Office security systems
SureCloud, the provider of Gartner-recognized Integrated Risk Management solutions and cybersecurity services, has partnered with Secure Controls Framework (SCF), granting all its customers access to SCF’s control set through its cloud-based Compliance solution. SCF aims to provide cybersecurity and privacy control guidelines to organisations of any size and across any sector, helping them to implement best-practice controls to protect their data and processes, and respond to evolvi...
Maxxess Systems, a global provider of event response management and collaboration systems, has launched a new website specifically designed to strengthen company communications and serve as a platform for providing ongoing value to the Integrated Security market. The new site features separate dedicated areas for each of the primary offered software platforms, and includes new spaces for case studies and blog postings to share market insights, trends, and examples to benefit the industry. Vibr...
As the UK’s premier specialist Certification Body within the security and fire safety sector, the National Security Inspectorate (NSI) has announced the addition of a new BS 7858:2019 screening course to its portfolio of industry-specific training. This revised Standard for the Screening of Individuals Working in a Secure Environment involves a number of significant changes taking effect in April 2020. These include an increased emphasis on risk assessment, the removal of character refere...
Alcatraz AI, developer of secure frictionless access control platforms, has named security industry veteran Josh Jackson as Regional Vice President, Strategic Partnerships. Based in Florida, Jackson will oversee sales, business development, customer service, marketing, and operations for Alcatraz AI. “We’re excited to have a security industry pro lead our East Coast sales operations as we continue to build our innovative frictionless access control platforms,” said Alcatraz AI...
As SIA’s 2020 Member of the Year, ASSA ABLOY’s presence at ISC West 2020 will include an enhanced booth experience, showcasing a suite of new product innovations that help security professionals create access in smart and efficient ways. “Security professionals are experiencing rapid industry change, which is why ASSA ABLOY is focused on educating customers about the latest curb-to-core solutions,” said Mark Duato, Executive Vice President of Aftermarket Solutions at ASS...
Keysight Technologies has announced Breach Defense, a security operations (SecOps) platform designed to improve operational security effectiveness. An integral element of the new platform is the Threat Simulator breach and attack simulation solution which enables network and security operations teams to measure the effectiveness of operational security by safely simulating the latest attacks and exploits on live networks. Security operations teams are faced with an increasingly complex network e...
Attracting trade visitors from across the subcontinent, the region’s most influential trade fair for the security industry, Secutech India, is scheduled to return for its 9th edition from 7 – 9 May 2020 at the Bombay Exhibition Center, Mumbai. With exhibitor registration still open, the fair has already attracted more than 350 of the world’s leading security brands with less than three months remaining before it commences. The 2020 exhibition will feature Axis Communication, CP Plus, Hikvision, ZKTeco, Infinova, Matrix, Toshiba and many more. Security devices and turnkey solutions The 2020 edition of Secutech India is set to reflect the country’s digital transformation Detailing the business value of the fair, Ms Regina Tsai, the General Manager of Messe Frankfurt New Era Business Media Ltd said: “Catering to local market requirements such as cost efficiency and a need for fast project implementation, Secutech India assembles the full range of security devices and turnkey solutions under a single roof. Benefiting from its position in Mumbai, India’s commercial center, last year the fair attracted more than 20,000 buyers traveling from across India’s main regions, and we are looking forward to welcoming even more business this coming May.” The 2020 edition of Secutech India is set to reflect the country’s digital transformation. IP cameras are in high demand from SMEs, retail and the residential segment, while biometric access control systems are also gaining popularity in offices and at border controls, with users gradually favouring contactless systems such as facial recognition above fingerprint biometrics. Core security solutions In the view of Ms Tsai, this year’s fair is taking place at a favourable time for the regional industry: “The government aims to transform India into an electronics export hub, which will open up new opportunities for component manufacturers catering to the local manufacturing sector. But just as importantly, as part of India’s proposed Union Budget 2020, infrastructure development across roads, railroad, airports, ports, and economic corridors are expected to raise demand for core security solutions including video surveillance, video analytics, biometrics and intruder detection systems." "The governments ‘Digital India’, ‘Smart City Mission’, and ‘Technology Empowerment’ initiatives will also be growth drivers.” Access control in healthcare facilities As a maturing security market, the appetite for knowledge in India is growing" Among many benefits, the ability to make onsite comparisons, conduct meaningful business discussions and view product demonstrations are a few of the show elements that visitor’s to Secutech India value. According to Ms Tsai, business effectiveness is the top priority for the fair’s organisers: “Initiatives such as the ‘Secutech connect’ business matching service which links buyers with exhibitors based on industry background continue to be highly popular, helping us to generate genuine business outcomes for participants.” But beyond business, information exchange is also a priority says Ms Tsai: “As a maturing security market, the appetite for knowledge in India is growing. This is a need that the upcoming edition of Secutech India will cater for with a series of conferences dealing with topics relevant to the local market, including cybersecurity, smart city digital infrastructure; the convergence of 5G, artificial intelligence, data analytics and the IoT; access control in healthcare facilities, and fire safety in elderly care homes and restaurants.” Personal protection equipment In addition to its core focus on security, Secutech India 2020, in cooperation with the GPS Association of India, will feature a pavilion dedicated to fleet management, vehicle tracking as well as passenger and driver safety. The concurrent ‘Fire and Safety India’ event will also return as the destination for trade buyers to locate the latest firefighting gear, personal protection equipment and smoke detection systems.
Technology start-up Broadstone and the provider of cloud based security workforce management solution, TrackTik, have announced a partnership integration deal. The partnership will see the company integrate with Broadstone’s ‘Labor-as-a-Service’ technology as they go-to-market together to promote this exciting new relationship. Canadian-based TrackTik, helps organizations manage all aspects of their security personnel via a single software solution. Already an established player in North America and actively expanding in the UK, the partnership with Broadstone will accelerate TrackTik’s continued growth in the EMEA market. The Broadstone platform uses data and automation to solve complex tasks that traditional temporary staffing agencies would handle on a day-to-day basis. Complete visibility Key tasks such as payroll management, background checking and license checking, company-worker matching and performance management are automated for both the company and employees seeking permanent and temporary contracts. The new partnership will mean that TrackTik’s offering will allow customers to simply push shifts that cannot be filled by existing staff, through to the Broadstone community. A pool of screened workers will be matched, and then scheduled into the TrackTik solution. The integration will give TrackTik customers complete visibility of their current and contingent workforce, including the ability to see when temporary staff are clocking in and out for shifts, with a real time overview of the temporary staffing costs being incurred. Providing a frictionless experience The services we offer will be a perfect fit, and will further bolster TrackTik’s solution Co-founder & CEO Tom Pickersgill, said: “This latest partnership with TrackTik, sees us integrating with a well-established and trusted workforce management solution. We choose our partners very carefully and feel that this is a great strategic win for both companies – particularly given our aspirations to break into the US market by 2021.” “TrackTik has a great reputation in the region for providing a solution which offers organizations an easy way to optimize their security workforce’s operations. Given its focus on this regulated market segment, the services we offer will be a perfect fit, and will further bolster TrackTik’s solution when it comes to providing a frictionless experience.” Innovative technology companies Brian Strasser, TrackTik’s Senior Director of Partnerships, said: “The deal we’ve signed with Broadstone is a perfect example of how we provide additional value to our clients. Our strategy is to partner with leading and innovative technology companies in an effort to provide our customers with an even greater suite of capabilities.” Mark Folmer, CPP, FSyI, TrackTik’s Vice President, Industry, added: “Our focus, knowledge, and experience in the security sector, coupled with Broadstone’s unique capabilities, is a great combination that will help our mutual clients efficiently respond to the ever-changing resource allocation landscape.”
Allied Universal, a security and facility services company in North America, is pleased to announce that Drew Vollero has received the prestigious Orange County Business Journal’s CFO of the Year Award for a private company. Vollero received the honor at the 13th Annual CFO of the Year Awards held at the Hotel Irvine on January 30th. Awards go to Chief Financial Officers for exemplary performance in the preceding fiscal year in five categories. Murray Rudin, Managing Director of Riordan, Lewis & Haden Equity Partners in Los Angeles, was master of ceremonies. Profound impact at Allied Universal In addition to Drew Vollero, the additional award winners were: Jack Hartung of Newport Beach-based restaurant chain Chipotle Mexican Grill for Public Company Ronald Cortez of Irvine-based UCI Division of Finance & Administration for Not-For-Profit Company Jesse Timmermans of Cerritos-based fashion retailer Revolve Clothing for Rising Star Elizabeth Pagliarini of Lake Forest-based Summit Healthcare REIT for Lifetime Achievement “Drew Vollero has had a profound impact at Allied Universal since joining the company in 2018,” said Steve Jones, CEO, Allied Universal. “Drew is an exemplary leader and we are honored that he received this amazing recognition.” Improvements in the capital structure Vollero was the first CFO of Snap Inc., also known as Snapchat, who built the function from scratch and helped guide the company to an initial public offering-- one of the largest IPOs in U.S. history. As a key strategic partner to Jones, he has played a lead role in the acquisition of nine companies in 2019 and completed the successful sale of Allied Universal to new ownership with improvements in the capital structure. In addition, Vollero has focused his efforts on building a premier financial function through the addition of talented leaders, enhanced processes, and useful technology. In conjunction with key leaders at Allied Universal, he continues to drive sales growth, lower costs and improve cash flow. He earned a Bachelor’s Degree in Math and Economics with high honors from Yale University, and holds a Master’s Degree in Management from Oxford University.
Matrix has announced its presence in the prestigious trade fair for Security, Safety & Fire Protection - Secura 2020. Organized in North Africa, SECURA is the first international fire, safety & security expo organized in Algeria. With an ambitious regional visibility plan, the expo will be held in Safex - Foire d'Alger, Mohammadia from 11th to 13th February 2020. Matrix aims at exhibiting their indigenous and innovative range of solutions for IP Video Surveillance, Access Control, Time-Attendance and Unified Communications. IP Video Surveillance The solutions are specifically designed for large, multi-located enterprises, SME and SMB organizations. Matrix Comsec continuously works towards keeping abreast with the constantly upgrading technology by designing and manufacturing solutions that are equipped with the latest technology. Matrix will be presenting some of its comprehensive range of Telecom and Security solutions at Secura 2020. Matrix 5 MP IP Cameras - Higher Resolution for Better Surveillance Available in Dome and Bullet variants, Matrix 5MP IP Cameras are best suited for Enterprises With the continued demand for IP Video Surveillance in Small and Medium-scale Enterprises, new solutions that produce better image quality in the most challenging conditions are needed. To meet the growing needs of SMBs, Matrix offers 5MP IP Cameras along with the range of 2MP and 3MP IP Cameras. Owing to the high 5MP resolution, these cameras provide sharper and brighter images with even more details. Exceptional low light performance Equipped with Sony STARVIS series sensors, our 5 MP IP Camera delivers a true, 104-degree Horizontal field-of-view (FOV) and exceptional low light performance in light as low as 0.01 lux. Available in Dome and Bullet variants, Matrix 5MP IP Cameras are best suited for Enterprises and are ideal for both indoor and outdoor applications. Key Features: Better Quality Images - with 5 MP Resolution Larger Field-of-View (FOV) – 104 degrees HFOV Exceptional low light performance in light as low as 0.01 lux IP67 and IK10 Protection Latest H.265 Compression technology True WDR – to deliver consistent images in varying light conditions Next-gen door controller Matrix will do a live demonstration of two of its unique and innovative solutions: COSEC ARGO – Solution experts will discuss at length its differentiating features and how they make the device the next-gen door controller when it comes to Access Control. Products and Solutions: Matrix NETRA series of 5MP, 3MP, and 2MP IP Cameras – Offer superior image quality along with True WDR, Intelligent Video Analytics and Edge Recording. Matrix PARAM series of NVR – Network Video Recorders offer High-Resolution Recording, Live View of Multiple Streams, Centralized Monitoring without a server, Powerful Investigator and Instant Notifications. Deep learning technology Weighbridge Integration - Collects pictorial evidence of inward or outward vehicles by mapping unique numbers such as License Plates, Challan Numbers or Token Numbers for further verification and auditing. Parking Management - Addresses the need for automated functioning of small, medium or large parking areas. Matrix Face Recognition – It is based on innovative and deep learning technology with a powerful user identification algorithm that identifies users accurately within no time. Visitor Management Solution Matrix Visitor Management Solution - It is designed to assist organizations in streamlining the day-to-day guest visits without compromising the security, hospitality or productivity of the organization. Matrix PRASAR UCS - It proves to be a complete solution for inter-branch office collaboration and communications. Dispersed branches can be tied together over the IP network, with PRASAR UCS located at the Head Office. Matrix ANANT UCS – This is a powerful Unified Communication solution that provides enterprises with integrated mobility and unified messaging. It helps to improve collaboration (video calling, chat, presence sharing, voicemail to email, conference, etc.) among all their employees, irrespective of its size and geographic location.
Barco, a provider of control room solutions, has just released SecureStream, a new media streaming solution to easily and securely share content beyond the control room. Using a very intuitive user interface, control room operators can simply drag and drop video or data sources into a SecureStream channel, allowing the content to be shared with field staff or remote experts. In this way, SecureStream helps authorized people get a complete situational overview, contributing to better and faster decision-making. Typically, the control room is the central intelligence hub of an organization. This is where all the information is collected and visualzed, and where critical decisions are made. Things get more complex, however, when a key decision-maker or expert is located outside of the control room. In order to quickly give these people a better situational overview, the operator can now stream selected content to remote locations. Control room software SecureStream is extremely easy to use from either a web browser or from the control room software. Using the overview of available sources, control room operators can simply drag and drop content into a SecureStream channel and then provide the relevant link to selected receivers. The content can be video, data, or even a CMS perspective (a group of content that logically belongs together). The receiver uses a web browser on laptop or cellphone phone to view this content. SecureStream was designed to couple user-friendliness with the highest level of security. The system uses both on-premise and cloud technology to stream the content to the receivers. This hybrid on-premise and Software-as-a-Service (SaaS) configuration helps to lower the risk of intrusion on the enterprise network, maximizing security. Secure and user-friendly SecureStream was designed to couple user-friendliness with the highest level of security Because this is a one-way system, (only streaming from inside the organization to outside) there is no need to open the enterprise’s firewall to allow inbound remote connections. All services are thus delivered over encrypted outbound-only connections, fully based on proven industry standards. Furthermore, all remote access is managed at an off-site secure entry point. “With SecureStream, we managed to make streaming content outside the control room both secure and user-friendly,” says Jan Willem Brands, Chief Product Officer of Barco Enterprise division. “Based on our experience with streaming solutions in a control room context, we now really raised the ease-of-use for both the operators in the control room and the remote receivers. The integration with Barco’s Control room Management Suite (CMS) is another operational improvement that makes SecureStream more attractive for users.” Integrated Systems Europe SecureStream will be showcased for the first time at the Integrated Systems Europe (ISE) tradeshow at the Amsterdam RAI, from 11-14 February 2020. You will find the company representatives in Hall 12, at Booth F120.
Datrium, pioneer of the secure multicloud data platform for the resilient enterprise, announced that it has expanded the Datrium Global Partner Network to new regions and introduced a new tier, DRaaS Select. With DRaaS Select, partners can better aid customers in their cloud transformation and modernize disaster recovery (DR) and backup processes. The Datrium Global Partner Network has grown rapidly in North America, EMEA, ANZ and APJC, with the addition of 20 new partners in the last six months. According to the State of Enterprise Data Resiliency and Disaster Recovery 2019 report, 50.4% of all organizations surveyed recently experienced a DR event, with ransomware as the leading cause. Ransomware is one of the biggest concerns for IT leaders today and this threat is requiring many organizations to rethink their DR plans. On-demand cloud-native DRaaS solution Datrium’s on-demand cloud-native DRaaS solution with VMware Cloud on AWS makes it simple and far more economical for organizations to recover when disaster strikes. The expansion of the Datrium Global Partner Network enables organizations worldwide to work with specialized resellers and distributors in their region to modernise their data centers, transform DR with a failproof DRaaS solution and free their organizations from the complexity of traditional infrastructure. We’ve experienced high demand from customers looking to transform their data centers with cloud-based solutions" “We’ve experienced high demand from customers looking to transform their data centers with more cloud-based solutions,” said Tim Page, Chief Executive Officer at Datrium. “At Datrium, we pride ourselves on delivering unprecedented flexibility and simplicity to help customers transform their IT. The new and expanded partner program reflects our mission to bring on-demand, failproof and cost-effective DR with VMware Cloud on AWS to enterprises everywhere. This is an exciting time for Datrium and our growing Global Partner Network.” Additional services opportunities The new DRaaS Select tier provides partners with additional services opportunities and enables them to better guide their customers through DR transformation initiatives and protect them from the growing threat of ransomware. DRaaS Select partners receive the highest level of training and certification in DR with VMware Cloud on AWS so they are uniquely equipped to help organizations protect themselves from disasters in an economical way. Participation in the DRaaS Select tier is by invitation only and is limited to an exclusive set of highly skilled partners in specific geographic regions. DRaaS is fundamentally changing the DR market with its cloud-native design, built-in backup, instant Recovery Time Objective (RTO), continuous compliance and an on-demand pay-as-you-go model. This presents a unique opportunity to leverage the public cloud and its elastic capabilities to finally deliver DR done right with Datrium DRaaS with VMware Cloud on AWS. Multicloud deployment strategies Datrium’s commitment to the channel and its partners’ go-to-market efforts are reflected in the following Partner Network levels: DRaaS Select resellers receive advanced training and certification on DRaaS with VMware Cloud on AWS. These partners have the highest level of expertise in DR with built-in backup. DRaaS Select partners can help customers transform their DR processes including providing guidance on Runbook creation and multicloud deployment strategies. Preferred resellers are provided with new service opportunities and a rich set of program benefits, so together with Datrium they can help companies achieve failproof on-demand DR, achieve their DR compliance objectives, quickly recover from ransomware attacks, modernize their data centers, achieve their hybrid cloud objectives, and design and implement data resilience strategies. Authorized resellers can provide services beyond DR, including all around data center modernization, multicloud and hybrid cloud strategies as well as data resilience efforts. Cloud and SaaS-based solutions Datrium has expanded its DRaaS Select Partner ecosystem and garnered interest in DRaaS Preferred With the Datrium Automatrix, which contains DVX at its core, Datrium and its partners can remove IT infrastructure complexity by delivering a platform that converges backup, mobility, DR and encryption in a single platform. “Channel, reseller and distribution partners approach Datrium because they are excited about the transformational products we’re bringing to market for DR and DHCI,” said Joe Vranicar, Chief Revenue Officer at Datrium. “Our partners have embraced our unique approach to DR and have built practices specific to delivering Datrium’s cloud and SaaS-based solutions to customers. Datrium mutually invests in each partnership to ensure the highest level of skills and technical expertise and to capitalize on the unique opportunity we have to deliver a cloud-native DR solution with built-in backup for all VMware workloads. Our goals for the expanded program are to work with specialized resellers and distributors make DR simple, efficient and cost-effective and to free organizations from the complexity of traditional, legacy infrastructures.” Adding new partnerships Since releasing DRaaS to the market in August 2019, Datrium has expanded its DRaaS Select Partner ecosystem and garnered interest in DRaaS Preferred, adding new partnerships across the U.S., Europe, Australia, New Zealand, and the Philippines including ASI Solutions and BEarena NZ, Bytes Software, CDW, Champion Solutions Group, Citrus Solutions, DCNEXT Holland, Epaton, Mindsight, Novulutions, Prodec Networks, PTS Data Center Solutions, SISL, Spinnakar, Technologent, and TrustCo.
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture Influences Door Solution Decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organization’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organization and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training Employees On Door Security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organization or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate Through The Decision-Making Process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New Security Entrance Installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule Group Meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure You Monitor Public Areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organization. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What Is The Ultimate Success Of The Installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
With the coming of a New Year, we know these things to be certain: death, taxes, and… security breaches. No doubt, some of you are making personal resolutions to improve your physical and financial health. But what about your organization’s web and mobile application security? Any set of New Year’s resolutions is incomplete without plans for protecting some of the most important customer touch points you have — web and mobile apps. Every year, data breaches grow in scope and impact. Security professionals have largely accepted the inevitability of a breach and are shifting their defense-in-depth strategy by including a goal to reduce their time-to-detect and time-to-respond to an attack. Despite these efforts, we haven’t seen the end of headline-grabbing data breaches like recent ones affecting brands such as Marriott, Air Canada, British Airways and Ticketmaster. App-Level Threats The apps that control or drive these new innovations have become today’s endpoint The truth of the matter is that the complexity of an organization’s IT environment is dynamic and growing. As new technologies and products go from production into the real world, there will invariably be some areas that are less protected than others. The apps that control or drive these new innovations have become today’s endpoint — they are the first customer touch point for many organizations. Bad actors have realized that apps contain a treasure trove of information, and because they are often left unprotected, offer attackers easier access to data directly from the app or via attacks directed at back office systems. That’s why it’s imperative that security organizations protect their apps and ensure they are capable of detecting and responding to app-level threats as quickly as they arise. It’s imperative that security organizations protect their apps and ensure they are capable of detecting and responding to app-level threats as quickly as they arise In-Progress Attack Detection Unfortunately, the capability to detect in-progress attacks at the app level is an area that IT and security teams have yet to address. This became painfully obvious in light of the recent Magecart attacks leveraged against British Airways and Ticketmaster, among others. Thanks to research by RiskIQ and Volexity, we know that the Magecart attacks target the web app client-side. During a Magecart attack, the transaction processes are otherwise undisturbed Attackers gained write access to app code, either by compromising or using stolen credentials, and then inserted a digital card skimmer into the web app. When customers visited the infected web sites and completed a payment form, the digital card skimmer was activated where it intercepted payment card data and transmitted it to the attacker(s). Data Exfiltration Detection During a Magecart attack, the transaction processes are otherwise undisturbed. The target companies receive payment, and customers receive the services or goods they purchased. As a result, no one is wise to a breach — until some 380,000 customers are impacted, as in the case of the attack against British Airways. The target companies’ web application firewalls and data loss prevention systems didn’t detect the data exfiltration because those controls don’t monitor or protect front-end code. Instead, they watch traffic going to and from servers. In the case of the Magecart attacks, the organization was compromised and data was stolen before it even got to the network or servers. Today’s proven obfuscation techniques can help prevent application reverse engineering, deter tampering, and protect personal identifiable information and API communications Best Practice Resolutions The Magecart attacks highlight the need to apply the same vigilance and best practices to web and mobile application source code that organizations apply to their networks—which brings us to this year’s New Year’s resolutions for protecting your app source code in 2019: Alert The key to success is quickly understanding when and how an app is being attacked First, organizations must obtain real-time visibility into their application threat landscape given they are operating in a zero-trust environment. Similar to how your organization monitors the network and the systems connected to it, you must be able to monitor your apps. This will allow you to see what users are doing with your code so that you can customize protection to counter attacks your app faces. Throughout the app’s lifecycle, you can respond to malicious behavior early, quarantine suspicious accounts, and make continuous code modifications to stay a step ahead of new attacks. Protect Next, informed by threat analytics, adapt your application source code protection. Deter attackers from analyzing or reverse engineering application code through obfuscation. Today’s proven obfuscation techniques can help prevent application reverse engineering, deter tampering, and protect personal identifiable information and API communications. If an attacker tries to understand app operation though the use of a debugger or in the unlikely event an attacker manages to get past obfuscation, threat analytics will alert you to the malicious activity while your app begins to self-repair attacked source code or disable portions of the affected web app. The key to success is quickly understanding when and how an app is being attacked and taking rapid action to limit the risk of data theft and exfiltration. Protecting encryption keys is often overlooked but should be considered a best practice as you forge into the new year with a renewed commitment to app security to ensure your organization’s health and well-being in 2019 Encrypt Finally, access to local digital content and data, as well as communications with back office systems, should be protected by encryption as a second line of defense, after implementing app protection to guard against piracy and theft. However, the single point of failure remains the instance at which the decryption key is used. Effective encryption requires a sophisticated implementation of White-Box Cryptography This point is easily identifiable through signature patterns and cryptographic routines. Once found, an attacker can easily navigate to where the keys are constructed in memory and exploit them. Effective encryption requires a sophisticated implementation of White-Box Cryptography. One that combines a mathematical algorithm with data and code obfuscation techniques transforming cryptographic keys and related operations into indecipherable text strings. Protecting encryption keys is often overlooked but should be considered a best practice as you forge into the new year with a renewed commitment to app security to ensure your organization’s health and well-being in 2019. Protecting Applications Against Data Breach According to the most recent Cost of a Data Breach Study by the Ponemon Institute, a single breach costs an average of $3.86 million, not to mention the disruption to productivity across the organization. In 2019, we can count on seeing more breaches and ever-escalating costs. It seems that setting—and fulfilling—New Year’s resolutions to protect your applications has the potential to impact more than just your risk of a data breach. It can protect your company’s financial and corporate health as well. So, what are you waiting for?
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant Public Safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive Risk Reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising Detection Systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organizations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organizations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber Risk Profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualizations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent Applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter Intrusion Detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security Ecosystem Members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritize communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realized. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no searching in a bag or purse for the card). And there’s no personal identification number (PIN) code to remember; no “intrusive” biometric element that can concern some users. James Segil, President and Co-Founder of Openpath, says the simplified process “uses fewer thought cycles.” Reliability of the system comes from Openpath’s SurePath triple-connect technology “We wanted to make mobile access control that people want to use and can use safely and with ease,” he says. “We wanted to make using a smart phone for access control easier and more reliable than using a keycard.” Simplified User Operation In the simplified scenario, the mobile credential resides on a smart phone that can remain tucked away in the user’s purse or pocket. The credential remains active without the user needing to open an app. The wave of the hand signals intent, which causes the button to light up, activate and the door is ready to open. Segil says the simplicity of operation has contributed to the system seeing an unheard-of 94% adoption rate among users. Reliability of the system comes from Openpath’s SurePath triple-connect technology. The smart phone credential is delivered using Bluetooth, WiFi or LTE (cellular) – whichever signal reaches the reader first enables the door to be opened. So even if a company’s WiFi is down or Bluetooth proves unreliable, there is still a third option. Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems Seamless Cloud Integration Segil is a serial entrepreneur who has had experiences as a frustrated user, dealing with many different offices, people and access control deployments over the years – subletting office space, changing PIN codes, dealing with 10 different offices using 10 different cards. Based on that experience, Openpath’s founders saw a need for a more user-centric approach to access control, and a chance to improve the office experience to be more aligned with employees’ experiences in their smart homes. Segil says he also saw “significant lethargy” among incumbent players in the access control space, and a market in which mobile and cloud technologies had still not taken hold. In addition to a simplified user experience built around mobile credentialing, Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems. The “elegant” readers, including a flush-mounted version, fit in well with high-end office environments. The company launched in May 2018. Openpath has been signing up national and regional channel partners all across the U.S. Openpath is focused on the commercial real estate market, where they have already seen significant adoptions, especially among mid-sized companies. Larger deployments as part of new construction are in the pipeline. National System Integration In the past six months since its launch, Openpath has been signing up national and regional channel partners all across the U.S. and now has a nationwide footprint and is able to service customers all over the U.S. They are not yet disclosing any specifics about the number of partners they have signed up and who they are. “I can share that we have a number of large national system integration and security brands on board as channel partners and many more regional and local system integrators,” says Segil. They are looking for additional integrator partners. “There is a cohort of folks out there who say ‘I get it,’ and I want to offer it to my customers,” says Segil. The cloud element of the system can provide recurring monthly revenue (RMR). Openpath’s system offers flexibility in terms of meeting each customer’s security needs. In addition to the “super convenient” scenario described above, the system can also be configured to be “super secure,” using two-factor authentication and other measures, says Segil. There are multiple “flavors” between the two extremes. It can also be integrated with elevators to enable the buttons on allowed floors. Integration With Existing Systems Cloud software simplifies operation for both tenants and landlords. The system is backwards-compatible to existing systems and can be used to retrofit and mobile-enable a legacy system, providing the benefits of mobile features and cloud operation to multiple sites. The software can interface with enterprise applications such as Active Directory, and an application programming interface (API) facilitates integration with other systems and building components. It operates with marketing automation platforms such as Flack and visitor management systems such as Envoy. The system is backwards-compatible, providing the benefits of mobile features and cloud operation to multiple sites Open standards make the system easy to install in new or existing buildings using RS485, or Cat 5 or Cat 6 wiring, whatever is in place. Retrofit installations can use existing panels, servers, software, etc., or they can be replaced. The Openpath panel is installed right next to an existing panel in a retrofit and preserves all legacy integrations of the previous system. Access Credentials Compatibility In its simplest configuration, the Openpath system consists of single or four-door panels wired using standard ports, Wiegand ports and REX ports, each connected to software in the cloud. Each panel works offline if the internet connection is down. Various key fobs, cards and other credentials are available in addition to mobile credentials. Openpath was one of the new exhibitors at last fall’s GSX show in Las Vegas, occupying a large-sized booth for a startup company. The “beautiful” hardware drew a lot of attention, says Segil. “The channel loves us, and we signed a lot of people,” he adds. “We were excited by the response.”
One factor aggravating concerns about workplace violence in corporate America is the easy availability of firearms. In many states, citizens, including employees, have the right to carry firearms onto a company’s property even though firearms are prohibited in the workplace. In effect, an employee prone to violence may have a firearm as near as their vehicle in the company parking lot. Currently, 23 states in the U.S. have so-called “parking lot storage” laws, which enable employees to store firearms in their vehicle’s trunk or glove compartment despite any corporate ban on weaponry. The laws have evolved as an expression of the Second Amendment “Right to Bear Arms” in the last decade or so. There is some variance in the laws from state to state, but they generally allow a citizen to carry a gun to and from work and keep it stored out of sight in their vehicle.Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show Employee Second Amendment Rights “The laws contend that employees should not have to give up their Second Amendment rights between home and the workplace and should be able to have a gun with them for protection from their front door at home to the front door of the workplace,” says Eddie Sorrells, Chief Operating Office/General Council of DSI Security Services. Sorrells will speak about the current state of the laws, how they came about, the nuances of state-to-state differences, and the possible impact on overall corporate security in a session titled “Employees Who Carry: Preventing Workplace Violence” at the upcoming GSX conference in Las Vegas, September 23-27. Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show, attended by more than 22,000 security professionals from 100-plus countries. Sorrells’ session will be Sept. 24 from 10:30 to 11:45 a.m. Restrictions On Gun Visibility Employees may think the “right to carry” extends to the workplace, but the right only extends to the parking lot. The company still has the right to ban guns inside the premises. However, it is unlawful in some states for companies to search vehicles in parking lots, and companies who do so are violating the law, says Sorrells. Among the various state laws, some exempt public education institutions and other public venues. Depending on how the laws are written, there may be other exemptions, too. In Florida, for example, the law exempts any organizations that have explosives on site. With weapons on a company's property, a high-risk termination could potentially become violent Most laws require weapons to be stored securely out of sight. However, in Alabama, for example, it is legal to store validly permitted guns in full view during hunting season, Sorrells says. A resident of Alabama himself, Sorrells has been in the contract security business for 27 years, working mostly in multi-state operations. He has worked for 500 or so corporate security organizations throughout the country and is a practicing attorney who has studied issues of workplace violence and active shooters. “There is a political element to these laws, which were created with the goal of protecting Second Amendment rights,” says Sorrells, who says he sees arguments on both sides of the issue. However, political opinions aside, “if you’re a business owner, you have to contend with dozens of weapons on a company’s property,” he adds. “That could be an issue if a high-risk termination could potentially become violent. You have to assume there is a weapon in that person’s vehicle.” Sorrells' session will dive into the case law and illuminate some of the legal issues and how courts have addressed them GSX Education Program After the session, Sorrells hopes attendees will take away a good working knowledge of the state of the laws, how to comply with the laws, and issues such as posting of signs. The session will dive into the case law and illuminate some of the legal issues and how courts have addressed them. The timely session is an example of the valuable information attendees can gain by attending GSX. Sorrells has been attending the yearly ASIS International Conference and Exhibits for more than 20 years, at least since the mid-1990s. As the pre-eminent security organization around the world, ASIS International provides unrivalled educational and networking opportunities at the yearly conference, he says. “There is a vast amount of networking and educational offerings on a wide variety of topics, including technology, legal issues, risk management, workplace violence, consulting, and anything under the sun,” says Sorrells. The newly branded GSX education program is led by subject matter experts from ASIS International, InfraGard (a public-private partnership between U.S. businesses and the Federal Bureau of Investigation), and ISSA (Information Systems Security Association). Sessions will deliver valuable, actionable takeaways to help attendees shape their security strategies. There will also be an exhibition of 550-plus suppliers and manufacturers highlighting the latest security solutions.
National Bank of Umm Al Qaiwain (the Bank) is a Public Shareholding Company incorporated in Umm Al Qaiwain by Amiri Decree Number (1) on January 5, 1982, issued by His Highness, the Ruler of Umm Al Qaiwain and commenced its operations with effect from August 1, 1982. The Local government of Umm Al Qaiwain is the largest shareholder and promoter of the bank. The bank is engaged in providing retail and corporate banking services through a network of 14 branches in U.A.E. The Bank carries out Islamic banking operations through Islamic Banking window established in 2005 across its branch network. They were searching for a fool-proof solution that would help them in managing the Time-Attendance and overtime calculation. With offices spread over 14 locations in UAE, management of attendance data was a daunting task. centralized attendance data management All manual work for report generation was eliminated outrightly, simplifying the salary procedure Thus, centralized attendance data management and maintaining a complete record of their employees were a part of their key requirements. Moreover, their payroll processing deployed a software - RAMCO, wherein the attendance data was manually entered. After a comprehensive discussion with the customer, Matrix offered a centralized platform - COSEC CENTRA, to manage all the data centrally. Door controllers - COSEC VEGA FAX installed in all the office entrances. These door controllers are integrated with the central platform that pushes the event data to the server. Furthermore, the Matrix platform is integrated with the payroll system - RAMCO. All manual work for report generation was eliminated outrightly, simplifying the salary procedure. After implementing Matrix solutions, NBQ witnessed drastic changes while following their processes. Customized attendance policy formation Effortless attendance management of multiple locations from the Head Office was prominently one of them. The shift allocation and shift correction processes were streamlined. Their solution included some advanced features like customized attendance policy formation and real item alert on attendance related event & auto-scheduled reporting. This, in turn, ensured efficient employee database management improving productivity. Products and solutions offered: COSEC VEGA FAX A complete Time-Attendance and Access Control solution with a blend of aesthetics, size, connectivity, reliability and ease-of-use. Designed for large enterprises with multi-location organizations. COSEC CENTRA PLT A web-enabled application server that controls the entire system from anywhere in the world. It is the heart of the entire solution and acts as a bridge between applications and the devices. COSEC CENTRA TAM An enterprise-grade solution, designed for organizations the Time-Attendance and Leave Management processes like recording entries and exits, salary processing, etc.
Openpath, a provider of modern mobile access control, is announcing a partnership with Lincoln Property Company (LPC), one of the diversified real estate service firms in the United States. Openpath has been selected as LPC’s technology partner to standardize and bring best-in-class technology solutions across its current portfolio and planned developments of commercial spaces. Openpath’s platform focuses on integrated technology to provide frictionless mobile access and scalable cloud-based solutions that can also integrate with legacy systems. This collaboration future-proofs LPC’s security offerings for modern commercial development. The partnership marks a shift in the commercial real estate market, as operators and tenants demand technology-capable properties that provide ease, efficiency and advancement to address high-risk security challenges. Already deployed in a number of LPC’s Los Angeles properties, Openpath will continue to outfit buildings across the country, providing state-of-the-art, personalized security plans and solutions for individually customized building needs. Integrated security solution LPC is one of the ten largest commercial property developers in the nation, managing or leasing over 403 million square feet and $76 billion in assets. As the first developer to choose an access control and technology partner, LPC is now leading the charge for tenant experience and innovation. With the built world becoming more technology-reliant, an integrated security solution is critical to making an environment attractive for LPC’s tenants and employees. This partnership provides a future-proofed solution for LPC properties, as Openpath’s cloud access control technology provides a standardized solution that can be integrated across LPC’s current and future technology needs. In addition to mobile access control, Openpath offers LPC buildings a broad range of first-to-market services including Lockdown and Tailgating Prevention to address current workplace security concerns. While required integrations will continue to evolve, Openpath and LPC’s strategic relationship enhances and ensures the property's attractiveness years down the line. Customization capabilities “This partnership provides an opportunity for us to continue to develop and personalize our solutions tailored towards Lincoln Property Company’s unique portfolio of commercial spaces,” said James Segil, co-founder and President of Openpath. LPC is focusing on the future of how we integrate better solutions" “Our mobile platform provides necessary customization capabilities while giving LPC’s tenants the freedom of control in their daily security. LPC is focusing on the future of how we integrate better solutions and we’re excited to see this next stage of development as we continue to design products that meet evolving property needs.” “Our goal is to ensure that every building provides the highest quality experience for our tenants,” said Eric Roseman, VP of Innovation & Technology Ventures, Lincoln Property Company. “We are excited to be the first major real estate firm to partner with Openpath to bring this technology to a nationwide commercial portfolio, and to spearhead the movement of tenant experience by providing our buildings with state-of-the-art security and mobile access control.”
The campus site near Aix-en-Provence is diverse, with offices, event spaces, kitchens and two accommodation blocks totaling 170 units. The Camp must remain open around the clock, all week, while maintaining security for staff and visitors. Aperio provided locking devices tailored to every door type — interior and exterior. So far, The Camp has integrated 221 Aperio Wireless Escutcheons, 42 Aperio Wireless Cylinders and 10 Aperio Wireless Handles within a TIL Technologies security system. Integrated online with the central system and controlled from the same interface, these Aperio devices effortlessly handle daily staff traffic of around 250 people. Meeting rooms, server rooms, living spaces and kitchens are secured with Aperio wireless locks. Up to 2,000 external visitors arrive on-site when The Camp stages an event — and each must also have credentials issued and access filtered through the site. Aperio makes it straightforward to enable visitor access. Real-time and future-proofed “Many credentials get lost and Aperio enables us to handle this efficiently,” says Benjamin Ciotto, Head of Information Technology at The Camp. Online mode is very important because [access] rights are very often updated for the constantly shifting campus population" A few clicks are all it takes to cancel a lost key-card and issue a replacement. Security staff at The Camp ensures only authorized users to enter offices where expensive video projectors and screens are stored. Their TIL integration enables real-time management of the whole site, with specific profiles created to segment individuals who need fine-grained access to specific areas. “Online mode is very important because [access] rights are very often updated for the constantly shifting campus population,” explains Benjamin Ciotto. “We can also program access to defined time slots, which is essential when we welcome 200 people for an all-day meeting, for example.” Environmental Product Declarations Aperio technology also met The Camp’s need for an aesthetically pleasing, wireless solution. They did not want to compromise their interior or exterior design. The Aperio product ecosystem’s sustainability performance also fits The Camp’s ethos. Because Aperio devices are wireless and battery powered, they are much more energy efficient than traditional wired locking systems, which require an “always-on” mains connection. Multiple Aperio devices have independently assessed Environmental Product Declarations (EPDs). These detail the footprint of each device through its full life-cycle, from production to disposal. “Aperio is a real comfort of use,” Benjamin Ciotto concludes. “And we handle the easy maintenance for ourselves.”
Critical building management and security systems at one of the most advanced super-high-rise towers, the landmark Wasl Tower in Dubai, are to be integrated with Maxxess eFusion technology. The 302-meter multipurpose tower, which will be operated by the Mandarin Oriental Hospitality Group, incorporates offices, guest rooms, public areas and apartments, and is situated in a pivotal Dubai location. The Wasl Tower is designed with advanced sustainability features including natural shading and cooling, adaptive lighting, one of the world’s tallest natural ceramic facades, and a vertical boulevard. eFusion was selected for the project because of the flexibility it allows, enabling rapid integration, off-the-shelf, with a wide choice of security, safety and business-critical technologies. With a modular, building block approach, eFusion provides an umbrella management system and drives service efficiency by removing the need for operators to continually switch between systems. Visitor management system By keeping it simple and integrating with the widest choice of technologies, Maxxess removes the complexity A key use of the technology will be to integrate back-of-house operations at the Wasl guest apartments with front-of-house systems, for maximum ease of use and operational efficiency using the Maxxess unified platform. This eFusion solution comprises a 900-plus reader ASSA ABLOY VingCard access control system, a 1700 camera Hanwha surveillance system, and advanced key management with Deister ProxSafe, and it will use the BACnet protocol to integrate the building management system (BMS). The Tower will also benefit from Maxxess VisitorPoint visitor management system, a Zenitel intelligent communication system and disabled call-to-assist alarms. The VisitorPoint integration will improve the guest and resident experience, reduce administration and front-desk queuing, and ensure smooth running of functions from visitor and contractor management to collections and deliveries, and security. Streamline security, safety and facilities management “The challenge with projects of this scale is to find a simple, straightforward platform that communicates with everything and works with all the systems involved,” says Lee Copland, Managing Director EMEA, Maxxess. “By keeping it simple, and integrating with the widest choice of technologies, Maxxess removes the complexity.” The Wasl Tower project is the latest of a growing number of mixed-use developments, including hotels, retail, office and residential complexes to use eFusion to streamline security, safety and facilities management. Last year Maxxess won an Intersec Award for its major eFusion implementation at Bluewaters Island.
PINs protect, just ask your credit card company. How many rooms at your office shouldn’t offer an open access, free-for-all? Probably quite a few. But expecting everyone to keep them locked, and the key-carrying and-tracking that entails, is unrealistic. This is when you need Code Handle. Access control system This simple, secure, easy-to-fit handle works with your current door lock. There is no need for you to change the door lock mechanism; just replace the existing handle to add PIN security to an office door. With Code Handle, there is no wiring, no expensive access control system and no need for cumbersome physical keys. Two screws fit a Code Handle to almost any interior office, meeting room, archive or storage room door. The inbuilt electronic PIN pad does the security work for you. Press a 4-digit code on the handle’s integrated keypad and the door opens. Code Handle comes with a Master Code and 9 different user PINs, so you can restrict access to a select group of people — senior managers, the IT department or the office cleaners, for example. User-friendly security Code Handle keeps sensitive documents, meeting rooms and personal belongings safe at your workplace Code Handle also locks itself. Auto-locking ensures an office, storage room or staff toilet is always secure when you close the door. You know for sure nobody has seen the new org chart you left on your desk, nor entered the stationery cupboard without authorization. With Code Handle, user-friendly security comes with clean, elegant design. Forget about ugly push-button-and-twist mechanical PIN locks. The low-profile Code Handle is brushed in stainless steel and satin chrome zinc, in a sleek design to blend with any modern office décor. All the security you need is in the handle. Two standard batteries (CR2) slot inside, and typically last for 30,000 lock/unlock cycles before you need to replace them. An indicator tells you when it’s time to change them. Code Handle comes in left- and right-hand versions. fire tested It is fire tested and enables free exit from the inside of a room. Code Handle keeps sensitive documents, meeting rooms and personal belongings safe and secure at your workplace. You can’t lock every room, nor install CCTV everywhere. With Code Handle, you don’t need to. To learn more about Code Handle, please visit: https://campaigns.assaabloyopeningsolutions.eu/codehandle
H-Farm has a strong track record supporting innovation and creativity in European start-ups. The company focuses on skills development, new approaches to education and digital transformation. Its most recent transformation project involved an access control system — for its own offices. H-Farm needed a solution to streamline access management for lots of people at a growing portfolio of sites and buildings. H-Farm experiences rapid turnover of users, both because new businesses join regularly and because they organize up to 300 events every year. Battery-powered locks Any new locks would need to extend an existing Axis system, but without adding complexity for day-to-day administration. To meet their needs, H-Farm selected a combination of Aperio® handles, security locks and escutcheons, each easy to retrofit, so day-to-day work at their busy offices would not be disrupted by intrusive installation. So far, 40 Aperio® Online H100 wireless door handles, 6 Aperio® Online L100 wireless locks and 4 Aperio® Online E100 wireless escutcheons have been fitted across multiple H-Farm locations in northern Italy. All Aperio® battery-powered locks are wireless, so no ugly cabling runs to H-Farm’s doors. Because Aperio® offers wide range of battery-powered devices, H-Farm can choose the precise wireless lock for every application: the L100 lock protects doors with high security demands; robust H100 handles suit interior doors with high traffic. Wireless access control Aperio® H100 enables customers to add doors to their access control solution because cost per door is lower H-Farm interior doors are mostly secured with the new Aperio® H100 wireless handle — Intersec’s Access Control Product of the Year in 2018. The Aperio® H100 packs the flexibility and affordability of Aperio® wireless access control into a slim, cleverly designed door handle. Its standard battery slots inside the handle, ensuring a minimal footprint. ASSA ABLOY’s device design team incorporated electronics into the handle lever on the outside of the door, without jeopardizing security. Design has become a major feature of the H100’s appeal. H-Farm wanted devices to blend with the contemporary architecture of their new €101m H-Campus development. “Aperio® wireless access control hardware is solid, nice looking and perfectly fits our environment — solving our access problem,” says Alberto Aldrigo at H-Farm. The H100 and other Aperio® devices are easy to install; for the H100, basically two screws complete the job. Going forward, this will enable H-Farm to quickly bring new buildings into the same access system as they expand to fresh locations. The H100 fits around 90% of target doors with two main models: one for left-handled doors, the other right-handed. “The Aperio® H100 also enables customers to add more doors to their access control solution because the cost per door is lower,” says Tania Amico, Aperio® Sales Manager at ASSA ABLOY Italy. Seamless integration H-Farm managers want to control access to site doors, or bring entirely new premises into their access system The open architecture underpinning Aperio® devices enabled easy online integration with their existing Axis system via PRYSM AppControl. Remote operation from a single, central software interface is seamless, which makes administering the system easy. “The PRYSM AppControl software utilizes the integration Axis completed with Aperio®,” says Piergianni Marana, Key Account Manager at Axis. “And the AXIS A1001 Door Controller is based on open hardware, which makes installing and configuring an Aperio® wireless lock easy and seamless.” An Aperio® RS-485 Hub coordinates up to 8 Aperio® locks within a typical range of 15 to 25 meters, communicating with the admin system via the powerful AXIS A1001 IP Network Controller. One AXIS A1001 Door Controller can manage one wired door and one Aperio® hub, up to 9 doors per hub. AES 128-bit encryption ensures communication between lock and system is secure. Online Aperio® integration gives facility managers real-time status information about their premises. Aperio® locks are wireless, so there was no expensive or time-consuming cabling. The AXIS A1001 uses Power over Ethernet (PoE), which eliminates the need for power cables to the controllers, too. If needs change at a facility — perhaps H-Farm managers want to control access to more site doors, or bring entirely new premises into their access system — it’s quick, efficient and easy for an installer to fit Aperio® locks and integrate the doors with the AXIS Entry Manager control panel. To discover whether your existing security system is ready for wireless Aperio® locks, download a free, fast Compatibility Checker at https://campaigns.assaabloyopeningsolutions.eu/aperio-upgrade
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Sometimes customers expect more out of a security system. A brand new security system just doesn’t perform as the customer expected it would. In fact, one might argue that the many variables in today’s complex systems make it more likely than ever that some element of a system might not measure up to a customer’s expectations. What happens then? We asked this week’s Expert Panel Roundtable: What happens if a customer’s expectations of system performance are greater than what a physical security system can deliver?
Beyond Security - Access Control For Multi-Tenant SitesDownload
Reducing The Cost of Video Surveillance System Deployment and OperationDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals