Office security systems
Suprema, a globally renowned company in access control, biometrics and time & attendance solutions, has announced that its intelligent biometric access controller, CoreStation has acquired UL 294 compliance. UL 294 compliance UL 294 is a certification designed especially to ensure the safety and reliability of access control products. The certification has significance to larger customers, like government institutions, corporations, and medical and banking verticals that value reliability...
Ping Identity, the intelligent identity solution for the enterprise, was recognized as one of the 25 Highest Rated Public Cloud Computing Companies To Work For During the COVID Crisis in a list released by Battery Ventures, a global investment firm and cloud investor, with data specifically provided by Glassdoor, the provider of insights about jobs and companies. The list highlights 25 publicly traded companies—all business-to-business, cloud-computing companies--where employees reported...
Acronis, a global provider of cyber protection, announced that it has joined the MPC Alliance, a global association of organizations with the mission of improving data security and privacy through the implementation of the secure cryptographic technology of multi-party computation (MPC). MPC is a mathematical approach to digital security that reduces the dependency on trusted third parties and physically secured devices to maintain the privacy and security of the digital footprints, which have...
Flexibility and a trusted record of reliable security in real-world environments: these are critical features when choosing any new electronic locks. With the Aperio E100 Wireless Escutcheon from ASSA ABLOY Opening Solutions, one can get both. A robust device suited to almost any medium- to high-traffic door, the E100 is easy to install wire-free - an ideal choice for both retrofit projects and new buildings. With Aperio’s open platform, it is straightforward to then integrate the escutch...
Blind spots in surveillance coverage, incompatible video and access control systems, lack of adequate perimeter measures are some of the common issues that facility directors must address with their security teams. At the end of the day, facility executives need technology that accomplish more with less and that expand situational awareness, overall system functionality, and real-time response capabilities, while generating cost savings. By leveraging technology like thermal imaging, this is pos...
As iPhone 12 shipments rollout, security experts at Check Point warn of the security risks in using 5G. Here’s how consumers can stay safe while using the new iPhone and other 5G carriers. Security experts at Check Point are warning of security risks around 5G as iPhone 12 begins to ship worldwide. What is 5G? And how does it work? 5G is the shorthand term that stands for the fifth generation of wireless cellular networks. Following previous wireless standards after 1G, 2G, 3G, and 4G net...
Acronis, a global provider of cyber protection, announced plans to expand its global network of cloud data centers, including new state-of-the-art facilities in Canada, New Zealand, and Bhutan. Announced at the Acronis Global Cyber Summit 2020, the expansion ensures that the full range of Acronis Cyber Protection Solutions will be available to partners and organizations around the world, which is critical now that an estimated two-thirds of employees work remotely and rely on cloud-based services. Services data centers The rise of edge computing around the world means more data is now created and used away from company networks" The announcement also revealed Acronis’ plan to add an additional 100 micro data centers to its global network, which already includes collocated and managed services data centers in the U.S., the U.K., Switzerland, France, Germany, Japan, Australia, and Singapore. Another new data center in Vancouver, Canada was announced earlier this month. “The rise of edge computing around the world means more data is now created and used away from company networks,” said Serguei “SB” Beloussov, Founder and CEO of Acronis. Cloud data centers “Micro data centers enable the efficient deployment of edge computing, particularly in emerging markets. As part of Acronis’ Global-Local Strategy, this expansion allowing us to provide the local, cost-efficient, bandwidth efficient, and low latency cloud services our global partners demand. It demonstrates our commitment to offering the cloud-based services and cyber protection that partners and users need in today’s digital world.” With Gartner forecasting that the worldwide market for cloud management and security services will continue growing more than 25% by 2022, and Technavio projecting that the global edge data center market will progress at a CAGR of almost 14% by 2024, the new cloud data centers announced will put Acronis in a strong position in both areas. Cloud-based cyber protection The expansion further enables Acronis to extend the reach of its cyber protection solutions “While reliance on cloud-based access to production data and controls has been increasing during the past several years, the pandemic accelerated its adoption worldwide among organizations,” notes Phil Goodwin, Research Director, IDC. “Developing a larger network of cloud data centers, especially in emerging markets, enables Acronis to cultivate new partners and customers who are actively seeking cloud-based data protection and security platforms and solutions.” The expansion further enables Acronis to extend the reach of its cyber protection solutions delivered through the Acronis Cyber Cloud platform, which empowers service providers to provide backup, disaster recovery, antimalware, secure workplace collaboration, and blockchain-based data authentication service - all through a single pane of glass. Data center network “Organizations across the globe rely on data in a way they never have before, which means they need IT providers like us to be ready with effective, affordable solutions,” said Martin Brought, President & CEO, Robson Communications. “Acronis understands what providers need to build our portfolio of services and keep clients protected - not just from the standpoint of the solutions they offer, but also how they price and deliver them. The expansion of their data center network will help a lot more service providers around the world keep their clients productive and protected.” Endpoint management tools Among the solutions service providers can access through the new data centers is Acronis Cyber Protect Cloud. Among the solutions service providers can access through the new data centers is Acronis Cyber Protect Cloud. This unique integration of backup, disaster recovery, next-gen antimalware, cyber security, and endpoint management tools recently earned the 2020 New Product Innovation Award for Data Protection from Frost & Sullivan. All of Acronis solutions are designed to address the Five Vectors of Cyber Protection, ensuring the safety, accessibility, privacy, authenticity, and security (SAPAS) of an organization’s data, applications, and systems. Cyber protection solutions Regardless of their size or geography, or whether they are collocated or managed services facilities, all Acronis data centers meet the highest standards of digital and physical security, and feature redundant power and environmental controls ensure constant (99.9%) monthly availability. Service providers interested in learning more about the global network of Acronis data centers or the full range of cyber protection solutions available via the Acronis Cyber Cloud are encouraged to contact the Acronis Partner Program team.
Aiphone, the renowned international manufacturer of intercom and security communication products, has added the IXG-MK IP Video Guard Station to its robust portfolio of solutions in its IXG Series Multi-Tenant Video Intercom System. The IXG-MK provides visitors a convenient way to call a building’s concierge, receptionist, or security guard directly from the entrance station. This is helpful when visitors are unsure how to reach a tenant or if they are simply trying to deliver a package to the front desk. Once safe intent has been determined, calls can then be transferred to the proper apartment or suite, or the door unlocked for deliveries. Clear video identification “Perimeter security is more important than ever, due to the COVID-19 pandemic and increased interest in occupancy management,” said Paul Hefty, Technical Sales & Support Engineer, for Aiphone Corp. “This additional layer of security will ensure only approved visitors will be allowed inside, keeping tenants and building assets safer.” Those screening visitors can choose either hands-free (VOX) or full duplex (handset) communication The IXG-MK offers flexibility and simplicity to end-users with a seven-inch touchscreen for clear video identification, video communication between guard stations, call recording, and the ability to forward calls directly to a tenant. Those screening visitors can choose either hands-free (VOX) or full duplex (handset) communication. Touching the key button will activate the door release associated with the connected entrance station or door station. Network-Based communication platform An ideal solution for any multi-tenant housing or office facility, the IXG-MK can have up to 9,999 units in its address book and will maintain a history of calls received. The IXG Series Multi-Tenant Video Intercom solution is a sophisticated, streamlined way to connect a variety of mixed-use buildings. This series is a complete network-based communication platform offering a variety of options for any multi-tenant security application. Throughout 2020, Aiphone will be celebrating its 50th Anniversary in North America by thanking customers, dealers, integrators, and employees for providing the opportunity to develop and improve better security and communication solutions.
Vanderbilt, a renowned provider of state-of-the-art video, access control and intrusion security systems, announced the introduction of Vanderbilt Mobile ACT ID, featuring zero-touch, cloud-issued credentials for seamless integration into its access control solutions. The result is the ability to easily issue new credentials, as well as instantly grant and restrict access for office buildings, government facilities, healthcare institutions, schools, residences and a growing variety of enterprises. Powered by WaveLynx Technologies, Vanderbilt Mobile ID communicates directly to each platform for authentication to help streamline access across the Vanderbilt U.S. platforms, including lite blue, bright blue, ACT365 and Vanderbilt Security Management System (SMS). The free credentials are supported on NFC for Android and Bluetooth Low Energy for iOS, and features fully authenticated issuance from a secure cloud credential authority. Access control system The application does not require any subscriptions or fees, making it an extremely flexible and affordable solution that allows organizations to transition to mobile access at their own pace. “The addition of cellphone credential functionality is critical in today’s threat landscape as more users demand touch-free flexibility and a streamlined approach to visitor management and access control,” said Lynn Wood, Product Portfolio Manager, Vanderbilt. “Now, more than ever, we’re seeing demand for technology that is easy to use, simple to navigate and offers the added benefit of mobility for users. Vanderbilt Mobile ID brings all of this to customers at no additional cost.”
Navigate360 urges to identify the warning signs of stress in the employees and ultimately prevent violence with confidence and knowledge. If it is like most businesses, the business probably weren't at all prepared to deal with COVID-19, and the companies are still tirelessly adjusting operations to adapt and survive. Regardless, the urgency of another eclipsing issue is about to interrupt those efforts. Professionals have warned of a follow-up tsunami in the form of mental health issues. And it's about to make landfall in the workplace. Because modern workplace safety begins with prevention, Navigate360 created this important eBook for everyone’s use as a resource. Written by Joe Hendry, a certified Physical Security Professional (PSP) widely considered one of the top U.S. trainers in Violent Critical Incident response, this eBook details the startling research on behaviors of violent individuals and the impact of the pandemic on workplaces. Identify warning signs It's intended to help the users identify the warning signs of stress in an organization’s employees and ultimately, to prevent violence with confidence and knowledge. Readers can get vital information on: Current trends in stress and violence How to identify the warning signs in the employees What the organization and their team can do to help eliminate the stigma around mental health Workplaces thrive when people feel safe, both physically and emotionally.
Visitor management is the smartest way to welcome those who are permitted in a school and vet those who don't. Visitor Management is the school's first line of defense. The schools are the heart of a thriving community. It is more important now than ever that they can welcome everyone who belongs in the school - from staff and students to visitors, volunteers and vendors - while vetting those individuals who should not be allowed entry. What is a visitor management process missing? Discover how modern, smart visitor management technology increases security and empowers staff to manage the complexities of the front office while welcoming those who belong in the building. The company’s new eBook provides their customers with insights on how to ensure their visitor management: Integrates with the user’s school's full suite of emergency preparedness solutions Considers adaptability for future processes, visibility and scalability Maintains a safe and welcoming environment for staff and students
With the ever-changing world, one can see condominiums, apartments, and gated communities becoming a hub of activity. People are establishing home offices, deliveries are increasing and security becomes more important than ever. Condo living is resort-style living at its best. CondoPark becomes an automated transportation and parking manager while ensuring unwanted people and vehicles are not accessing the user’s garages. CondoPark has unlimited potential and has the flexibility to adapt to the best features for the user’s operation. Tenants and/or Concierges can: Manage deliveries of all types of vendors in a secure and efficient manner. Manage parking of tenants and ensure they and their cars and bikes are secure. Manage visitors - no passes or cards - on-demand in real-time. Manage reservations - parking can be managed in advance as non-tenant parking becomes more and more valuable. Security - provide tenants assurance that parking areas are tracked and protected of vandalism, tailgating, car theft, and any other infractions. Real-time monitoring - from anywhere. Compatible with the user’s current systems and upgradable. Optional License Plate Recognition. The future of Condo living is changing and CONDOPARK takes care of these parking needs. Software is a small monthly fee so it is very affordable for all environments.
We’ve just endured an event that was unprecedented in recent history. COVID-19 greatly affected our lives: our daily activities, the health and well-being of our families and friends, and business operations as we know it. Now that stay-at-home restrictions have been lifted, organizations are preparing for employees to return to work. Confidence surrounding the return to the office hinges on the employees’ perceptions of how well they will be protected while at work. One thing is certain: There is a lot of work ahead. Let’s look at some of the challenges enterprises can expect to face and how to best address them. Addressing the Return to the Office To say that the COVID-19 pandemic has disrupted operations around the world, is the understatement of the decade. That being said, businesses and governments are under mounting pressure to restart their operations as quickly as possible. With ‘social distancing’ and other measures helping to curtail the spread, organizations are turning their attention to a critical question, “How do we effectively restart operations, while protecting our employees’ and citizens’ health and safety?”As organizations begin to “reboot,” they must be able to take a variety of factors into consideration and focus on what they can actually control In the absence of defined contingency plans, industry standards or regulatory guidance, organizations are looking for innovative ways to help address a host of new challenges. Businesses are not just focused on response or monitoring of hot zones during the pandemic; they’re also thinking about afterward, when people return to the daily activities and the workplace under a different, new set of circumstances. Embarking on this journey and being successful requires a key element: the insight to adapt. As organizations begin to “reboot,” they must be able to take a variety of factors into consideration and focus on what they can actually control: their employees’ safety, operating models, and existing compliance requirements. Building Confidence Adjusting these elements demands a pragmatic approach that addresses the potential risk to employees in various environments while also delivering a degree of confidence to customers that an organization is taking a meaningful, proactive posture to keep people safe and healthy. Also, as circumstances change, obtaining the insight to adapt to those changes is crucial for businesses to stay one step ahead and remain agile. One example of this, that we expect to impact the future of business, is the increased use of mobile applications to provide remote health checks of employees while delivering push notifications of wellness tips, rapid communication when issues arise, and response to a call for help in case of emergency changes in health status. Employee monitoring To illustrate the point, having employees provide current symptom status and temperature before arriving at work can help to establish a baseline. Upon arrival, they complete a quick check-in to verify the information before entering the premises.It is important to remember that private health information is being shared, requiring adherence to existing privacy requirements In this instance, it is important to remember that private health information is being shared, requiring adherence to existing privacy requirements, documentation, record keeping and accuracy checks. Doing so manually is a significant challenge, hence the need for a systemic approach. Organizations are looking for applications that map to their current needs, can scale to larger populations as needed and remains adaptable to emerging requirements and legal mandates as they evolve. We expect to continue to see new use cases like this evolve as organizations implement new approaches to daily operation. Regardless of the use case, the underlying driver is that access to information and flexibility is critical and the ability to respond quickly is vital. Looking to the Future As we all adjust to different ways of operating, business and security leaders need to keep a few guidelines in mind. First, it is critical to identify the mission-critical challenges that are most relevant to your operations. What works for an organization down the road, may not work for your business. Next, you need to implement processes and policies that are flexible enough to fit your situation, scalable to larger or smaller groups and adaptable to new requirements be they regulations, standards, processes or new technologies. And lastly, above all else, be pragmatic. The solution should not be worse or more complex than the problem. As we move out of this phase and into the weeks, months and years ahead, there is hope. By empowering your team and the overall business to realize stronger risk awareness, deeper threat detection and prevention, and broader visibility, you can develop a return-to-work strategy that enables you to get your operations up-and-running quickly and efficiently.
Across the world, the impact of the current pandemic has majorly disrupted how we function in our everyday lives, as a society, and the ways in which we do our jobs. Throughout, our personal safety and wellbeing, as well as that of our families, neighbours and colleagues, has been paramount - and adapting our day-to-day lives to meet social distancing measures has been a learning curve for us all. As we start to reassemble normal life, precautionary measures will continue to be put in place to achieve the universal aim of mitigating the spread of the virus as much as possible. As different countries reach new stages of this process, some parts of the world continue to live and work in lockdown, while some are beginning to open up. This means governments, as well as businesses and organizations, will need to think beyond one-way systems and sanitation stations to contain the risk of infection as more people begin to return to the outside world. Tracing the spread of COVID-19 Of course, this will need to be driven by higher-level support from leaders in government, healthcare and technology to develop innovative ways of tracking and tracing the spread of COVID-19. From contact tracing solutions, to self-reporting apps and thermal screening cameras – governments and businesses across Europe have a new responsibility to seek and reinforce the most effective ways to ensure people’s safety. These measures are particularly pertinent to those reopening their doors as lockdown eases, and those returning to a daily routine of commuting to and serviced office spaces. As more and more people begin to move through public and commercial areas, we will rely more on technology to run in the background to ensure safety and wellbeing is monitored - much like that of the everyday CCTV camera. Thermal temperature screening cameras One piece of technology that we can expect to see as more commonplace is the thermal temperature screening cameras and monitoring system. An example of this kind of device, is D-Link’s recently launched all-in-one, intelligent fever screening kit – which includes a dual-lens thermographic camera, blackbody calibrator, as well as integrated management software. Governments, as well as businesses and organizations, will need to think beyond one-way systems and sanitation stations to contain the risk of infection The premise of temperature screening cameras like this one, is to harness thermal imaging technology coupling it with AI to identify if a person is experiencing elevated temperatures, and raise the alarm automatically when someone at risk of spreading is detected. To monitor the progression or depletion of COVID-19, technologies such as AI facial recognition will play an important role in mitigating the risks of the virus spreading. Thermal cameras that use AI can easily capture and manage employee’s temperature and stop their entrance if a fever is detected. For this reason, such devices are normally installed in a doorway or entrance to a building to quickly detect and identify those displaying symptoms before entering a building. This type of surveillance will be detrimental to the management of COVID-19 in the world of a ‘new normal’ – as companies feel their way out and learn as they go along with people’s health and wellbeing continuing to be center of the mind. Just as lockdown has had an impact on physical as well as mental health, so too will the adjustment to living life post-pandemic. Not only in getting used to and dealing with the emotional and mental pressures of life on the ‘outside’ as they leave lockdown, but they also face the very real risk of contracting the virus and the worries they may have of spreading it. Appropriate installation of temperature screening Companies and organizations have a responsibility in these times to play a supportive role towards employees, such as allowing them to continue working from home until they feel comfortable to work in an office setting. Equally, as restrictions ease, employers have a duty to make the workplace a safe place that is able to uphold the wellbeing of staff, which is where, as we wait for a vaccine, we must make use of the available technology. However, in the case of the thermal camera, in order for it to deliver effective results, it must be installed appropriately. To support this, we have outlined some key points to consider when deploying a temperature screening camera here: Choose a solution that features a blackbody calibrator – a vital part for any temperature screening device. A blackbody calibrator is the basis for accurate calibration of infrared thermography devices and allows the device to accurately detect a fever. Check for facing windows or doorways and heat sources such as radiators as these increase the risk of stray heat or cold sources throwing off readings according to the ISO standard associated with this type of equipment Be wary of weather and changes in climate as the device will need time to acclimatise – in order for readings to be clear individuals coming in from outside must wait five minutes before being screened When mounted, the camera must face individuals head-on and in parallel with their face to capture the inner eye area which is crucial for temperature reading Consider an option using AI which will automatically recognize individuals based on photos in the system Check applicability and legality of temperature screening cameras before deploying There’s a long way to go before life will fully return to normal. In the meantime, and to help everyone along the way, it’s essential that the right measures are in place to protect the physical and mental wellbeing of those we are responsible for. For anyone who is exploring options, know that there is help out there to provide guidance and expertise on the solutions that will be right for you and your business - now, as we go through the remainder of lockdown, and as we slowly move back into everyday lives.
The modern working world has evolved dramatically over the last few decades - from how and when we work, to the places we work from. Widespread internet connection advances, alongside the growth of cloud-based shared working platforms, have not only created the possibility for increasingly flexible working arrangements, but also fueled a desire to do so – particularly among millennials. The preference for flexible working has now created a widespread need for more agile workforces, saddling IT departments around the world with the task to maintain ‘business as usual’ without compromising corporate privacy. With flexible working forecasted to stay for the long haul and passwords increasingly under scrutiny, evaluating alternative secure authentication methods to keep companies’ data and networks safe is important to protect these ‘new normal’ ways of working. The end of the humble password? A recent report by Raconteur found that the most common method of authentication for securing the digital aspects of workplaces is passwords. Unfortunately, however, between phishing, hacking and simple guesswork, passwords are easily compromised – a problem that is only getting worse, with IT professionals reporting an increase in phishing attacks in the last few years. Once compromised, passwords can be used to enter untrusted apps or websites and, worst and most commonly of all, give rise to even greater data breaches. Between phishing, hacking and simple guesswork, passwords are easily compromised Alongside security concerns, 6 in 10 people worry about forgetting their passwords and, according to a recent Balbix study, 99% of people reuse the same password across different work accounts. This, undoubtedly, is a side effect of the increasingly complex character requirements implemented by many enterprises. This stress and effort leads to frustrated employees, but, more worryingly, forgotten passwords can also cost IT departments millions of dollars a year. In our flexible, hyper-connected world, it is clear then that the humble password is no longer effective. Additional or alternative layers of authentication are needed to help enterprises maintain their workplace security in a more convenient and cost-effective way. Smarter workplace authentication with biometrics Often, hacking incidents involve the use of stolen credentials. One authentication solution that could bring an end to these large-scale hacking attacks is biometrics, as unique biological traits are extremely hard to steal and spoof. In addition to being a more secure method to authenticate users and prevent fraud in companies’ networks, it is also possible to layer biometric modalities to create a highly convenient and secure multi-modal authentication solution for sensitive areas or information. Spoofing two biometric modalities, such as fingerprint and iris, in the same attack is virtually impossible, but that doesn’t mean this level of security needs to impair the UX. After all, you can put your finger on a touch sensor, while at the same time glancing at a sensor. For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees at secured access and entry points. It can also be used to add frictionless layers of additional security to any aspect of current security systems, such as key fobs or USB sticks, or to access personalized settings or employee accounts when using shared devices, such as a printer system. This way, beyond playing a role in securing the modern workplace, biometrics can also give employees greater flexibility and convenience over how, when and where they work. Privacy and biometrics - explained Many employers and employees worry about safeguarding privacy in the workplace. Considering biometric data is highly personal, it is no wonder, then, that many are concerned about collecting this data for the purpose of workplace security and what liabilities this may expose them to. For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees Employers must adhere to the relevant workplace privacy laws, such Europe’s GDPR, and this duty extends to biometrics, of course. But, providing biometrics is implemented in line with best practice, it can actually protect employees’ privacy far more effectively than its predecessor, passwords. When employers use an on-device approach, their employees can rest assured no one will be able to access or steal their biometric data, as all biometric data is stored and processed on the device - whether that is a laptop, smartphone, USB stick or key fob. Removing the need for data to ever enter the cloud, this also removes the technical and legal complexities of managing a biometric database and, if a key fob is lost for example, all parties can rest assured there is no chance of anyone else being able to use it. A win-win. Precisely because biometric data is so difficult to steal and spoof, adding biometric authentication to end-point devices can considerably reduce data breaches to keep both sensitive employee and corporate data safe and secure. Reimagining workplace security As people work more flexibly, systems are shared more frequently, and attacks get smarter, it is clear to see that passwords alone are no longer enough to secure the modern-day workplace. Adding biometric authentication to end-point devices can considerably reduce data breaches Now is the time to reassess the physical and logical access control infrastructure. To keep personal and corporate data safe, it is crucial to add new and additional authentication methods to the security infrastructure. Luckily, the benefits of biometrics are often far simpler to realize than many enterprises imagine. The beauty of biometrics is its combination of both security and convenience. Compared to other forms of authentication, biometrics offers considerably stronger protection and an enhanced UX that can easily be integrated into existing enterprise security infrastructure – without the need for huge biometric databases to manage or fear. So, whether to replace outdated passwords or as part of a multi-modal authentication system, biometrics can play an important role in pushing workplace security into a new era for both physical and logical access control.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no searching in a bag or purse for the card). And there’s no personal identification number (PIN) code to remember; no “intrusive” biometric element that can concern some users. James Segil, President and Co-Founder of Openpath, says the simplified process “uses fewer thought cycles.” Reliability of the system comes from Openpath’s SurePath triple-connect technology “We wanted to make mobile access control that people want to use and can use safely and with ease,” he says. “We wanted to make using a smart phone for access control easier and more reliable than using a keycard.” Simplified User Operation In the simplified scenario, the mobile credential resides on a smart phone that can remain tucked away in the user’s purse or pocket. The credential remains active without the user needing to open an app. The wave of the hand signals intent, which causes the button to light up, activate and the door is ready to open. Segil says the simplicity of operation has contributed to the system seeing an unheard-of 94% adoption rate among users. Reliability of the system comes from Openpath’s SurePath triple-connect technology. The smart phone credential is delivered using Bluetooth, WiFi or LTE (cellular) – whichever signal reaches the reader first enables the door to be opened. So even if a company’s WiFi is down or Bluetooth proves unreliable, there is still a third option. Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems Seamless Cloud Integration Segil is a serial entrepreneur who has had experiences as a frustrated user, dealing with many different offices, people and access control deployments over the years – subletting office space, changing PIN codes, dealing with 10 different offices using 10 different cards. Based on that experience, Openpath’s founders saw a need for a more user-centric approach to access control, and a chance to improve the office experience to be more aligned with employees’ experiences in their smart homes. Segil says he also saw “significant lethargy” among incumbent players in the access control space, and a market in which mobile and cloud technologies had still not taken hold. In addition to a simplified user experience built around mobile credentialing, Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems. The “elegant” readers, including a flush-mounted version, fit in well with high-end office environments. The company launched in May 2018. Openpath has been signing up national and regional channel partners all across the U.S. Openpath is focused on the commercial real estate market, where they have already seen significant adoptions, especially among mid-sized companies. Larger deployments as part of new construction are in the pipeline. National System Integration In the past six months since its launch, Openpath has been signing up national and regional channel partners all across the U.S. and now has a nationwide footprint and is able to service customers all over the U.S. They are not yet disclosing any specifics about the number of partners they have signed up and who they are. “I can share that we have a number of large national system integration and security brands on board as channel partners and many more regional and local system integrators,” says Segil. They are looking for additional integrator partners. “There is a cohort of folks out there who say ‘I get it,’ and I want to offer it to my customers,” says Segil. The cloud element of the system can provide recurring monthly revenue (RMR). Openpath’s system offers flexibility in terms of meeting each customer’s security needs. In addition to the “super convenient” scenario described above, the system can also be configured to be “super secure,” using two-factor authentication and other measures, says Segil. There are multiple “flavors” between the two extremes. It can also be integrated with elevators to enable the buttons on allowed floors. Integration With Existing Systems Cloud software simplifies operation for both tenants and landlords. The system is backwards-compatible to existing systems and can be used to retrofit and mobile-enable a legacy system, providing the benefits of mobile features and cloud operation to multiple sites. The software can interface with enterprise applications such as Active Directory, and an application programming interface (API) facilitates integration with other systems and building components. It operates with marketing automation platforms such as Flack and visitor management systems such as Envoy. The system is backwards-compatible, providing the benefits of mobile features and cloud operation to multiple sites Open standards make the system easy to install in new or existing buildings using RS485, or Cat 5 or Cat 6 wiring, whatever is in place. Retrofit installations can use existing panels, servers, software, etc., or they can be replaced. The Openpath panel is installed right next to an existing panel in a retrofit and preserves all legacy integrations of the previous system. Access Credentials Compatibility In its simplest configuration, the Openpath system consists of single or four-door panels wired using standard ports, Wiegand ports and REX ports, each connected to software in the cloud. Each panel works offline if the internet connection is down. Various key fobs, cards and other credentials are available in addition to mobile credentials. Openpath was one of the new exhibitors at last fall’s GSX show in Las Vegas, occupying a large-sized booth for a startup company. The “beautiful” hardware drew a lot of attention, says Segil. “The channel loves us, and we signed a lot of people,” he adds. “We were excited by the response.”
One factor aggravating concerns about workplace violence in corporate America is the easy availability of firearms. In many states, citizens, including employees, have the right to carry firearms onto a company’s property even though firearms are prohibited in the workplace. In effect, an employee prone to violence may have a firearm as near as their vehicle in the company parking lot. Currently, 23 states in the U.S. have so-called “parking lot storage” laws, which enable employees to store firearms in their vehicle’s trunk or glove compartment despite any corporate ban on weaponry. The laws have evolved as an expression of the Second Amendment “Right to Bear Arms” in the last decade or so. There is some variance in the laws from state to state, but they generally allow a citizen to carry a gun to and from work and keep it stored out of sight in their vehicle.Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show Employee Second Amendment Rights “The laws contend that employees should not have to give up their Second Amendment rights between home and the workplace and should be able to have a gun with them for protection from their front door at home to the front door of the workplace,” says Eddie Sorrells, Chief Operating Office/General Council of DSI Security Services. Sorrells will speak about the current state of the laws, how they came about, the nuances of state-to-state differences, and the possible impact on overall corporate security in a session titled “Employees Who Carry: Preventing Workplace Violence” at the upcoming GSX conference in Las Vegas, September 23-27. Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show, attended by more than 22,000 security professionals from 100-plus countries. Sorrells’ session will be Sept. 24 from 10:30 to 11:45 a.m. Restrictions On Gun Visibility Employees may think the “right to carry” extends to the workplace, but the right only extends to the parking lot. The company still has the right to ban guns inside the premises. However, it is unlawful in some states for companies to search vehicles in parking lots, and companies who do so are violating the law, says Sorrells. Among the various state laws, some exempt public education institutions and other public venues. Depending on how the laws are written, there may be other exemptions, too. In Florida, for example, the law exempts any organizations that have explosives on site. With weapons on a company's property, a high-risk termination could potentially become violent Most laws require weapons to be stored securely out of sight. However, in Alabama, for example, it is legal to store validly permitted guns in full view during hunting season, Sorrells says. A resident of Alabama himself, Sorrells has been in the contract security business for 27 years, working mostly in multi-state operations. He has worked for 500 or so corporate security organizations throughout the country and is a practicing attorney who has studied issues of workplace violence and active shooters. “There is a political element to these laws, which were created with the goal of protecting Second Amendment rights,” says Sorrells, who says he sees arguments on both sides of the issue. However, political opinions aside, “if you’re a business owner, you have to contend with dozens of weapons on a company’s property,” he adds. “That could be an issue if a high-risk termination could potentially become violent. You have to assume there is a weapon in that person’s vehicle.” Sorrells' session will dive into the case law and illuminate some of the legal issues and how courts have addressed them GSX Education Program After the session, Sorrells hopes attendees will take away a good working knowledge of the state of the laws, how to comply with the laws, and issues such as posting of signs. The session will dive into the case law and illuminate some of the legal issues and how courts have addressed them. The timely session is an example of the valuable information attendees can gain by attending GSX. Sorrells has been attending the yearly ASIS International Conference and Exhibits for more than 20 years, at least since the mid-1990s. As the pre-eminent security organization around the world, ASIS International provides unrivalled educational and networking opportunities at the yearly conference, he says. “There is a vast amount of networking and educational offerings on a wide variety of topics, including technology, legal issues, risk management, workplace violence, consulting, and anything under the sun,” says Sorrells. The newly branded GSX education program is led by subject matter experts from ASIS International, InfraGard (a public-private partnership between U.S. businesses and the Federal Bureau of Investigation), and ISSA (Information Systems Security Association). Sessions will deliver valuable, actionable takeaways to help attendees shape their security strategies. There will also be an exhibition of 550-plus suppliers and manufacturers highlighting the latest security solutions.
Security and surveillance systems have become a vital component of a casino management system enabling gaming club operators to monitor and manage security threats in real time. Apart from the original purpose of security measures, it helps raising concerns over card counting, advantage playing, and various other suspicious or prohibited activities. However, a typical casino atmosphere often involves great complexity in its environmental lighting, leading to high noise level in captured video images. Challenges: Inadequate lighting in casino making it difficult for cameras to distinguish colors and movement, resulting in blurry images. Lack of advanced video analytic functions in traditional surveillance systems presents difficulties to an effective monitoring process, with high labor cost needed for scanning live views and recorded footages manually. Access control system Different casino areas require different solutions to fulfill its demand. At gaming tables, it’s critical to capture the subtle movements of each players and dealers. Cameras with higher FPS, 3D DNR and super low lux image sensor gives a neater and brighter image under dim lighting, while 2-way audio provides additional audio information. Casino operations involve a multitude of monetary transactions in critical areas including cages, vaults and offices where cash, chips, and other valuables are circulated. An access control system integrated with facial recognition functions helps operators in strengthening the security level. Exceptional customer experience is the key to good customer loyalty. Facial recognition system Video analytics allows operators to filter videos recording smartly with object attributes With ANPR (Automated Number Plate Recognition) and facial recognition embedded into the management system of carparks and VIP lounges, customer entry and exit can be streamlined minimal interruptions. A modern video surveillance system complemented by top notch IP cameras can improve and simplify the entire operation. Modern video management software possesses features that are not offered by traditional systems. Video analytics such as human object detection allows operators to filter videos recording smartly with object attributes, e.g. colors of customer clothes. The architecture of modern video management provides scalability to accommodate the growing amount of video sources during business expansion. Standardized protocol offers higher interoperability in terms of 3rd party system integration with access control or alarm system. Cameras for centralized management Thanks to the internet, control center is now able to receive and group videos from dispersed cameras for a centralized management. The operators could access to the live views of different casino affiliates and receive real-time notification on cellphone devices when specific events are in action.
Car theft is a huge risk for car sales offices, and this is especially an issue for the premium brands. Luxury car giant Eden Auto Premium BMW built a new site in Bordeaux, France, where they house and sell new and second-hand cars, as well as having a car park for customers. That amounts to a lot of cars that need protecting. They researched and compared different technologies and selected Hikvision products to meet their needs. These were then ably installed by reseller Faurie Telecom (Group Convergence), with Hikvision’s help, and the help of French distributor ITESA. The BMW reseller wanted a standalone system to streamline their security operation. Originally they used a night security agent, which was a costly solution. They needed to be able to integrate the security solution into a third party monitoring system, managed by Securitas, in order to reduce manpower costs. Perimeter protection systems The site posed a number of technical challenges. The team also needed to counter some crafty thinking from intruders, who were even resorting to hiding underneath cars during the day, when they can slip in unnoticed. They then could wander around the closed garage, avoiding detection by perimeter protection systems activated only at night. This meant the solution needed to focus on providing real-time, active image at night. With a lot of flags flying on the site, false alarms were a particular issue - these would set them off regularly With a lot of flags flying on the site, false alarms were a particular issue - these would set them off regularly. The complexity of the site also gave a lot of potential for false alarms, which needed to be minimised to reduce overall costs. The solution was made up from Hikvision products, providing a converged system, with seamless monitoring. Central to the system was Hikvision’s Security Radar (DS-PR1-60) for intrusion detection at night. Speed dome PTZ camera The Radar has a large coverage area, and performs excellently at night, whatever the weather. This means that false alarms are kept to a minimum. Radar has the added benefit that it can position humans and vehicles on a map, making it very useful for tracking purposes. This is where the DarkFighter IR Network Speed Dome PTZ camera (DS-2DF8225IX-AEL) comes in. The radar cameras are linked with this for auto tracking. If an event is detected, the control center automatically receives an alarm and can use the PTZ’s auto-tracking function to track any intruders. DarkFighter cameras are also designed to excel at night, so are ideal for this solution. Although radar has promising accuracy rates, the team needed to carefully configure it. The site environment proved a complex installation, with a lot of metal that can cause false alarms for the radar. Seamless security solution We were very satisfied with the innovative products and onsite service provided by the Hikvision team" The local team drafted in expertise from Hikvision HQ’s R&D and technical teams to complete the installation to a high quality and low false alarm rate. The system is coordinated using a AcuSensecamera (DS-2CD2686G2-IZS AcuSense 4K NVR (DS-7716NXI-I4) and a POE Switch (DS-3E0510P-E). Finally, HikCentral provides a user-friendly VMS experience, designed especially to integrate all the different Hikvision products, to make a seamless security solution. Christophe Chamand, from Faurie Telecom, says: “We were very satisfied with the innovative products and onsite service provided by the Hikvision team. From presales and order to technical support and aftersales service, Hikvision has been with us throughout the process, ensuring a successful installation and a happy customer.” With an innovative, converged security solution, BMW has been able to streamline its security, even at night. So intruders sneaking in and hiding during the day are out of luck.
RCP21, a pioneering Community Interest Company (CIC), has used SmartTask to help set up and manage an in-house security operation at Langthwaite Business Park in South Kirkby, West Yorkshire. The workforce management software was adopted to coordinate a full-time team of officers, tasked with protecting 120 businesses located at the site, without the need to increase management and administrative resource within the organization. SmartTask has since enabled RCP21 to deliver a superior security service in the most reliable and efficient manner. Workforce management solution “As managing agents of Langthwaite Business Park, we had previously outsourced the security requirements, but we took the decision to bring the service in-house,” explains Nicola Parker, Operations Manager at RCP21. “We recognized the need for a proven workforce management solution that would underpin our security solution moving forward. SmartTask has given us the visibility and control needed to deliver our service and provide customers with complete peace of mind.” SmartTask is used to manage RCP21’s full-time team at Langthwaite Business Park that provides a range of security services including CCTV monitoring, mobile patrols and keyholding and alarm response. SmartTask-enabled smartphones are used to scan 32 checkpoint tags around the site, so RCP21 has full visibility of mobile patrols that take place. Submit incident reports SmartTask has proved to be a hugely useful tool that is delivering value across our security operation" The software’s SmartForm functionality also enables security officers to electronically view their daily tasks; complete vehicle safety checks; and submit incident reports. In particular, the incident reporting tool allows a security officers on patrol or responding to an alarm response to capture all essential information, including any photo evidence, via a smartphone. This means RCP21 has an electronic record of any incident in real-time, so it can take immediate and appropriate action as well as share relevant details to the customer. Monthly performance reports can be taken from SmartTask, while incident data is included within the business park’s newsletter to provide information in relation to crimes and incidents on the park. Mobile workforce management “SmartTask has proved to be a hugely useful tool that is delivering value across our security operation. The software is simple and easy to use by all staff involved and is effective in enabling us to monitor and deliver our security services to a very high standard,” concludes Parker. Paul Ridden, CEO of SmartTask: “Our cloud-based employee scheduling and mobile workforce management software is highly configurable and scalable, making it an ideal solution for any security operation. Whether you are a top 30 security company or a small in-house team, it is possible to take advantage of SmartTask’s user-friendly, feature-rich functionality to better plan, manage, deliver and report on your security services.”
iSpace Environments, a Minneapolis-based commercial furniture and technology dealership, is now using Carousel Digital Signage software to promote its services and amplify its message throughout its showroom as part of a technology upgrade and renovation. A longtime Carousel Digital Signage reseller, iSpace provides furnishing and technology design and integration services to clients in the corporate, higher education, healthcare, and automobile retail sectors. As organizations re-open following the COVID-19 pandemic, iSpace is helping clients reconfigure their workspaces to comply with the new health and safety regulations. Their interior transformation adheres to these compliance standards and demonstrates how furniture and technology can create safe, comfortable work environments. Content creation and management Showing the technology creates awareness of what AV technology offers for workplace design" iSpace is now using Carousel Cloud software to communicate health and safety guidelines, welcome messaging, visitor information, and examples of how clients can apply digital signage to their own environments. All visual messaging is distributed to flat panel televisions and video walls throughout the building, leveraging Carousel Cloud’s interoperability with Apple TV devices to simplify and centralize media playout. iSpace’s AV experts demonstrate the software’s capabilities during tours, including multi-display support, Apple TV interoperability, and ease of use including simplified content creation and management. Communicate competitive advantage “Showing the technology creates awareness of what AV technology offers for workplace design,” said Nate Pesch, Technology Sales Manager at iSpace Environments. “Our customers aren’t always aware of our technology-related products and services, and Carousel Cloud helps us communicate our competitive advantage.” Pesch confirms that the digital signage content they show to visitors often opens the conversation to broader possibilities. “The Carousel content always looks visually impressive and provides an opportunity to share our expertise around technology integration,” he said. “We have many examples of becoming a one-stop shop for customers.” Standalone server infrastructure Those conversations then lead to Carousel Cloud’s benefit in workspace communications. Carousel Cloud gives users the flexibility of being able to update content at any time and from anywhere - a benefit that Pesch says is increasingly critical during as business operations continue to change. He also points to the cost-reducing benefits of Carousel Cloud, which eliminates the traditional expense of a standalone server infrastructure. Instead, Carousel Cloud software is deployed on the organization’s existing IT infrastructure and can use common Apple TV devices or BrightSign media players (including the BSN.cloud platform) on the playout side. Use built-in templates One organization’s safety protocol may different from another, but everybody wants to feel safe" “Carousel software is easy to learn, so an organization lacking in-house design resources can use built-in templates to create content,” said Pesch. “That’s important these days as many content managers are working from home. With Carousel Cloud, content managers can make changes remotely. We can also show how easy it is to use these templates across different aspect ratios, as we display the content on portrait screens, landscape screens, and video walls in our showroom and meeting spaces. It’s very powerful.” iSpace Environments, which has remained open through the pandemic as an essential business, is seeing an increase in traffic as organizations consider how life in the workplace will change. With organizations across the globe updating facilities in accordance with new regulations, many customers are aiming to create environments that communicate how safety is their top priority. Organization’s safety protocol “We’re helping people get back to business any way we can, whether it’s with screen dividers on desks, furniture reconfigurations, or digital signage to communicate the proper safety measures,” said Pesch. “Businesses and schools need to show that they’re thinking about safety, and digital signage is one way to communicate that they’re doing something about it. One organization’s safety protocol may different from another, but everybody wants to feel safe. Digital signage is one of the most effective ways to communicate these messages.”
Schools and heritage sites present their own unique difficulties for security and access control. But what about a school that is also a heritage site of exceptional value? This was the challenge facing security administrators at the Colegio Diocesano Santo Domingo in Orihuela, Spain. The Colegio Diocesano is more than just a school. Its historic buildings date to the 1500s, a heritage site as well as a place of learning - with a museum which requires the protection of the same access system. Hence, the brief for a new access system required minimal disruption on two fronts. The college buildings are a Resource of Cultural Interest and on Spain’s heritage registry: they must not be damaged. School leaders also required little disturbance of everyday school learning. Wireless access control was the obvious answer. Wireless access control devices The school chose SMARTair Wireless Online management for their new keyless access system SMARTair wireless access control devices now control access through 300 doors around the school. A mix of battery-powered escutcheons and weather-proof escutcheons, knob cylinders and wired wall readers (including for lifts), are connected to SMARTair’s intuitive software by a network of 38 wireless communication hubs. The school chose SMARTair Wireless Online management for their new keyless access system. This powerful management option enables real-time security control to limit free access to and around the site, even if the school data network is down. Automated emails inform security staff of any incidents, keeping students, staff, equipment, and precious heritage safe. Issue access credentials “The main benefit is the ease of real-time key management - from any place and at any time - via the wireless online management system,” says IT Manager, Francisco Fernández Soriano. “This increases security for children and for staff, because no unauthorized people can enter the school.” SMARTair locks and readers provide a streamlined way to manage access. Student and staff carry credentials programmed to allow access to specific authorized areas. SMARTair TS1000 software makes it easy to issue and cancel access credentials for temporary visitors such as parents. Installation and integration The system was installed without a hitch and also without any disruption to classes" “In addition to the main entrances and classrooms, access to private spaces such as lifts, offices, staff rooms, the church, the museum, the library and the IT room is constantly monitored,” he adds. “Thanks to our SMARTair devices installed at more than 300 doors, the security team can find out who has accessed which space and when, at any time.” Installation of the school’s new SMARTair system demanded minimal work. Some school doors date to the 16th century, so major alterations to door hardware were not possible. “The system was installed without a hitch and also without any disruption to classes,” confirms Fernández Soriano. Because SMARTair is a modular system, scalability is built in. They can extend or fine-tune their access system when they choose. Indeed, SMARTair’s “Phase II” is already under discussion. Education management software SMARTair software also easily slotted into the school’s existing management workflows. The Colegio Diocesano has used iinventi education management software for the past five years. Integration with SMARTair software was simple: access control, the library and canteen are managed from an integrated system. “SMARTair gives the school’s security team the answers they need,” concludes school director, Reverend José María Fernández-Corredor.
Auto Trader is an FTSE100 technology company and is an agile, fast-paced business, and so needs to have a robust risk management framework which gives the ability to manage risks on a real-time basis. It had an existing risk and compliance management framework; however, this relied on multiple spreadsheets, and so action tracking and reporting were a manual and lengthy process. They were looking for a solution that could bring together multiple risk registers, give them the ability to assign actions to risk owners for them to maintain and provide real-time reporting and dashboards at different levels of detail. Auto Trader wanted a solution that out of the box met most of their requirements, but also needed a flexible solution and so recognized the need for professional services to configure to meet specific requirements. Gartner’s Magic Quadrants They saw that SureCloud’s solutions could allow them to aggregate risks across different business functions, to track actions and to report on a real-time basis. The fact that SureCloud also has a vast portfolio of GRC solutions that may be useful to Auto Trader in the future as they expand their GRC journey attracted them to Platform, as the business could grow into the solution over time. Auto Trader needed a solution that was easy and intuitive to operate, to ensure users will feel confident in how to navigate the software and therefore gain quick value. They also wanted users to be able to "dip in and out" of the Platform quickly. After reviewing several solutions, many on Gartner’s Magic Quadrants like SureCloud. Auto Trader found that other vendors lacked the flexibility that SureCloud offered. Manage complex risks We were attracted to SureCloud due to the flexibility of the solution in comparison to other GRC solutions" Claire Baty, Governance, Risk and Compliance Director at Auto Trader, commented: “We were looking for a solution that would be simple to use, yet provide the ability to manage complex risks, while complementing our agile ways of working." "We were attracted to SureCloud due to the flexibility of the solution in comparison to other GRC solutions, as it gave us the ability to design our own user journeys and reporting tools, and the modular approach that means we can continue to enhance our framework over time. We are looking forward to working with SureCloud on this important project.” Digital automotive marketplace Nick Rafferty, COO at SureCloud commented: “We are thrilled to be working with Auto Trader, the UK and Ireland's largest digital automotive marketplace. Not only to help them meet their Risk and Compliance needs but also to be chosen due to our level of agility in our Platform. I look forward to seeing the relationship grow as our technology flexes to their way of working while automating and streamlining their programs." "SureCloud is proud to be helping another market-leader ditch spreadsheets for good.”
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Sometimes customers expect more out of a security system. A brand new security system just doesn’t perform as the customer expected it would. In fact, one might argue that the many variables in today’s complex systems make it more likely than ever that some element of a system might not measure up to a customer’s expectations. What happens then? We asked this week’s Expert Panel Roundtable: What happens if a customer’s expectations of system performance are greater than what a physical security system can deliver?