With the coming of a New Year, we know these things to be certain: death, taxes, and… security breaches. No doubt, some of you are making personal resolutions to improve your physical and financial health. But what about your organization’s web and mobile application security? Any set of New Year’s resolutions is incomplete without plans for protecting some of the most important customer touch points you have — web and mobile apps. Every year, data breaches grow in scop...
Suprema, a global leader in biometrics and ID solutions, announces that the company has entered into a commercial software license and distribution agreement with Qualcomm Technologies, Inc., a subsidiary of Qualcomm Incorporated, for the licensing of Suprema's BioSign, its under-display fingerprint recognition algorithm. Suprema has entered the smartphone segment with the Samsung Galaxy J5 in its fingerprint solution for smartphones last year. In February 2018, the company launched BioSign 3.0...
With the need for security guard services growing worldwide, Montreal-based tech startup TrackTik Software Inc., an integrated security workforce management cloud-based software solutions provider, has announced US$ 45 million in financing from Toronto-based Georgian Partners and Montreal-based Caisse de dépôt et placement du Québec (la Caisse). Disruptive AI And Machine Learning Funds will be used to drive new product development — including disruptive artificial...
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. eFusion Security Management The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud...
Trillium Secure, Inc. has appointed Mahbubul Alam as Chief Marketing Officer and Senior Vice President of Global Engineering. This move further deepensTrillium's experienced management team while the company launches an end-to-end trusted and secured data services platform for vehicles. Alam's expertise in platform as a service offerings and over-the-air update technology for connected vehicles is a perfect fit for driving Trillium's recently launched Trusted Mobility Platform and Services. Cr...
Viking Electronics Inc. announces the release of its brand new 2019 Product Catalog which celebrates Viking’s 50 year legacy. The catalog features hundreds of products and introduces many new innovations, as well as Viking’s core products – such as emergency phones, door entry systems, paging amplifiers, mass notification systems, hot line phones, and more. The catalog is not just a simple product guide; it offers countless ideas and custom solutions for ‘Access Control&r...
Pulse Secure, global provider of secure access solutions to both enterprises and service providers, has announced that the IAIT Lab (Institute for the Analysis of IT components) has completed an extensive test of Pulse Connect Secure, resulting in superb findings across usability, comprehensiveness and interoperability for the market leading VPN solution. Pulse Connect Secure Pulse Connect Secure provides easy, secure, authenticated access for remote and mobile users to corporate resources—anytime, anywhere. Pulse Connect Secure is the most widely deployed SSL VPN for organizations of any size, and across every major industry, to enable productivity through seamless, protected access to applications and information. The solution offers Zero Trust-based secure access through integrated user, device and security state authentication and robust connection sets that ensure compliant pre- and post-connect access to hybrid IT infrastructure. Pulse Connect Secure includes Pulse Secure Clients and the AppConnect SDK Pulse Connect Secure includes Pulse Secure Clients and the AppConnect SDK. Pulse Clients are dynamic, multi-service network clients, which can be implemented agent or agentless, for mobile and personal computing devices. Pulse Clients can be simply deployed, enabling users to quickly “click and connect” from any device, anywhere. Pulse Secure AppConnect SDK delivers per application SSL VPN connectivity for iOS and Android clients, enabling IT departments to create an even more transparent and secure mobile app experience for their users. Multi-Factor Authentication And Data Security The Institute for the Analysis of IT components (IAIT), an independent testing laboratory based in Germany, examined Pulse Connect Secure under real-world conditions through a series of testing scenarios. The highly detailed, nine-page report covers 16 core functions ranging from initial configuration, policy development, through enterprise onboarding, host checking functionality, FQDN split tunneling, multi-factor authentication, as well as data center and cloud Single Sign On along with interoperability with a range of third-party applications. The complete review offers several conclusions, including: The Pulse Connect Secure appliance is perfectly suited to establish secure means of access to company resources via any kind of connection whatsoever. In the test, the solution was able to score highly across a very large scope of functions. Despite the vast range of applications, data stores, and services, Pulse Connect Secure proved to be relatively straight forward to be set up and managed. Both the wizards and the extensive documentation are helpful with this. In the test, it was easy to integrate our appliance into the vendor’s central cloud-based management tool Pulse One. Administrators looking for an efficient solution for securing access to their company resources should definitely take a look at Pulse Policy Secure.
Johnson Controls announces that it has partnered with Civic Technologies, the global digital identity leader. Johnson Controls will integrate the Civic Secure ID Platform (SIP) with C-CURE 9000 Security and Event Management Systems from Software House to provide visitor management with greater data privacy and protection, enabling building visitors to securely present their verifiable identity using the Civic App. This partnership will enable properties secured by C-CURE 9000 a more convenient and secure solution for processing visitors at point of reception and ensure Johnson Controls remains a leader in secure access technology with innovative digital identity solutions. Offering Solutions We’re looking forward to integrating Civic as a part of our access management technology" “Lack of user-controlled identity information and decentralized verification using current methods is an ongoing challenge in the identity access management industry,” said George Martinez, director of Cloud Services at Johnson Controls. He further added, “The ability to digitally verify the identity of people coming in and out of C-CURE 9000 secured buildings, without needing to collect and store excess personal information, offers incredible compliance and security benefits. We’re looking forward to integrating Civic as a part of our access management technology and to offering solutions that help our customers and the guests that use and visit their facilities.” The Johnson Controls and Civic partnership will simplify and streamline the proof of identity process for managing visitors in building lobbies. Visitor identity verification with the Civic App will initially be deployed in three New York locations, with an expected volume of over 20,000 visitors per month. Manage Sensitive Data The Civic integration provides data privacy with the benefits of blockchain-powered security Visitors typically have to sign in with the receptionist and provide information, usually a physical ID and contact information, to check in for their visit and receive temporary access to the building. By integrating Civic for authentication and Know Your Customer, when visitors walk into a building, they will be able to scan a QR code on the C-CURE 9000 check-in kiosk with their Civic App without needing to dig out a physical ID or enter personal information into a form. Integrating the Civic App provides benefits beyond a simplified visitor management process. For visitors, the Civic integration provides data privacy with the benefits of blockchain-powered security. Using the Civic Secure ID platform, user information is always stored locally on a user’s mobile device and is protected by biometrics. This also means that properties secured by C-CURE 9000 are able to securely verify the identity of users without any requirements to store or manage sensitive personal data that attracts hackers. Secure Access Management Civic enables guest and employees to prove who they are with a mobile device" “Today, we all carry various items to identify ourselves, from government-issued IDs to fobs that grant us building access. By integrating the Civic App, anyone who needs to visit a C-CURE 9000 secured building will have the opportunity to identify themselves with their Civic App,” said Vinny Lingham, Civic co-founder & CEO. “Civic enables guest and employees to prove who they are with a mobile device, rather than requiring them to show an ID document, sign a visitor logbook and stand in line to check in/out of a facility. We’re looking forward to working with Johnson Controls to bring blockchain-powered identity verification to enable secure access management for Johnson Controls customers’ sites and with their guests across the U.S.” The way we prove who we are is changing. The partnership between Johnson Control and Civic is the perfect example of how this transformation is taking place. In the future, it will not be necessary to carry and surrender a personal document to prove identity when this can all be seamlessly managed from a mobile app that offers the additional benefits of allowing users to control how their personal information is shared.
Maxxess Systems introduces new enterprise software that combines security, communications, business intelligence and data integration into a single, easy-to-use platform called Maxxess InSite. Maxxess InSite, Unified Interface Platform Maxxess InSite sets a new benchmark for security and business intelligence software platforms by every standard of measure" Nothing operates, functions or looks like Maxxess InSite. It combines systems intelligence and human intelligence to detect and respond to unfolding events in real-time – all of which is queued, organized and displayed on a highly-intuitive user interface. In doing so, Maxxess InSite truly enables early action, allowing IT, Operational Technology and Physical Security departments within organizations to correlate data, improve response coordination, and deal with issues when they’re small – before they become large and costly. This new system is uniquely categorized as an Awareness and Response Coordination System. “Maxxess InSite sets a new benchmark for security and business intelligence software platforms by every standard of measure,” said Nancy Islas, President of Maxxess Systems. “It goes beyond basic detection and control. It empowers total awareness and provides users with unprecedented capabilities to help prevent incidents from happening. It also coordinates the activities of first responders and the people they are assisting from the moment a threatening event is detected. And best of all, is the simplicity of Maxxess InSite’s operation.” Security And Business Intelligence Software Maxxess Insite is a single system that harnesses the power of myriad system technologies Maxxess InSite features an open-architecture framework to accommodate virtually any security or business intelligence application with comprehensive functionality – from automated responses with database integration to mobile alert notifications with two-way communications. Hardware and software solutions from more than 50 different leading manufacturers are already integrated into Maxxess InSite, providing more combined capabilities and functionality than any other cross-platform solution available. This allows Maxxess InSite to be configured for virtually all applications, employing any combination of software modules and hardware to deliver each user with a highly customized solution and unparalleled efficiency. Myriad System Technologies Maxxess Insite is a single system that harnesses the power of myriad system technologies, effectively expanding their collective capabilities while also making human interaction more intuitive. It meshes the capabilities of the following systems and technologies, and more: video surveillance, access control, GPS/IPS location technologies, intrusion detection, fire safety systems, perimeter detection/protection, HVAC/building management, smart phones and tablets, ID/credential badging, two-way communications, guard tour, visitor management, time and attendance, license plate recognition, hotkey emergency notification, reporting/forensics, wireless sensors, elevator/escalator control and database integration. Kevin Daly, CEO of Maxxess Systems, added, “The beauty of the product is that even with these diverse integrations and functions, the system is very user friendly. Simplicity of use is truly the system’s ultimate sophistication.”
Integrated security manufacturer TDSi is pleased to announce the appointment of Greg Little as Technical Support Engineer. Greg will be providing First and Second Line support to TDSi’s customers, for both engineering and sales support – with a specialization in IP networking and CCTV. John Davies, Managing Director of TDSi commented, “We are delighted to welcome Greg back to the TDSi team, as he was previously our Sales Support & Estimator for five years. With a highly impressive track record of technical knowledge and expertise, Greg is the perfect professional to support TDSi’s customers with any technical or sales bid enquiries.” Modern Security Systems With the level of technical integration required by modern security systems, technical support is a key service provided by the TDSi team. Reflecting upon his new role, Greg stated, “Every installer needs to know they can pick up the phone and get competent, timely and professional support when installing or fault-finding on site.” Greg has a distinguished security career, including 21 years at Chubb Security and two years as Technical Supervisor at Network Security Greg has a distinguished security career, including 21 years at Chubb Security (14 as a Service Engineer, seven as Technical Support Engineer) and two years as Technical Supervisor at Network Security, where he trained to become Fire Industry Association (FIA) and Gent qualified, before returning to TDSi. Dispersed Security Projects John Davies added, “We were excited to invite Greg back to TDSi in his new role, which is a vital part of TDSi’s support team. We are proud to offer our partners and customers the highest levels of technical advice and support whenever required, and Greg is a key part of our ongoing commitment to deliver this.” TDSi is also pleased to announce the appointment of new Warehouse Operative Dominic Alexander at its Headquarters in Poole, Dorset, UK. Dominic is a key member of the team that processes and ships TDSi’s extensive range of products to its partners and customers around the world. Dominic commented, “We manage the logistics and movement of products from our UK manufacturing plant, to our warehouse in Poole and onwards to globally dispersed security projects. It’s great to be part of a team that helps people stay safe and secure all around the world.”
Aiphone has announced significant improvements to its full IP IX intercom and security solution. The new and upgraded features built into the new IX2 series include improved audio and camera functionality, large touch screen monitors and communication with up to 9,999 door stations. IX2 IP Intercom And Security Solution “With no server or license fees, the IX2 system offers highly affordable P2P full IP video entry security, internal communication and multicast paging,” said Wyatt Taylor, Managing Director of Aiphone UK Ltd. “Utilizing its ability to connect directly to a network, all these functions can be implemented between remote locations over large areas.” “However, what elevates IX2 above other traditional and IP intercom systems currently available for large scale installations, is the ease at which it can be integrated with third-party systems. As a result, we are able to provide a totally integrated intercom and security solution, including access control, IP network cameras and video management software (VMS), such as Avigilon, ExacqVision and Milestone, as well as Lenel Onguard access control management software out of the box and without the need to buy any licenses.” Scalable Solution Offering Video Entry Security IX2 has the capacity to provide communication with a practically infinite number of intercom stations IX2 has the capacity to provide communication with a practically infinite number of intercom stations. Video entry security, internal communication, emergency stations and multicast paging are all able to be implemented between remote locations over large areas and distances, making the IX2 system an ideal solution for education campuses, as well as any other type of application involving multiple locations such as airports, railway stations and parking facilities. Key features of IX2 include: No wiring-distance limitations: LAN and VPN connections enable implementation over extensive areas and between remote locations. Peer-to-peer configuration results in space savings, reduced installation time and lower cost. Simply connect the units to Power over Ethernet (PoE) switches. No need for a dedicated server, with the additional benefit of eliminating the risk of system downtime due to server malfunction. 7-inch handset with a touchscreen which can be used in domestic and commercial environments. Hands free touch screen monitors. Picture in picture video can show the door station camera and an overhead camera simultaneously. Video intercom between master monitors. Newly designed IX panels which comply with DDA regulations, e.g. offer clear visual guidance and a blue halo button. Audio and video SIP Integration with Cisco IP phone systems. ONVIF compatibility provides the option for images captured by call panel cameras to be integrated with a video surveillance system. SD card slots on panels and monitors enable video and audio data to be recorded and backed-up. Call log facility on each handset provides data trails. IX2 is also equipped with some advanced functionality rarely found in other IP Intercom POE systems. These include: Call Queuing Up to 20 calls can be queued and prioritised on an IX-MV7 master station When multiple calls are made to the same monitor station, the IX2 system places the calls in a queue which is displayed on the LCD screen. On the calling end, users are given notification that their calls are in the queue. Up to 20 calls can be queued and prioritized on an IX-MV7 master station. The importance of each call, e.g. normal, priority or urgent, can be indicated by the display of respective red, amber or green colors on the master station. Higher priority calls are moved automatically to the top of the list. Call Transfers Calls and conversations within the IX2 system can be transferred to up to 10 other IX-MV7 monitor stations. The transfers can be done manually or through a variety of system settings. With Delay Transfer, for example, the system automatically transfers calls which are not answered within a pre-set time. An Absent Transfer feature immediately calls another IX-MV7 master station when someone is away from their desk, while Scheduled Transfer automatically transfers calls to another IX-MV7 master station during pre-determined times, e.g. out of hours.
For over a century, IEEE's mission has been to advance technology for the benefit of humanity. As the world’s largest technical professional organization, IEEE’s global community includes over 420,000 members in engineering, computing and technology, collaborating on communications, consumer electronics, robotics, sustainable energy, aerospace, life sciences, and many other critical initiatives. Dave George Felicitated With IEEE Life Membership Dave George has been an active IEEE member for over 40 years As the Chief Technologist behind Pryme Radio’s communications innovations, Dave George has been an active IEEE member for over 40 years. Recently, Mr. George was honored with IEEE Life Membership, a top echelon designation reserved only for those individuals demonstrating long-standing leadership, dedication, and who have made a significant impact on the development of technology. “I’m grateful for IEEE’s recognition, but it’s my job to find ways to better the lives and professions of Pryme’s customers through communications,” said George. “The fact that technologies have become ever more exotic and exciting is a bonus.” Never comfortable tooting his own horn, George’s demure demeanor belies the important role he’s played in moving the communication industry forward. In fact, George credits IEEE as being his primary source for leading edge electronic science data, which often help lead him to develop ground-breaking new products at Pryme. Pryme's Future Product Line In Sync With IoT George is a regional member of the IEEE Communications Society (ComSoc), Robotics & Automation Society (RAS), Intelligent Transportation Systems Society (ITS), and the Vehicular Technology Society (VTS.) His involvement has given rise to future product developments at Pryme that support emerging networks such as IoT, mesh, 5G, soon to be 6G, as well as intelligent vehicle to vehicle communications. George may shy away from the spotlight, but he is fearless when it comes to entering unexplored technological territories. The reward Dave George reveres most is creating products that make a difference. George’s philosophy mirrors the IEEE’s mission and is also reflected in Pryme’s guiding principle — Invent communications technologies that benefit public safety, security, government, education, transit, utilities, construction, manufacturing, retail, hospitality, field services, facilities, healthcare, professionals and humanity as a whole.
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognize that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unless they are quickly brought under control. Training Security Officers Governments and organizations across the world are increasingly encouraging businesses to re-assess risks and to plan for and conduct drills for major emergencies. This is driving different agencies and companies to invest in new skills, resources and systems, and encouraging businesses to routinely re-evaluate their emergency response strategies. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents For example: UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents, as part of the UK government’s Action Counter Terrorism program. And organizations including the Association of University Chief Security Officers (AUCSO) and Higher Education Business Continuity Network (HEBCoN) are developing customized training for their members to improve their own response and business continuity plans. Mass Notifications Systems Whether an organization is facing a terrorist attack or a severe weather event, follow up reports consistently identify that the same types of challenges are common to all crisis situations, with similar errors often occurring again and again. Typically, these are centered on three key areas: poor communications, fractured command and control structures, and delayed deployment of resources. Communications skills and technologies clearly play a pivotal role in how effective an organization is in responding to major incidents, particularly when it comes to assessing the situation and its implications, moving people towards safety and providing updates as an incident unfolds. However, when an organization is considering its technology options, emergency response and mass notification systems (MNS) are often touted as the ideal platform to deliver all the required critical communications and ongoing updates. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents Emergency Notification System All the incident reporting, command and control, and communications functions have been brought together on a single platform But, if an organization does not know exactly where all its staff or students are, and it cannot see the location and availability of its first responders and other emergency coordinators relative to them and the incident, then how useful is it to send a top-down alert to everyone? And what about fast moving or multi-centre incidents, where previously agreed evacuation procedures, recommended actions or mustering points may need to change if an incident takes an unexpected turn? Many organizations may have been lulled into believing that an emergency notification system will allow them to confidently handle all the communications aspects of virtually any crisis. In reality, too many businesses are still unaware that there are now much more sophisticated and proven technologies where all the incident reporting, command and control, and communications functions have been brought together on a single platform. Using Live Map Tracking The benefit of using these advanced and more integrated approaches – often categorized as mobile distributed command and control systems – is that they enable faster and better decision making in a crisis using real-time feedback and two-way dialogue with those closest to the emergency. And they avoid the risks of any potential delays, miscommunications or mistakes that can happen when an organization is under pressure to respond and often switching between multiple systems. Leading universities and multi-national corporations are already using new mobile/web-enabled platforms to improve their incident response These next generation emergency management platforms have been specifically designed to enable real-time mapping of an organization’s security assets and its users on a single screen and to fully integrate it with a highly targeted geo-fenced notification capability. The mass notification aspect of the system can then be used to advise specific groups on the best actions to take at their location as an incident develops. The use of live map tracking enables real time mapping of an organisation's security assets Segmented Messaging Many leading universities and multi-national corporations are already using these new mobile/web-enabled platforms to plan, manage and improve their incident response, leading to 50% faster reactions and more positive outcomes.During a crisis, users can receive push notifications so the security centre can immediately see their exact location and advise them accordingly The systems have been widely adopted within the higher-education sector, but they are equally applicable to any large company with multiple international sites or those situated in research or corporate campuses where the bulk of assets and people are based in one or more key locations. Typically, systems provide users with a smartphone app that they can use to call for immediate emergency or first aid support when at work, or to report something suspicious which could prevent an apparently minor incident from escalating into a full-scale emergency. During a crisis, users can receive push notifications, SMS and E-mails asking them to open the app if they are not already logged in, so the security center can immediately see their exact location and advise them accordingly. Supporting Dispersed Mustering Now that communications can be more nimble, responsive and flexible this can support the increasing numbers of planners are recognizing the advantages of dispersed mustering. This is a strategy that has been developed to reduce the risk of secondary attacks on unprotected people complying with instructions to evacuate from premises and gather in what are, effectively, exposed locations. It is now acknowledged that evacuees waiting outside for any length of time are more vulnerable to targeted attacks or to injury, from flying glass for example. With dispersed mustering – a strategy made more effective by these new mobile distributed command and control systems - a building’s occupants can be advised not to go outside, but to move to known safe internal locations. People in each specific area can then be kept regularly updated. Many corporations are now using new mobile/web-enabled platforms to improve their incident response Coordination Between Response Agencies The software platforms can be integrated with an organization’s fixed security infrastructure to take real-time sharing of information First responders are permanently logged in, so the emergency operations center can see their exact locations in real-time and can advise what actions to take in mustering people or in setting up and protecting security cordons. Bringing everything together on one platform, with real-time feedback and in a fully integrated system also removes what is often seen as the weakest communication link in managing any major incident: the need to rely on conventional two-way radio as the sole means of communication between the command and control center and its first responders and other team members on the ground. The software platforms can be integrated with an organization’s fixed security infrastructure to take real-time sharing of information to a new level for improved collaboration, coordination and communications between users, the incident management team and external agencies. Improving Emergency Response Strategies One of the most powerful features of some of these new systems is the ability to record and view all alerts, responses and the detailed conversations between first responders, emergency coordinators and other parties. This allows the systems to be used to simulate major incidents involving inputs from the emergency services and other key agencies and to ensure the organization’s crisis management plans have been fully tested against a range of possible incident scenarios.
As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of security — it’s here. If you’re hesitant to make the move to the cloud, consider these six reasons to embrace this new technology now. Cloud technology has created an opportunity for integrators to offer managed services to their customers Increased RMR Cloud technology has created an opportunity for integrators to offer managed services to their customers, producing a new business model that generates more stable and predictable income streams. By offering managed services on a subscription basis, integrators can build a part of their business to provide recurring monthly revenue (RMR), allowing them to scale faster. This business model is especially beneficial for customers who prefer to pay a fixed monthly or yearly rate for services rather than a large upfront fee, which can help attract new business while growing revenue from current customers. Stickier Customers Providing managed services fosters a more involved relationship between integrators and their customers, which can help boost customer retention. This is primarily the result of three factors. Firstly, customers who buy managed services are committed for a specified term, which helps develop an ongoing business relationship between them and the integrator. Secondly, providing managed services creates an opportunity for more customer contact — each interaction is an opportunity to build rapport and monitor customer satisfaction.While the functionalities of each system vary, their potential is evident in the cloud-based services available Third, customers who purchase managed services generally tend to do business longer than customers who purchase products or services individually; with the monthly purchase of their services on autopilot, customers get into the habit of receiving these services, which helps reduce the chance that they’ll cancel their subscription while also building customer loyalty. High Gross Profit Margins Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. On an ongoing basis, cloud service platforms offer a new level of accessibility to integrators, helping to provide better insight on activity trends to identify opportunities to continuously grow their revenue through subscription-based streams. Easier To Provide Managed Services Traditionally, serving more sites required integrators to hire more technicians to meet the needs of their growing customer base, but the cloud has helped overcome this demand. While the functionalities of each system vary, their potential is evident in the cloud-based service platforms that are available today. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue The Avigilon Blue™ platform, for example, is a powerful new cloud service platform that helps integrators address the needs of their customer sites using fewer resources by offering the ability to administer system upgrades, fixes, health checks, and camera or system settings adjustments remotely. The Avigilon Blue platform automatically sends, and stores video analytics highlights in the cloud, which can easily be accessed from any PC browser or mobile device. This data can be used to efficiently manage customer sites and maintain the health of those sites, helping to increase speed of service and expand the capacity to have more sites up and running.Cloud service platforms have the potential to revolutionize the security industry by providing new opportunities for integrators Not only does this help integrators scale their business faster, it creates an opportunity to provide added value to the customer at a lower cost as new upgrades and services come out. Proactively Fix Problems Before They Occur In addition to automating notifications and tedious maintenance tasks, cloud service platforms help provide integrators with the information and abilities they need to keep their customer sites running smoothly. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue — possibly before the customer even notices a disruption in service. They can then identify the problem and determine whether it can be resolved remotely or requires a technician to be deployed. By having the capacity to pinpoint service needs and make certain adjustments via the cloud, integrators can streamline their customer service processes and lower their response times to provide better, more efficient service. Increased Valuation Of Business Companies that utilize cloud technologies are experiencing as much as 53 percent higher revenue growth rates The ability of cloud service platforms to help integrators manage more sites remotely and expand their revenue through subscription-based streams offers a competitive business advantage. Security innovators have harnessed the power of the cloud to enhance integrator efficiency so that they can spare their attention, resources and effort for where it’s needed most. As a service that helps offer scalability and a high gross profit margin while requiring fewer resources to maintain customer sites, cloud service platforms have the potential to revolutionize the security industry by providing new opportunities for integrators that may ultimately increase their business valuation. According to a study by Dell, companies that utilize cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Integrators who adopt cloud service platforms can benefit from numerous advantages — cost-saving maintenance capabilities, the potential to generate new monthly recurring revenue, and user-friendly design and data security — which make them a significant development within the industry as well as a potential lucrative new business model. The dream of cloud technology is no longer a distant idea of the future, it can become a present reality — and integrators who harness its power can reap its business benefits now.
If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property. Any security system that you employ must therefore meet the most demanding commercial requirements of today’s offices, and tomorrow’s. This means thinking beyond a basic intrusion system and specifying a comprehensive solution that integrates smart features like access control, video management and intelligent video analytics. Because only then will you have security you can trust, and detection you can depend on. Reliable Entry Management Access control systems have been developed that guarantee reliable entry management for indoors and outdoors Access control is becoming increasingly important for ensuring the security of office buildings, but as the modern workplace evolves you’re unlikely to find a one-size-fits-all solution. Today, it’s commonplace to control entry to individual rooms or restricted areas and cater to more flexible working hours that extend beyond 9 to 5, so a modern and reliable access control system that exceeds the limitations of standard mechanical locks is indispensable. Access control systems have been developed that guarantee reliable entry management for indoors and outdoors. They use state-of-the-art readers and controllers to restrict access to certain areas, ensuring only authorized individuals can get in. With video cameras located within close proximity you can then monitor and record any unauthorized access attempts. The system can also undertake a people-count to ensure only one person has entered using a single pass. Scalable Hardware Components As previously mentioned, there is no one-size-fits-all system, but thanks to the scalability of the hardware components, systems can adapt to changing security requirements. For example, you can install Bosch’s Access Professional Edition (APE) software for small to medium-sized offices, then switch to the more comprehensive Access Engine (ACE) of the Building Integration System (BIS) when your security requirements grow. And, because the hardware stays the same, any adaptations are simple. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently The APE software administers up to 512 readers, 10,000 cardholders and 128 cameras, making it suitable for small to medium-sized buildings. With functions like badge enrollment, entrance control monitoring and alarm management with video verification it provides a high level of security and ensures only authorized employees and visitors are able to enter certain rooms and areas. Of course, there will always be situations when, for convenience, you need certain doors to be permanently open, such as events and open days. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently. Growing Security Needs You switch to the Bosch Building Integration System (BIS), without having to switch hardware (it stays the same, remember?). This is a software solution that manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform. It is designed for offices with multiple sites and for large companies with a global presence. Bosch Building Integration System (BIS) manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform The BIS Access Engine (ACE) administers up to 10,000 readers and 80 concurrent workplace clients per server, and 200,000 cardholders per AMC. An additional benefit to security officers is the ability to oversee cardholders and authorizations through the central cardholder management functionality and monitor all access events and alarms from every connected site. For consistency, multi-site cardholder information and access authorizations can be created on a central server and replicated across all connected site servers, which means the cardholder information is always up to date and available in every location. Intrusion Alarm Systems Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email Securing all perimeter doors is vital when protecting employees, visitors and intellectual property. Doors are opened and closed countless times during business hours, and when intentionally left open, your office is vulnerable to theft, and the safety of your employees is compromised. For this reason, intrusion control panels have been developed with advanced features to ensure all perimeter doors are properly closed, even when the system is not armed. If a door remains open for a period of time (you can specify anything from one second to 60 minutes), the system can be programmed to automatically take action. For example, it can activate an audible alert at the keypad to give employees time to close the door. Then, if it is still not closed, it will send a report to a monitoring center or a text directly to the office manager, and when integrated with video it can even send an image of the incident to a mobile device. Customized Intrusion Systems What about people who need to access your building outside of working hours, like cleaning crews? Your intruder system allows you to customize the way it operates with a press of a button or swipe of a card. This level of control enables you to disarm specific areas, bypass points and unlock doors for cleaning crews or after-hours staff, whilst keeping server rooms, stock rooms and executive offices safe and secure. Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email. You can program the panel to send you opening, closing, and other event alerts, which means you don’t have to be on-site to keep track of movements in and around your facility. Video Management System A video management system will add a next level of security to your access control system Every office building has different video security requirements depending on the location, size and nature of the business. Some offices may only need basic functions such as recording and playback, whereas others may need full alarm functionalities and access to different sites. A video management system will add a next level of security to your access control system. For example, the video system can provide seamless management of digital video, audio and data across IP networks for small to large office buildings. It is fully integrated and can be scaled according to your specific requirements. The entry-level BVMS Viewer is suitable for small offices that need to access live and archived video from their recording solutions. With forensic search it enables you to access a huge recording database and scan quickly for a specific security event. For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management Full Alarm And Event Management For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management. It’s also resilient enough to remain operative should both Management and Recording Servers fail. Large multi-national companies often need access to video surveillance systems at numerous sites, which is why BVMS Professional allows you to access live and archived video from over 10,000 sites across multiple time zones from a single BVMS server. When integrated with the BVMS Enterprise version multiple BVMS Professional systems can be connected so every office in the network can be viewed from one security center, which provides the opportunity to monitor up to 200,000 cameras, regardless of their location. Essential Video Analytics Video analytics acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture If your strategy is to significantly improve levels of security, video analytics is an essential part of the plan. It acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture. In effect, each video camera in your network becomes smart to the degree that it can understand and interpret what it is seeing. You simply set certain alarm rules, such as when someone approaches a perimeter fence, and video analytics alerts security personnel the moment a rule is breached. Smart analytics have been developed in two formats. Essential Video Analytics is ideal for small and medium-sized commercial buildings and can be used for advanced intrusion detection, such as loitering alarms, and identifying a person or object entering a pre-defined field. It also enables you to instantly retrieve the right footage from hours of stored video, so you can deal with potential threats the moment they happen. Essential Video Analytics also goes beyond security to help you enforce health and safety regulations such as enforcing no parking zones, detecting blocked emergency exits or ensuring no one enters or leaves a building via an emergency exit; all measures that can increase the safety of employees and visitors inside the building. Intelligent Video Analytics Intelligent Video Analytics have the unique capability of analyzing video content over large distances Intelligent Video Analytics have the unique capability of analyzing video content over large distances, which makes it ideally suited to more expansive office grounds or securing a perimeter fence. It can also differentiate between genuine security events and known false triggers such as snow, rain, hail and moving tree branches that can make video data far more difficult to interpret. The final piece in your security jigsaw is an intelligent camera. The latest range of Bosch ’i’ cameras have the image quality, data security measures, and bitrate reduction of <80%. And, video analytics is standard. Be prepared for what can’t be predicted. Although no-one can fully predict what kind of security-related event is around the corner, experience and expertise will help make sure you’re always fully prepared.
More good news for exhibitors on the second day of the Global Security Exchange (GSX) in Las Vegas. Brisk attendance continued early in the day, and then slowed somewhat in the afternoon, but most comments from exhibitors were positive. Exhibitors such as Lenel were “thrilled” with the show, and noticed the steady, good traffic and lots of sales leads. Lenel’s position at the front of the hall probably helped. New developments in mobile credentialing are a big trend at GSX, and Lenel’s BlueDiamond mobile credentials are traveling on a new path, so to speak. The access control company is introducing the idea of “Pathways” as a way of automatically signaling intent to a Bluetooth-enabled smart phone to open a door. A recognizable “pathway” is programmed into the phone, based on signals from nearby readers and locks and also geolocation signals. The system recognizes when a user travels along the pathway and automatically signals the correct door(s) to be opened along the way without the user having to touch his smart phone.A recognizable “pathway” is programmed into the phone, based on signals from nearby readers, locks and also geolocation signals Providing A Lightweight Alternative “When you trigger a pathway, it’s signaling intent to open the door,” says Greg Berry, Vice President Mobile Credentialing, Global Security Products, for United Technologies, parent company of Lenel. “Pathways are customized to a user’s needs and are the common places you are going all the time.” A user who walks the same path daily to the door of an office will find that door opens automatically. Previously using mobile credentials has been “slightly more work than using a badge,” says David Weinbach, Manager of Identity and Product Innovation for Lenel. “Now with Pathways, it’s less work than using a badge.” Specifically, a user no longer has to take out his phone and push a button to signal intent. “Rather than trying to emulate the badge, you create an experience that is better than the badge,” adds Berry. “We want to change the paradigm and turn the market on its ear.”New browser-based clients are being released with each new version of OnGuard software Other news from Lenel includes the release of more mobile and browser-based clients for OnGuard to be used for greater convenience alongside the Window-based clients. Providing a “lightweight” alternative enables some of the functionality of the Windows client in a format that is easy to access on the go. New browser-based clients are being released with each new version of OnGuard software. Cloud-hosted systems using Microsoft Azure are also among the plans for OnGuard, which ultimately will offer on-premises and cloud options. There’s not much comment from the Lenel folks about their parent company United Technologies’ plan to acquire S2 Security, which was announced days before the show. They would only say that the acquisition is waiting for regulatory approval, and that the expectation is that the two companies’ products will be complementary, given S2’s focus on the SMB (small and medium-sized business) market and Lenel’s strength at the enterprise level. The acquisition strategy is to grow both businesses. More details to come about the new combined company. Modern Network Infrastructure NVT Phybridge, a PoE connections company located near the back of the hall, also reported steady booth traffic on Day 2. “There are lots of customers and partners here,” said Steven Fair, Executive Vice President. “We are pleased with the quality of people, but not overwhelmed with the quantity.” FacePRO AI facial recognition is used for real-time searches of terror suspects or criminals throughout a location NVT Phybridge, which provides IP networking products for the telephony industry as well as security, is focused on networking concepts at GSX, in particular the changing requirements for network infrastructure in the age of IoT. We are pleased with the quality of people, but not overwhelmed with the quantity.” Fair uses the term “Modern LAN” to describe the new, changing requirements and in consideration of the specific networking needs of each edge device, whether cameras, sensors, or door access control devices. “Start with the edge device — what does it need from the network? What are its needs and have there been any innovations to enable you to connect to the network more economically?” asks Fair. There is also a green aspect to designing network infrastructure. Can existing equipment, such as coaxial or single twisted-pair cabling, be used, and thus save on disposal costs of the used cabling as well as lowering installation costs? Among NVT Phybridge’s offerings that can serve the changing networking needs in the IoT era is Smart Path PoE, which offers smart power, smart network access and secure connections. The CLEER family of products provides ethernet over existing coaxial cabling to enable easy transition from analog to IP cameras. The PoLRE products supply ethernet and power to travel over a single unshielded twisted pair cable with reach over 400 meters. The products have been used recently to transition a series of cruise ships from analog to IP video without having to replace cabling and spending only two days in dry dock for the installs. A New Focus Away From AI Panasonic is looking to apply AI-based capabilities to vehicle recognition in the near future, with the ability to identify vehicle characteristics Deep learning and artificial intelligence (AI) seem to be taking a lower profile at this show, perhaps signaling the end of the hype. Companies that mention AI point to specific products that use the technology and are currently available. For example, Panasonic is featuring its FacePRO AI-based facial recognition system. The system uses face images captured from video — grabbing up to 30 to 35 faces a second as video is recorded. The system saves the best of those face images, eliminating extensive duplication, as thumbnails, which are linked to the video footage where the faces appear. To find video in which a face appears, the operator merely drags-and-drops the thumbnail image and commands the system to “go fetch” video that contains that face. The system then produces a timeline showing where the face appears in the feed from each video camera on the premises, so an operator can track the movements of a suspect throughout a facility. The tool helps to simplify and shorten the workflow of locating a suspect in real-time and is affordable for a wider range of uses beyond the traditional airports or high-end applications. The FacePRO software is offered on any Panasonic camera, and works with a separate FacePRO server that is integrated with the video recorder. The system can be added easily to existing systems and is useful for such applications as real-time searches for terror suspects or other criminals throughout a location. Panasonic is also looking to apply AI-based capabilities to vehicle recognition, too, in the near future, with the ability to identify vehicle characteristics such as color, type of vehicle and direction of travel. On the VMS side, Panasonic is transitioning its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved That’s just a sampling of what I saw on Day 2 of the show. I have more to share in a final show report, including what I see tomorrow on the final (shortened) day.
I have been thinking a lot about the U.S. government’s ban on video surveillance technologies by Hikvision and Dahua. In general, I question the wisdom and logic of the ban and am frankly puzzled as to how it came to be. Allow me to elaborate. Chinese Camera Manufacturers Reality check: The government ban is based on concerns about the potential misuse of cameras, not actual misuse. Before the government ban, you occasionally heard about some government entities deciding not to use cameras manufactured by Chinese companies, although the reasons were mostly “in an abundance of caution.” Even so, I find the targeting of two Chinese companies – three if you count Hytera Communications, a mobile radio manufacturer – in a huge government military spending bill to be a little puzzling. I can’t quite picture how these specific companies got on Congress’s radar. The government ban is based on concerns about the potential misuse of cameras, not actual misuse What level of lobbying or backroom dealing was involved in getting the ban introduced (by a Missouri congresswoman) into the House version of the bill? And after the ban was left out of the Senate version, was there a new wave of discussions to ensure it was included in the joint House-Senate version (with some minor changes, and who negotiated those?). It all seems a little random. Concerns For The U.S. Furthermore, the U.S. ban solves neither of the two main concerns that are generally used as its justification: Concern: Cybersecurity. The U.S. ban “solves” the issue of cybersecurity only if both of the following statements are true. No security system that uses a Hikvision or Dahua camera or other component is cybersecure. Any system that does not use a Hikvision or Dahua camera or other component is cybersecure. What level of lobbying or backroom dealing was involved in getting the ban introduced into the House version of the bill? The ban ignores the breadth and complexity of cybersecurity and instead offers up two companies as scapegoats. Our industry has sought to address cybersecurity, and the one principle that has guided that effort is that cybersecurity is an issue that must be addressed by manufacturers, consultants, integrators and end users – in effect, everyone in the industry. Cybersecurity does not begin and end with the manufacturer and banning any manufacturers from the market does not ensure better cybersecurity. Concern: “Untrustworthy” Chinese companies. Hikvision and Dahua are only two Chinese companies. Any response to concerns about whether Chinese companies are trustworthy would need to cover many more companies that manufacture their products in China. Australian TV recently claimed that “All Chinese companies pose a risk. Because of Chinese laws, there is a requirement for companies to be engaged in espionage on behalf of the state.” Even if one embraces that extreme view, the logic fails when only two companies are targeted. One source told me that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, so it’s a much bigger issue than two companies.The Chinese government has much more effective ways of conducting espionage than exploiting security cameras And is U.S. security at risk unless or until it is cut off from more than half of the world’s supply of video cameras? Even Western camera companies manufacture some of their cameras and/or components in China. Why name only two (or three) companies, only one of which has ties to the Chinese government? If the goal of the U.S. ban was to address the possibility of cybersecurity and/or espionage by the Chinese government, shouldn’t there be other companies and product categories included? Clearly, video surveillance is not the only category that has the potential for abuse. The Chinese government has much more effective ways of conducting espionage than exploiting security cameras. Global Response To U.S. Ban And now that the U.S. ban has been passed, how is the ban being misused to justify a new level of alarm about Chinese companies? Australian television effortlessly made the leap from “software backdoors” to a concerted and organized effort by the Chinese government to use cameras to be the “number one country for espionage.” And it’s not just about government facilities: “Even on the street, [cameras] have the potential to inadvertently contribute toward Chinese espionage activity by providing real-time information about the situation on the ground,” says the Australian TV report. If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies? If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies, or at least those with electronics or computer products that could be used for espionage? What about the espionage potential of the 70% of mobile phones that are made in China? What about other consumer electronics such as PCs or smart TVs? How many government facilities that are eliminating Dahua and Hikvision cameras have employees who use iPhones or use other electronic equipment from China? Artificial Intelligence & IP-Over-Coax Also, consider the impact of the ban on business. Hikvision and Dahua have had many successes in the video surveillance market, including in the U.S. market. They have added value to many integrators and end user customers. They have been on the forefront of important trends such as artificial intelligence and IP-over-coax. And, yes, they have made technologies available at lower prices.Cybersecurity issues have plagued several companies in the industry, not just Hikvision and Dahua Cybersecurity issues have plagued several companies in the industry, not just these two, and both Hikvision and Dahua have worked to fix past problems, and to raise awareness of cybersecurity concerns in general. Is a U.S. ban on two companies an appropriate response to a series of geo-political concerns that are much bigger than those two companies (and bigger than our entire market)? Should two companies take the brunt of the anti-Chinese backlash? Video Surveillance Cameras Is the video surveillance market as a whole better or worse for the presence of Hikvision and Dahua? Is it up to the U.S. government to make that call? In some ways, thoughts of Chinese espionage are a sign of these uncertain political times. Fear of video surveillance is perfectly congruent with long-standing anxieties about “Big Brother;” suspicion about China taking over our video cameras just rings true at a time when Russia is (supposedly) controlling our elections. But should two companies be targeted while broader concerns are shrugged off?
As Internet of Things (IoT) devices go, networked video cameras are particularly significant. Connected to the internet and using on-board processing, cameras are subject to infection by malware and can be targeted by Distributed Denial of Service (DDoS) attacks. Hacking of cameras also threatens privacy by allowing unauthorized access to video footage. The performance of hacked cameras can be degraded, and they may become unable to communicate properly when needed. Ensuring cybersecurity is a challenge, and the fragmented structure of the video surveillance market contributes to that challenge. A variety of companies are involved in manufacturing, integrating, installing and operating video systems, and cybersecurity threats can enter the picture at any stage. “It’s not always clear who is responsible,” says Yotam Gutman, vice president of marketing for SecuriThings, a cybersecurity company. “However, the only entities who can ensure cybersecurity are the security integrator and the service provider. They will bear the financial pain and are willing to pay for cybersecurity. An extra $1 or $2 per camera per month is not expensive.” SecuriThings’ “lightweight software agent” runs in the background of video cameras, sending information to an analytics system in the cloud IoT Device Security Management At the recent IFSEC trade show in London, SecuriThings unveiled its IoT Device Security Management (IDSM) approach to enable integrators to ensure cybersecurity. Founded in 2015, the company has around 20 employees in Tel Aviv, Israel, and operates a sales office in New York City. SecuriThings’ “lightweight software agent” runs in the background of video cameras, collecting metadata on camera processes and connections and sending information back to an analytics system in the cloud. Drag-and-drop deployment enables a camera to begin generating data within seconds and requiring only two mouse clicks. The cloud system analyzes data, pinpoints abnormalities, identifies new users, detects multiple entry attempts and tracks other camera processes to identify any cyberattacks. It monitors all devices, gateways, users and APIs to detect threats in real-time and mitigate the threats based on a pre-determined security policy. Machine learning tools also analyze more subtle activities that can indicate insider abuse. For example, a user support center can identify if cameras are being accessed improperly by employees, thus preventing insider abuse. Certified Vendor Agnostic Software SecuriThings is working with camera manufacturers and video management system (VMS) manufacturers to certify operation of its software agents with various camera models and systems. Working through integrators, such as Johnson Controls, is the fastest route to market, SecuriThings has determined. The system can be added after the fact to existing installations for immediate monitoring and remediation, or it can easily be incorporated into new systems as they are launched. “We have a strong sales team in the United States focusing on bringing the technology to more local and national integrators,” says Gutman. Certification ensures SecuriThings’ software agent can be installed in most modern camera models without negatively impacting operation; the software is vendor agnostic. Another eventual route to market is to work with camera manufacturers to install the SecuriThings software agent in cameras at the factory. In this scenario, the system can easily be “clicked on” when cameras are installed. The SecuriThings cloud system generates a dashboard that tracks system activities to identify any cybersecurity threats IoT Security Operations Center SecuriThings operation is transparent to the VMS, and the company works with VMS manufacturers to ensure the code operates seamlessly with their systems. Cloud analytics generate a dashboard that tracks system activities, and/or a managed service monitors the system and notifies customers if there is a problem. “We monitor it from our IoT Security Operations Center, a fully managed service that ensures the real-time detection and mitigation of IoT cyber-threats,” says Gutman. “We found that end-customers don’t have the manpower to monitor the system, so our experts can guide them.”Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable" A benefit for camera manufacturers is the ability of a system like SecuriThings to “level the playing field” on issues of cybersecurity, says Gutman. The approach provides a higher level of cybersecurity confidence for integrators and users, including those using cameras that have previously had cybersecurity problems such as “back door” access. SecuriThings has certified its software for use with Hikvision cameras and is in the process of certifying with Dahua, says Gutman. “Western manufacturers say their products are more secure, but we can help all camera manufacturers prove that they are just as secure,” says Gutman. “Integrators and users can log into a device and see all the activity.” Securing Connected Devices From Cyber Threats Beyond video, SecuriThings’ products target the full range of connected devices in the Internet of Things (IoT). The SecuriThings security solution enables real-time visibility and control of IoT devices deployed in massive numbers in smart cities, physical security, building automation, home entertainment and more. Video surveillance is an early focus because of market need, an opportunity to gain traction, and the critical nature of security applications. But the challenges are much broader than video surveillance. “We are seeing similar risks to other devices,” says Gutman. “Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable. If you can disable the access control system, you can cause a lot of problems.” Other connected devices that could be at risk include building automation and heating and cooling (HVAC) systems.
PureTech Systems recently announces a delivery milestone for the next phase of the Border Patrol’s Mobile Video Surveillance Systems (MVSS) program. The latest deliveries, consisting of ruggedised Ford F-150 trucks outfitted with telescoping surveillance payloads, are being deployed in San Diego, CA and will support mobile video surveillance up to 6 miles away. Remote Surveillance Scenarios The event was followed by Fox 5 News and ABC 10 News in San Diego and highlighted the value to Border Patrol agents in the field, including rapid deployment and ease of use. The MVSS platform utilizes PureTech Systems’ PureActiv software as its central command and control, providing video intelligence, user interface display and sensor collaboration logic for the surveillance suite which consists of visible and thermal cameras mounted on a telescoping mast which extends over 35 feet in the air. Mobile Surveillance Solution In the interview with ABC 10 News, Michael Scappechio, a supervisor with the Border Patrol, said, it’s their increased rate of arrests that landed the trucks here, “nearly a 90 percent increase is significant, that’s going to get attention, that’s going to get resources, that’s going to get man power, infrastructure and technology.” Border Patrol also furthered that these trucks won’t replace the border wall but instead, will go hand in hand with it. PureTech Systems is teamed with Benchmark Electronics to deliver the complete mobile surveillance with the mission to track and identify Items of Interest (IOI) along the U.S. southwest border and other remote surveillance scenarios where rapid mobile deployment is needed. The most recent delivery of the mobile video surveillance solution is not the first, with several systems already being deployed along the border in Texas.
Abloy UK and security company Barry Brothers have supplied and installed a CLIQ Go electronic cylinder solution to a communal garden in Kensington, London to provide its subscribers with reliable and secure access. The garden’s previous access control system had proven to be unreliable, at times allowing members of the public unauthorized access which often resulted in damage in the area. Also, previous subscribers had maintained ingress and egress to the garden by retaining their key after their subscription had lapsed. Multiple Access Requirements Located in an enclosed area, the garden is secured with an external gate that is fully exposed to the elements. The resident committee required a durable locking solution to cope with such conditions, with the technology to control multiple access requirements; to allow subscribing resident’s access to the gardens, and a team of contractors and committee members with higher access permission to enter the internal compound to enable maintenance of the gardens. The new CLIQ Go electronic cylinder solution from Abloy as the ideal technology to cope with the ever-changing access control requirements Sam Moxey, technical sales and project manager at Barry Brothers, London’s longest serving security company, specified the new CLIQ Go electronic cylinder solution from Abloy as the ideal technology to cope with the ever-changing access control requirements. Excellent Feedback The CLIQ Go App moves security to a new dimension, enabling controlled security from a mobile device and the ability to easily revoke access permission of non-subscribed individuals. Features include the ability to schedule access to areas and to provide contractors with time-limited access. If a key is lost, access can also be revoked using the CLIQ Go App, all managed from a cloud-based system. The system has been installed for six months with excellent feedback from the committee and subscribers. Membership subscriptions have increased and savings have also been achieved because of the reduced number of locksmith callouts. Sam Moxey, Barry Brothers, Said, “I wanted to ensure that the solution we specified would perform as required and finally resolve what had become an ongoing issue for the committee. Having worked with Abloy UK for a number of years, I had no hesitation in recommending CLIQ Go. It was very easy to set up and the programming of the CLIQ Go locks and keys was achieved easily, fitting with my busy workload.”
A chain of one-stop shopping destination is one of the pioneers of discount shopping center in the UAE and Dubai. With a selected chain of suppliers, they offer the widest choices of products at very affordable prices. The products of this retail chain range from daily food items to beauty products and perfumes. Household items such as kitchenware, tableware, appliances, decors and electronics including mobile phones and computer accessories are also available here. The store offer apparels such as ladies wear, menswear, and children’s wear, in addition to shoes, bags, school and office supplies. Branches of this retail chain are located in more than eight locations with the one in Sharjah being the biggest branch till date. Easy Attendance Management Since branches of this retail chain are spread across UAE, managing attendance of every employee became a tedious task. Moreover, keeping track of each of their IN and OUT timings, overtime, leaves, and shift management for multiple locations from a single location was another challenge the retailer faced. Attendance management, multiple shift management and over time calculation became tricky challenges to deal with. Apart from that, they required specific type of reports to map everything department or location wise. Matrix offered its dynamic range of biometric hardware products along with the software solutions to complement the devices Matrix offered its dynamic range of biometric hardware products along with the software solutions to complement the devices. As the retail chain is an exponentially growing company building stores at several locations, Matrix offered its Time-Attendance module along with fingerprint and card based door controller, COSEC DOOR FOT. This solution assisted in easy attendance management of employees along with their shift and overtime management. Analysis Of Employees’ Attendance The solution also allowed generation of several specific types of reports with detailed filtering options for smooth process and analysis of employees’ attendance details. Matrix People Mobility Management solution assisted the retail chain achieve following results: Centralized Attendance Management and Monitoring Easy Shift & Schedule Management Elimination of Overtime Issues Smooth HR Process with Various Precise Reports The products used for providing solutions: COSEC DOOR FOT - Fingerprint and Card based Door Controller for Time-Attendance COSEC CENTRA ME - Application Server Platform with 500 or more Users and Expandable up to 1,000 Users COSEC ME TAM - Time-Attendance Module for 500 or more Users COSEC USER100 - User license for 100 users
Wilson James has appointed SmartTask as preferred technology partner and awarded it a deal for the supply of a mobile patrol and electronic smart form solution for a new security contract with National Museums. Under the agreement, the company will now roll out the SmartTask workforce management software to 10 sites including the Natural History Museum, V&A and Science & Industry Museum. This follows a successful trial that achieved significant time savings by removing paperwork and streamlining operational processes. The new partnership between Wilson James and SmartTask will replace an incumbent supplier agreement that no longer met the business and operational requirements of the security, construction logistics and business services provider. Identify Potential Benefits In particular, the retender process for the security contract with Natural Museums required a single provider of a highly-configurable mobile patrol and electronic smart form solution. An initial trial at the Natural History Museum focused on use of electronic forms via SmartTask-enabled smartphones to reduce administration and increase productivity of operational staff. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms It was designed to identify potential benefits based on the precise requirements of the customer as well as create a suite of seven SmartForms and reports that could deliver standardized data capture and analysis. This included confiscated items and vehicle check SmartForms, scenario testing and incident reporting. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms. Required Monthly Reports Confiscated items, following bag searches carried out at point of entry, historically required between 10-15 minutes to complete and during that time the security officer was away from the floor resulting in lost productivity. Following the adoption of SmartTask, reports can now be created automatically using highly-accurate data, while paper usage and printing requirements have been dramatically reduced. The time savings achieved at the National History Museum by the Wilson James team have led to higher productivity, greater capacity to carry out bag searches and increased visibility of security staff. Management time saving have also been realised in production of required monthly reports, as well as administration savings of 12-hours per week for the Security Duty Managers. Ease Of Deployment Don McCann, Technology Systems Consultant at Wilson James commented: “SmartTask provided significant support throughout the contract bid and contributed to the successful re-signing for a further five years.” SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system" “The solution is now fully operational at five locations – Natural History Museum, National Science & Media Museum, National Railway Museum, Science & Industry Museum and a Wandsworth storage site – with the Science Museum and V&A to follow shortly. SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system, ease of deployment and its suitability for the security sector.” Enhance Customer Satisfaction Paul Ridden, CEO of SmartTask said: “This latest agreement demonstrates our ability to work closely with our customers to develop advanced workforce management solutions that support business development, customer retention and quality service delivery. We are now partner of choice for a growing number of security organizations based on our proven track record helping to tackle some of the most common and difficult operational challenges they face.” SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
The first Starbucks coffee house opened in in Moscow in 2007 and in ten years the chain’s growing popularity across Russia has seen more than 100 outlets open. There are now several different store formats including classic coffee shops located in shopping centres; stand-alone stores characterized by open vaulted ceilings; smaller kiosk outlets; and drive-through outlets where customers can buy fragrant coffee and fresh-baked goods round the clock without leaving their cars. Following a survey of the latest solutions AVIX recommended IDIS technology as the best option for reliable, scalable video that could be remotely accessed via PCs and mobile devices. Maximum Design IDIS Solution Suite was identified as the best video management software option to integrate existing legacy equipment IDIS Solution Suite was identified as the best video management software option to integrate existing legacy equipment, the analog IDIS DirectCX range to leverage existing infrastructure as well as the latest IDIS IP solutions. The VMS also offered the most user-friendly and convenient for use not only for Starbucks security controllers but also by the senior operations managers In the classic coffee house outlets IDIS HD TVI DVRs have been installed handling either 8 IDIS cameras (TR-3108) or 16 cameras (TR-4116) depending on the site requirements. A mix of analog and IP camera technology is used across the Starbucks estate, giving maximum design and installation flexibility. New drive-through outlets are protected by a combination of external and internal cameras. Older Legacy Cameras In the shopping centre kiosk outlets an easy-install and compact full-HD flat dome camera (DC-F1211) has been deployed, while a compete view of the entire point of sale is covered by a vandalresistant IR camera, the DC-D2233WR, with both cameras linked to an H.265 4K recorder (DR-2304P). With thousands of customers visiting stores every day, and hundreds of staff to take care of, Starbucks’ management wanted a robust, flexible video surveillance solution that would operate effectively in every store location and in all store formats. AVIX, a Russian distributor was challenged with designing a system that would deliver optimum quality video regardless of the store format and make use of older legacy cameras in certain locations. The system also needed to be convenient to install while maintaining the aesthetics of each outlet with the ability to focus in on sales transactions in real-time. Maintaining Quality Standards This IDIS solution gives us excellent video quality the operational control we need to manage our continued expansion" The system was required not just to ensure high security standards but also to be used by Starbucks’ senior operations managers to control efficiency and underwrite customer service and performance as the number of stores continues to grow. Senior staff in the Starbucks operations department, and security managers, now use the video system day-to-day, verifying working hours, maintaining quality standards and controlling incidents. “This IDIS solution gives us excellent video quality the operational control we need to manage our continued expansion. The IDIS Solutions Suite VMS is comfortable and convenient for remote monitoring and it works perfectly by allowing our current mix of IP and analog cameras, including the latest IP IDIS models and equipment. The system is future scalable, and we will easily adapt it to changing needs.” Alim Sizov, General Manager ‘SVS Project’ – Starbucks Partner. Following the success of this first phase installation a comprehensive upgrade to IDIS video cameras is being implemented across the entire Starbucks estate.
Maxxess, the innovative security management and communications solutions, partnered with the Santa Ana Unified School District (SAUSD) to deploy a powerful new security and operations solution that leverages the power of smart mobile devices to maintain comprehensive communications and emergency management operations. Maxxess Ambit, which provides private, two-way, managed messaging and intel on a more personal and intuitive level, received its first wide-scale test during the SAUSD’s annual earthquake preparedness drill called the Great Southern California ShakeOut. SAUSD used Maxxess Ambit as their primary communications solution during the Great Southern California ShakeOut drill “The 2018 Great Shakeout drill was more realistic than in years past,” said Camille Boden, Executive Director or Risk Management for the Santa Ana Unified School District. She further added, “With Maxxess Ambit, our Emergency Operation Center (EOC) was able to receive simulated eyewitness accounts and requests for assistance from multiple staff members at schools across the District. The information with GPS locations provided by Maxxess Ambit came into the EOC rapidly, providing first responders with the specific details they would need if we really had experienced a disaster. The drill tempo was accelerated and provided real-world insight as to what the District could possibly experience in the event of a massive earthquake.” Maxxess Ambit’s “see it, say it” SAUSD used Maxxess Ambit as their primary communications solution during the Great Southern California ShakeOut drill. Maxxess Ambit’s “see it, say it” application kept SAUSD’s EOC fully informed of missing people, dangerous situations, property damage and more during the emergency simulation. This allowed the EOC’s staff to instantly generate various reports and assign the appropriate personnel to respond. One report that came in during the drill was from a school needing to be evacuated, which was immediately assigned to SAUSD’s logistics personnel. Logistics then called the school transportation service and directed them to the correct pick-up spots. The EOC at SAUSD not only took action on reports that came in but was able to anticipate issues resulting from the information collected with Maxxess Ambit. All EOC’s actions were captured for reporting and future audits within Maxxess Ambit. Mass Notification During an earthquake scenario, Maxxess Ambit can broadcast a mass notification that will be sent to all users of the organization During an earthquake scenario, Maxxess Ambit can broadcast a mass notification that will be sent to all users of the organization, by site, by department or even by selected user groups. This allows emergency personnel to quickly monitor staff status, communicate with staff members using an organized interface, and help first responders act efficiently. As end users respond to the mass alert broadcast, a geo-tag is placed on a map to correspond with each mobile user’s location. Unlike systems that handle only one aspect of communications like a mass texting tool, Maxxess Ambit also addresses longstanding security challenges by transforming the way organizations operate on a daily basis. In a school environment, for example, a staff member can activate a duress report via Maxxess Ambit in the event a meeting is becoming emotional or tense. Real-time Chat Session The report would appear on the mobile devices of the school’s security team, enabling a real-time chat session while continuously tracking the staff member’s location. This unique combination of features empowers total awareness by making administrators, teachers, staff and students an integral part of the security solution. Maxxess Ambit is a cloud-based solution that does not require a capital investment in any hardware or servers and is deployed like a mobile app with all information logged into the system for compliance and audit purposes.