Maxxess Systems, a provider of event response management and collaboration systems, is pleased to announce the integration of OpenEye Web Services (OWS) with Maxxess eFusion security management software. eFusion is presently installed in thousands of facilities around the globe enabling security personnel to more precisely monitor and assess potential and emerging threats, and quickly respond to emergencies. This new integration enables the Maxxess monitoring software to retrieve video from Ope...
The physical security industry is moving fast. Evolving risks, new technologies and business changes all converged and had a profound impact on the industry in 2019. Looking back at our top articles of the year – as measured by those that received the most “clicks” at our website – provides a decent summary of how the industry evolved this year. Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2019. In the world o...
Two of the most familiar names in the physical security market – Pelco and Panasonic – underwent ownership changes during 2019. Consolidation continued on multiple other fronts. Security service companies, video companies and access control companies were all among the entities involved in merger and acquisition (M&A) activity during the last 12 months. In short, the industry landscape continues to transform in response to a changing market. Here's a look at the Top 10 M&A s...
ONVIF, a global standardization initiative for IP-based physical security products, held its annual membership meeting in November, providing ONVIF members with an overview of important activities of 2019 and plans for the year ahead. Attendees heard presentations on the growth of ONVIF, as well as plans for new profile development. ONVIF Chairman Per Björkdahl highlighted the forum’s achievements over the past year, particularly the market’s continued support for the profile co...
We live in an age when private customer data is constantly under attack from hackers. Cyber-threats have taken a front seat in the line-up of primary risks facing banks and financial institutions. The fact that cyber-attacks are becoming more prevalent isn't the only issue; they're also becoming more complex and therefore harder to address. And although the convenient interconnectivity of the Internet of Things (IoT) creates many advantages for financial institutions, there is also an increased...
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organizations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how indust...
Qognify, the trusted advisor and provider of physical security and enterprise incident management software solutions will be present at Intersec 2020. The company will demonstrate the latest version of its state-of-the-art video management system, Cayuga as well as its newly released, web-based central management platform, Umbrella. Focusing on the outcomes of customers that place a premium on physical security, safety and operations, both products enable organizations especially in the logistics and retail sector to increase security and process transparency and derive valuable business insights. Cayuga (R14) video management system Qognify will showcase the current version of Cayuga (R14) and the new Umbrella software on booth SA-C41 at Intersec 2020, which takes place from 19 – 21 January 2020, at the Dubai International Convention and Exhibition Center, Dubai, UAE. The company will once again be joined by its representative in the region, Electronic Design. The presentation at Intersec will highlight new trends in security management and how Qognify’s portfolio of premium solutions provides a central hub, from which all company-wide security-related systems can be managed. Enhanced cyber security Being developed at Qognify’s technology hub in Bruchsal, Germany, Cayuga R14 was launched earlier this year, bringing to market a professional next-generation VMS that not only supports more than 5,000 different devices from more than 80 different hardware manufacturers, but also provides cyber security for the growing number of IP video surveillance systems in use. Intersec 2020 is the ideal place for Qognify to demonstrate its latest innovations to end customers, partners" It builds the basis for Umbrella, a ground-breaking platform that can be deployed securely in the cloud or on-premise to enable centralized system monitoring, administration and license management for distributed Cayuga video systems. Intersec 2020 Kaj Svenningson, Director of Sales for the Middle East and Africa at Qognify, explains, “Qognify is one of the most renowned VMS providers and has been developing solutions for more than 20 years. Cayuga – and recently also Umbrella – have attracted a lot of attention from organizations operating in a wide range of sectors throughout the Middle East, most notably in logistics and retail.” Svenningson adds, “As one of the world’s largest trade fairs for security, safety and fire protection, Intersec 2020 is the ideal place for Qognify to demonstrate its latest innovations to end customers, partners and interested parties in the region.”
Rhombus Systems, a provider of enterprise cloud-managed physical security solutions, announces a suite of new sensors - asset tags, door sensors, environmental sensors – to transform how organizations manage their physical security. The new sensors are battery operated and use the Rhombus security cameras as a local intelligence hub to capture sensor events, corresponding video footage, and data of the physical environment. By seamlessly combining enterprise video security with IoT sensors, organizations can simplify their physical security infrastructure, gather more actionable insights, and better secure their workplaces all from a single console wherever they happen to be. Physical security software tools This innovative approach means that organizations no longer need multiple, siloed consoles to manage different enterprise IoT sensors. Now - all sensors, data collected by the sensors, and video footage - can be remotely accessed and managed from one console and work in unison. All of the data captured by the sensors and cameras work together to deliver a unique experienceFor example, if you attach an asset tag to a valuable tool on a construction site, you not only can see where the tool is located, but you can also see its movement patterns and even receive an alert for when that tool goes missing. All of the data captured by the sensors and cameras work together to deliver a unique experience rarely seen in physical security software tools. A Versatile solution for physical security “Existing systems for securing and managing physical spaces are woefully outdated and underserved,” said Omar Khan, Rhombus Systems Co-founder and CTO. “By leveraging our AI security cameras, we’re able to pair video with IoT sensors to provide a more advanced and versatile solution for physical security. There’s a huge opportunity to completely reinvent this space, and we’re on a mission to do just that.” The Rhombus sensors are managed through a web console or mobile device and are plug-and-play – meaning they can be set up, taken down, and moved in minutes – and have a battery life of up to 2 years with a single coin cell battery. The asset tag can be attached to any object to track and issue alerts when valuable items enter or leave an organization. Monitoring the temperature and humidity of a space The Door Sensor features a built-in accelerometer and can be attached to any door or entry point to issue alerts when an entry point is opened or left open. The Environmental Sensor monitors the temperature and humidity of a space and issue alerts when certain environmental parameters are surpassed. “We’ve been working with Rhombus for years and are continually impressed with the quality of their products and speed of innovation. It’s hands down the best video security solution we’ve ever used,” said Arik Levy, Luxer One CEO. “We have thousands of Rhombus cameras deployed, and with the new sensors, their platform is going to be game-changing for us. We’re already envisioning the different ways we can add these into our operations.” Full end-To-End encryption The sensors automatically communicate with Rhombus’s R2 camerasThe sensors automatically communicate with Rhombus’s R2 cameras meaning no other gateways or network gear is required to set them up. The sensors benefit from the same great infrastructure as the security cameras giving organizations full end-to-end encryption, automatic firmware and software updates, modern cloud management, and a 5-year warranty as standard with the service. The asset tag, door sensor, and environmental sensor will be available in January and will start at $49 plus an annual software subscription. Feature highlights of the Rhombus platform include: Plug-and-play sensors and cameras that can be set up, taken down, and moved in a matter of minutes for unique scalability and flexibility compared to existing options Cloud management, allowing users to securely access their system from any computer or mobile device Rhombus AI and Computer Vision for advanced facial recognition, people analytics, and custom alerts End-to-end encryption for enterprise-grade system security Automatic firmware and software updates to ensure the system is kept up to date with the latest technology IT Integrations with an organization’s technology stack, such as single sign-on (SSO), Office 365, and Slack
Genetec Inc., a pioneer technology provider of unified security, public safety, operations, and business intelligence announced strategic new initiatives to support its fast growth in Mexico. To spearhead these new initiatives, long time Genetec sales leader, Alain Bissada, who is currently Senior Director for Canada, is taking on a new expanded role to include Mexico as part of his responsibilities. In this new position, Alain Bissada will be responsible for supporting the company’s wide range of public safety, industrial, enterprise, retail and banking customers in Mexico, and put in place the necessary infrastructure to support its ambitious growth plans. Unified IP security solutions Genetec has been growing its market presence in Mexico at a very rapid pace Genetec is currently undertaking a recruitment campaign to support its growth in the region and is actively looking for a new country manager. The company will be moving to new, modern offices in the Polanco region of Mexico City, featuring a state-of-the-art experience center to showcase its entire range of unified IP security solutions, a sales engineering lab, training facilities, and additional space to accommodate new employees. As the vendor of video surveillance, access control and license plate recognition solutions, Genetec has been growing its market presence in Mexico at a very rapid pace. The company currently has public safety customers in 26 out of Mexico’s 32 states, and hundreds of private customers across a wide range of industries including, manufacturing, logistics, utilities, hospitality and more. Physical security infrastructure investment “Customers are looking for technology solutions that not only enable them to protect people and assets but also help them make the most of their video surveillance and physical security infrastructure investment to improve their operations,” said Alain Bissada, Senior Director, Canada and Mexico. “I look forward to working with our talented team and network of systems integrators in Mexico to support our ambitious plans in the region and to give our customers the support they need to meet their security and business operations needs.”
HID Global, a pioneer in trusted identity solutions, announced that it is collaborating with VMware to drive mass adoption of cellphone access to digital and physical places by adding HID Cellphone Access for opening buildings and doors to VMware Workspace ONE, an intelligence-driven digital workspace platform for managing any app on any device. The collaboration will make it possible for Workspace ONE users, for the first time, to more securely open doors with their smartphones as part of a unified cellphone experience that also enables them to access applications, computers, networks, data and cloud-based services. Workspace ONE is an industry leader in unified endpoint management (UEM) and the collaboration with HID will fuel even broader interest and uptake by enterprise organizations focused on blending physical and digital employee experiences with technology. Cloud-based access control platform “Adding physical access control capabilities to Workspace ONE will bring a unique element to our customers’ digital transformation journeys as we take yet another step in redefining what it means to provide empowering digital employee experiences across any application on any device,” said Tony Kueh, Vice President of Product Management, End User Computing, VMware. The platform streamlines mobile ID replenishment over the air when employees lose their smartphones HID cellphone credentials are delivered to Workspace ONE through the HID Origo cloud-based access control platform that provides a suite of integration, enablement and developer tools and services that simplify how HID partners and a growing community of new developers and resellers bring cellphone access control solutions to market. The platform also streamlines cellphone ID replenishment over the air when employees lose or must replace their smartphones and other cellphone devices. Cybersecurity and physical security “The collaboration between two of the leading companies in the fields of cyber security and physical security will help accelerate the use of converged physical and logical access control on cellphone devices,” said Hilding Arrehed, Vice President of Cloud Services, Physical Access Control, with HID Global. “The solution underscores HID’s and VMware’s shared commitment to bring to market one of the industry’s first unified access control solution for a user base of this size.” VMware recently completed a pilot of their platform integration at VMware facilities using Bluetooth-enabled HID iCLASS SE readers and cellphone IDs. The HID Cellphone Access application programming interfaces (APIs) and software developer kits (SDKs) provided VMware with direct access to HID access control hardware, speeding integration and pilot execution. Converged physical and logical access control The incubation of this technology partnership has validated the benefits of converged physical and logical access control on cellphone devices including a more seamless, convenient and intuitive experience for users with improved security and administrative efficiency. Users accessed buildings, rooms and other spaces by tapping their cellphone device to a reader at the door, and also unlocked doors from a distance using “twist and go” cellphone gesture technology or by simply swiping to unlock their phones as they approached.
As an innovator in certified physical security for asset protection, Technocover will be demonstrating the depth and breadth of its LPCB approved steel systems for the hardening of every type of site against unauthorized access. The Mid Wales-based expert in turnkey high security, including UltraSecure doors, access covers, enclosures, access control and accessories, will be participating in LPCB’s highly anticipated Live Lab over the two days of the show. Visitors will be able to view the engineered resistance of its products under simulated physical attack by LPCB’s certification test team. Technocover will be supplying compliant and non-compliant specimens of an LPCB SR3 (security rating 3) Sentinel Lite enclosure with side vents and cable entry cat-flap as part of the dramatic tests which replicate different levels of attack risk posed by criminals and their chosen tools. Physical security for industry More of the company’s product capability can be seen on stand H40 alongside leading brands within the HS Security portfolio of physical security for industry and the urban environment (part of Hill and Smith Holdings PLC). On show will be an example of an UltraSecure LPCB certified (SR4) mesh enclosure, whose modular design can be configured into large and complex secure enclosures for utilities, energy, transport, industrial and other sites. Equipment can be assembled offsite and lifted into position to overcome challenging site constraints Equipment can be assembled offsite and lifted into position to overcome challenging site constraints, speeding up installation in order to reduce downtime or even permitting the asset to remain live during the process. In addition, the Technocover ‘Tardis’ will showcase four LPCB approved doors, with security ratings 2, 3, 4 and 5, and a variety of LPCB certified accessories essential to ensuring the holistic performance of the door in line with its security rating. Asset protection Options on display include different types of entry and exit control, vision panels, door closers and vents among numerous accessories for adapting security provision to specific operational and location needs. The Technocover team will highlight the company’s Total Service approach to bespoke asset protection evolved over 25 years of designing, manufacturing and installing LPCB approved systems for critical infrastructure and the built environment. In line with the show’s theme of ‘Evolving Security Through innovation’, this specialized work demonstrates the company’s deep experience and ingenuity in resolving complex functionality within the scope of LPCB certification. Variations on the modular cage on show, for example, are solving growing demand for the secure containment of CBR (chemical, biological and radioactive) materials and controlled substances in laboratories, medical facilities, pharmacies, process and production sites. Protective cage and access system A recent project involved the design of a special protective cage and access system to secure a refrigerator and incubator within a university unit. Meeting the need for external visibility of the protected assets, Technocover designed and installed a five-sided cage system, tested and approved to LPCB SR4 (LPS 1175 Issue 7; cert no 450i). The company has just achieved an updated LPCB 450i certificate for a ‘Hybrid Case System’ with the options of solid panel construction, a removable roof, or sliding roof access hatch for even greater flexibility to meet operational needs.
CNL, global provider of Physical Security Information Management (PSIM) software and solutions, is pleased to announce that it has been awarded the 2019 Technology Partner of the Year by Edge360, internationally renowned designer, developer, manufacturer and integrator of intelligence-based public safety technologies and solutions for federal, state and local governments, as well as commercial and private organizations. The award recognizes CNL’s excellence in innovation and implementation of customer centric solutions. Real-time 3D visualization platform The award distinguishes CNL as a premier technology partner, enabling the delivery of quality solutions The award distinguishes CNL as a premier technology partner, enabling the delivery of quality solutions that leverage both existing capabilities and next-generation technologies to solve mission critical security challenges using Edge360’s real-time 3D visualization platform. Utilizing the RavenView3D Plug In, developed by Edge360, CNL’s PSIM displays RavenView3D models allowing full visibility and interaction with an entire city. Its powerful building x-ray mode shows exactly which building, floor or zone is in alarm, delivering complete situational awareness and helping operators to manage appropriate responses to improve security. This industry-renowned solution ensures a focus on providing end customers with the most efficient, yet effective results, creating a measurable return on their investment. Integration with IPSecurityCenter “We value our strong partnership with elite technology providers such as CNL who strengthen our ability to meet our customers’ most challenging requirements,” said Rick Urban, Director of Special Projects, Edge360. “As a team, we have the ability to collaborate to deliver great solutions that can be rapidly developed, integrated, and deployed to our customers.” “CNL Software is committed to working with new and innovative technologies that will give our customers improved security and greater efficiency” comments Mike Mostow, General Manager – Americas, CNL. “When integrated with IPSecurityCenter, Raven View3D further enhances the industry’s most comprehensive PSIM platform, providing users with access to more of the tools they need to quickly see, understand, assess and properly resolve security incidents, consistently.”
With so many high-end professional security companies in attendance, a security trade show is perhaps the least likely environment for criminal activity. Would criminals really choose to mess with the leaders in global security? While it may seem counter-intuitive, personal and corporate security needs to be a priority for every attendee – no matter how secure you may feel. If you are attending a security trade show where you will be surrounded by security experts, you should still not let your guard down. Use your security expertise to remain alert and vigilant to your surroundings. Use your security expertise to remain alert and vigilant to your surroundings Personal safety When it comes to security, there are two main areas where you need to focus on: your personal and your corporate security. Personal safety is self-explanatory: how you keep your person safe from physical attacks. When attending a trade show of any type, it is important that you are willing to speak to people and allow them to approach your personal space. However, it is equally important to set guidelines in order to keep your personal safety. Any location where large amounts of people are in attendance is a potential target for both individual criminal assault and terrorist attacks. Constant vigilance is your best defense here. Below are just a few examples of personal safety standards you should adhere to while attending any type of trade show: Always have a way out: as soon as you are provided a map of the facility hosting the show, commit to memory both the public entrances and exits. As a backup, take notice of the utilitarian transitways used by employees of the facility. Don’t let the most obvious exits become a “choke-point,” where you can be easily become caught in case of a crisis. Stay together: when you leave the venue make sure you do so in your group of colleagues or friends. While you may be anxious to get to your next destination, don’t breach protocol to do so. Keep a buddy system: communicate your known travel destinations with your teammates. If you have a meeting to attend with a client, let someone know when you will be there and when you plan on returning from it. Use tech to your advantage: consider installing a tracking app on the phone of everyone in your group attending the show. An app such as Life360 allows you to easily find your friends in case of an emergency. Drink responsibly: at many trade shows, alcoholic beverages are served. If you decide to partake, make sure that only people you trust are providing those beverages. Furthermore, don’t ever leave drinks unattended – it’s better to grab another than risk a spiked drink. Corporate safety Corporate security is typically a bit broader in that it includes your physical space, the materials or equipment located in your booth, and any proprietary or digital materials shared with clients or visitors. A security trade show will by nature offer a great many products and services that may be proprietary in nature. And so it’s important that everything you bring is accounted for at all times. Here are a few things to keep in mind when thinking about corporate safety: Securing privacy: if you plan on meeting with attendees in your booth, make sure you can provide privacy during your discussions. It is essential to be able to provide a safe place to discuss things. Make sure that prying eyes or sensitive ears can’t pierce your veil of confidentiality. Secure your assets: petty theft is a problem at any venue. To avoid the unexpected loss of your items, you should make sure all laptops, briefcases, backpacks, purses and anything else of value are “cabled” to hardpoints such as heavy tables to keep them from being carried off. Never leave anything important unattended. Secure delivery: if the trade show facility requires contracted employees to deliver your equipment or booth materials to your space, make sure that your materials are locked, secured, and properly labeled to mitigate pilfered or misplaced materials. Do not be afraid to take photos of your booth before it is left for the evening to document the shape it is left in. After all, it is a security trade show Keep in mind that you are there to target clients and customers who may need your products or services. Corporate espionage is a billion-dollar industry now. There are agents who attend security trade shows looking to steal the latest and greatest technology. These “professional spies” are solely there to undercut the success of your company at the show. Make their job as difficult as possible by being smart and alert.
One of the responsibilities of construction project managers is to account for risks during the initial planning for a project and mitigate them. With all the tools, construction materials, and heavy machinery during the initial stages of a project, the construction site is a dangerous place to be at. However, this is not the only risk that project managers need to protect a site from. With plenty of valuables both physical and virtual within a construction site, it is also a prime target for theft and arson. Improving the security of construction sites It is important now more than ever that construction business owners and project managers invest in improving the security of construction sites. After all, security on construction sites is for the protection not only of valuable assets but also of workers and members of the public. Investing in adequate resources for construction site security can prevent several issues, including: Theft of expensive tools and construction equipment Cybersecurity breaches leading to loss of sensitive information such as invoice data Arson resulting in loss of life and property Vandalism of construction site property Trespassing by unauthorized parties and exposure to construction site dangers Risks of injuries that can result in litigation and legal claims Identifying security issues Having a dedicated security team in place is a good first step in bolstering a construction site’s security. They will be able to prevent theft, vandalism, and deter unauthorized personnel from entering the site. They can also identify security issues that can potentially arise and even respond quickly to accidents and other calamities should they occur. Having a dedicated security team in place is a good first step in bolstering a construction site’s security For a better implementation of construction site security measures, it is critical that business owners and managers assess an assessment of the site itself. This will help identify both internal and external risks that can affect the site’s security and guide project managers in putting systems in place to address them. Construction site security checklist To guide you, here is a sample template that you can use to form your own construction site security checklist. SECURITY COORDINATION YES NO 1. Does the site have designated security coordinators? 2. Are the security coordinators available for contact during non-business hours? 3. Does the construction site provide a means to contact the police, fire department, and other relevant authorities in case of emergencies? 4. Does the construction site have a written security plan, including procedures for specific scenarios? 5. If so, are construction site employees aware of the security plan? GENERAL MACHINERY YES NO 1. Are all machinery adequately marked? (Identification number, corporate logo, tags, etc.) 2. Have all the machinery been inventoried? (Serial number, brand, model, value, etc.) 3. Does the project have a list of the names of operators handling the machinery? 4. Are all the machinery fitted with immobilizers and tracking devices when appropriate? 5. Are all the machinery stored in a secure area with a proper surveillance system? 6. Are the keys to the machinery stored in a separate, secure area? TOOLS AND OTHER EQUIPMENT YES NO 1. Are all power tools and hand equipment marked? (Identification number, corporate logo, tags, etc.) 2. Have all power tools and hand equipment been inventoried? (Serial number, brand, model, value, etc.) 3. Are tools and equipment fitted with tags and tracking devices when appropriate? 4. Are tools and equipment stored in a secure place? INVENTORY CONTROL YES NO 1. Is there a system in place to check material inventory to ensure they are not misplaced or stolen? 2. Are there procedures in place for checking materials that go in and out of the construction site? 3. Is there a set schedule for checking materials and equipment? 4. If so, do the records show that the schedule is followed strictly? 5. Are all material suppliers arriving for delivery properly identified? (e.g license plates, driver’s license, etc) CONSTRUCTION SITE PERIMETER YES NO 1. Is there a physical barrier in place to secure the site? 2. Is the number of gates kept to a minimum? 3. Are there uniformed guards at every gate to check personnel and vehicles entering and leaving the site? 4. Are security warnings displayed prominently at all entry points? 5. Are entry points adequately secured? (With industry-grade padlocks, steel chains, etc.) 6. Is there an alarm system? 7. Is the locking system integrated with the alarm? 8. Is the site perimeter regularly inspected? 9. Are “NO TRESPASSING” signs displayed prominently along the perimeter? LIGHTING AND SURVEILLANCE YES NO 1. Is there sufficient lighting on the construction site? 2. Is there a dedicated staff member assigned to check if the lighting is working properly? 3. Is the site protected by CCTV cameras? 4. Are there signs posted on site indicating the presence of security cameras? 5. Are there motion detection lights installed on-site? INTERNAL CONTROLS YES NO 1. Is there a policy on employee theft? 2. Are employees aware of the policy? 3. Are employees required to check in and check out company properties when using them? 4. Are staff members encouraged to report suspicious activity? 5. Is there a hotline employees can call to report security lapses and breaches? SITE VISITORS YES NO 1. Are visitors checking in and out? 2. Are vehicles entering and exiting the site recorded? CYBERSECURITY YES NO 1. Are the construction site’s documents and other sensitive data stored in the cloud securely? 2. Does the company have a strong password policy? 3. Are asset-tracking data accessible online? 4. Are confidential documents and data regularly backed up? 5. Are employees well-informed about current cyberattack methods such as phishing? Security is a serious business in construction. Because of the dangers already present on your construction site, a lapse in security can have devastating effects on your business’s operations. Not only do you risk losing money in a security breach, but more importantly, you also risk endangering the lives of your site’s personnel and third parties. Business owners and project managers need to make a concerted effort to educate employees about security and double down on their best practices for protecting their sites.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Penetration testing of physical security systems is used to evaluate if a company’s security measures operate as intended. From a technology angle, penetration testing (pen testing) assesses whether the totality of the systems operate as designed, rather than testing each individual component. Does the system work with the officers, the policy and procedures that are in place? A session at ISC East, Nov. 20 in New York, will address the need for and benefits of penetration testing (also known as red teaming). The session, titled “We Sneak into High Security Buildings and Get Paid for It,” will be presented by Michael Glasser, President, Glasser Security Group. He has two decades of experience providing security design strategic planning, implementation oversight, auditing and penetration testing. “Penetration testing determines whether people and systems are providing the protection you think they are,” says Glasser. Various system components should come together into a solution that works for the client. People, technology and architecture are all components of successful security systems. His motto: “Stop guessing and starting testing." Test-driving security systems “You can compare it to driving a car,” says Glasser. “You want to be sure the brakes work and the engine works, but then somebody has to test-drive the car.” Stop guessing and starting testing" The concept of penetration testing goes back to the Cold War, when the military had “Red Teams” and "Blue Teams,” competing squads that used their skills to imitate attack techniques enemies might use. More recently, the term “pen testing” has become common in the cybersecurity industry, often referring to “white hat” hackers that test the effectiveness of cybersecurity measures. Applying the concept to physical security in corporate America brings the concept full circle. “People think their controls work, but they realize they really need to see if it all works together,” says Glasser. Pen testing in corporate America “You can go to any military base or nuclear power site and you see pen testing,” says Glasser. “But often it doesn’t happen in corporate America.” Sometimes physical pen testing is approached as an extension of cybersecurity testing because addressing physical threats is an element in cybersecurity, too. “It’s the same service, except to make sure the physical house is in order,” says Glasser. Glasser’s session will be among the SIA Education@ISC East presentations scheduled at the education theaters on the show floor at ISC East, Nov. 20-21 at the Javits Center in New York. The process If you believe the movies, Glasser’s job is all fun and excitement, like a “bunch of kids having fun.” The reality is more mundane, he says. “People think it’s fun, but it’s work, not fun.” The process is front-loaded with weeks of research and surveillance to determine possible vulnerabilities before attempting a break-in. Research is based on threat modeling: What is a company worried about? Who is the bad guy? What do they want to do? What are the threats? The process is front-loaded with weeks of research and surveillance to determine possible vulnerabilities Among other tools, Glasser uses Open Source Intelligence (OINT), which is collection and analysis of information gathered from public, open sources, such as media, the Internet, public government data, etc. Glasser comes from a physical security industry family – both his mother and father were employed in the security industry – and he attended his first ISC East show in the 1990s when he was 11 years old. As a security consultant and security expert witness for more than 20 years, he has previously spoken at GSX and various ASIS International events.
In addition to providing the Northeast’s largest security trade show, ISC East will include free conference sessions and keynote speeches right on the show floor and several paid workshops. The Nov. 20-21 event at New York’s Javits Center will also include vendor solution sessions from Axis Communications, Hikvision and NAPCO. Wide variety of paid workshops An advantage of the International Security Conference & Exposition in New York is that much of the programming is complimentary to registered attendees, and location of the sessions on the show floor means attendees don’t have to leave the exhibition to take in a session. The paid workshops include technology sessions about cyber terminology for physical security integratorsThe paid workshops include an Active Shooter Workshop and technology sessions about cyber terminology for physical security integrators; and basic installation and configuration of video surveillance solutions. An OSDP (Open Supervised Device Protocol) Boot Camp Short Course will also be offered. As a smaller show, the topics of ISC East conference sessions are broader and of more general interest, rather than organized into focused “tracks” as at ISC West. Attendance at sessions can provide continuing education (CE) credits with organizations that partner with ISC East – one credit for each hour-long session. Attendees can use their Certificate of Attendance from any session to self-report their education hours to relevant industry bodies: ALOA (AEU education credits), ASIS (CPE continuing professional education credits) and NICET (CPD Continuing Professional Development points). An advantage of the International Security Conference & Exposition in New York is that much of the programming is complimentary to registered attendees Keynote sessions at the Main Stage The Main Stage will be the venue for keynote sessions delivered by Deanne Criswell, Commissioner, New York City Emergency Management (on Day 1 – Nov. 20); and Angela Stubblefield, Chief of Staff at the Federal Aviation Administration (FAA) (on Day 2 – Nov. 21). The two SIA Education@ISC East educational theaters on the show floor will be booked up both days with a variety of interesting topics. A new session covers penetration testing for physical security, presented by Michael Glasser of Glasser Security Group. A session on LiDAR (Light Detection and Ranging) sensors will be presented by Frank Bertini, UAV and Robotics Business Manager, Velodyne LiDAR. Another popular topic is Safe Cities, and FLIR will present a session on moving from secured to smart cities with intelligent, connected systems. New addition is Active Shooter Workshop The Active Shooter Workshop is a new addition to the ISC East program. It has been a popular session at ISC West for three years now. At ISC East, presenters of the workshop will be David LaRose, System Director Public Health, Lee Health; and Ben Scaglione, Director of Healthcare and Security Programming, Lowers and Associates. At the end of the workshop, an additional hour of programming will be the “Stop the Bleed/Save a Life” session presented by Jerry Wilkins, Co-Owner of Active Risk Survival. The Main Stage will be the venue for keynote sessions delivered by Deanne Criswell, Commissioner, New York City Emergency Management, and Angela Stubblefield, Chief of Staff at the Federal Aviation Administration Woman in Security event A Women in Security Forum breakfast event will be held on Nov. 21 (Thursday). It’s the second annual event and this year will focus on diversity and inclusiveness in the workplace of the future. Valerie Anderson, President of Boon Edam, will lead a discussion on “Diversity 2.0: Next Steps for Creating an Empowered Workforce”Moderator Valerie Anderson, President of Boon Edam, will lead a discussion on “Diversity 2.0: Next Steps for Creating an Empowered Workforce.” Panelists are Lisa Terry of Allied Universal, Andrew Lanning of Integrated Security Technologies, Elaine Palome of Axis Communications and Dawne Hanks of Milestone. The Women in Security event is likely to attract up to 100 attendees. SIA’s Women in Security is an active organization, with monthly meetings and a newsletter that recognizes prominent women in the security industry. “It’s really a group for both men and women,” says Mary Beth Shaughnessy, Event Director, ISC Events at Reed Exhibitions. “There are many programmes, recruiting efforts, and professional and networking opportunities. They are a robust group of people who are active in making a difference. It’s important to support women in the security industry, which is 95% male, and to develop a new generation of women to be a part of the industry’s future.” The keynote addresses at ISC East will also highlight two high-profile women.
ISC East continues to flourish as the Northeast’s largest security trade show. Focused on the big Tri-State market and overall Northeast sector vs. the flagship ISC West event in Las Vegas in the spring, the International Security Conference & Exposition at New York’s Javits Center will be held Nov. 20 and 21. “Anybody who has been to the show has commented and seen the growth,” says Mary Beth Shaughnessy, Event Director, ISC Events at Reed Exhibitions. Ninety new exhibitors When the show opens, there will be around 90 new exhibitors, including Gunnebo, Mobotix, Liftmaster, Cypress Integration Solutions, SAFR from Real Networks and Security Brands. Because it is a regional show, some large companies have smaller exhibits that feature their local and regional personnelLarger exhibitors at the show include Brooklyn Low Voltage Supply (distributor), Axis Communications, DoorKing Inc., NAPCO Security Technologies, and All American Monitoring. Because it is a regional show, some large companies have smaller exhibits that feature their local and regional personnel eager to meet with security professionals from the Northeast corridor. ISC East will be co-located with the Infosecurity ISACA North America Expo and Conference. The combination provides a comprehensive approach to physical and cyber security products and services. Rapid growth in past three years The audience at ISC East is unique – about 90% of attendees do not attend ISC West. The show has seen rapid growth in the past three years, and attendees report a new energy and passion among exhibitors and attendees. By every measure, the show will be bigger than last year, while maintaining the intimate, smaller vibe of a regional show. A “Crack the Tap” cocktail reception will be held at the end of the first day on the show floor. A charity activity on the ISC East show floor will be presented in partnership with Mission 500, an organization that works to serve the needs of children and communities in crisis. At the Mission 500 booth which will be adjacent to the Main Stage, each exhibition attendee will be invited to create a “care package” of essential hygiene items that will be delivered to children and families in need, in partnership with Volunteers of America - Greater New York. Attendees may write a note of encouragement to be included in the package they assemble. Event will highlight security startups A Nov. 20 (Wednesday) session at ISC East will highlight startup companies in a format reminiscent of television’s “Shark Tank.” Four finalists will take to the main stage and provide a seven-minute pitch about their new product or service. After the “Tech Tank” presentations, audience members vote live on their mobile app for their top choice, and the winner will be announced during the “Crack the Tap” cocktail reception.Four finalists will take to the main stage and provide a seven-minute pitch about their new product or service “It’s a program that allows attendees to see and hear about cutting edge technologies,” says Nicole Miller, Senior Conference Manager, ISC Security Events. The four finalists, chosen from more than 40 exhibitor submissions, are Arrow Labs’ MIMS Smart Watch for mobile incident management; Cepton Technologies’ Helius Smart LiDAR System; SAFR from RealNetworks’ Facial Recognition system, and ZeroEyes’ Weapons Detection and Active Shooter Mitigation Platform. New partnership with ASIS New York Beginning in 2020, ISC East will be combined with the ASIS New York chapter’s annual conference and expo, which was held in May this year. Starting next year, the events will be rolled into one industry-wide expo and education event geared to serving the total security industry in the tri-state area (New York, New Jersey and Connecticut). In 2020 there will be an enhanced education program along with the combined event next fall. In recognition of the new partnership, ISC East is involving the ASIS NYC chapter in this year’s show, too, with a booth on the show floor, and promotional logos and signage. The ASIS chapter will have a table at the SIA Honors Night event on Nov. 20. “We are really involving them this year to show we are working together and partnering going forward,” says Shaughnessy.
There are many matters that must be taken into account when organizing a casino. A top priority is the security of the entire workforce and clientele. An access control system that is reliable and easy to operate provides the basis for that. Casino Baden-Baden is open 358 days a year. In addition to various different pay scale groups and work-time models, a variety of bonuses need to be assigned. Pay may therefore be partly exempt of tax or liable to tax, with holiday bonuses and weekend pay. Recording staff work timings Intensive workshops and consultations were conducted to establish the specific requirements of the casino, so that the best possible solution could be developed. The main focus was on recording work times and transmitting that data to the casino's own specially developed shift schedule program. Given the various different work time models and wage types in numerous variants, complex manual procedures must be automated in future. IF-4735, IF-810, and IF-800 access control terminals Employees can use their passes for cashless payment in the cafeteria and at the vending machines In 1991, a solution for physical access control and time recording was implemented in the form of the IF-5020 software. Since 1998, the IF-6020 software solution has been in use. The hardware terminals IF-4735, IF-810, and IF-800 ensure smooth recording of work times and grant authorized employees access to the various separate areas. Also, the employees can use their passes for cashless payment in the cafeteria and at the vending machines. The system solution from Interflex, with its hardware and software components, now brings employees and administrators substantial time savings and a great deal of convenience. Central access control system All access permissions and work times are now recorded and controlled in one central system, eliminating the disruption of transferring from one system to another, such as to the program for pay and shift planning. This has brought considerable improvement in transparency and in the freshness of data, and paper has been completely banished from work time control.
HID Global, globally renowned trusted identity solutions provider, has announced support for Seos-enabled student IDs in Apple Wallet. Beginning this fall, students, faculty and staff at Clemson University will be able to add their IDs to Apple Wallet and use their iPhone and Apple Watch to access buildings on campus, purchase meals and much more. Seos-enabled student IDs “HID Global is excited to play an important role in creating transformative connected university experiences that make it easy for students to simply use their iPhone or Apple Watch to enjoy all that daily campus life has to offer,” said Stefan Widing, President and CEO with HID Global. HID’s technology and electronic locks from our parent company ASSA ABLOY are helping Clemson University students" Stefan adds, “HID’s broad range of technology and electronic locks from our parent company ASSA ABLOY are helping Clemson University students, faculty and staff take full advantage of convenient mobility applications. This fall, their Apple devices can be used for everything from entering buildings – such as residence halls and individual rooms – to buying meals, accessing the gym, and using secure print services and numerous other university resources.” iCLASS SE reader modules To support student IDs in Apple Wallet on iPhone and Apple Watch, HID provides Seos-enabled credentials, HID iCLASS SE and HID OMNIKEY readers, embedded HID iCLASS SE reader modules, and Corbin Russwin and SARGENT electronic locks from ASSA ABLOY. Through HID’s support of student IDs in Apple Wallet, Clemson students will be able to seamlessly access residence halls, libraries and fitness centers, buy lunch, make purchases at the university store, print documents and more by placing their iPhone or Apple Watch near a reader where contactless student ID cards are accepted. Contactless student IDs Contactless student IDs are supported on iPhone 6 and later and iPhone SE. On iPhone XS, iPhone XS Max, and iPhone XR, student IDs may still be used for up to five hours in power reserve mode when the iPhone battery needs to be charged. Student IDs in Apple Wallet are not only convenient, they also provide an extra level of security as students no longer have to worry about misplacing their physical card. School credential provisioning is protected by two factor authentication.
There are over 55,000 electrical substations in the United States. These substations, along with power plants and transmission lines, provide power for millions of people. It is imperative that these locations remain secure from intrusion and sabotage. If just a handful of these substations were rendered inoperable, the U.S. could face a serious blackout. The 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, which knocked out several transformers and totalled over $15 million in damages, was a catalyst for the Federal Energy Regulation Commission (FERC) establishing new security standards for utilities. One of the most notable policies introduced was the Critical Infrastructure Protection Standard 014 (CIP-014). This statute requires utilities to identify ‘mission critical’ facilities and assets, conduct a security inspection to identify threat, and implement a security system to address those risks. Replacing traditional fencing systems VTI Security has been servicing security needs in the commercial, utility, and oil and gas sectors for over 35 yearsIn response to security incidents such as Metcalf and other FERC activities, a large electrical utility with hundreds of substations across the country looked to expand security beyond its fence line. The end user wanted to enhance and possibly replace traditional fence protection systems – including fiber optics, microwave barriers, and video analytics – as these systems all proved to be costly, as well as time and labor intensive. In the end, the utility company relied on VTI Security, an industry-leading integrator, for a recommendation. Based in Burnsville, Minnesota, VTI Security has been servicing security needs in the commercial, utility, and oil and gas sectors for over 35 years. To determine the best system for its end user, VTI reviewed six different technologies, including some with multiple vendors. VTI also tested systems in field deployments and conducted cost analysis. The integrator concluded that SpotterRF’s product was superior to all others and selected it as its sole radar standard for perimeter solutions. SpotterRF perimeter protection solution “Our findings were that SpotterRF not only provided the most comprehensive detection in a substation environment, but SpotterRF was also by far the most cost-effective total solution based on the ability to mount equipment on existing structures,” said Jerry Klapak, Senior Account Manager for VTI Security. SpotterRF provides perimeter protection through its patented Compact Surveillance Radar (CSR) systems SpotterRF, based in Orem, Utah, provides perimeter protection through its patented Compact Surveillance Radar (CSR) systems, which provide up to 300 acres of radar tracking power in a hand held, four-pound device. The CSRs enable security monitors to never be blind, providing 100 percent coverage, 24 hours a day, in all weather conditions. They are designed to detect threats up to 3300 feet beyond the fence line and provide early warnings to staff before situations escalate. PT-Series thermal camera While radar casts a wide circle to detect the presence of potential intruders, the FLIR thermal camera provides visual verification along specific perimeters. Upon selecting a radar system, VTI needed a video manufacturer to supply cameras to deploy with the radar. In 2015, the integrator approached FLIR Systems for a solution and selected PT-Series thermal camera for the project. “The ability for FLIR's products to perform beyond published performance specifications was a surprise we don’t often see,” said Klapak. “Each product exceeded published performance metrics on our field testing and actual deployments.” Features thermal and visible-light imaging SpotterRF radars, combined with FLIR PT-Series cameras, deliver maximum coverage and perimeter protectionThe PT-Series is a pan/tilt camera that features both thermal and visible-light imaging. The pan/tilt mechanism gives end users precise pointing control, fully programmable scan patterns, and both radar slew-to-cue and slew-to-alarm functions. With the radar and thermal technologies selected, VTI worked to ensure seamless integration and performance between the two systems. “We worked with each company’s support and development teams, as well as the VMS manufacturer, to ensure the technologies not only worked with one another, but also met the client’s needs for bandwidth consumption and VMS interface and display,” said Klapak. Together, SpotterRF C20 and C40 radars, combined with FLIR PT-Series cameras, deliver maximum coverage and perimeter protection. Cost-effective solution for substations "The FLIR PT-Series, when deployed with SpotterRF, can cover a wide area of substation footprint. It is a cost-effective solution for substations needing to monitor the perimeter as well as inside the yard," said Michael Chaffee, Director of Business Development at FLIR Systems. “The speed at which the FLIR PT-Series slews to the cue of the SpotterRF detection is impressive." A number of environmental factors affected performance, including weather" When someone walks into the field of view of SpotterRF’s C20 or C40 radar, the radio waves bounce off the person and back to the radar, which then calculates the precise GPS location of the target, as well as its size. The radars then tell the FLIR PT-Series camera to zoom to that location. The camera automatically stays on and tracks the target. Because the radars control the cameras, the cameras only move upon detection, which significantly extends the shelf life of the cameras, allowing them to last for years without replacement. Locates person in a 15 or 100-acre space This FLIR and SpotterRF solution addresses an important pain point for the perimeter security and intrusion detection market. “In the past, utilities tried to use video analytics to find targets. Because these systems were outdoors, a number of environmental factors affected performance, including weather, lighting and moving trees,” said Logan Harris, CEO of SpotterRF. “However, by combining our radar with FLIR’s pan tilt thermal cameras, you’re able to solve this problem.” He added, “Together, SpotterRF’s radar technology and FLIR’s thermal imaging are able to locate a person in a 15 or 100-acre space, see hundreds of yards beyond the fence line, cue the camera, and alert the personnel, all without the help of an operator.” Activates security lighting based on motion One surprising benefit was the ability to use both the thermal cameras and radars for additional security and production uses"In the past, only military organizations could access this level of advanced technology. Now, the FLIR and SpotterRF solution makes this security capability accessible and affordable for critical infrastructure, power distribution and commercial applications. "Our client is very pleased with the ability of the technologies to provide security for their critical sites," said Klapak. "One surprising benefit was the ability to use both the thermal cameras and radars for additional security and production uses. They now use the radars to activate security lighting based on motion within and outside the fences. This provides not only a green approach to security by lowering energy costs but also improves customer relations by reducing light pollution in residential neighborhoods.” The entire team was also impressed by the solution’s minimal installation time. Unlike installing fiber optic cables on fence lines, which requires months for digging trenches, the FLIR PT camera and SpotterRF radar can be mounted easily on control shacks or lattice poles within a week. Four times faster installation of systems “The deployment occurred four times faster than it was anticipated,” said Harris. “VTI installed the systems at 25-30 sites in just three months.” VTI began installation in 2016, with plans to roll out the solution in a phased approach as part of a multi-year plan. Approximately 50-75 sites will deploy the camera and radar solution. On average, each substation has two FLIR PT-Series cameras and four SpotterRF radars. Some of VTI’s other clients are also expected to deploy the same solution at 10-20 sites over the next few years, based on the success VTI has proven in the utility environment.
Ping Identity, the provider of Identity Defined Security, announces its successful completion of the Financial-grade API (FAPI) conformance testing, as part of the process defined by Open Banking Ltd. This builds on Ping Identity’s previous success as the first identity platform to pass all 70 technical security tests, as set by Open Banking Ltd., with zero warnings. The most recent set of FAPI conformance testing evaluated the latest versions of the Ping Intelligent Identity platform, including PingFederate, PingAccess and PingDirectory, within a mock banking environment. Additional technical requirements It switches to an API model with structured data that utilizes a token model such as Open Authorization The inclusion of FAPI within the Ping Identity solution for Open Banking helps allow banks to overcome insecure practices such as screen scraping by using stored user credentials. Instead, it switches to an API model with structured data that utilizes a token model such as Open Authorization. FAPI is a technical specification developed as a multi-industry standard by the FAPI Working Group of OpenID Foundation (OIDF). It leverages OAuth 2.0 and OpenID Connect (OIDC) to define additional technical requirements for the financial industry and other sectors requiring higher security. For banks specifically, FAPI provides various advantages. This includes enabling applications to securely interact with financial accounts, while also enhancing the user’s ability to control security and privacy settings. Secure identity requirements In concurrence with the specification, OpenID Foundation maintains a cloud-based testing suite for conformance testing by banks, certified third-party security providers and platform vendors—such as Ping Identity. The Ping Intelligent Identity platform is used by hundreds of financial services enterprises, including many of the CMA 9 and Open Banking Ltd. itself. Additionally, FAPI is of increasing relevance to the growing number of new fintech start-ups in areas such as investment, wealth management, insurance, payments and even real estate. “This is significant beyond the Open Banking and financial services sector,” explains Rob Otto, EMEA Field CTO, Ping Identity. “Other digitally-focused sectors, with similar secure identity requirements, now have a proven template that can allow them to quickly deploy their own security controls, which have been stringently tested by the largest financial institutions in the UK.”
Merthyr County Council were experiencing high levels of break-ins and thefts in its three household recycling sites resulting in high repair and replacement costs. The Council employed a security company to man guard three sites which cost over £150,000 per annum however, the break-ins were still occurring. The Gallagher Channel Partner designed a solution to detect, deter and protect. They installed a Gallagher Monitored Pulse Fence to detect intruders climbing or breaking through the fence, deter by delivering a short, sharp but safe shock, while protecting the Council's assets and on-going operation. Cost-Effective installation The system was retrofitted to an existing fence structure ensuring an easy, efficient and cost-effective installation. Since the fence was installed break-ins have ceased and the requirement for man guarding is no longer needed. Electrical Statutory Compliance Inspector at Merthyr County Council, Les Lewis, said: “I was thrilled with the completed project. Not only is it aesthetically pleasing, but it has met all of our security requirements. It has also helped make huge cost savings as we no longer require manned security out of hours or need to repair damaged fences and replace expensive assets. I believe the Gallagher system will pay for itself within 18 months.”
Modern office design needs an advanced access control system that is powerful, flexible and aesthetically in tune with workspace users and their needs. At Plexal, a new £15 million flexible work environment located in the heart of Olympic East London, where the city’s ‘innovation community’ meet to brainstorm and explore new ideas, Aperio achieves all the three virtues wirelessly. At Plexal enterprise and academia work together, with technology companies, start-ups, universities and creatives under one roof. Up to 800 entrepreneurs use the workspace to devise, create and launch products and services. Innovative access control solution Easy, non-disruptive installation of new locking devices was another goal: Plexal preferred a wireless solution Plexal required a tried-and-tested access control solution they could rely on for high-end security to protect this new co-working office against unauthorized intrusion and burglary. Easy, non-disruptive installation of new locking devices was another goal: Plexal preferred a wireless solution. Any chosen solution would need the flexibility to expand access control as Plexal’s site scales over time. Device aesthetics must complement a contemporary, light-filled interior design with lots of glass. Powerful, flexible, wireless connectivity Plexal offices are now fitted with Aperio wireless, access card-based locking technology. Plexal’s battery-powered Aperio locks are integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. So far, 59 Aperio L100 wireless high-security door locks have been installed and integrated online with DoorFlow. These Aperio locks provide Plexal with a high level of physical protection and transmit door status to DoorFlow in real time. Adaptable locking solution Plexal required an adaptable locking solution for a range of different doors and, with no wiring required" “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install Aperio with minimal disruption,” says Stewart Johnson, Director at NetNodes. Because Aperio locks are battery- rather than mains-powered, the new wireless solution also keeps Plexal’s maintenance costs and energy consumption low. Aperio wireless locks use no power when idle, only “waking up” to read credentials or maintain a system heartbeat. Annual running cost savings over traditional wired doors are significant. Modern locking device design Aperio aesthetics were a good fit for Plexal’s modern workspace. “We have a futuristic-style, open-plan design here at Plexal — our offices are predominantly glass-fronted, so we needed an effective design which was not only robust but adaptable, too,” says John Herbert, Facilities Manager at Plexal. “What really appealed to me about ASSA ABLOY access control’s products was the aesthetic.” Aperio technology integration And because Aperio technology is built on an open platform for integration with almost any security or building management system, Plexal’s access control solution is fully future-proofed. They have the option to expand to new offices, floors or even buildings easily. Aperio can upgrade mechanically locked doors and wirelessly connect them — online or offline — to new or existing access control systems. This is achieved with minimal modification to doors and premises, offering a simple, cost-effective security upgrade. Aperio can upgrade mechanically locked doors and wirelessly connect them to new or existing access control systems Wireless access control “Should any additional doors need to be added to the system in the future, this can be done easily, without modifying or changing the aesthetics of the environment,” confirms Stewart Johnson. “This also minimizes future installation costs, offering a cost-effective and straightforward access control upgrade.” “We foresee change in the not-too-distant future and are delighted at our options to modify,” adds John Herbert. Secure physical and digital access ASSA ABLOY's innovations enable safe, secure and convenient access to physical and digital places, offering efficient door opening solutions, electronic locking devices, trusted identity solutions and entrance automation technologies.
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Tools such as standard operating procedures (SOPs) and checklists ensure that every factor is considered when installing a physical security system – or do they? Security system installations are detailed projects, and any overlooked detail is a missed opportunity to make the system better. We asked this week’s Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?