extremely – maybe the most important – piece of our industry. What is the point of everything we do if we can’t instill that trust? But what we need to solve here also comes with opportunity. There’s certainly hope. You’re not seeing a frontal attack on the technology. It’s usually some loophole, or some older device that hasn’t been updated, or wasn’t installed correctly, or it was social-engineered. The opportunity is, not that it can’t be solved, but that it absolutely needs to be solved – and it can.
Gaulden: Integrators need the ability to understand that cyber layer and what it means. Nowadays, everything runs on the network, and you won’t even get past the IT department to get on the network if you don’t have the right staff, the right credentials. From an integrator standpoint, you need the ability to add to your staff, to understand everything from the product level to the firmware and the software level, all the way to the deployment of the holistic system. You can’t just say, “That’s not part of our responsibility.” All these devices are now riding on the network. They can be protected from a cyber perspective, or you will have vulnerabilities.
As manufacturers and business consultants to integrators, we should facilitate the conversation, that it is one ecosystem"
Aikin: Everything is a communication device. With the concern and need comes an opportunity for the integrator. But it’s also in making sure integrators are having that conversation with end users and setting the expectations up front. What I’m providing you on day one is the best in the industry at this time, but tomorrow it may not be. My accountability and service are to maintain that environment and keep it running. I may not physically change the device you see, but the service I’m bringing to you is that security, and that comprehensive dialogue. The IT stakeholders already have that expectation, but there is a chasm in some organisations between the physical security and the IT stakeholders, and the integrator is facilitating that conversation. As manufacturers and business consultants to integrators, we should facilitate that conversation. It is one ecosystem.
Q: Aside from cybersecurity, what are some of the other threats that integrators should be aware of as they work with customers to implement the new trends and technologies we have mentioned?
Aikin: It is diversifying, all the options and the capabilities. With that comes confusion and misapplication. If I look at the trends around just wireless; I go back 10 years ago, there were even questions of whether wireless was a secure technology. That has progressed and continues to be part of the cyber conversation, just like any hardwired product. It’s something you have to maintain and be aware of. Wireless has really diversified. There is still a need for education within the channel, and most importantly, to the end user. There are still end users that assume a WiFi widget is the same thing as a Bluetooth widget is the same thing as a low-frequency widget. But they are all different. There are reasons there are different technologies. Nothing stifles the adoption of technology more than misapplication.
We have different architectures within our lock base and among our software partners to allow a mix of technology"
Gaulden: Integrators understand the differences in how various doors are used and how those applications will work. In the K-12 school environment, you want the ability for an instant lockdown, and a WiFi deployment probably isn’t your best option. You need a real-time deployment. However, my office door at headquarters doesn’t necessarily need real-time communication. I can pull audits off it once or twice a day. You have to mix and match technologies. For a high security door, you would proactively monitor it. But for a door where convenience is the goal, we can put electronic security on it but we don’t need to know what’s going on at any moment in time. We have different architectures within our lock base and among our software partners to allow that mix of technology.
Jenner: End users want the latest technology, but it may not be for their applications. Those things drive more costs into it, when end users need to be putting money into cybersecurity and some other things. That’s part of the misapplication. Another risk is interoperability. That’s a big piece of the technology and as things change. How do we do a better job of supporting open architecture? It may not be a standards-based protocol, although we use a lot of standards, but we just need to make sure whatever protocols we use are open and easily accessible so we can continue to work with them in the future. We know that when our devices go in, they will support other parts of the ecosystem from an interoperability perspective. That’s important for integrators to know: How is this going to be applied and integrate with something in three, four or five years from now? It’s an expensive investment, and I want to make sure it will work in the future.
Main photo: Business leaders from Allegion discussed new trends in electronic and wireless locks at a recent press event: (L-R) Robert Gaulden, Devin Love, Brad Aikin and Mark Jenner.
Ambarella is a big player in the video surveillance market, but not a familiar name to many buyers of security cameras. They don’t make cameras, but they make the computer chips inside. Founded in 2004, Ambarella began in the broadcast infrastructure encoders market and entered the market for professional security cameras in 2008. More recently, the company has also entered the market for automotive OEM solutions.
Between 2005 and 2015, the company has produced a progression of advanced camera system on chips (SoCs) designed, developed and mass-produced for the consumer electronics, broadcast and IP camera markets. An SoC includes an image processor as well as capabilities to run software and provide computer vision (analytics).
Development has been happening fast at Ambarella. In January, they introduced the CV22 camera SoC, combining image processing, 4K and 60fps video encoding and computer vision (video analytics) processing in a single, low-power-design chip. CVflow architecture provides DNN (deep neural network) processing required for the next generation of intelligent cameras.
The even newer CV2 camera SoC, introduced in late-March, delivers up to 20 times the deep neural network performance of Ambarella's first generation CV1 chip, also with low power consumption.
I caught up with Chris Day, Ambarella’s vice president of marketing and business development, at the ISC West show to find out more about the company.
Q: Your company is not as well known in the industry as it should be, given its widespread impact on the market. Would you prefer otherwise?
Day: I think we would prefer more visibility. If you talk to any camera maker, they know who we are. We do business with all the top-10 camera companies – Hikvision, Dahua, Avigilon, Pelco and the rest. Because we are a chip supplier, the end-customer deciding to buy a camera may not know what chip is inside. For that reason, we may not have the visibility. But if you are a camera maker, you know who we are.
Typically, it takes nine months to develop a camera, longer with an intelligent camera because you are importing so much software
Q: What are you hearing from your camera customers in terms of what they need, and how are they directing where you go with R&D?
Day: We have become a major supplier to those companies based on years of developing image processing – wide dynamic range, low light, and similar features – as well as AVC (advanced) and HEVC (high-efficiency) video encoding. That’s the heritage of our company and why we do business with all these companies. The next treadmill is computer vision – adding the intelligence into the camera. The goal is still being best-in-class in imaging and encoding, but now being best-in-class in adding the intelligence and being able to do all those things with very low power, within the “thermal budget” of the camera. That’s the next big wave.
Q: How far away is that in terms of the end-customer? How soon will he or she be able to reap the benefits?
Day: By the end of 2018, or maybe next year. We’re just beginning to sample the CV22, for instance, which is the first SoC directed to security cameras. Typically, it takes nine months to develop a camera, maybe longer with an intelligent camera because you are importing so much software. So, we’re talking about the end of this year or next year.
Q: Tell me about your current products and the next generation.
Day: The CV22 is sampling this quarter. CV2 we announced [in late March], which is a high-performance chip. The idea is that we provide our customers with different price/performance points, so they can produce a family of cameras with different capabilities. They have the same basic software model, so someone can invest in software once and then have different performance points without completely rewriting the software. That’s key. They might have 100 software engineers developing neural networks and all the features, so if you have to recreate that at different price points, it’s a lot of work.
Ambarella provides customers with different price/performance points, so they can produce a family of cameras with different capabilities
Q: Historically, video analytics have over-promised and under-delivered. What would you say to a sceptical user in terms of how much confidence they should have in the next wave of products?
Day: Ambarella has been in the security business for 10 years, and some of us have been in the business for 15 years. Every year I’ve been disappointed by the analytics I have seen at the ISC West show. Every year there are incremental improvements – 2 percent, 5 percent, whatever – but in general, I became a sceptic, as well. What is fundamentally different now is the neural network approach to computer vision. Even for us developing these chips: In CV1 we had a certain level of deep neural network performance. We produced CV22 in the same year with four times the performance, and then CV2 has 20 times the performance in the space of one year. That’s just at the chip level. But the neural network approach to analytics and computer vision is game changing if you look at the things you can do with it compared to traditional analytics approaches. If you look at what it’s doing in automotive and security, you will see significant development. I totally appreciate the scepticism, but I think it is completely game-changing at this point, based on the technology in the chips and based on what’s happening with neural networks.
Q: What do you think the next big thing is?
Day: I think the next big thing is the neural networks; it’s the intelligence in the camera. People have been pushing toward higher resolution, we’ve done 4K, we have incredible imaging even in really dark scenes. So we have been solving all those problems. And so now to add the computer vision and be able to do that in parallel with the image processing and high-resolution encoding, and all in a chip that is low-power. That’s the differentiator.
Q: What else is happening?
Jerome Gigot, Senior Director Marketing: There is a lot happening on the consumer side, too, with the home security market. You will see cameras in your home with more and more intelligence. Some are used for video doorbells. On some of the new cameras, we have package notification – you get notified if a package arrives, or if someone steals your package. And new battery-powered cameras are very easy to install with no wires.
Change is happening at MOBOTIX, and the German company wants to get the word out. “This company has been around since 1999, and people still give us a blank stare because they don’t understand what’s behind the curtain,” says Joe Byron, Vice President Sales Americas, MOBOTIX CORP. “As we gain visibility, people really want to know ‘what’s going on over there?’”
There’s a lot going on. A new CEO, Thomas Lausten, who joined the company last year, is a former Milestone employee who brings with him the Milestone philosophy of open systems. It’s a culture shift for MOBOTIX, which has historically favored closed systems.
“We needed a new leader to take us to the next level,” says Byron. “Thomas brings an open-platform mentality. He listens to a variety of opinions – from end users, architects and engineers, and MOBOTIX employees – before formulating a smart decision. That will take us to the next level.”MOBOTIX has been well ahead of the industry’s technology curve, and several early innovations have recently become more common
The MOBOTIX Ecosystem
Over the years, MOBOTIX has developed a unique “culture” that has many rabid devotees; some say it’s the security industry’s version of tech giant Apple. “MOBOTIX has many loyalists, who are enthused about the products and the culture,” says Byron. “We can build on that with a new level of products, more excitement and a new direction.”
In addition to a new CEO, MOBOTIX will soon have a new chief technology officer (CTO), Hartmut Sprave, who will be joining this summer. Providing “fresh eyes on the subject” and an outside perspective from the IT industry will drive further innovation. “We don’t want to be on the bleeding edge, but on the cutting edge, and know the audience and its needs and challenges,” says Byron.
MOBOTIX’ existing technology mix provides a foundation as the company makes the transition. In some cases, MOBOTIX has been well ahead of the industry’s technology curve, and several early innovations have recently become more common. An example is MOBOTIX’ decentralized system approach with edge-based recording.
Products highlighted by MOBOTIX at the recent ISC West show included the M16 AllroundDual Multisensor IP camera, S16 DualFlex IP camera and the Q26 Hemispheric 360-degree panoramic IP camera for indoor and outdoor applications. MOBOTIX Management Center (MxMC) 1.8 can change the camera settings on 80 cameras at a time. MOBOTIX IP Video Door Stations can interface with iOS and Android smartphone apps.
“We have had so many things in place over so many years that people haven’t known about,” says Byron. He argues that MOBOTIX’ emphasis on technology development sets it apart from some camera companies in the U.S. market.
Joe Byron, Vice President of Sales, and Ashley Grabowski, Regional Marketing Manager, at ISC West 2018
“People have been let down in the U.S. market with cameras that have been over-marketed, over-reaching and have little substance,” he says. The German engineering of MOBOTIX products and systems provides an antidote to the technology void, he says. “They are looking for the substance, and that’s what we have,” says Byron.
What was missing – until now – was the “layer of integration” with other systems in the market, contends Byron. That separated MOBOTIX from the rest of the industry.MOBOTIX offers cybersecurity features that pre-dated the current industry obsession, such as HTTPS/SSL encryption in recording and playback video
“But now we are an open platform, and we have these features sets and are the best of both worlds,” he says. “We can align with technology products and bring MOBOTIX to the masses. It’s a matter of listening to customer challenges and formulating a path to meet those challenges.”
The fruits of that open system approach were on display at ISC West. The MOBOTIX booth featured integrations with ClearSite, Omnicast by Genetec, Konica Minolta and Mx-MSP by APB Technology. Other MOBOTIX technology partners include Avigilon, Bosch, Exacq, Gallagher, IndigoVision, Lenel, Milestone, Pelco by Schneider Electric, Salient Systems, Verint and Video Insight (Panasonic).
Targeting Local Markets
Another change under the new leadership is more flexibility to address the needs of local markets. “We need to be aware of our audience in the Americas,” says Byron, “and how approaching the market and the product mix may be different. We have the ability to create what we need here to be successful.”
One particular concern in the Americas market is cybersecurity, and MOBOTIX offers cybersecurity features that pre-dated the current industry obsession, such as HTTPS/SSL encryption in recording and playback video. “We already have it, but we have never broadcast it to the masses,” says Byron. “We have the substance but haven’t communicated it.”
Looking to enter the government market, for example, MOBOTIX faces the important requirement to be “IA compliant.” The company qualifies as IA (information assurance) compliant but just needs to go through the process of getting the “rubber stamp.”
“We have so much under the hood when it comes to our products,” says Byron. He says MOBOTIX’ Internet of Things (IoT) approach can meet any end user challenges. “We can be all things to all people, if they truly get to know us. We just need to develop a vehicle to allow customers to communicate with us: What is the challenge? Nine times out of 10 we can meet that challenge with one of our cameras.”
The reviews are in, and ISC West was another hit. Brisk attendance and a comprehensive lineup of the industry’s top companies and products contributed to another successful show for Reed Exhibitions. Our Expert Panel Roundtable, who have attended many such events, added their own reflections to the industry’s post-ISC glow. We asked this week’s Expert Panel Roundtable: How successful was ISC West 2018 for security industry exhibitors and visitors?
The residential/smart home market is undergoing revolutionary transformation, with a flood of new products and technologies helping to make our homes more connected, easier to manage and, yes, smarter. These massive steps forward provide challenges, and also opportunities, for the security industry, which has played a major role in protecting homes and residents for decades. We asked this week’s Expert Panel Roundtable: How are changes in the residential/smart home market impacting security?
A big trade show, such as the upcoming ISC West, has a lot to offer for attendees. If anything, a big show has “too much” to offer; there is certainly more to experience than any one person could get around to. How, then, can attendees maximize the value they get out of ISC West? For advice, we go to our Expert Panel Roundtable, all seasoned veterans of many big trade shows. Specifically, we asked this week’s panel: How can attendees get the most out of a big trade show like ISC West?