Mobile access
ProdataKey (PDK), manufacturer of the cloud access control platform built for cellphone, announced that its revolutionary “touch io” Bluetooth reader is now shipping. When installed as part of a pdk io access control system, the new readers allow users who have installed a cellphone credential on their smart phone to enter a controlled door by simply touching their hand to the reader, making it the most convenient cellphone solution on the market. There’s no need to unlock the...
MedixSafe, a pioneer in the access control cabinet market, announces that its Key Access Ready Enclosure (KARE) key control cabinets are now available with Bluetooth format card readers. This wireless technology enables users to access their KARE cabinets using their cellphone devices as their access credential, while still offering the high level of security synonymous with MedixSafe’s solutions. Polymer swing handle lock Each key tag easily snaps open so that names and/or numbers of ke...
The Face Recognition Company (FRC) has announced that its multi-camera face-recognition security product is to be unveiled for the first time at the International Security Expo in London. The company, which has been in stealth mode for three years, has developed the world’s first ultra-accurate facial recognition security system, optimized for commercial businesses. Available in January 2020, its first product is designed to provide enhanced security for retail and commercial premises or...
At the ISC East 2019 event at Jacob Javits Center in New York City, Morse Watchmans (ISC East booth #847) is showcasing its KeyWatcher Touch key management solutions that protect important keys and physical assets, resulting in reduced downtime, fewer losses, and improved accountability. Also featured is their latest addition, KeyWatcher Fleet which is proven to optimize fleet utilization and longevity through key control. “Morse Watchmans has multiple decades of experience in delivering...
BCD International, Inc. is pleased to announce the receipt of its commercial license from the Dubai Development Authority. In January 2020, the company will open its Middle East branch in Dubai Internet City, Dubai. The office will serve as the regional headquarters for Video Storage Solutions (VSS), one of the company’s major divisions. VSS will expand its global presence in the METAI region to supply authorized security distributors with video recording and storage appliances that are p...
As security embraces IT-centric solutions, it can provide business value over and above security. Now in charge of managing a variety of data – e.g., from video platforms – a company’s security function has access to a range of new metrics. While security may use video to analyze a security event, machine learning can analyze the same data for other business capabilities, such as quality control or when a policy has been breached. “It’s the same camera, but with d...
News
HID Global, globally renowned provider of trusted identity solutions, has announced that it has expanded its digital certificate family to offer an Extended Validation (EV) Code Signing (EV CS) certificate that protects software from tampering and forgery. Customers who download software that has been digitally signed with the IdenTrust TrustID EV CS certificates can identify the source and launch its applications or other code without receiving an ‘Unknown Publisher’ warning from the widely used Microsoft anti-phishing and anti-malware application filter. Digital certificate authority “We have brought our expertise as the world’s most trusted digital certificate authority to the challenge of securing software code in today’s increasingly vulnerable digital world,” said Vishvas Patel, vice president and chief architect with HID Global, Identity and Access Management. IdenTrust code signing certificate identifies a software publisher at the highest level of assurance specified in industry standards" He adds, “Our IdenTrust code signing certificate identifies a software publisher at the highest level of assurance specified in industry standards and can be used to verify that desktop and mobile applications, firmware, drivers or other software code are being sent from an authenticated source and have not been altered by unauthorized parties.” TrustID EV CS digital certificate Each TrustID EV CS digital certificate is issued into a FIPS 140-2 Level 2-compliant HID Crescendo smartcard or USB Token that ensures publishers can only access it through a two-factor authentication process. This also protects the private key from being exported, which provides additional assurance about who published the software code and eliminates the risk of tampering or unauthorized updates to the published software. A free HID Global Timestamp Authority service further enhances the IdenTrust TrustID EV CS certificate offering by adding long-term validation of the digital signature’s integrity as well as non-repudiation even after the IdenTrust TrustID EV CS certificate has expired or been revoked. Microsoft Smartscreen Application Reputation filtering system HID IdenTrust TrustID EV CS certificates are only issued after a strict vetting and authentication process that instantly gives a software publisher a trusted reputation as defined by the Microsoft Smartscreen Application Reputation filtering system. The process of establishing this reputation can take much longer when code is not signed with an EV CS certificate. Until the reputation is established, the filtering system will continue to flag an application as a potential source of malware infections the first time that customers launch it. The IdenTrust TrustID EV CS digital certificates are available now.
Now the customer can combine the advanced access control of a wireless electronic escutcheon with the intelligence and superior security of an electromechanical mortise lock. With a robust design, the new SMARTair Lock is built to secure doors where high daily traffic and a large number of access events are all in a day’s work. This new wireless device in the SMARTair product range is built around three main elements. The external reader with multi-color LED is available in several different finishes to blend with the existing doors. The lock’s internal control and battery-powered RF module also houses a button for electronic privacy. Finally, a battery-powered electromechanical clutch unlocks the door when a valid credential is presented to the external electronic reader. The new SMARTair Lock works with any DIN-compliant door handle — the users can choose their own. Streamlined security management The new SMARTair Lock can be installed quickly and wirelessly without disrupting your working day Users can also choose to install an additional mechanical cylinder, enabling them to unlock the door quickly and manually in any emergency. The lock incorporates admin-friendly features for streamlined security management. Sensors monitor and report when a door is left open or closed incorrectly, or when an attempted intrusion is detected. A SMARTair Lock also registers any unlocking events made via mechanical key. The new wireless lock works with any SMARTair management option, including offline, update-on-card and real-time, online system management. Its RFID reader accepts all common RFID credentials, including MIFARE®, iCLASS® and DESFire. The lock also works with the future-proofed Openow cellphone solution from SMARTair, and the SMARTair Remote app. Simple and efficient The new SMARTair Lock can be installed quickly and wirelessly without disrupting the user's working day and make access in schools, hospitals and any other high-traffic location safer, simpler and more efficient — reducing wasted time and expense while ensuring that the premises are more secure.
ProdataKey (PDK), manufacturer of the leading cloud access control platform built for cellphone, announces the imminent release of its integration with DW’s Spectrum IPVMS video management platform. The integrated solution will be on display at ISC East in New York City, Nov. 20 -21, at the ProdataKey booth 346. The event coincides with the release of the integration to installing dealers, on Nov. 21, who will now be able to offer their customers one of the most affordable, feature-rich unified video/access control platforms industry-wide, both in terms of initial expense and long-term, total-cost-of-ownership. Interested parties are encouraged to visit the ProdataKey booth for a live demonstration. The pdk io/DW integration allows users of an DW Spectrum system to review all pdk io event data from within the IPVMS interface and enables more efficient and effective security monitoring through automated responses to access-related events. Comprehensive security solution The integration allows DW Spectrum users to send commands back to the pdk io system to open or close doors For example, activity at a door reader or a door propped open can activate the movement of a PTZ camera to provide corresponding coverage, initiate the pop up of a video layout, send email notifications to designated users, generate an audio alarm at the monitoring workstation, and create a bookmark within the recorded video stream at the time of the event. A flexible rules engine makes it easy for installing dealers, integrators and system administrators to program these and other sequences. In addition, the integration allows DW Spectrum users to send commands back to the pdk io system to open or close doors, enable or disable certain features like “do not disturb,” and even trigger a lockdown. The result is a comprehensive security solution, accessible through a single interface, which delivers far more features and functionality than two systems operating independently. Cloud access control platform Cory Jackson, VP of Strategic Sales at ProdataKey, says, “Our dealer network, which favors the pdk io cloud access control platform for its ease of installation, simple usability, powerful features and affordable pricing, will find the same advantages hold true for DW’s Spectrum’s video management solution. Bringing to market the two as an integrated offering is a guaranteed win/win for both our sales channel and their customers, who are looking for the most effective security technologies that also deliver a strong return on investment.”
Today’s market wants access management systems that are easy to set up and use. They must be easily scalable and able to integrate with other security solutions like video and intrusion systems. And access management systems need to be highly resilient and always available. With the introduction of the Access Management System 2.0, Bosch has addressed all these needs. Access Management System 2.0 The entire customer journey is designed to be as effortless and as simple as possible. Specifying the system is easy: the software is offered in three pre-configured software bundles for different sized organizations: Lite (max. 144 doors and 200,000 cards) Plus (max. 512 doors and 200,000 cards) Professional (max. 10,000 doors and 200,000 cards) Easy configuration The graphical user interface (GUI) is simple and easy to understand Configuration is easy - Existing floor maps can be imported into the system and icons are dragged and dropped on the map to represent controllers, doors and building objects. Onboarding of users is straightforward: for example, enrolment and assignment of access profiles are all implemented in one dialog manager. Operation is also easy - The graphical user interface (GUI) is simple and easy to understand. The dark color-scheme of the GUI reduces eye-strain and fatigue, so operators stay fresh and alert. In addition, the colors of the Access Management System 2.0 GUI are aligned with the colors of the Bosch Video Management Systems (BVMS) GUI, so operators enjoy the benefits of an integrated solution, which is easier to operate than two distinct systems. Future-proof and highly scalable system Users can start small and add extra capacity whenever necessary. The Access Management System 2.0 can be expanded to 10,000 doors and 200,000 cardholders. No hardware needs replacing when expanding; users just require software upgrades and possibly additional controllers, readers and cards. Henceforth, increasing system size is not only easy but also pretty cost-efficient. And since it is regularly updated with the latest data security enhancements, it is a future-proof investment that is ideal for office and government buildings, retail environments, educational institutes and more. Master Access Controller (MAC) For maximized resilience and high availability, the Access Management System 2.0 includes the Master Access Controller (MAC) as an additional layer of resilience between the server and the access controllers. If the server fails in the Access Management System 2.0, the MAC takes over and ensures that the controllers still communicate with each other and share necessary information from the card readers. Thus, even functionalities, which include various controllers such as anti-passback and guard tour, can still be performed. Anti-passback functionality The anti-passback functionality prevents a card holder passing back their card to another person The anti-passback functionality prevents a card holder passing back their card to another person and thereby enabling their unauthorized entry. Guard tour is a safety functionality offered to security guards, which uses access readers as checkpoints along a defined route. Access management systems are required to be seamless with high-tech functionality. They can seamlessly integrate with other video and intrusion systems. And these access management systems need to be highly resilient and online at all times. The Access Management System 2.0 is Bosch Building Technologies’ answer to all these requirements. High level of safety with threat level management Up to 15 configurable threat levels such as lockdown, controlled lockdown or evacuation mean that safety measures can be initiated quickly in critical situations such as fire or terrorist attack. The threat level state is activated by one of three triggers: operator workstation, emergency button, or specially configured “emergency” cards that are presented to a reader. The different threat levels can make all doors open, all doors blocked, or a mix of some open and some blocked. Individual doors can also have their own security profile and allow only certain cardholders access. High data security and privacy protection To protect against cybercrime and loss of personal data, the database as well as the communication between server and access controllers is encrypted at all stages, e.g. through support of the secure Open Supervised Device Protocol (OSDP) v2 protocol. Access Management System 2.0 also has trusted digital certificates for mutual authentication between server and client to prevent tampering by unauthorized clients and uses secure design principles such as “secure-by-default” and “principle of least privilege”. Seamless integration with third-party video systems Access Management System 2.0 is a flexible access management system for medium- to large-sized organizations The Access Management System 2.0 is a flexible access management system for medium- to large-sized organizations. It is easy to set up, operate and expand. Access Management System 2.0 can grow with the needs of the customer and can be integrated with video systems such as the BVMS (version 9.0 and higher) and third party systems such as Milestone’s XProtect. It will as of the second quarter 2020 be able to integrate with the B-/G- Series intrusion system from Bosch and other third party systems. With this integration capability, the Access Management System will serve as the solid platform to mix and match various security systems, depending on the customer’s individual needs. Enhancing safety of security guards Overall, the Bosch Access Management System 2.0 makes access management simple, scalable and always available. Any deviation of sequence or timing causes an alarm in the Access Management System 2.0. Colleagues or first responders can be notified at once improving the safety of security guards. In the extremely rare event that the Access Management System 2.0 server and the MAC fail, cardholders can still enter and leave areas with their badges because the database is stored directly on the Access Management Controllers. Thanks to this offline capability, it is furthermore possible to save millions of events even during down times.
HID Global, a pioneer in trusted identity solutions, announced that it is collaborating with VMware to drive mass adoption of cellphone access to digital and physical places by adding HID Cellphone Access for opening buildings and doors to VMware Workspace ONE, an intelligence-driven digital workspace platform for managing any app on any device. The collaboration will make it possible for Workspace ONE users, for the first time, to more securely open doors with their smartphones as part of a unified cellphone experience that also enables them to access applications, computers, networks, data and cloud-based services. Workspace ONE is an industry leader in unified endpoint management (UEM) and the collaboration with HID will fuel even broader interest and uptake by enterprise organizations focused on blending physical and digital employee experiences with technology. Cloud-based access control platform “Adding physical access control capabilities to Workspace ONE will bring a unique element to our customers’ digital transformation journeys as we take yet another step in redefining what it means to provide empowering digital employee experiences across any application on any device,” said Tony Kueh, Vice President of Product Management, End User Computing, VMware. The platform streamlines mobile ID replenishment over the air when employees lose their smartphones HID cellphone credentials are delivered to Workspace ONE through the HID Origo cloud-based access control platform that provides a suite of integration, enablement and developer tools and services that simplify how HID partners and a growing community of new developers and resellers bring cellphone access control solutions to market. The platform also streamlines cellphone ID replenishment over the air when employees lose or must replace their smartphones and other cellphone devices. Cybersecurity and physical security “The collaboration between two of the leading companies in the fields of cyber security and physical security will help accelerate the use of converged physical and logical access control on cellphone devices,” said Hilding Arrehed, Vice President of Cloud Services, Physical Access Control, with HID Global. “The solution underscores HID’s and VMware’s shared commitment to bring to market one of the industry’s first unified access control solution for a user base of this size.” VMware recently completed a pilot of their platform integration at VMware facilities using Bluetooth-enabled HID iCLASS SE readers and cellphone IDs. The HID Cellphone Access application programming interfaces (APIs) and software developer kits (SDKs) provided VMware with direct access to HID access control hardware, speeding integration and pilot execution. Converged physical and logical access control The incubation of this technology partnership has validated the benefits of converged physical and logical access control on cellphone devices including a more seamless, convenient and intuitive experience for users with improved security and administrative efficiency. Users accessed buildings, rooms and other spaces by tapping their cellphone device to a reader at the door, and also unlocked doors from a distance using “twist and go” cellphone gesture technology or by simply swiping to unlock their phones as they approached.
Farpointe Data, the access control industry's OEM for RFID credentials and readers, has announced that at ISC East 2019 on November 20-21 in Booth 947, attendees can see how the company’s Conekt mobile smart phone access control identification solution integrates the same advantages for Android smartphones as Apple iOS delivers, such as 3-D Touch, Widget and Auto-Unlock, into the Conekt Wallet App version 1.1.0. All new improvements create the same increased user conveniences for Android users as iPhone users obtained in May. Mobile access credentials Conekt's Android solution provides the easiest way to distribute mobile access credentials" "As these improved Wallet App features have been provided to iPhone end users since May, this new version lets access control system manufacturers, integrators and dealers provide their Android customer base with the simplest to use mobile access credentials in the market," explains Scott Lindley, general manager of Farpointe Data. He adds, "Similar to our most recent Wallet App supporting Apple's latest iOS version13.1.3, Conekt's Android solution provides the easiest way to distribute mobile access credentials with features that include allowing the user to register only once and requiring only the handset's phone number. No portal accounts or activation features are required. By removing these and additional personal information disclosures, we also address privacy concerns that have been slowing adoption of this technology." Parking, lobby and suite specific access control systems For instance, the newly improved Widget lets the user make up to three mobile control credentials as widgets. This saves time by allowing quicker access to credentials supporting divergent building systems such as parking, lobby and suite specific access control systems, directly from the Android's home screen. With 3-D Touch, a new pressure-sensitive feature, the user simply pushes on the Wallet App to select from up to three of the most commonly used mobile credentials. Each user can choose their personal preferred combination. For example, a delivery driver may choose to simply enter the van parking area, receiving dock and restrooms, while the vice president gets access to the boardroom, executive dining room and reserved parking facility. Auto-Unlock with Conekt mobile access credential Lastly, Auto-Unlock lets a user select the Conekt mobile access credential they want as their favorite. Once activated and designated, a little star appears in the upper right corner of the mobile access credential. As the favorite, this mobile credential is transmitted immediately whenever the Wallet App is selected. All new Android Wallet App features are available for immediate no-cost download on the Google Play Store and will continue to operate securely behind the smart phone's PIN code and biometric defenses.


Expert commentary
It’s hard to believe that we’re in the final quarter of 2019. It’s time to wrap up goals and make new ones that will guide us into another decade. As we look forward, we can’t help but look back at some of the key trends that emerged in the last couple of years, and their continued presence in the product road maps and plans that so many security industry leaders and manufacturers are creating. Some of these trends have enhanced the efficacy of security systems, whereas others have the potential of having adverse impacts. Cybersecurity Cyber-attacks of all kinds have become, and will continue to be, a major threat, making this one of the most important initiatives that today’s businesses embrace. From a manufacturer’s perspective, building cybersecurity into the product from its inception is critical, with integrators beginning to demand this level of consideration from the products they sell. As a result of a rise in the convergence of IT applications alongside security investments, end users are now seeking out solutions designed with data security top-of-mind. All network connected devices such as DVRs/NVRs, servers, IP cameras, access controllers, intrusion alarms, smart sensors, are vulnerable, which is why this added step in developing cybersecurity protocols and applying them across the organization is critical. Building cybersecurity into the product from its inception is critical More connected devices The Internet of Things (IoT) has been a major trend for the past few years in many industries, and this will continue as we integrate sensors of all kinds into the network. The collection and analysis of the data collected by these sensors is giving rise to a plethora of applications such as industrial applications, intelligent building management, event management, and much more. The physical security industry benefits by having additional intelligence for situational awareness and emergency management, as well as opportunities to provide additional value-added services and business insights. Being deployed in an increasing number of scenarios and with continued improvements in computing capabilities, video has the opportunity to become the eye of IoT. AI-enabled devices Software manufacturers are looking toward artificial intelligence to help propel advanced analytics in an effort to deliver more situational awareness to operators, and an increased ability to proactively assess threats or anomalies. While video and data analytic capabilities have been around for quite some time, some would argue they were rudimentary in comparison to software that uses AI to make existing applications such as facial recognition much more accurate, and to create new ways to detect anomalies. In addition, AI continues to be used to make sense of the large amounts of data that are being generated by intelligent sensors and by analyzing the growing amount of video. 5G connectivity It’s safe to say that 5G will revolutionize the way people stay connected to the internet. Extra speed, extra bandwidth are going to make our mobile devices faster, more powerful and hyperconnected, with the same thing happening to IoT connected devices such as cameras. This is going completely change the way we think about smart cities: More powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas. More powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas Privacy concerns In most advanced economies around the globe, citizens are increasingly concerned with privacy of their data, and many governments have put – or are in the process of doing so – stringent data protection laws in place. The EU has lead the way in using these concerns to develop privacy regulations that govern the development of data-driven applications. This trend is starting to impact the entire globe, as we shift toward more data autonomy and privacy. Since most physical security applications involve the collection of video and data about people and assets, privacy regulations will continue to have a significant impact on the industry well into the future. Cloud and mobile capabilities Mobility is critical for physical security and is emerging through the development and use of cloud-based services, as well as the ability to access security devices through a smart phone or Web-based browser. That’s why there’s been such an influx of mobile apps created to manage cameras, receive automatic alerts for the most diverse event, and giving users the ability to grant or restrict access to a facility. All of this demonstrates the world’s demand for mobility, connectivity and ease-of-use. More video — everywhere Video is the cornerstone of security, providing both real-time and forensic coverage for emerging threats and incidents, which is why it’s one of the fastest growing segments of the marketplace. The use of video for traditional applications in new markets, as well as for use in newer applications that are not necessary security related is poised to see the most movement. In some industries such as oil and gas, there is a trend towards extending video coverage into extremely harsh and hazardous environments, so manufacturers are challenged to develop appropriately certified equipment to meet a more stringent demand. Manufacturing facilities such as food processing plants are also increasing their use of video for training and compliance purposes to prevent incidents such as food recalls that can be extremely costly for the business. It’s an exciting time to be a part of the security market, as we’re really just beginning to see that, when it comes to technology advancements, the sky is the limit. I would argue at the core of these innovations is the video data being collected, and as we work to build technologies that can harness the power of these applications, we will continue to be at the forefront of this movement toward greater intelligence and business insights.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasize to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government center or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organization can move their line of defense away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalize their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
With the recent news headlines about store closures and the collapse of well-known chains, alongside clear adjustments in business strategy amongst established high street favorites, there is no denying that the UK retail industry is under huge pressure. A recent report suggests growing issues are leading some retailers to increase risk-taking in the supply chain. But here, Steve Bumphrey, Traka UK Sales Director, looks at ways to help retailers embrace the storm, including paying attention to security, management processes and efficient customer focus. Challenges plaguing retail industry It’s been an awful year to date for UK retail if you believe the cacophony of negative headlines about the health of the UK economy and the confidence levels of the UK consumer. The sector is facing huge challenges in dealing with the evolution in on-line and smart mobile retailing The sector is undoubtedly facing huge challenges in dealing with the evolution in on-line and smart mobile retailing. Further concerns include an unwillingness of policymakers to address the changing retail environment and how business rates and general business taxation and regulation is making a difficult situation worse. Supply Chain Risk Report According to the latest Global Supply Chain Risk Report, published by Cranfield School of Management and Dan & Badstreet, those under pressure, are now facing increased exposure to risk if they are forced to cut costs in their supply chain. The report cites data for the retail sector that shows increased levels of risk-taking since Q4 2018, with retailers reporting high levels of dependency on suppliers and indicating a propensity to off-shore to low-cost, high-risk countries where suppliers are more likely to be financially unstable. In-Store technology revolution The underlying evolution of technology taking hold of the retail industry and consequential changing consumer behavior is what is really forcing the industry to step up and act. This is not only in the shift to online and smart mobile purchases, but also with the increased use of technology in store. Self-scanning and checkouts In a bid to enhance the physical shop experience, especially in supermarket outlets across the UK, retailers are increasingly giving customers autonomy with self-scanners and checkouts and need to be able to trust them to ensure an honest transaction. And for the shoppers, this dependency on technology and not human interaction to complete a shop means scanners must be instantly available and ready for use. Many different underlying competing challenges impact the retail industry Compensators At the recent British Retail Consortium’s ‘Charting the Future’ conference, looking at retail crime and security, Dr Emmeline Taylor, a criminologist at the City University of London identified in self -service shops, several new types of ‘offenders’ such as so-called ‘compensators’ including the atypical ‘frustrated consumer’ who, “fully intended to pay but were unable to scan an item properly”, adding to the security challenge. There are clearly many different underlying competing challenges impacting the retail industry. Arguably, the increase in technology and autonomous shopping, where less staff are present (or staff cuts planned) throws up more vulnerabilities, such as the opportunity for store theft. Use of body cameras Staff needs emerging technology such as body cameras to act as a deterrent to crime and keep employees safe Furthermore, staff may need greater use of emerging technology such as body cameras to act as a deterrent to crime and help keep employees safe. In essence, prevention is better than cure, and it’s certainly cheaper. Whether combating crime physically or online, or looking to find ways to counter the high street trends, working together, sharing information and taking a more holistic approach will help the development of a shared language between retailers. Retail Banking It is also here where common approaches can help to deliver on efficiencies, in time, resource and budget that can serve to operate right through the supply chain, and minimize, or even negate the need to take any risks. It can even serve to enhance the customer experience, increasing confidence in the shopping environment. Of course, when discussing the high street, it is not just the department stores and chains that are feeling the impact. Well known banks are also having to redefine their priorities and role on the high street, with customers (especially younger generations) demanding a more efficient service than ever before. Well known banks are also having to redefine their priorities and role on the high street Asset protection Leading the way is Nationwide, globally renowned building society, which prides itself on being one of the largest savings providers and mortgages provider in the UK, promoting itself as running purely for the benefit of its customers, or ‘members.’ Richard Newland, Director of Branch & Workplace Transformation at Nationwide said, “Even more than getting a good ‘deal’ from a building society, the quality of our welcome, or our renowned level of service, we make sure our members feel safe with us, enough to trust us with their greatest assets. We are doing everything we can to evolve our business and focus our efforts on providing the best and most secure services that people value.” Key management systems Traka has supported Nationwide with the introduction of dedicated key management systems So committed to its branch network, it has pledged to its 15 million members that every town and city with a Nationwide branch, will still have one for at least the next two years. A bold statement in today’s climate. Traka has supported Nationwide with the introduction of dedicated key management systems, moving its branch network into a more digital system. Keys no longer need to leave site and the audit trail capability has helped to remove the manual paper recording, allowing status of keys to be established instantly, at any time. Changes in retail market This example, together with Traka’s portfolio of high street brands and globally renowned department stores that cannot be named for security reasons, demonstrates the need for retailers to embrace the need for change, both from a product offering and operational running perspective to achieve aspirations of resonating with customers. They also prove the opportunities for success, in an unquestionable difficult market environment. If retailers can listen to customers and respond accordingly, taking into consideration staff safety and security, alongside an ability to respond quickly to personalized enquiries and expectations. This way, perhaps, the current environment can be seen as an opportunity to innovate and embrace technology to form the high street of the future.
Security beat
Honeywell Commercial Security is among the companies working to develop security systems that are more proactive than reactive. “Our biggest opportunity moving forward is the ability to have security solutions that do a better job of detecting and predicting threats,” says Tim Baker, Global Marketing Director, Honeywell Commercial Security. Greater use of analytics and intelligence can reduce human error and simplify processes by providing a more unified view for greater situational awareness. Artificial intelligence and deep learning "We’re reaching a maturity level in terms of algorithms and hardware to drive new capabilities in a cost-effective way,” he says. Baker sees a continuing interest in artificial intelligence (AI) and deep learning in the physical security market, used in video analytics and also for intrusion and access control. "We have challenged ourselves to move from reactive solutions to develop a set of proactive solutions that determine potential security threats before they happen,” he says. An overarching theme is the need to focus operator attention on “what matters” rather than requiring operators to keep track of the growing number of sensors in newer systems. A remaining hurdle is to streamline the deployment of analytics systems, which can require expensive customization during the commissioning phase. Credential-enabled access control reader The reader can support any card format and also enables “frictionless” access control That’s where Honeywell is investing and focusing its attention, seeking when possible to “pre-teach” algorithms based on data gleaned from a large installed base. Fortunately, there will be plenty of data from a growing variety of sites to build from. Honeywell offers a full ecosystem built around enterprise security needs and a second ecosystem built around the needs of small- and medium-sized businesses (SMBs). In the enterprise space, the trend is toward smarter edge devices, such as Honeywell’s OmniAssure Touch, a cellphone credential-enabled access control reader. The reader can support any card format and also enables “frictionless” access control. A user can gain access by touching the reader, with no need to take his or her smart phone (which has the credential) out of their pocket. The reader is fully backwards compatible, which is a Honeywell hallmark. Honeywell’s OmniAssure Touch can support any card format and also enables “frictionless” access control. Designed to be cloud-enabled On the enterprise software side, Honeywell has invested in further development of their Pro-Watch access control system and MAXPRO VMS (video management system), tying them together into a single security console, along with intrusion and other systems such as human resources (HR) data. For the SMB market, Honeywell is building and expanding their MAXPRO Cloud system. As existing hardware has evolved to be cloud-enabled, the company has also been introducing new control products that are designed from the ground up to be cloud-enabled. Honeywell’s biggest vertical markets include banking, healthcare, gaming, energy infrastructure and airports The new MAXPRO Intrusion system, which can be configured over the cloud, will be introduced in the first quarter. MAXPRO Access, to be introduced in late November, can be deployed using an embedded web interface, a cloud interface, or as an on-premise solution. On the NVR side, an embedded NVR works alongside Honeywell’s new 30 Series video cameras, providing secure and encrypted end-to-end connection. Networked security system A challenge for Honeywell is to keep up with broader trends happening in the industry, whether geopolitical (e.g., relations between China and the United States) or regulatory such as General Data Protection Regulation (GDPR). Baker acknowledges an industry-wide increase in awareness about cybersecurity, driven largely by the enterprise market. IT departments are getting more involved in the purchasing decision; indeed, the chief information officer (CIO) is often the ultimate decision-maker. In response, Honeywell is emphasizing “cybersecurity by design” from the beginning to the end of a project. Also, they are using white-hat hackers to test products before they are released into a live environment. “We are doing everything we can to make sure products are cybersecure,” says Baker. Honeywell’s biggest vertical markets include banking, pharmaceutical, healthcare, gaming, energy infrastructure and airports. NDAA-compliant video cameras Compliance is a common thread throughout the verticals. Honeywell sells to the government mostly in the access control and intrusion space and built around their Vindicator networked security system. (They also introduced the line of NDAA-compliant video cameras, made in Taiwan, at the recent GSX show.)
ISC East continues to flourish as the Northeast’s largest security trade show. Focused on the big Tri-State market and overall Northeast sector vs. the flagship ISC West event in Las Vegas in the spring, the International Security Conference & Exposition at New York’s Javits Center will be held Nov. 20 and 21. “Anybody who has been to the show has commented and seen the growth,” says Mary Beth Shaughnessy, Event Director, ISC Events at Reed Exhibitions. Ninety new exhibitors When the show opens, there will be around 90 new exhibitors, including Gunnebo, Mobotix, Liftmaster, Cypress Integration Solutions, SAFR from Real Networks and Security Brands. Because it is a regional show, some large companies have smaller exhibits that feature their local and regional personnelLarger exhibitors at the show include Brooklyn Low Voltage Supply (distributor), Axis Communications, DoorKing Inc., NAPCO Security Technologies, and All American Monitoring. Because it is a regional show, some large companies have smaller exhibits that feature their local and regional personnel eager to meet with security professionals from the Northeast corridor. ISC East will be co-located with the Infosecurity ISACA North America Expo and Conference. The combination provides a comprehensive approach to physical and cyber security products and services. Rapid growth in past three years The audience at ISC East is unique – about 90% of attendees do not attend ISC West. The show has seen rapid growth in the past three years, and attendees report a new energy and passion among exhibitors and attendees. By every measure, the show will be bigger than last year, while maintaining the intimate, smaller vibe of a regional show. A “Crack the Tap” cocktail reception will be held at the end of the first day on the show floor. A charity activity on the ISC East show floor will be presented in partnership with Mission 500, an organization that works to serve the needs of children and communities in crisis. At the Mission 500 booth which will be adjacent to the Main Stage, each exhibition attendee will be invited to create a “care package” of essential hygiene items that will be delivered to children and families in need, in partnership with Volunteers of America - Greater New York. Attendees may write a note of encouragement to be included in the package they assemble. Event will highlight security startups A Nov. 20 (Wednesday) session at ISC East will highlight startup companies in a format reminiscent of television’s “Shark Tank.” Four finalists will take to the main stage and provide a seven-minute pitch about their new product or service. After the “Tech Tank” presentations, audience members vote live on their mobile app for their top choice, and the winner will be announced during the “Crack the Tap” cocktail reception.Four finalists will take to the main stage and provide a seven-minute pitch about their new product or service “It’s a program that allows attendees to see and hear about cutting edge technologies,” says Nicole Miller, Senior Conference Manager, ISC Security Events. The four finalists, chosen from more than 40 exhibitor submissions, are Arrow Labs’ MIMS Smart Watch for mobile incident management; Cepton Technologies’ Helius Smart LiDAR System; SAFR from RealNetworks’ Facial Recognition system, and ZeroEyes’ Weapons Detection and Active Shooter Mitigation Platform. New partnership with ASIS New York Beginning in 2020, ISC East will be combined with the ASIS New York chapter’s annual conference and expo, which was held in May this year. Starting next year, the events will be rolled into one industry-wide expo and education event geared to serving the total security industry in the tri-state area (New York, New Jersey and Connecticut). In 2020 there will be an enhanced education program along with the combined event next fall. In recognition of the new partnership, ISC East is involving the ASIS NYC chapter in this year’s show, too, with a booth on the show floor, and promotional logos and signage. The ASIS chapter will have a table at the SIA Honors Night event on Nov. 20. “We are really involving them this year to show we are working together and partnering going forward,” says Shaughnessy.
Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cloud. The flexible deployment model – enabling a cloud installation, an on-premise installation or any combination – is one of the ways Qumulex seeks to differentiate itself in the market. Installing fully on-Premise system The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected The system is designed so that an integrator can install a fully on-premise system and then later ‘flip a switch’ and transition to a cloud model, says Tom Buckley, VP Sales and Marketing. The Qumulex initial 1.0 system launch is currently entering its final beta test. Full commercial availability is expected in the first quarter of 2020, which the company will highlight in a bigger 20x20 booth at ISC West next year. The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected. Ensuring cybersecurity, the gateway provides a ‘firewall’ of sorts to avoid any cybersecurity threat from entering an enterprise through a vulnerable IP camera. The system is designed to be ‘cloud-agnostic’ and to work with any public or private cloud, using Docker software and ‘containers,’ a standard unit of software that packages code and all its dependencies so an application runs quickly and reliably from one computing environment to another. At launch, the Qumulex system will use the Google cloud. Greater situational awareness The open platform approach will enable users to assemble best-of-breed solutions Another point of differentiation for the new platform is a unified access control and video surveillance environment – both are part of the same program. Access control can drive video events and vice versa for greater situational awareness. A unified system avoids having to integrate separate systems. A big emphasis for Qumulex is ease of use. They have designed the user interface to be as simple and intuitive as possible, using consumer-oriented systems such as Nest and the Ring Doorbell as a model of simplicity. Finally, the open platform approach will enable users to assemble best-of-breed solutions. Keeping it simple, the system offers native integration with only the major camera manufacturers that represent most of the market: Axis, Hanwha, Arecont, Panasonic, Vivotek and Sony. Longer-Term storage Other cameras can be included using the ONVIF interface. On the access control side, the system will initially be compatible with Axis door controllers, Allegion wireless door locks and ASSA ABLOY Aperio wireless door locks. Future versions of the software will seek to integrate HID Edge and Vertx and eventually Mercury panels. The gateway device may incorporate only a solid-state drive (SSD) for buffering Qumulex is taking a ‘mobile-first’ approach. The software is designed as a ‘progressive web app,’ which means is it is adaptable to – and fully functioning in – any smart phone, mobile device, laptop, or on a desktop computer with multiple monitors. The gateway device may incorporate only a solid-state drive (SSD) for buffering, or as many hard drives as the customer wants for storage. Short-term storage is available in the cloud, but local hard drives may be used for longer-term storage which can get expensive given the monthly fees of cloud storage. Using third-Party server To manage the variety of scenarios, Qumulex will offer a line of gateways and recorders, or a customer can use a third-party server along with Qumulex, which is an open system. Qumulex will use a manufacturer’s representative sales model and has already signed up 11 rep firms covering the United States (the initial target of the launch). The company has been spreading the word among integrators, too, first at the ISC West show last spring, when 98 integrators saw demonstrations of the system at a suite in the Palazzo. Another 48 integrators saw the system at ESX in Indianapolis in June. At the recent GSX show in Chicago, Qumulex had a booth on the show floor, where they scanned 450 badges that yielded 176 unique integrators. Entering the physical security market Qumulex just closed a second round of funding, which does not include any ‘institutional’ money Buckley estimates there are around 10,000 total security integrators in the United States that sell products similar to theirs at their price point. They are working to build their database to reach out to those integrators. (Exacq had more than 4,500 dealer/integrators before it was sold to Tyco/Johnson Controls.) Qumulex is the third company to enter the physical security market by the same team that launched two other successful startups in the last 20 years: Exacq Technologies (sold to Tyco in 2013) and Integral Technologies (sold to Andover Controls in 2000). Both previous companies were built around a need to help the integrator community transition to newer technologies. Qumulex just closed a second round of funding, which does not include any ‘institutional’ money. The first round of investment involved only the founders, and the second round added some ‘angel’ investors to the mix. The funding allows more flexibility and control over the company’s timeline and the evolution of the product’s feature set, free of outside mandates, says Buckley.
Case studies
Device and application security solutions provider, Trustonic has announced that OPTOLANE has selected Trustonic Secured Platform (TSP) to bring security and trust to the company’s new connected medical diagnostic device. The product is primarily used at the point-of-care for early diagnosis and preventative healthcare, particularly for diagnosing cancer, infectious diseases and congenital abnormalities. Healthcare devices have become top targets for cybercriminals due to their critical nature, the valuable intellectual property they employ and the sensitive personal information that they collect and store. Research shows that there were 8.2 attempted cyber-attacks per connected healthcare endpoint in each month of 2018. Smart diagnostic platform OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform To ensure security, privacy and high performance, OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform, which integrates Trustonic’s Trusted Execution Environment (TEE). OPTOLANE’s in vitro diagnostic (IVD) platform, called LOAA (Lab on an Array) Analyzer, examines blood and tissue samples for multiple targets, including DNA, RNA, proteins and metabolites, in real-time. It was developed to satisfy market demand for ‘sample to answer’ IVD tools and enables sample extraction through to analysis with a single cartridge. “Investment in connected healthtech is increasing and IVD is an important segment in the global diagnostics industry,” comments Ben Cade, CEO of Trustonic. “These solutions add significant value to diagnosis and treatment, enhancing the well-being of the general public while increasing productivity and reducing costs. But, where personal data this sensitive is being captured, processed, and transmitted, the appropriate steps must be taken to protect it from malicious actors.” Trustonic security platform Trustonic’s hardware-backed security platform, TSP, enables secure and private data extraction, processing, storage and transmission. The technology: Enables a secure image processing channel from the sensor to the application processor; Provides cryptographic tools to protect individuals’ sensitive medical data; Ensures data integrity; Creates a secure environment to run algorithms analyzing raw data from the sensor; Encrypts sensitive data when being shared with the cloud. Do Young Lee, CEO of OPTOLANE, says “There is clear demand for innovative new diagnostics solutions that go from ‘sample-to-answer’ in real-time. Importantly, though, we fully understand our responsibility to protect patient data." Enhanced data security To deliver connectivity while protecting the sensitive personal data collected by diagnostic devices, we needed a proven hardware-backed security foundation. Trustonic’s experience protecting smartphones, wearables and IoT hardware, and securing critical mobile applications in the financial and automotive sectors, is assurance that our devices and patient data are secured to the highest standard.” OPTOLANE expects to receive FDA certification for the new device in the first quarter of 2020. Once certification is achieved the product will be available to clinicians in healthcare facilities around the world.
Being a property management and home security service provider, DOM UK Ltd. considers specialized door security solutions for different premises such as holiday homes, serviced apartments and other temporary accommodations. By implemented keyless solutions on a rented property or serviced apartment provides effortless access granted by property managers and ease of control. Guests can also benefit as the last thing they want to worry about is looking after an extra set of keys. DOM Tapkey cloud-based smart locks DOM Tapkey, is a cloud-based smart lock, which diminishes the problem of remotely managing property access, including the expense and hassle of constant key exchanges, the disruption of early check-ins and overstays, and minimize the security risks of unauthorized access. A similar issue was put across to DOM UK by a popular AirBnB situated in Oxford. Pillow Talks are a specialist property management business based within Oxfordshire. Both Pillow Talks and their tenant, Ginger Video, who are renting premises for their business needs, wanted to replace their existing mechanical locks with an alternate, safe and secure digital locking solution. Allowing them full management and control of the premises. Digital locking system With DOM Tapkey, users can use the same ID on several smartphones and tablets simultaneously that works for temporary tenants or small business owners renting premise, allowing multiple access at any one time. DOM Tapkey is a revolutionary way to lock and unlock the doors to homes and offices The revolutionary digital locking system allows users to manage access and security of their home or office environment with the easy-to-use Tapkey app. They can add or remove users with smartphones and transponders on their smartphone conveniently. Whether at work or a meeting, it’s a quick and easy process. This locking system offers an innovative plug-and-play solution for all security needs. Home and Corporate Security National Sales Manager, DOM UK Ltd, Mr. Lloyd Chitty states “The project itself had been installed by one of our trusted partner and security expert, Oxford SMS (now J.Priest&Son), the tenant was highly impressed by the product and service provided by Mr. Jason Priest, they requested for a digital cylinder to be installed within their private home and labeled the locking cylinder as a new 21st Century system.” DOM Tapkey access control solution is more than just a digital door opener. It’s also a smart management tool that allows homeowners to remotely program electronic keys, send authorizations to other users, share access and receive event notifications. DOM Tapkey is a revolutionary way to lock and unlock the doors to homes and offices. Simply place the smartphone against the digital cylinder and avail instant access.
Pulse Secure advances remote access to web applications such as Microsoft Office 365 and network resources to help 3,000 staff enjoy a better work-life balance leveraging Pulse Secure. Pulse Secure, a provider of software-defined Secure Access solutions, has announced the delivery of a successful project at one of Italy’s largest media organizations designed to help foster mobile workforce productivity while ensuring protected, compliant access to cloud and data center applications. RCS MediaGroup is one of the leading multimedia publishing groups, active mainly in Italy and Spain across all publishing fields, spanning from newspapers to magazines, from digital to books, from TV to new media, and to training. It is also one of the top players in the advertising market and in the organization of iconic events and major sporting formats, such as the Giro d’Italia. Protecting against cyber-attack We maintain several security controls across our network, as well as regularly cyber-security training" The RCS Group publishes the daily newspapers Corriere della Sera, La Gazzetta dello Sport, El Mundo, Marca and Expansion, as well as numerous magazines, the most popular including Oggi, Amica, Io Donna, 7, YO Dona and Telva. Like many other popular enterprises, being an integral part region’s culture and communications has made RCS Group a target for cyber threat actors. “Protecting our systems against cyber-attack is a critical requirement as is ensuring our staff and journalists have easy, flexible and secure access to their work,” says Monica Venanzetti, Network Manager for RCS MediaGroup in Milan. “To meet this need, we maintain several security controls across our network, as well as regularly conduct cybersecurity training. We deployed our first VPN solution in 2006 to enable secure access to our systems and it was time to progress our capabilities.” New cloud services RCS MediaGroup employs over 3,000 staff including 700 journalists and as Giandomenico Oldano, Director of IT operations for RCS MediaGroup, explains, “As a group, we have an ongoing strategy to help our staff embrace smart working. This is part of an initiative to improve the work-life balance of our employees and reduce their traveling time, which in a busy city like Milan can be very time consuming.” As part of this work-life balance strategy, RCS MediaGroup has invested in more remote, mobile and cloud technologies and recently moved its staff onto Microsoft Office 365 to encourage this transition. “To meet this need and as part of our commitment to ensuring best practice secure access, we decided to upgrade our legacy VPN to provide more capacity and to better integrate with new cloud services such as Office 365,” says Venanzetti. Cloud single-sign on The simplified management interface allows RCS MediaGroup to set up enterprise-wide policies" “We examined several options and Pulse Secure provided us a modernized platform with more advanced features including endpoint compliance and cloud single-sign on. We found the tool comparatively simpler to administer, very interoperable and with a broader feature-set.” The upgrade process was straightforward, and the simplified management interface allows RCS MediaGroup to set up enterprise-wide policies that make it easy for its remote users to connect to its critical publishing systems. The solution also incorporates client checking technology that ensures that its users’ devices, both corporate and personally owned endpoints, are running the right system and security patches before they can attach to the corporate network. “One of the most important features was deep support for our users’ devices including tablets, laptops and PCs across both Apple and Microsoft environments,” says Oldano. Cloud-based applications “Our upgrade has been a success and provides a lot of potential for future projects that will allow us to offer secure access for more cloud-based applications. Pulse Secure has been with us throughout this process and its technology is helping us to deliver on our commitment towards smarter working for all our staff.” Pulse Secure enables enterprises to centrally manage Zero Trust Secure Access to applications, resources and services that are delivered on-premise, in private cloud and public cloud environments. The Pulse Access Suite delivers protected connectivity, operational intelligence and threat response across mobile, network and multi-cloud environments in order to provide easy, compliant access for end users and single-pane-of-glass management for administrators. “Enterprises are fortifying capabilities to accelerate mobile workforce productivity and take advantage of cloud computing.” Comprehensive and integrated Pulse Secure offers a proven, comprehensive and integrated suite that works with an enterprises hybrid IT infrastructure to enable a simpler, more manageable and scalable approach to secure access,” said Paul Donovan, vice president of EMEA sales at Pulse Secure. “We are pleased to have been selected by RCS MediaGroup, a prominent and progressive market leader in multimedia publishing and look forward to supporting their on-going digital transformation initiatives.”
Delta Scientific, the prominent manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, announced that, on Monday, October 7, at approximately 7 am, a Delta MP5000 portable barrier stopped a stolen Dodge Ram pick-up truck at an entrance gate of the Naval Air Station - Corpus Christi. The stolen car was chased by the local police onto the base. The barrier then impacted the rear of the vehicle, disabling it. Simultaneously, the Air Station announced that an unauthorized person was on base and the facility immediately would go under lockdown with all gates secured to all traffic. Having taken flight after the truck was stopped by the barrier, the intruder was quickly apprehended within the hour and taken into custody by the Bureau of Alcohol, Tobacco, Firearms and Explosives. "This is the second attempted intrusion into the Naval Air Station - Corpus Christi in eight months," explained Greg Hamm, Delta vice president of sales and marketing. Control vehicle access "On February 14, a Delta MP5000 portable barrier stopped a stolen Ford Edge crossover SUV at the North Gate. The trespasser had driven across the base to escape but crashed into the Delta unit and erupted into flames. The driver was shot and killed." Delta's totally self-contained MP5000 mobile deployable vehicle crash barriers now carry an ASTM rating as high as M50, able to stop and disable a 15,000 lb (66.7 kN) G.V.W. vehicle moving at 50 mph (80.4 kph). They tow into position to control vehicle access within 15 minutes. No excavation or sub-surface preparation is required. Once positioned, the mobile barricades will unpack themselves by using hydraulics to raise and lower the barriers off their wheels. DC-powered pumps will then raise or lower the barriers. Once the event is over, procedures are reversed and the barriers are towed away.
ADT, a security and automation provider serving residential and business customers, announces a partnership to integrate mobile safety solutions into the Lyft platform. Extending ADT’s safety and technology to mobile applications will bring an additional layer of security to Lyft’s rideshare experience. With ADT’s mobile safety platform, Lyft seeks to give riders and drivers more peace of mind. The pilot will focus on an ADT-powered safety feature within the Lyft app that will discreetly connect Lyft users who feel unsafe - by voice or SMS chat - with a security professional at one of ADT’s owned and operated monitoring centers. Detailed incident information After contacting the user, or if there is no response, the ADT security professional will alert authorities as needed so they can arrive at the user's location, equipped with detailed incident information. “As a rideshare company with an exceptional commitment to rider and driver safety, Lyft is the ideal partner for ADT,” said Jim DeVries, President and CEO of ADT. When it comes to safety, there is no better partner for Lyft than ADT" “We look forward to working closely with the Lyft team as together we bring our industry-leading technology to rideshare riders and drivers. We continue to leverage our deep expertise, technology and the trusted ADT brand to expand our reach into new areas of security beyond the home and business. Partnering with Lyft broadens our exposure while enabling ADT to further realize our mission and belief that people deserve to be safer and more secure wherever they are.” Professional monitoring services ADT’s data-driven mobile safety solution provides Lyft with a platform to extend the safety and security of ADT’s professional monitoring services to its users within its mobile app experience. Beginning in early 2020, Lyft intends to pilot the ADT mobile safety solution in nine U.S. markets including Chicago, Los Angeles and New Jersey, with potential to implement nationally to Lyft’s 30 million riders and 2 million drivers. “When it comes to safety, there is no better partner for Lyft than ADT,” said Ran Makavy, EVP and Chief Product Officer of Lyft. “We are extremely excited to enter into this partnership and look forward to a meaningful, industry-leading collaboration.”
VuWall, the pioneer in video wall control and AV network management, announces that the Canadian Space Agency (CSA) successfully deployed VuWall's VuScape processor to monitor the launch of the satellites and their trajectory for the RADARSAT Constellation Mission (RCM). Installed by Applied Electronics, VuScape video wall controller shares and manages incoming content to the control rooms' video walls. Managing multiple surfaces and streams of information "The RCM will collect information from multiple satellites that is critical to maritime management, disaster management, and ecosystem monitoring in Canada," said Paul Vander Plaetse, CEO at VuWall. The CSA can manage multiple surfaces and streams of information, cutting down on the amount of cabling" "From a single VuScape processor, the CSA can manage multiple surfaces and streams of information, cutting down on the amount of cabling. This is an excellent example of how our affordable visualization solutions can be scaled and tailored to meet the needs of any organization — from the smallest to the largest and most mission-critical deployments — while adding capabilities that further the value of the system." Performing maintenance and control operations For the project, VuWall's VuScape processor shares the incoming information on the video wall in both mission control rooms and meeting rooms. Control room operators can easily configure and update the layouts as needed on each of the video walls, providing them with at-a-glance information that's vital for performing maintenance and control operations on the satellites that they are mandated to monitor. With a single VuScape processor driving multiple video walls in multiple rooms, the CSA is able to manage the access and control of each individual surface with user profile management, limiting access to view and/or manage video wall content only to authorized personnel.


Products


Round table discussion
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
Fire and security systems are two elements of the same mission: To keep buildings and their occupants safe. However, the two systems often operate independently and may not be integrated. Should there be more integration and what are the pitfalls? We asked this week’s Expert Panel Roundtable: What are the challenges and opportunities of integrating security and fire systems?
An aging employee population and the influx of a new generation of workers and customers is driving change in the physical security industry. Millennials – those born in the 1980s and mid-1990s – are especially impacting how the industry operates, the technologies it produces, and the customers it serves. This tech-savvy generation grew up with the Internet at their fingertips. They embrace innovation in all its glory and expect it to play a seamless role in their lives – and work. We asked this week’s Expert Panel Roundtable: How are millennials changing how security systems are designed, installed and/or operated?
White papers

Financial Institutions Require Future-Ready Physical Security Technologies
Download
Is Your Access Control As Effective As You Think?
Download
Convergence Of Physical And Logical Access
Download
Mobile Access - What You Need To Know
Download
Best Practices For Integrating Mobile Into The Access Control Architecture
Download
