The DoorBird app has been awarded the ‘Software Made in Germany’ and ‘Software Hosted in Germany’ quality seals. The German Association of Medium-Sized Enterprises in the IT Industry (Bundesverband IT-Mittelstand e.V.) awards the seals to German companies whose software meets particularly strict data security and quality criteria. The app is the central control tool for DoorBird IP video intercoms developed and manufactured by Bird Home Automation in Berlin. With the Doo...
Maxxess Systems, a globally renowned company in event response management and collaboration systems, is pleased to announce their partnership with SmartPTT by Elcomplus, an advanced communications radio technology company, to deliver a powerful integration with Motorola Digital Radios that will improve response times to critical events. SmartPTT integration with InSite This new SmartPTT integration with Maxxess InSite allows InSite to automatically communicate over Motorola Digital Radios in t...
UK-based Trustonic announces a strategic partnership with the smartphone manufacturer Samsung Electronics Co. Ltd. to better serve their mutual partners and customers. This multi-year deal will lead to the integration of Trustonic’s security platform with Samsung’s device-embedded Knox security platform. This creates a single-cloud solution for cellphone operators and distributors to manage and protect their Samsung smartphones and tablets throughout the supply chain. Trustonic&rsqu...
Threatscape, the specialist cyber-security service provider with offices in London and Dublin, announced that it has been awarded the coveted Gold Security Partner designation by Microsoft. This recognises Microsoft partners who have demonstrated the skills and expertise to design, deploy and manage security solutions to protect enterprise-scale clients against sophisticated cyber threats. The award acknowledges Threatscape’s continued investment in its Microsoft Security Practice, which...
Allegion US, a security products and solutions provider, announced the integration between Overtur™, the industry collaboration environment for door hardware and openings, and Autodesk’s BIM360, a platform connecting project teams and data from design through construction. With this powerful new integration app from Allegion, professionals working on projects using Overtur as a collaboration platform can directly export punches collected using Overtur Mobile and the Punch List tool...
Panasonic Public Safety Solutions Division, a business unit of the newly formed Panasonic i-PRO Sensing Solutions Co., Ltd., announces the immediate availability of Panasonic IDguard, an identity redaction solution that reduces up to 90% of the manual effort associated with editing video files of sensitive content. “In developing this solution, Panasonic has combined AI and machine learning technology to automate the video redaction process,” said Bill Brennan, President of Panasoni...
As educational pioneers continue the challenging conversation about what the new normal will look like for students across the nation, Allied Universal®, a security and facility services company in North America, is helping school administrators and campus safety departments plan and prepare for students returning to school. Allied Universal’s more than 7,500 campus Security Professionals safeguard nearly 700 schools/universities nationwide. Over last several months, Allied Universal’s K-12 and higher education experts have been sharing best practices, guidance and tools to help schools provide a safe and secure environment for all students and faculty. Kiosk screening technology This guidance includes the following: Support ‘no touch’ entry into buildings, dissemination of personal protection equipment (PPE) and disinfecting supplies and social distancing requirements to keep staff, students and parents safe. Allied Universal’s CARE Ambassadors are available to help ease return to school anxieties and are available to welcome, inform and educate students and parents on all aspects of the return to school initiatives. Conduct distance temperature screening with a broad range of solutions such as handheld, fixed or semi-permanent thermal screening imaging and robotic and kiosk screening technology. Assist with traffic control, provide improved management of drop-offs and pickups, and support ingress and egress locations around school buildings. Help mitigate further risks with advanced technologies such as Allied Universal’s HELIAUS® platform, LiveSafe®’s Mobile Safety and Security App, access control and remote video monitoring solutions. Resuming peer-To-Peer learning Institutional stakeholders are asking questions about what the ‘new normal’ will look like for our students" “Institutional stakeholders are asking questions about what the ‘new normal’ will look like for our students, while, at the same time, our educational leaders are balancing budgets and dealing with lay-offs and staffing decisions while continuing to provide a high quality academic experience for students across the country,” said Stephen R. Aborn, Director of Higher Education at Allied Universal. “We are here to support and offer a variety of solutions to keep all school campuses safe during the COVD-19 pandemic.” Recently, the Centers for Disease Control and Prevention (CDC) provided recommendations on how to keep the communities safe while resuming peer-to-peer learning. Decreasing spread of the virus The CDC released this guidance to inform a gradual scale up of operations with the ultimate goal to decrease further spread of the virus. “We recognize the hard work of our education leaders and support their mission of furthering learning and education to all students in a safe environment,” said Mahsa Karimi, Education Manager at Allied Universal. “It is our #1 goal to provide our education partners with the safety resources and tools they need so they can focus on what they do best—to continue to teach and inspire our students.”
PSA, the consortium of professional systems integrators, announces the addition of Mobile Pro Systems to its network. Mobile Pro Systems offers a family of different network/IP based mobile video surveillance systems utilized by many government and commercial entities. “Mobile Pro Systems’ technology is a great addition the PSA’s line card,” said Tim Brooks, PSA’s vice president of sales and vendor management. “They provide flexible and mobile solutions for powering security, network and communications technologies.” Network-Based video cameras By combining Mobile Pro Systems’ power-based hybrid platforms and various technologies together, they offer extremely effective products. Mobile Pro Systems utilizes network-based video cameras, video management and recording systems, wireless mesh, cellular communications, solar power and video analytics as fully integrated solutions. “We look forward to providing for and serving the needs of the PSA customer. We design our products to be ‘futureproof’, offering the greatest flexibility with components in the industry”, said Steve Dunker, V.P. of Business Development. Mobile surveillance solution “Mobile Pro Systems has professionally engineered purpose-built systems that include the basics and add smart technologies which provide dependability for years of successful operation. Our goal is to provide the user with the optimal mobile surveillance solution.” Mobile Pro Systems’ products are excellent ‘re-deployable assets’ for securing construction sites, utilities or any other facilities deemed as needing ‘critical infrastructure protection’ or CIPs. The securing of these remote areas is being strongly enhanced by Mobile Pro Systems’ solutions as they provide both live/recorded video & alarm solutions that can be monitored and viewed both at the site and from remote locations.
Trustonic and Huawei announce the next step in their partnership to bring simplicity and greater security to cellphone applications. Trustonic Application Protection (TAP) now supports Huawei’s hardware-backed Trusted Execution Environments (TEE) “iTrustee”, and the HUAWEI P40 Series smartphone supports the TAP SDK at launch. Application developers can use the TAP development platform to leverage Huawei’s hardware-backed security for features such as Trusted User Interface (TUI), which is vital for the next generation of cellphone banking, payments and mPOS, automotive and cellphone identity-based apps. The TAP platform makes it easy for application developers to build advanced security and shielding into critical cellphone apps. Advanced security features iTrustee’s integration with TAP will simplify the process of secure application development for Huawei devices This will help Huawei to create a secure ecosystem for its Huawei devices, starting with the HUAWEI P40 Series, while adding support for the other devices that are upgraded to EMUI 10.1. iTrustee’s integration with TAP will simplify the process of secure application development for Huawei devices and their acceptance into the broader application ecosystem. “The TAP development platform gives application developers access to the advanced security features that they need to bring trust and richer user experiences to app users across billions of smartphones worldwide,” adds Dion Price, Trustonic CEO. “This announcement is a significant achievement in just one year of working with Huawei and will bring hardware-backed security to an even wider range of applications and services.” Digital car key sharing This news builds on the 2019 launch of the first development platform to enable developers to protect their apps and assets with TEE across different devices. TAP is the only application development platform that combines hardware-backed and software based in-app protection, enabling any developer to build and deploy applications with advanced security, and make use of TUI to shield sensitive user-interactions from potentially-compromised main device operating systems. TAP is already protecting a wide range of sensitive cellphone application use-cases globally. This includes the digital car key sharing apps for Volkswagen Group and Hyundai, and off-the-shelf smartphone secure payment acceptance with Rubean.
Matrix PRASAR UCS is an Enterprise Unified Communication Server that connects internal and external decision makers at multiple locations for effective communication and collaboration. It brings people together anytime, anywhere, and on any device with our integrated collaboration infrastructure for voice and video calling, messaging, and mobility. With a range of enterprise grade calling features, it improves employees’ productivity and speeds up the decision-making process. Key features: Scalable up to 2,100 UC Users Full Fledged Voice Mail system Up to 550 Concurrent Calls Mobility VARTA Application Up to 99 SIP Trunks Presence Sharing 248 VoIP Channels 64 Simultaneous Calls Corporate Directory Integration 1U Enclosure
Allegion US, a provider of security products and solutions, announces the launch of Schlage® Mobile Access Solutions, a comprehensive, secure and flexible access control solution portfolio. In the age of digital transformation and the evolving mobile economy, providing secure, convenient access is at the forefront of security challenges faced by multifamily properties, businesses and campuses alike. The Schlage Mobile Access Solutions portfolio redefines access control for the mobile world. Mobile credential experience As a complete cloud-based ecosystem, it enables the use of mobile credentials on openings across a property or site, delivering straightforward mobile credential experience for end users and site administrators. Developed by a pioneer in the security space for 100 years, Schlage Mobile Access Solutions is a comprehensive portfolio that provides customers and end users with a premium mobile offering, providing them seamless access to where they live, work and visit: Schlage Mobile Access Credential - The new credential features AES-256 asymmetric credential encryption and works in offline scenarios once downloaded from the cloud. This means it is reliable and even works in environments where internet access is down or cellular service is spotty. Schlage Mobile SDK - Designed for Physical Access Control Software (PACS) providers to easily integrate this Bluetooth mobile credential into their system, which allows seamless credential management and secure delivery/communication with Schlage locks. Schlage Mobile Enabled Control™ Smart Lock - Schlage’s multifamily resident door lock is now mobile enabled and allows properties to offer high-tech, convenient security to residents. Schlage NDE Mobile Enabled Wireless Lock – The wireless cylindrical lock is now mobile enabled, and the new interior push button expands the way the lock operates to include storeroom, office, privacy and apartment functions. Schlage LE Mobile Enabled Wireless Lock - The wireless mortise lock is now mobile enabled and available with an indicator, interior push button or deadbolt to support storeroom, privacy, apartment and office applications. Schlage MTB Mobile Enabled Multi-Technology Reader – The new Schlage MTB Series Readers are now mobile enabled and compatible with 2.4 GHz Bluetooth, 13.56 MHz smart and 125 kHz proximity, allowing the ability to process multiple credential formats simultaneously. They feature a RS-485 interface and out-of-the-box support for Open Supervised Device Protocol (OSDP) for secure bi-directional communication. The MTB series can be simply installed with plug and play mode or commissioned via the ENGAGE app for simplified, in-field configuration. Schlage CTE Controller - Designed to work with a Schlage mobile enabled multi-technology reader, the CTE is an ENGAGE™ enabled, single-opening controller that allows perimeter and common area openings to be managed in a single system along with Schlage Control Mobile Enabled Smart Locks and NDE cylindrical and LE mortise wireless It is ideal for multifamily, commercial mixed use and retail storefront applications. Convenient access control solution Schlage Mobile Access Solutions is ideal for small to medium-sized businesses" While mobile access is not new to the industry, Schlage’s belief in open global standards and interoperability, along with its commitment to cybersecurity, differentiates its portfolio from competition. This ultimately provides customers with better options for control of their security solutions in years to come. “Allegion is always looking for ways to address our customers’ evolving needs with real, sustainable innovation, so we’re excited to launch this comprehensive cloud-based mobile enabled portfolio,” said Brad Sweet, commercial marketing leader at Allegion. “Schlage Mobile Access Solutions is ideal for small to medium-sized businesses, multifamily properties and higher education campuses that want a customizable, interoperable, secure and convenient access control solution.” The launch of Schlage Mobile Access Solutions portfolio is the next wave in Allegion's mission to serve the industry with flexible access control solutions, making seamless, comprehensive security the new standard for businesses, institutions and beyond.
Following on the success of its entertaining and informative ‘Virtual NAB Booth’, audio over IP solutions innovator, Barix will present its latest products for the professional Audio Visual (AV) market and host individual meetings with end users and systems integrators during its ‘Virtual InfoComm’ webinar event, slated to be held on June 22 and 24, 2020. ‘Virtual InfoComm’ webinar “While we will miss not being able to meet with AV professionals, integrators, and partners face-to-face in Las Vegas this year, we look forward to engaging with them virtually,” said Manuel Merki, Head of Marketing at Barix. Manuel adds, “Our Virtual NAB Booth for broadcasters was well received, and with more virtual event experience under our belts, our Virtual InfoComm may prove to be even better. With businesses starting to emerge from lockdowns and projects ramping back up around the world, this is a perfect time for end-users and integrators to learn what’s new from Barix and discuss their specific requirements with us one-on-one.” Audio Visual solutions on display A highlight of the webinar will be the full launch of Barix’s IP Former hardware Barix will present its latest AV product news on June 22, 2020 in three sessions, allowing attendees around the world to choose the most convenient time slots for their region - 10:00 am CEST, 1:00 pm EDT (10:00 am PDT), and 5:00 pm SGT. A highlight of the webinar will be the full launch of Barix’s IP Former hardware for transforming virtually any loudspeaker into an IP speaker, following its early preview at ISE. SIP Audio Endpoint Other featured products will include the SIP Audio Endpoint for bridging analog audio with SIP-based phone systems, a new SDK available for the AudioPoint 3.0 low-latency, audio-to-mobile streaming platform, and enhancements to the company’s Simple Paging solution for fixed and mobile paging. The company is also offering one-on-one, online meetings with Barix Chief Executive Officer (CEO), Reto Brader on June 24, 2020 to privately discuss specific topics, projects, and products of interest.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Being in the physical security industry for almost two decades has been an exciting journey, with significant changes that have impacted the world of security. Companies today must be proactive when it comes to securing their facility and are lucky to have so many choices when it comes to security technology. From the beginning, the ISC West show was always at the forefront of new technology and brought together the very best technology and industry professionals in the “City of Lights”. Back in 2001 when I first entered the security world, video surveillance was the key driver, and transitioning from analog cameras to IP video cameras was the talk of the town. In the early 2000s, the ISC West show was filled with video manufacturers showcasing their new IP cameras and the IT folks were just starting to get involved with the security decisions. Back then the ISC West show consisted of a myriad of video manufacturers exhibiting their camera lines. Where now in 2020 the high-profile enterprise-level camera manufacturers dominate the show floor. Over the last two decades, keeping up with the technology advancements of IP cameras was a difficult feat for most camera manufacturers and the high-profile manufacturers who had the funds to invest in R & D were the only ones that survived. Changing the game in video surveillance and access control In the early 2000s, the ISC West show was filled with video manufacturers showcasing their new IP cameras Another huge change that our industry has seen over the years was the increase in the number of acquisitions. Smaller security manufacturers started being acquired by the larger ones, which changed the game in video surveillance and access control. In addition to manufacturers, large security integrators like Convergint Technologies & Anixter were also buying smaller commercial integrators and dominating the market. At ISC West today, you will see predominately high profile – big name manufacturers and integrators where the smaller companies were either acquired or went out of business. Revolutions in the industry The security industry also faced a huge revolution with three major technologies driving growth in the security market – Network-based technologies (IoT enabled solutions), Access Control as a Service (ACaaS) and Mobile Credentials. ISC West saw this evolution coming and created specific educational seminars dedicated to these topics. Another big push that came into play in the last few years was being able to integrate a host of technologies like video and access control by using an open architecture platform. Many partnerships were formed in the security industry due to this massive push for integration. At ISC West, we now see many companies having their partners sharing booth space. This helps reduce costs for exhibitors in addition to giving smaller companies credibility by being recognized with the bigger players in the industry. In addition, ISC West makes it easy for attendees to plan out their show schedule in advance with the mobile app; creating a convenient way to access show information from mobile devices. From the beginning, the ISC West show was always at the forefront of new technology Emerging excitement Today, ISC West continues to be an exciting show that is jammed packed with educational sessions, networking events, and new pavilions that help segment the security industry into different sectors. An example of some new technology pavilions includes drones & robotics, loss prevention & supply chains, and emerging tech. All new start-up companies that are 5 years old or less can be part of the emerging tech section of the show. Here entrepreneurs can unveil new and upcoming security technologies; creating a win win situation for any size business looking to make its name known in the industry. New technology, innovations and rising trends Another huge focus at the ISC West show is public safety. A full range of solutions are offered at the Public Safety Pavilion including barriers/bollards/gates/perimeter security, surveillance, access control, and alarms - along with innovative technologies for gunshot and drug detection, license plate recognition, acoustics, facial recognition and AI, connected vehicles, communication systems and devices, alerts and monitoring, and active shooter solutions Today, ISC West continues to be an exciting show that is jammed packed with educational sessions, networking events, and new pavilions and training. Virtual reality demonstrations have also been available at the show to help attendees with preventative measures when it comes to school and public safety. Some new vape and metal detection technology built on the IoT concept will be featured at ISC West 2020 to help combat the vaping epidemic in our country. With active shooter incidents on the rise, metal detection and perimeter protection at schools will be an important part of the show. Awards and showcases When it comes to show press, we have also seen an influx of awards for security manufacturers that are exhibiting at the show. The major security publications have been offering manufacturers the opportunity to submit a product in distinct categories and win a prestigious award at the show. This creates “buzz” about your product and great for social media postings. Live video interviews at an exhibitors’ booth has also become a very popular tool to increase brand awareness and thought leadership for exhibitors. The ISC West show offers numerous ways to drive traffic to your booth and promote new product launches seamlessly. Over the years, the show has created a conduit The ISC West show offers numerous ways to drive traffic to your booth and promote new product launches seamlesslyfor manufactures and integrators to showcase new products and technologies to end users across multiple vertical markets. At the top of the game While the security industry continues to evolve, the one thing that stays constant is the wealth of information that ISC West offers to its attendees. The show always brings together the latest technologies and thought leaders that will continue to change the game in security for years to come.
As we surpass 2019, it’s high time we realize that by merging the digital and physical realm, IoT is destined to change the way we live and work. I have always been interested in the intersection between business and technology, and today it seems that the brave new technological world we have been dreaming over centuries has arrived. With everything from home appliances to smart vehicles, portable devices are connected to the internet and exchange crucial data. According to the statistics, there are 26.66 billion IoT connected devices around the globe. Which statistically leaves every citizen of the world with at least 3 devices. IoT in every day life I must say the numbers are quite mind-boggling! And this leaves a lot of room for improvement by incorporating the Internet of Things in software development; whether it’s a cellphone app or web. According to the statistics, there are 26.66 billion IoT connected devices around the globe. Which statistically leaves every citizen of the world with at least 3 devices It may interest you to know that the Internet of Things has the potential to touch every domain and nearly every aspect of human life. According to sources, impact on IoT leads to: By 2020, 50 billion devices are expected to connect to the internet In 2015, 3.5 connected devices per person have now reached almost 7 8 billion cellphone broadband access points by 2019 5 million IoT jobs by 2020 70 percent a year growth through 2018 in total sales of clothing and accessories incorporating computer technology, rising from $3 billion today to $42.5 billion $3.3 trillion market for ‘Smart City’ applications and services by 2025 The impact of smart homes Instead of saying the home is where our heart is; a home is where a bot is. However, IoT hasn’t entirely arrived in our homes. I mean, we are still required to order groceries the minute we run out of eggs and Greek yogurt. Slowly and steadily we are getting there; it seems the latest advancements in artificial intelligence and big data analytics will definitely work wonders for us. Smart homes are no longer a dream project; we can soon expect everything to be governed by the “brain” or a central platform. Moreover, bots will be seen tackling a certain set of functions related to more difficult tasks, and lastly niche bots, in charge of single tasks such as vacuuming the house or addressing more complex duties like accounting, coaching or household managing. Tech giants, or should I call them current development frontrunners like Amazon, Google, Samsung and Apple are expected to come up with something nerve-cracking. The benefits of IoT Other than this, with IoT, you will be able to work smarter and not harder. Artificial intelligence and advanced analytics can help create a more intelligent work environment. For example, the right AC temperature in shared office spaces help us book the most convenient meeting room, and moreover, take into account the room preference by setting the right temperature, lighting, and can automatically restock office supplies. This simply leads to: More efficient office operations Energy savings Comfortable work environments Consequently increased employee productivity The dark side of the Internet of Things The potential risks Every technology indeed comes as a boom, but that doesn’t mean the grass will be greener on the other side. Furthermore, we will uncover how even after offering so much convenience why IoT poses so much risk. Like I said before, IoT can be integrated into anything from coffee machines to fitness watches leading to make our lives more convenient. But what happens if they turn bad? When being unwillingly infected or hacked, these blessings can certainly turn into huge threats. IoT can be integrated into anything, leading to make our lives more convenient Devices, systems and the lack of security It may interest you to know that IoT devices can become bots that blindly follow commands to commit crimes as part of a botnet. What is a botnet, you may ask? Well, it is a network of infected devices that are mainly abused by the attacker to perform tasks such as carrying out DDoS attacks, Bitcoin mining and spreading spam emails. Mainly being used to carry out DDoS attacks and to mine for cryptocurrencies, these botnets have the potential to have a larger impact by making IoT devices do much more, such as send spam messages featuring dangerous malware. Botnets can also carry out click-jacking campaigns, distribute fake advertisements, and even worse, infect other IoT devices. Botnets can also carry out click-jacking campaigns, distribute fake advertisements, and even worse, infect other IoT devices Much like most malware, botnets can be found on dark marketplaces. The source code can be purchased and leaked, depending on the type of service. In case, an IoT device is already infected, another bot can attempt to replace the infection with its code and in some cases also "repair" the security vulnerability. But most of the time it fails! No matter how innocent these proof-of-concept attacks may seem, one cannot deny the fact that IoT devices and systems aren’t properly secured. Hackers can easily gain control of them and cause complete chaos like never before. Collecting information at a cost But how much information can an IoT device collect? What I mean is that by hacking a webcam, one can see what they are pointed at without you even knowing it, smart TVs and personal assistants can pick up sound, and smart cars can give clues to whether or not someone is home. Honestly, the amount of information collected on these IoT devices cannot be determined at any cost. And with everything in the cloud, such information can be intercepted or rerouted to a malicious server and be abused if not properly secured. The more we surround ourselves with IoT devices, the more motivation cybercriminals receive to target us! With the time passing by, let’s simply hope that connected device security will dramatically improve.
The next step in the journey of digital transformation, the fifth generation of wireless communications technologies (5G) will have an enormous impact on mankind, and on every industry including security. In short, 5G will disrupt the way we live and work. To discuss the changes, we presented our questions to Benoît Jouffrey, VP 5G Expertise at Thales, which is at the forefront of the transformation with an emphasis on trust and security. Following are his responses. Q: In layman's terms, what is the difference between 4G and 5G ecosystems as they relate to opportunity, flexibility and choice in networking tools? Jouffrey: Compared with largely one-size-fits-all 4G services, the 5G ecosystem will provide organizations with much greater choice and flexibility in the way they communicate over mobile networks. The network slicing capabilities of 5G means that business can have their own independent networks, with each one customized to their unique requirements and backed up by service-level agreements (SLA). Another aspect of 5G will be the ability to drive latency between UE (User Equipment) and network down to below a few milliseconds, which will massively boost the performance and scalability of enterprise applications. Q: How can these capabilities drive a company's digital operations? 5G will allow enterprises to be connected more efficiently Jouffrey: 5G will allow enterprises to be connected more efficiently: they can rely on a higher density of connected devices exchanging more information in a better timeframe. Due to these slicing capabilities, 5G networks allow for much greater personalization than 4G networks. This means that businesses could benefit from this personalized network, tailored to their portfolio of Internet of Things (IoT) use cases, and not be necessarily expected to rely on a one-size-fits-all network. By combining the unique capabilities of 5G with the insights derived from analytics, machine learning, and artificial intelligence, enterprises will be in much better stead to run their operations efficiently and securely. Q: How might 5G impact the use of cloud systems? Jouffrey: 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have a small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate. Q: How can one provide trustworthy 5G lifecycle management for IoT devices? Jouffrey: Trustworthy IoT lifecycle management is an end-to-end approach from the secure provisioning of keys within the devices, to the proper identification of the users, from the authentication on the network or the network slice, to the secure handling of the data either at stored or in motion. Resources need to be invested long before this to qualify the business model, in prototyping, as well as prototype testing. Most organizations don’t have the resources to counter all the security challenges of their 5G IoT deployments. Businesses will often end up choosing between navigating a risk-laden 5G environment, with inadequate or incomplete trust mechanisms, or outsourcing these requirements. When looking at outsourcing, companies must choose a provider with expertise in digital security, ensuring 5G IoT deployments have data protection and connectivity credentials built in, together with end-to-end data protection solutions such as encryption – protecting data in the device, network, and cloud at rest and in transit. Q: How can wireless modules address new 5G IoT use cases? Wireless modules can be expected to play a bigger role than in previous generations of cellular Jouffrey: As IoT considerations are integrated into the 5G ecosystem, wireless modules can be expected to play a bigger role than in previous generations of cellular. 5G modules support different characteristics to earlier generations – the 5G use cases are much more complex, varied, from high-end use cases requiring high data usage and throughput, such as for industrial routers, to low-throughput, energy consumption optimized devices, as required for some IoT sensors. At the end, compared to the largely one-size-fits-all approach that preceded it, 5G will increase the demand for vertical-tailored wireless modules. Importantly, these wireless modules need to support new data protection and security features that go well beyond conventional compliance to 3rd Generation Partnership Project (3GPP) standards. Due to the extent of personalization within 5G networks, wireless modules must also offer providers and customers greater security as well as agility all along the device lifespan. Q: What are the new data protection challenges posed by 5G, and how can they be addressed? Jouffrey: The 5G era presents exciting opportunities, as well as security challenges. The greatest risks to enterprise data on 5G networks – including eavesdropping, man-in the middle attacks, denial of services, loss or compromisation of data – were already known in 4G. The 5G standards have looked at providing answers to these threats and come with some noticeable improvements, such as the encryption of the international mobile subscriber identity (IMSI), otherwise known as the Subscription Permanent Identifier in 5G. But what’s different with 5G is the threat surface area, due notably to the variety of devices that will be used over these 5G networks and the underlying technologies used for the deployment of the networks, such as cloud native virtualization. On top of this, it’s the first generation of cellular to launch in an era of global cyber-crime, funded by organized crime and states alike. So, whilst enterprises should look to the ecosystem of telecom operators and cloud providers, vendors, and system operators to help understand the opportunities presented by 5G – this same ecosystem needs to guide them in countering any new risks that the 5G architecture may pose. The key to securing 5G enabled devices is to build security into devices from the outset using encryption. The key to securing 5G enabled devices is to build security into devices from the outset Q: What new roles can the 5G embedded universal integrated circuit card (eSIM) endorse in network authentication? Jouffrey: 5G is the first generation of cellular to launch in a buoyant eSIM market. The eSIM will be key in supporting network slicing authentication and security, enabling enterprises to leverage their credentials to pre-select network slices. However, to support secure authentication for mobile networks that may require the usage of different authentication algorithms over time, these 5G eSIMs must support this flexibility of usage of multiple authentication and authorization credentials. With this capability built into these eSIMs from the start, mobile operators can remotely swap the authentication algorithm either for a dedicated primary authentication, or in a definitive way, thanks to key rotation management, thus maintaining a trusted environment.
Many exhibitors at GSX 2019 saw the show as a success, despite slower booth traffic on the second and third days. According to show sponsor ASIS International, there were more than 20,000 registrants from 125 countries around the world, including those who attended the conference as well as the exhibition. Exhibitors definitely put their best feet forward, enthusiastically promoting their technology breakthroughs, but how convincing were they? The comments from at least one attendee – a large corporate end user who represents a key demographic for show organizers – bluntly suggest that healthy skepticism was on display side-by-side with the promotional energy in play.On this floor, there are some lies being given out. Ask the tough questions, make the exhibitors show you" “On this floor, there are some lies being given out,” said Rudy A. Wolter, CTO, Security and Investigative Services for Citigroup, a financial services corporation. He advised fellow attendees to “listen for them, ferret them out, ask the tough questions. Make [the exhibitors] show you.” “Don’t be afraid to ask these men and women questions,” added Wolter. “Don’t be afraid to challenge them. If you don’t challenge them, they’re not getting any better which means we aren’t getting any better. At the end of the day, they’re the leaders; they’re the ones making change; they’re the ones touching systems; they’re the ones helping integration.” Banking security with Verint At Citigroup, Wolter oversees 1,300 bank branches in North America that use Verint systems, including 23,000 cameras tied into a single command center. Skepticism aside, Wolter also provided evidence that even tough customers can be brought around. Specifically, he is sold on Verint: “When you have a problem, this company listens,” he told attendees at a Verint gathering on the show floor. New at GSX 2019 is the Verint Video Investigator, which is software that empowers investigators to quickly find the data they need to identify security threats in near real-time. In all, Verint serves in excess of 2,300 individual financial institutions, with tens of thousands of branches. Wolter was one of several end users willing to sing their praises publicly. Other GSX exhibitors were also proud to have their own real-world success stories. Placing the emphasis on outcomes At GSX, I heard more than once that outcomes are more important than technologies. Customers don’t want to hear about technologies, but rather about what those technologies can do for them. Avigilon, now a subsidiary of Motorola Solutions, is another company that is focused on outcomes rather than technology per se. “Instead of focusing on megapixels and terabytes, the end user is focused on perimeter security, loss prevention and risk management,” says John Kedzierski, Sr. VP of Video Solutions at Motorola Solutions. “We are working to provide that outcome." The end user is focused on perimeter security, loss prevention and risk management" How operators work to ensure outcomes is another aspect that is changing, says Kedzierski. “Watching video is obsolete,” he says. Using Avigilon’s new system, the operator instead is looking at color-coded hexagons; one color means motion, another means an analytic event. Operators click on various hexagons to view video. Also at GSX 2019, Avigilon featured its new H5A camera line, with expanded object classification analytics, detailed object detection, and tracking in crowded scenes; and focused on the Avigilon Blue cloud system. They are working to make every camera capable of detecting faces, which can be matched to a watch list. How technology addresses marketplace changes Addressing the changing marketplace was another GSX theme. As the workplace changes, ASSA ABLOY Americas is adapting its technology to address new employment practices such as "hot-desking," and remote and mobile workers, says Peter Boriskin, Chief Technology Officer. Systems have to be able both to protect assets and also to provide flexibility to accommodate the changing workforce, he said. Corporate acquisitions are directly expanding the capabilities that ASSA ABLOY brings to the market. For example, they recently acquired Luxer One, a locker company that enables secure delivery of packages without customers needing to stand in line or wait for service. Deliveries can be made in seconds. Peter Boriskin of ASSA ABLOY Americas led a booth tour, including new power capabilities gained in the acquisition of LifeSafety Power Another recent ASSA ABLOY acquisition is LifeSafety Power, which is expanding the company’s capability to provide proactive data on wired systems by tracking power usage. For example, a spike in current might mean a problem with a component. Compiling “intelligent triggers” enables creation of a dashboard to provide analytics of wired systems. ASSA ABLOY has also been devising predictive analytics of wireless locks to predict battery life, for instance, and to address other maintenance challenges. “We want to know what’s going on at a door without visiting it,” says Boriskin. New exhibitors make their mark New exhibitors were part of the GSX mix. One new exhibitor was Vaion. It’s their first trade show after launching at IFSEC in London in June. Vaion combines a small camera portfolio with on-premise servers and software managed through the cloud for an end-to-end solution. Tormod Ree, co-founder and CEO, calls it a “hybrid cloud delivery model”. Vaion is also a “more proactive security model,” said Ree. Video is analyzed for anomalies, and the server “learns” what is normal and not normal. The system provides alerts and notifications, occupancy counting and traffic control, among other features. And “overlays” are employed to present information on a map. Vaion can highlight video that is more likely to be relevant and prioritize feeds that have more activity. Vaion designs the hardware, which is manufactured in Taiwan. Vaion was a first-time exhibitor at GSX 2019 with their end-to-end video system; Tomod Ree is co-founder and CEO Gunshot detection technology EAGL Technology displayed their “Firefly” gunshot detection technology at GSX 2019. Based on technology originally developed for use in the military for sniper detection, the U.S. Department of Energy adapted it to civilian uses after the Sandy Hook School shooting. Boaz Raz, CEO, said the technology is the “most advanced and affordable, wireless for use indoors or outdoors, and it can control doors and cameras”. It doesn’t “listen” for gunshots like some competitors; rather it measures energy for “6 sigma” accuracy (almost 100%). Defining, and redefining, end-to-end solutions End-to-end solutions were all the rage at GSX 2019, but Allied Universal was one exhibitor that pondered what, exactly, is an end-to-end solution? It means different things to different people. For example, a video company’s end-to-end solution would not include access control. When Allied Universal claims to offer an end-to-end solution, they mean it in the broadest definition of the term, including all security systems deployed for a customer as well as the important human element (i.e., manguarding). “The industry’s emphasis on ‘end-to-end’ doesn’t encompass a full solution,” says Mike Mullison, Allied Universal’s Chief Information Officer. “When somebody uses the term end-to-end, you have to ask: What’s at both ends?” The lines between cyber and physical threats are blurring. Clients want full-service solutions" “The lines between cyber and physical threats are blurring,” adds Mullison. “Clients want full-service solutions.” Allied Universal is adding new technology elements to its offering, and Mullison says “the next phase of growth will be fueled by technology.” Allied Universal recently introduced the Heliaus product, a smart phone app that accesses an analytics engine to predict outcomes and prescribe optimum responses. It literally puts technology in a security guard’s hand. One customer has found that use of the technology resulted in a 20% reduction in safety and security incidents. The latest in access control among exhibitors In addition to video, access control had a big profile at GSX 2019, as evidenced by ASSA ABLOY America and many other companies. Another example is SALTO Systems, featuring its new NEO cylinder for wireless access control and the SALTO Virtual Network (SVN); the SVN-Flex extends and increases the number of updating points directly to the door. The SVN-Flex extends and increases the number of updating points directly to the door The compact SALTO NEO Cylinder is designed for doors where fitting an electronic escutcheon is not possible or required and can be installed on standard doors, server racks, gates, cabinets, electric switches, or sliding doors. Low energy consumption results in 110,000 cycles with just one set of batteries. Other SALTO products are SALTO KS (Keys as a Service); SALTO BLUEnet Wireless for Bluetooth RF-driven real-time control of doors; the XS4 One Deadlatch stand-alone electronic lock; and JustIN Mobile, which replaces the need for an access card by securely sending a mobile key Over the Air (OTA) to an iOS or Android device from SALTO’s ProAccess SPACE management software. The next step in integration A new company reflecting the GSX emphasis on integration is Security and Safety Things (SAST), which is still in launch mode but expects to have its first pilot customers in the Q4. The first camera vendors embracing the SAST platform will have cameras for sale at ISC West in the spring. SAST is creating an Internet of Things (IoT) platform for the next generation of security cameras. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphones.SAST is creating an IoT platform for the next generation of security cameras “SAST is a technology platform, but it is also a business platform and a relationship platform,” said Emmanuel Ventadour, VP Sales and Marketing. For app developers, SAST also provides non-technical commercial services (i.e., easing their route to market.) Hartmut Schaper, CEO, emphasizes the “openness” of the company. Even though they are a spinoff of Bosch, they are treating every camera manufacturer equally, he says. For integrators, the use of apps can expand their field of play. Apps will empower integrators to use video for more business processes – not just security – and expand their reach with customers, says Schaper. From skepticism to sales There were plenty of product claims at GSX to feed the skepticism of even the toughest of potential customers. Fortunately, product claims were only the beginning of conversations with attendees at this year’s show. No doubt manufacturers were put through their paces more than once, and a few of them even came out on the other side with potential new business to show for their efforts. That’s the true measure of success at GSX 2019, or any trade show. Click here to read our reviews from Day One and Day Two of the show.
For the security market, the ‘fine ranging’ capabilities of ultra-wideband (UWB) technology opens up a range of new uses based on the ability to determine the relative position and distance of two UWB-equipped devices with pinpoint accuracy – within centimeters. UWB is more accurate and secure, even in challenging environments full of interference, compared to narrow band wireless technologies. UWB technology transmits a large amount of data over short distances using a small amount of energy. It will be used in seamless access control, location-based services, and device-to-device services across industries including smart homes, cities, retail services, and healthcare. Increasing the accuracy of ranging measurements UWB technology will support any application that benefits from knowing the precise location of a connected deviceUltra-wideband is a mature radio technology that transmits information spread over a large bandwidth, as described by the IEEE 802.154 standard. A new, enhanced amendment to the standard – IEEE 802.15.4z – focuses on improvements to existing modulations to increase the integrity and accuracy of ranging measurements. Moving forward, UWB technology will support any application that benefits from knowing the precise location or presence of a connected device or object. This reflects a move from data communication to secure sensing. New capabilities of UWB are largely unfamiliar to the market, but a new Consortium – the FiRa Consortium – has a mission to educate the market, provide use cases, and promote UWB technology. Delivering interoperability across devices “With a consortium, we can better deliver interoperability across devices, software, and chipsets,” says Ramesh Songukrishnasamy, Director and Treasurer of the FiRa Consortium, and SVP & CTO of HID Global. “This creates a frictionless experience for the user, which is vitally important with a new technology. People are more likely to adopt emerging technology when it runs smoothly without interruptions or errors.” The FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive" An industry consortium can create a UWB ecosystem of interoperable technologies instead of individual companies launching products that consumers struggle to make work together, says Songukrishnasamy. “Simply, the FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive.” Founding members of the FiRa consortium ASSA ABLOY and HID Global, pioneers in secure access and identity solutions, are founding members of the consortium. Their technology manages access to physical and digital places, things, and identities. Another founding consortium member, NXP Semiconductors, is a pioneer in secure connectivity solutions for embedded applications. Other founding members are Samsung, which creates top-of-the-line TVs, smartphones, wearables, and other connected devices; and the Bosch Group, a global supplier of technology and services that is at the forefront of IoT innovations. Sony Imaging Products & Solutions Inc., LitePoint and the Telecommunications Technology Association (TTA) are the first companies to join the newly formed organization. Immune to radio frequency interference UWB is also immune to radio frequency interference, so it functions in high traffic settingsUWB introduces higher levels of accuracy in positioning capabilities and increased security for ranging data exchange compared to existing technologies. Fine ranging with UWB technology can localize devices and objects to 10 centimeters of accuracy with or without line of sight. UWB is also immune to radio frequency interference, so it functions in high traffic settings. These capabilities will enable a variety of use cases like secure, hands-free access control in hospitals, location-based services for ride sharing, and targeted marketing for retailers. FiRa will demonstrate UWB technology at upcoming trade shows. The FiRa Consortium aims to build on IEEE’s work with an interoperable high rate physical layer (HRP) standard, including defining an application layer that discovers UWB devices and services and configures them in an interoperable manner. The consortium also plans to develop service-specific protocols for multiple verticals and define necessary parameters for applications including physical access control, location-based services and device-to-device services. Promoting the adoption of UWB solutions As a consortium, FiRa is not just setting standards but actively championing use cases for UWB technology. Creating the consortium addresses the need to develop interoperability and implementation standards; brings key players together to create a rich UWB ecosystem; allows for the sharing of intellectual property; and promotes the adoption of UWB solutions. The FiRa Consortium is committed to educating and promoting new use cases" “Since UWB is a mature technology with new potential uses, there is a general lack of awareness of potential applications that take advantage of the technology,” says Songukrishnasamy. “The FiRa Consortium is committed to educating and promoting new use cases.” The FiRa name comes from Fine Ranging to highlight UWB technology’s use cases and distinction from older UWB technologies and solutions. Enhanced security in challenging environments Fine ranging powered by UWB can outperform other technologies in terms of accuracy, power consumption, robustness in wireless connectivity, and security, especially in challenging, high density environments. UWB previously served as a technology for high data rate communication and as such was in direct competition with Wi-Fi. Since then, UWB has undergone several transformations: UWB has evolved from an OFDM-based data communication to an impulse radio technology specified in IEEE 802.15.4a (2ns pulses with Time of Flight); and A security extension being specified in IEEE 802.15.4z (at PHY/MAC level) makes it a unique secure fine ranging technology. Moving from data communication to secure ranging allows ‘spatial context capability’ to be utilized by a variety of applications: seamless access control, location-based services, and device-to-device (peer-to-peer) services. Information is available at firaconsortium.org.
It has been a long time coming, but the Bexar County Metro 911 Emergency Operations Center (EOC) is up and running, and the security systems implemented to protect the facility are among the best of the best. The regional operations center unifies emergency operations into one cutting-edge facility. A New Home Built in San Antonio, Texas, the EOC provides a new home for the Bexar County Sheriff’s communications operations and is an alternate site for the San Antonio police and San Antonio fire and EMS operations. The facility is a joint operations center not only for Bexar County but also for Comal (New Braunfels) and Guadalupe (Sequin) counties. Tight security system All three counties touch dividing lines and are considered part of the San Antonio metro area. Bexar Metro 911 Executive Director Bill Buchholtz said building the facility has stayed on budget of $40 million, “give or take a couple of million.” The electrical system meets Tier IV data center standards for maintaining operations regardless of any unplanned activity, and the mechanical system meets Tier III standards. Because the building is under a tight security system inside and out, it was also important that redundant systems were in place, as well as uninterrupted power. Employees based at the monitors on the main floor are given breaks every so often to decompress, relax and interact. Early stages of planning Alterman staff was fortunate to work with the general contractor in the early stages of planning security Alterman Technologies was hired to provide, install and direct the security solutions effort for general contractor Whiting-Turner, who directed construction on the 81,500 square foot facility located on 11 acres of land. Alterman Technologies’ staff was fortunate to work with the general contractor in the early stages of planning security for this facility. According to James Carmen, Alterman’s Project Engineer, being able to make early and consistent contact allowed for the integrator to help specify the types of security that they felt would most satisfy the end user. It also allowed the installation crew to be able to meet their integration deadline of 8 months, long before the overall construction of the facility was complete. Enterprise access control systems “We were able to evaluate all components of the security solution when we saw the demonstrations of the Lenel, Axis and Salient products,” Carmen said. “We’re pleased with the decisions we made to deploy this security equipment.” To keep the facility secure, Alterman Technologies installed 170 IP cameras inside and out to enforce perimeter security. Now that the facility has been formally dedicated and is fully in use, if a person doesn’t have a reason to be on property, they aren’t getting inside. The facility is secure. Alterman Technologies installed 120 door enterprise access control systems, including iClass biometric readers. Video management systems To monitor both the outside perimeter and inside the building itself, 110 5 MP Axis Communications IP cameras were paired with Salient Enterprise video management systems integrated with the Lenel access control solution. Inside the operations center, the facility is outfitted with 100 55-inch video control systems side by side, all of which are integrated with video and audio control solutions. During Hurricane Harvey, operators inside are able to coordinate any and all emergency and rescue operations Inside the facility, there is a first-floor, open room for 104 operator desk consoles, where operators can keep tabs on all three counties. Operators sit in a 13,878-squarefoot Public Safety Answering Point (PSAP) to handle all 911 calls, formerly managed at 25 different locations. In fact, during the recent Hurricane Harvey, operators inside are able to coordinate any and all emergency and rescue operations. Getting behind the power “The ability to have multiple supervisor control stations is a key feature, providing access to sources and allowing supervisors to manipulate the wall and change presets as needed,” said Art Salinas, Project Manager for Alterman Technologies. “It’s a great system with no real limitations. I believe the client has been pleased with the capability to control and preview content before it goes on the wall. They currently have about 30 preset displays.” With the number of cameras and the video streaming to the facility, Salinas had to be certain the equipment he was recommending and the software that would power the system would work without a hitch, 24 hours a day, seven days a week. “Our work to determine the right kind of solution was very involved, and we evaluated all the systems,” Salinas said. “When it came right down to it, we selected Lenel’s OnGuard for access control, Axis Communications IP cameras and Salient’s VMS and its PowerUltra servers. All of this is securely stored in an enclosed network so there is no worry of outside hacking.” Perimeter security system With three counties and multiple agencies using this facility, the security solutions have to be dependable" Salient Regional Sales Representative Paul Fisher said the choice of VMS was truly an important decision because it had to be strong enough to stop any breaches but also be able to provide the ability to run the perimeter security system and the internal security. “Our VMS solution is able to take the lead with all the streaming video and push it wherever it is directed,” Fisher said. “With three counties and multiple agencies using this facility, the security solutions have to be dependable, yet easy to use. We were invited in to demonstrate the system, and we were able to show numerous details that would benefit the end user. We are able to provide reliability and scalability, and we’re a local company, so that worked to our benefit as well,” Fisher said. Law enforcement officials The facility is designed to provide uninterrupted 911 services during various emergencies, including terrorist attacks and natural disasters. There also is an onsite helipad for access by law enforcement officials, should area roadways be closed or congested, and for staging for media during a public emergency. The building is constructed to withstand an EF3 tornado strike and to operate without any public utilities for an extended period of time. “The mission of the facility is to provide that emergency response when a caller is quite possibly going through the worst experience of their life,” said James Hasslocher, Bexar Metro 911 Network District Chairman.
Rajant and Dejero’s Technology Springs into Action in the Battle Against a 420-Acre Wildfire on the Santa Barbara County Coast. A wind-driven brush fire triggered evacuations after breaking out along the Gaviota Coast in Santa Barbara County, California. On a sunny afternoon in mid-October 2019, the heat from the sun combined with winds gusting up to 40 mph through the quiet foothills of El Capitán Canyon, sparking a wind-whipped, vegetation brush fire in the overly dry desert hills. The blaze, dubbed the ‘Real Fire,’ quickly charred 420 acres while threatening more than 100 structures that sat along the Gaviota Coast before firefighters and emergency crews were aware of the fire and able to gain an upper hand on the wild blaze. Wind-Driven bush fire Coincidentally, Rajant and Dejero had just arrived in Santa Barbara for a demonstration with the Santa Barbara County Fire Department. Shortly after the fire broke out, word reached the emergency services and crews from the Santa Barbara County Fire Department, Cal Fire, the U.S. Forest Service, and other agencies who immediately dispatched their teams to contain the blaze before it spread further. The climate in the canyon at the time of the blaze was considered ‘critical fire weather’ with its dangerously dry grass and wind gusts. These conditions only encouraged the wind-driven bush fire to spread swiftly through the foothills on the north side of Highway 101 near El Capitán State Beach, California and east over the ridge. A good stretch of the 101 Freeway had to be shut down immediately—in both directions—and Amtrak routes through the area were canceled. Total communications solution At the peak of the fire, helicopters and fixed-wing aircrafts attacked the flames from the air with retardant and water drops Visitors at nearby ranches, campgrounds, beaches, and resorts were evacuated, and a warning was given to residents living in the nearby Dos Pueblos, Refugio, and Winchester Canyons. At the peak of the fire, helicopters and fixed-wing aircrafts attacked the flames from the air with retardant and water drops, while dozens of engines, along with bulldozers and hand-crews, fought it from the ground. At about that same time the fire broke out, teams from Rajant and Dejero, along with subject matter expert Bruce Arvizu from the Department Homeland Security, had arrived in Santa Barbara. Together, they were prepared to deliver a live safety demo to the Santa Barbara County fire chief on how the companies can together provide the total communications solution. Improved spectrum efficiency The planned public safety demo was also to show how the blending of Rajant’s technology with Dejero Smart Blending Technology (SBT) eliminates drops and gaps—a solution comprised of mesh radio communications, blended cellular, and satellite technologies to bridge the communication gap in remote locations where signals are often weak or lost. While LTE networks provide high bandwidth, lower latency, and improved spectrum efficiency, LTE can also become spotty and drop signals in remote locations and other areas. Dejero’s Smart Blending Technology (SBT) fills in these gaps in the Wide Area Network by seamlessly blending any available LTE with SAT comms to guarantee a connection for the responding teams. Signal continuity becomes even more challenging in valleys, around mountains, and along coastlines, which becomes mission critical when emergency services are responding. Continuous and reliable connection More than 200 firefighters were on site fighting the fire with reinforcing containment lines of helicopters Rajant’s mesh radio technology bridges the gaps in these local areas. When the three technologies are used together, a continuous and reliable connection is provided, ensuring that communications between the responding agencies and their teams in the field are not lost. Meanwhile at the El Capitán canyon, more than 200 firefighters were on site fighting the fire with reinforcing containment lines of helicopters and drones in the air and 30-ton bulldozers on the ground cutting out ‘catlines’ and uprooting vegetation, thus eliminating the fire’s fuel. By plowing through the flames, brush, and trees with the dozers, the emergency crews saved valuable manpower and shortened the fire’s reach and life. When fighting fires with bulldozers, it is critical for the commander in control to receive data from each dozer to manage fighting the fire collectively as a team and to track each dozer individually. Critical local data Rajant and Dejero quickly proposed to the fire chief the benefits of their combined technology at a time of crisis and asked to allow Rajant and Dejero to modify their presentation from a demo to a real life exercise. “Our county firefighters are willing to do whatever it takes to get that job done. When we do our after-action review, the successes and failures always come out. And we like to capitalize on our successes.” said Daniel Bertucelli, County Fire Captain Santa Barbara County Fire Department. Rajant BreadCrumbs® can be mounted to the bulldozers so the critical local data could be transmitted while other situational data and mapping could be revived in the field. Dejero SBT would power the Microsoft Tactical Truck and provide the bridge from the field to the command post over cellular and SAT networks, during this actual emergency situation. Combined firefighting attacks More than 400 acres had burned with no structures damaged and no reported injuries Notably, the SAT comms on the vehicle was to be powered by Kymeta’s flat-panel dish technology, enabling true ‘comms on the move’ to best leverage Rajant’s Kinetic Mesh®. The updated mission was green lighted. On Friday morning, Rajant and Dejero meet with the fire squad at the command control center. Rajant BreadCrumbs and camera systems were mounted to dozers while the Microsoft mobile comms truck, with the Dejero GateWay on-board, maintained a close, but safe, proximity to the dozers to provide LTE. The firefighters manning the bulldozers were able to communicate in the valley when normally they could not. Data was sent from the bulldozers to the van to the internet where the command control center could receive the video feed. The real-life demo was a success. The combined firefighting attacks on the blaze gained the upper hand and went from a 20-percent containment on Thursday evening to 50-percent by Friday afternoon. By Monday, the Real Fire was 100% contained. More than 400 acres had burned with no structures damaged and no reported injuries. Evacuations were lifted for all areas.
Sussex Police have purchased a fleet of redeployable CCTV cameras from Revader Security, primarily for use on lampposts and urban infrastructure. The Transit-lite mobile cameras are ruggedized outdoor surveillance solutions which have been proven over many years to deter crime and secure vital video evidence for prosecution. Cost-Effective solution Using the Revader EasyFit bracket system, police operators are able to regularly re-position each camera to respond to the movement of crime hotspots, antisocial behavior, vandalism and other street crime around the locality. As the units can be installed in virtually any location within minutes, only minimal planning is required. Revader Security proposed a cost-effective solution of coupling an auxiliary camera to a Transit-lite unit In this instance, Revader Security proposed a cost-effective solution of coupling an auxiliary camera to a Transit-lite unit to provide twice the visibility and coverage. The Transit-lite unit contains the recording and transmission technology and acts as a server to the auxiliary camera. It also has the capacity to host other specialist cameras, such as those for number plate recognition (ANPR). Live and recorded footage is quickly and easily retrieved over the 4G mobile network. Redeployable camera solutions A member of Sussex Police’s Divisional Operations Team commented: “We have been really impressed by the Revader cameras, which are straightforward to install, easy to use, and have provided us with some very high quality CCTV evidence”. Stuart Caldecourt, Managing Director of Revader Security commented: “The use of another PTZ camera on the same Transit-Lite unit has provided our customer with a significant operational advantage at an only marginal increase in cost, representing excellent value for money”. Revader Security offers a wide a range of mobile CCTV and redeployable camera solutions for all applications, including those with low or zero power. The company continues to support Police and a variety of clients in the public and private sector.
NICE announced that a consortium of four UK police forces (Hampshire Constabulary, Thames Valley Police, Surrey Police and Sussex Police), operating as the South East Regional Integrated Policing Programme (SERIP), has signed a contract with NICE to deploy the NICE Investigate Digital Evidence Management Solution (DEMS). SERIP will roll out NICE Investigate to more than 12,000 officers to streamline investigations and address the challenges of growing digital evidence. “Having had the opportunity to pilot NICE Investigate in the four forces, we could see the system in action and realize the benefits for our investigations and investigators. 92% of our officers said it would make their investigation more effective,” said a spokesperson from SERIP. “NICE Investigate will be transformational for us, not only in terms of time savings but also through improved policing outcomes that will ultimately reduce threats, harm and risk to our communities.” Interview recording systems NICE Investigate will also make it much easier for SERIP forces to collect CCTV video for cases Running on the secure Microsoft Azure cloud, NICE Investigate is a one-stop solution for automating manual processes around the collection, management, analysis and sharing of all types of digital evidence. NICE Investigate will seamlessly integrate with the four forces’ records management, body-worn video and interview recording systems so investigators can automatically correlate and gather evidence through a single login. NICE Investigate will also make it much easier for SERIP forces to collect CCTV video for cases. Investigators can instantly pull up a list of cameras within an incident radius and send off a request to registered businesses located within that geographic area. Any uploaded video is automatically transcoded to a useable format and securely stored in the Microsoft Azure cloud. Driving digital transformation “With SERIP now rolling out NICE Investigate, we are providing cutting-edge delivery to an increasing number of forces for their day-to-day digital evidence management and digital transformation, ensuring investigations and evidence sharing are match fit for the digital age,” said Chris Wooten, Executive Vice President, NICE. “NICE Investigate is fast becoming the defacto standard for driving digital transformation in policing across the UK and is gaining momentum around the world.”
Eagle Eye Networks, the provider of cloud video surveillance, announces one of the fastest completions of a large scale, fully integrated citywide surveillance program, installing 13,720 cameras in 4 months. This project has been a large success for Mexico City C5, contributing to Mexico City's larger ‘Citizen Safety’ mobile application. This mobile application facilitates content sharing for more effective neighborhood watch and a panic SOS button. “Effective citywide surveillance is more than installing cameras in a few key locations, it’s about creating a platform that meets the unique needs of each municipality.” Unique web application The cameras are all operational, remotely monitored, and providing safety and security to citizens today “In partnership with Eagle Eye Networks we leveraged the Eagle Eye Video API and SDK to customize a unique web application that is designed to integrate fixed, mobile body worn, and vehicle cameras into one interface, providing an unprecedented level of insight and awareness into our cities operations, ” said Jaime Abad Valdenebro, CEO, Omnicloud.mx. 4G connectivity with Eagle Eye Networks’ bandwidth optimization was utilized in order to facilitate this quick deployment, installing approximately 250 cameras per day at its peak. The cameras are all operational, remotely monitored, and providing safety and security to citizens today. Integration of new technologies This fast-paced install occurred amidst the global supply chain challenges caused by COVID-19, however, Eagle Eye Networks’ strong partnership with both the Reseller, Omnicloud.mx, and suppliers provided alternatives and solutions to keep the project on schedule. Eagle Eye Networks solution was chosen because the Eagle Eye Cloud Video API Platform provides an open solution that allows integration of new technologies (AI, advanced analytics, search, license plate recognition), new suppliers, and new cameras at any time. Future and cybersecurity proofing the city’s investment and eliminating the headaches associated with managing large premise based data centers was crucial in their decision. City-Wide surveillance project Eagle Eye’s cloud video retention and massive on demand scalability make it ideal for large scale deployments" “When deploying a city-wide surveillance project, scalability, retention, and cellular transmission must be considered. Eagle Eye’s cloud video retention and massive on demand scalability make it ideal for large scale deployments. To operate your own large data center system for video recording is expensive and challenging.” “With Eagle Eye’s subscription service we provide a more robust and lower cost answer for large scale deployments. Furthermore, our open platform provides a future proof solution, integrating AI, video analytics, and advanced search at the click of a mouse,” said Dean Drako, CEO of Eagle Eye Networks. Cost-Effective solution “More than half of the world’s population resides in cities, creating an increased demand for smart, accurate insights to help streamline everyday operations including public safety, traffic flow management, infrastructure and transportation. Enormous amounts of data collection, aggregation, and storage are necessary to drive the deep analysis that is required to produce these smart insights.” “The only way to efficiently manage this data is to aggregate and analyze in the cloud,” said Jeff Kessler, Managing Director of Imperial Capital and Publisher of the Security Industry Annual Report. The Eagle Eye Cloud is a robust, scalable and cost-effective solution, purpose-built to support the data storage and analysis demands that city-wide deployments require.
International medical imaging IT and cybersecurity company Sectra (STO: SECT B) is receiving new orders for its crypto solutions for cellphone telephony, smartphones and the blue-light operations’ communication network TETRA from several European government authorities. Order bookings for Sectra’s Secure Communications operating area amounted to approximately SEK 35 million in April 2020. With solutions from Sectra, authorities that handle sensitive information are able to maintain their operations even when faced with exceptional circumstances.“Communication is pivotal for an operation in times of crisis. If information is unreliable, it is impossible to lead the operation,” says a spokesperson for a European security authority. cellphone encryption solutions During the COVID-19 pandemic, many operations are being run from the employees’ home offices During the COVID-19 pandemic, many operations are being run from the employees’ home offices. Currently, opportunities to work remotely are extensive in many work categories, but for individuals who are privy to classified information, working from home is not always an option. This means that certain critical operations risk coming to a standstill if employees are unable to meet each other or access their usual working tools. To uphold operations, many European government authorities have now implemented cellphone encryption solutions from Sectra. Measures taken include providing their key employees with smartphones and tablets that are protected with Sectra’s crypto solution. With these tools, they are able to exchange information in encrypted calls and chat, as well as gain access to important applications like email and calendar via a secure connection. Maintaining security and integrity Without such a solution, classified information belonging to the authorities cannot be exchanged at all outside of the walls of their official facilities. Other authorities that are closer to the field are taking advantage of Sectra’s crypto technology for the TETRA network. The TETRA network is used by blue-light operations and other emergency services and is usually operational on a national level. One country in Europe has elected to expand its access to Sectra’s crypto solution to ensure that, for example, healthcare professionals are able to discuss sensitive information while maintaining security and integrity for both healthcare services and the individual.
Round table discussion
What is a business, or an industry, but a collection of people and the results of their work? People make all the difference in the destiny of a business or industry. And the people involved in a business reflect the impact of demographic changes – and the passage of time. The security industry has been largely built by Baby Boomers, who are getting older and increasingly stepping aside to make way for younger folks. We asked this week’s Expert Panel Roundtable: Is there a “new generation” of employees and managers entering the physical security marketplace, and what will be the impact?
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload