Should ‘Made in China’ be seen as a negative in security systems and products? It’s an important and complex issue that merits a more detailed response than my recent comment in the Expert Panel Roundtable. For me, there are two sides of the answer to this question: Buying products that have certain negative attributes that are not in alignment with some part of a belief system or company mandate. Buying products that do not perform as advertised or do something that is un...
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each o...
Choosing the right server for a video surveillance application comes down to one question: What does the customer expect from the system? Is it a retail location with two cameras that only needs video stored for 24 hours? Does the system need failover protection? What are the ramifications if a system goes down? Does business have to stop? How fast does the customer need to have access to video? Is it a regulated industry where immediate access is a requirement? How mission-critical is the vid...
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will...
LENSEC is adding to their regional management team around the globe. Below are a few of the professionals covering relationships with partners and manufacturer reps. LENSEC's staff is comprised of physical security experts who interface with partners and their customers. They bring solid expertise in security deployment solutions using Perspective VMS. Integrated Security And Asset Protection Bob has extensive experience in building channel partners for security and asset protection hardware an...
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of...
ISS – Intelligent Security Systems, a global provider of intelligent Video Management Systems (VMS) solutions with natively developed analytics, recently established a new benchmark with industry reports from IHS Markit. In its Video Surveillance Intelligence Service report, IHS Markit estimates ISS to have been the third largest non-security solution vendor of VMS in 2017. In its 2018 Video Analytics in Security & Business Intelligence report, IHS Markit estimates ISS to have been the third largest vendor of paid for video analytics software in the Americas in 2017. The combined results of these new rankings clearly position ISS as an established leader in natively developed intelligent VMS and analytics solutions. Offering Higher Level Of Intelligence By weighting the latest IHS Markit rankings, it is clear that our unified platform SecurOS VMS and analytics solution delivers a superior value proposition"“The latest industry reports from IHS Markit reflect ISS’ perseverance to develop a VMS solution that transcends typical video management and control capabilities by offering higher levels of intelligence,” said Aluisio Figueiredo, CEO of ISS. “To accomplish this goal, we have continued to develop new and innovative functionality for our flagship SecurOS VMS in tandem with the development of powerful analytics designed from the ground up to seamlessly integrate with one another. By weighting the latest IHS Markit rankings for non-security VMS and analytics, it is clear that our unified platform SecurOS VMS and analytics solution delivers a superior value proposition.” “Our estimates show that ISS has grown quickly in recent years to become the world’s third largest non-security solution vendor of VMS and the third largest vendor of video analytics software in the Americas in 2017,” said Jon Cropley, Principal Analyst Market, IHS Markit. SecurOS v.10 VMS With Cyber Security Updates ISS introduced the SecurOS v.10 VMS, featuring an updated, highly-intuitive GUI designed to accommodate multiple clientsISS continues to adopt sophisticated technology with the use of neural networks and deep learning algorithms which provides innovative customizable video surveillance solutions to meet customers’ evolving needs. ISS recently introduced the SecurOS v.10 VMS, featuring an updated, highly-intuitive GUI designed to accommodate multiple clients, and the ability to easily manage large systems with infinite scalability. Additional enhancements include a new web client for remote access, robust cyber security updates, 64-bit edition for faster throughput and larger capacity, enhanced native failover operations, H.265 Intel QSV support and a brand-new Evidence Manager. SecurOS v.10 seamlessly integrates with a host of powerful analytics developed by ISS. This unique, highly intelligent VMS and natively developed analytics allow ISS to offer a wide range of specialized packages to fulfill users’ specific physical security and business intelligence needs. ISS’ innovative portfolio of open platform analytics also integrates with myriad third party video management solutions.
Maxxess Systems continues to drive the virtualization of the physical security industry with the development and implementation of the industry’s most advanced enterprise level situational awareness and response coordination solutions. Enhancing Maxxess Systems’ momentum is the recent introduction of Maxxess InSite Awareness and Response Coordination System which meshes ‘system intelligence’ and ‘human intelligence’ to deliver an entirely new category of physical security and communications solution on a unified, easy to operate platform. Maxxess InSite joins the company’s highly touted eFusion Security Management Software and Ambit Communications Software, which are presently installed in thousands of facilities around the globe by many of the world’s leading brands. Developing Sophisticated Software Solutions The solutions aren’t just evolutionary in nature, they’re revolutionary with new benchmarks in situational awareness, communications and personnel coordination"“Over the last decade, our focus has been on developing highly intuitive, integrated solutions for high-profile clients,” said Nancy Islas, President of Maxxess Systems, Inc. “This has allowed us to develop highly sophisticated software solutions based on the needs of high-profile users around the world. The resulting solutions we’ve developed aren’t just evolutionary in nature, they’re revolutionary with new benchmarks in situational awareness, communications and personnel coordination.” High-profile users of Maxxess Systems’ solutions include: the Alshaya Group, an international franchise operator with over 90 globally recognized brands; CAE, the pioneer in training for the aviation, defense, security and healthcare industries; Meraas, a developer of residential and commercial space in Dubai; Banco Central de Reserva del Peru, which mints and issues metal and paper money in Peru. Coppel, one of the largest retailers of clothing and household goods across Mexico; Regus, one of the world’s largest providers of flexible workspace; UDR, a real estate investment trust company in the US; the highly prestigious London School of Economics, and more than 50 companies in the renowned Emirates Group, among many others. Core Software Platforms Maxxess InSite combines ‘system intelligence’ and ‘human intelligence’ to detect and respond to unfolding events in real-timeThe Maxxess Systems portfolio is built on the following core software platforms: Maxxess InSite Awareness and Response Coordination System combines ‘system intelligence’ and ‘human intelligence’ to detect and respond to unfolding events in real-time – all of which is queued, organized and displayed on a highly-intuitive user interface. In doing so, Maxxess InSite truly enables early action, allowing IT, Operational Technology and Physical Security departments within organizations to correlate data, improve response coordination, and deal with issues when they’re small – before they become large and costly. Maxxess InSite features an open-architecture framework to accommodate virtually any security or business intelligence application with comprehensive functionality. Over 50 different leading manufacturers are already integrated into Maxxess InSite, providing more combined capabilities and functionality than any other cross-platform solution available. This allows Maxxess InSite to be configured for virtually all applications, employing any combination of software modules and hardware to deliver each user with a highly-customized solution and unparalleled efficiency. eFusion provides video and access system management and control capabilities along with alarm monitoringeFusion Security Management Software is a ‘system intelligence’ solution that integrates and correlates data from surveillance, access control and various other physical security related inputs onto a comprehensive monitoring and reporting dashboard. eFusion provides video and access system management and control capabilities along with alarm monitoring, access credentials tracking/authorization/de-authorization remotely, door status and more. eFusion can be deployed as a stand-alone control platform, or as a core component of Maxxess InSite. Ambit Communications Software is a ‘human intelligence’ solution that provides security managers communication and location knowledge for remote personnel through their personal devices for alerts, notifications, status assessment and access management. Ambit can be deployed as a stand-alone communications platform, or as a core component of Maxxess InSite. “The recent release of Maxxess InSite is the result of many years of software development and is based on the proven performance of our security and communications solutions,” continued Ms. Islas. “With the introduction of InSite, Maxxess Systems is bringing a completely new and unparalleled security and communications enterprise solution to the security marketplace.”
With the need for security guard services growing worldwide, Montreal-based tech startup TrackTik Software Inc., an integrated security workforce management cloud-based software solutions provider, has announced US$ 45 million in financing from Toronto-based Georgian Partners and Montreal-based Caisse de dépôt et placement du Québec (la Caisse). Disruptive AI And Machine Learning Funds will be used to drive new product development — including disruptive artificial intelligence (AI) and machine learning (ML) technologies Funds will be used to drive new product development — including disruptive artificial intelligence (AI) and machine learning (ML) technologies — that will enable security guard firms or in-house security teams to simplify their operations and maximize profitability. TrackTik will also nearly double its staff of 120 in the next year to help bring to market the new state-of-the-art tools and increase support and provide best practices for customers as the company expands its operations internationally. “This investment is in effect good news for the security workforce management industry as a whole as it is enabling us to reimagine every aspect of the industry, helping users of our technology to perform at unprecedented levels of intelligence and efficiency as they obtain their key business objectives,” said TrackTik Founder and CEO Simon Ferragne in making the announcement. “These unique tools will not only add value to our users but will in turn enable our clients to add value to their own customers,” he said, revealing that the new products are planned to start rolling out in early 2019. TrackTik Security Workforce Management Software Applauding the investors for their vision, Ferragne explained that both Georgian Partners and la Caisse are aligned with TrackTik’s commitment to transform the security workforce management market. In particular, Georgian Partners — a firm that invests in growth stage companies using AI and ML to solve real business problems, with a roster that includes players such as Shopify, Cority, Flashpoint and True Fit — has dedicated a group of technical experts to help TrackTik accelerate the development of its new products. “TrackTik's unique end-to-end security workforce management software is advancing the security industry to improve services and make smarter, data-driven decisions,” said Steve Leightell, Partner at Georgian Partners. “They've built a powerful solution that is solving their customers’ greatest business needs and are truly leading the industry. We are thrilled to be working with the TrackTik team to develop their software’s cutting-edge artificial intelligence capabilities. Georgian’s core philosophy is that businesses utilizing applied AI will enable superior service levels in terms of capability, delivery, availability, accuracy and convenience, and so we look forward to be a part of this phase of their growth.”TrackTik's unique end-to-end security workforce management software is advancing the security industry to improve services and make smarter, data-driven decisions" Applied Artificial Intelligence Citing a good cultural fit between the two companies, Leightell added that the timing was right to engage with TrackTik because there is a strong market pull for TrackTik’s first-of-its-kind, all-in-one enterprise software solution that delivers all of the mission-critical components required to run a professional security service firm on a single integrated platform, including real-time guard management and incident reporting, back office administrative functions, and business intelligence. In addition to Applied AI, Georgian Partners’ thesis-led approach to investing also focuses on Conversational AI – including the use of text-based messaging, chatbots and voice assistants – and Digital Security, two areas that TrackTik is well positioned to capitalize on, he added. Based on TrackTik’s substantial growth in 2018, Thomas Birch, Managing Director Venture Capital and Technologies at la Caisse stated that “this new investment will enable TrackTik to continue its international development and reaffirms la Caisse’s support for technology companies, which represent a promising sector of Québec’s economy. One of the fastest growing technology companies in Canada, TrackTik will use the proceeds of this transaction to pursue its strategic expansion plan, which includes developing more machine learning technology.” Automated Scheduling This is an exciting time for the security guard workforce management space as the industry grows and evolves" Among some of the advanced AI capabilities to be featured in TrackTik’s new software are an automated scheduling tool that uses predictive analysis and ML to streamline the scheduling of large, diverse and mobile security workforces, reducing the number of human interactions and simplifying day-to-day business, Ferragne said. TrackTik’s innovations have helped propel the company’s exponential growth since its inception in 2013, with the company receiving multiple recognitions for its solutions. Last year alone, TrackTik ranked No. 11 on the Deloitte Technology Fast 50 list, was included on the LinkedIn list of Top 25 Startups in Canada, placed 36th on the Canadian Business 2018 Startup 50 ranking of Canada’s Top New Growth Companies, and received a 2018 SaaS Award for Customer Success by San Diego-based APPEALIE. “This is an exciting time for the security guard workforce management space as the industry grows and evolves,” Ferragne said. “We at TrackTik are proud to support its advancement by providing the best products possible in the hopes of helping those in the industry propel their business forward. We want to thank both Georgian Partners and la Caisse for believing in our vision and mission, and we look forward to working together on achieving our goals.”
The Middle East is proving to be a hot bed of business for global suppliers of security, safety, and fire protection, with the world’s top industry players all set to converge at Intersec 2019 in Dubai to drive more double digit growth. From video surveillance technologies with Artificial Intelligence and deep learning capabilities, to cloud-based access control solutions and flame retardant protective clothing, Intersec 2019 will shine the spotlight on game changing solutions solving challenges faced by professionals spanning sectors from banking and retail, to infrastructure and energy. Top Surveillance Technology The 21st edition takes place from 20-22 January 2019, with more than 1,300 exhibitors from 60 countries spanning 50,000sqm of space at the Dubai International Convention and Exhibition Centre. Korean company IDIS, one of the world’s top surveillance technology manufacturers, is a regular Intersec exhibitor that’s hitting double digit year-on-year sales growth in the Middle East, a position that it largely attributes to contacts made at the annual three-day event. Many of our system integration partnerships resulted from engagement and introductions made at Intersec" “Many of our system integration partnerships resulted from engagement and introductions made at Intersec and we can track this back since our first appearance at the show in 2014,” said Harry Kwon, General Manager of IDIS Middle East and Africa. Commercial Organizations “These include Almajal G4S in KSA, Almoayyed in Bahrain and EMS in Egypt to name but a few. The result is an extensive and broad range of successful deployments of IDIS technology across government, education, retail, banking and many other commercial organizations.” “We’re hitting double digit sales growth year-on-year and continuing to increase our market share and geographical reach by expanding our sales channels,” added Kwon. Kwon said IDIS will look to up the ante with a series of new product launches later this month at Intersec 2019, including the latest iteration of its IDIS Deep Learning Analytics (IDLA) Engine: “IDLA has opened a new door to the future of video analytics with ground-breaking 96 percent accuracy combined with a 200ips speed.” Fisheye Advancements What’s more at Intersec we’ll launch the DV-2116, AI in the Box, which is a cost-effective, pre-built device with the graphical and processing power" “What’s more at Intersec we’ll launch the DV-2116, AI in the Box, which is a cost-effective, pre-built device with the graphical and processing power to quickly and easily transform existing surveillance into a powerful AI solution.” he said. “Also on show will be our latest fisheye advancements, which include improved peripheral resolution through an upgraded Panomorph lens on the 12MP model and a new 5MP compact model perfect for smaller applications and installation in confined spaces.” Intersec 2019 covers the seven sections of Commercial Security; Fire & Rescue; Perimeter & Physical Security; Safety & Health; Homeland Security & Policing; Information Security; and Smart Home & Building Automation. Protective Clothing ULTITEC is one of more than 150 exhibitors in the Safety & Health section, and will showcase its extensive range of protective clothing used by professionals in the oil & gas, aviation, construction and automotive industries. Jason Lin, ULTITEC’s General Manager, said its range of technical textiles are widely used by global conglomerates and local companies alike such as Qatar Gas, Shell, ExxonMobil, and ADNOC (Abu Dhabi National Oil Company). “At Intersec, we’ll focus on chemical and liquid jet resistant protective clothing such as the ULTITEC 5000 and ULTITEC 4000 which recently won the tender to be applied in PETRONAS Malaysia, one of the world’s largest and most forward-looking oil and gas producers,” said Lin. Excessive Heat Environments Our unique fabric technology of microporous film provides breathability and is perfectly suitable for excessive heat environments" “Our unique fabric technology of microporous film provides breathability and is perfectly suitable for excessive heat environments in the Middle East. It prevents occupational heat exposure as the microporous size is smaller than a water drop and larger than moisture vapor, offering exceptional comfort without compromising superior protection.” Elsewhere Matrix Comsec from India is one of more than 50 exhibitors at Intersec’s Information Security section that will look to capitalize on opportunities in a Middle East cyber security market that’s estimated to grow at a compound annual growth rate of 11 percent from 2018-2024. According to analysts 6Wresearch, revenues from the Middle East information security market will reach US$2.7 billion in 2024, compared to US$1.4 billion in 2018. High-End Solutions With the cloud playing an increasingly important role in the storage and processing of important data, Abhay Joshi, Global Sales Head at Matrix Comsec, said Middle East organizations are taking measures to adopt high-end solutions that prevent unauthorized access and cyber-breaches. “Organizational data is the most important resource that companies have, so firms are opting for secure cloud-based solutions,” said Joshi. “At Intersec 2019, we’ll launch our cloud based Time-Attendance and Access Control solution COSEC VYOM.” “Up until now, Matrix offered on premise solutions, but now customers will have the choice of deploying the solution either on the cloud or on premises. We’ll also launch our mobile based COSEC APTA Face Recognition Technology. This might be helpful for corporates and manufacturing sectors whereby normal biometric technology fails to operate,” added Joshi. Commercial Security Providers Commercial Security will be the largest section on the exhibition floor, with more than 450 exhibitors, including two-thirds of the world’s top 50 commercial security providers. Fire & Rescue is the next largest section, with more than 400 exhibitors, followed by Safety & Health (150 exhibitors) Homeland Security & Policing (100 exhibitors); Perimeter and Physical Security (100 exhibitors), and Information Security (50). The one-day Intersec Fire Conference on 21st January will provide insights into the changing global trends in fire protection A revamped conference line-up will be spearheaded by the Intersec Future Security Summit, raising key issues on Artificial Intelligence, security integration, emergency preparedness and response, data protection, and the Internet of Things. The one-day Intersec Fire Conference on 21st January will provide insights into the changing global trends in fire protection and its implications on the Middle East, while Dubai’s Security Industry Regulatory Agency (SIRA) Forum will also return with the latest updates in security law and industry regulations in Dubai. Popular Features Returning popular features to Intersec 2019 include the Drone Zone, an Outdoor Demo Area, a Smart Home Pavilion and the Safety Design in Buildings Pavilion. More than 150 exhibitors will also participate for the first time, while Canada, China, Czech Republic, France, Germany, Hong Kong, India, Italy, Korea, Pakistan, Singapore, Taiwan, UK, and the USA comprise the 14 country pavilions. Intersec is organized by Messe Frankfurt Middle East and held under the patronage of His Highness Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum. Official supporters include the Dubai Police, Dubai Civil Defense, Dubai Police Academy, Dubai Municipality, and the Security Industry Regulatory Agency (SIRA).
Registration is open for the second annual Cyber:Secured Forum, a conference connecting the worlds of cybersecurity, physical security and systems integration. This cybersecurity educational summit hosted by ISC Security Events, PSA Security Network and the Security Industry Association (SIA) will be held July 29-31 in Dallas, Texas. Cyber:Secured Forum 2019 will feature an evening welcome reception on July 29 followed by two days of in-depth content on cybersecurity trends and best practices related to the delivery of physical security systems and other integrated systems. Better Cybersecurity Attendees will enjoy sessions featuring top cybersecurity leaders and sponsor exhibits showcasing solutions related to cybersecurity, integrated systems and physical security solutions. Topics to be addressed in the 2019 summit include: Global cybercrime trends How to make your business cyber resilient Tools and technology for better cybersecurity of physical security systems Standards for cybersecurity Emerging threat vectors Cyber-hardening of security systems Monetising cybersecurity services Chief information security officers’ expectations for physical security Leaders in the IT and physical security industries will gather at Cyber:Secured Forum to connect and share information on risks and liabilities Leaders in the IT and physical security industries will gather at Cyber:Secured Forum to connect and share information on risks and liabilities, responding to cybersecurity threats and establishing security control standards across IT systems, particularly when integrating physical security solutions and devices on IT networks. Integrated Security Systems This event is designed for security systems integrators, IT and cybersecurity leaders, integration engineers, product developers and manufacturers, senior technology business executives, security specifiers and engineers, security consultants, top security leadership and anyone responsible for the cybersecurity of integrated security systems. Cyber:Secured Forum 2019 will be held at the Westin Dallas Park Central; conference registrants will have access to a special room rate at this hotel conveniently located just north of the city’s downtown district. A call for speakers for Cyber:Secured Forum 2019 will be issued in January. The conference is offering an early bird registration discount through Feb. 28. SIA members, PSA members and members of the ISC Executives Club receive additional discounts off registration rates.
NIT, an Ingram Micro Company, regional value-added distributor of IP surveillance and physical security solutions in the MEA (Middle East and Africa) region, announced signing a distribution agreement with IDIS, one of the largest manufacturers of security and surveillance technology in South Korea and a globally recognized leader in advanced surveillance innovation. With this agreement, IDIS’s full range of surveillance solutions will now be available across the Middle East and Africa through NIT. Suitable For Multi-site deployments It includes the IDIS’s line-up of powerful IP cameras and NVRs, as well as a choice of video management software (VMS) including the totally cost-free IDIS Center and the award-winning IDIS Solution Suite that is both modular and scalable in design, making it suitable for multi-site deployments and large enterprise-level applications. IDIS high-quality cameras and NVRs complemented by VMS are easy to use and do not require specialized training“Our new alliance with IDIS provides significant opportunities for our company to build end-to-end cost-effective surveillance solution which can suit different vertical markets,” said Bassel Al Fakir, Managing Director of NIT. “IDIS advanced plug-and-play video technologies will open up great new profit opportunities for our resellers,” added Mr. Bassel. Expanding Regional Reach IDIS DirectIP is an optimized HD surveillance solution, based on a highly secure IP framework, consisting of cameras, NVRs, network equipment, and a choice of client software as a complete package. IDIS high-quality cameras and NVRs complemented by VMS are easy to use and do not require specialized training or expert knowledge to install. “We are very pleased to have NIT, an Ingram Micro Company, on board. NIT are utilizing their expert knowledge and extensive partner network, which greatly extends IDIS’s reach across the region and opens an essential sales channel,” confirmed Harry Kwon, the General Manager of IDIS Middle East and Africa.
Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-Readers Simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 Encryption Ensures Cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labor from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting Requirements Of FICAM Guidelines SIA is pushing to make the latest OSDP version a standard recognized by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organizations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognized by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organizations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile Credentials Are Not Secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organization more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organization deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All Smartcards Are Equally Secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organization vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organization if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic Locks Are More Vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorized access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be Prepared To Unlock Future Benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
The oil and gas market is driven by a number of technology trends, political issues, waves of supply and demand, and regulations. At times, it seems like the market is in a constant state of ebb and flow, with business affected by traditional drivers, such as government mandates and operational efficiencies, and other non-traditional markers, like challenging weather conditions (consider the 2017 hurricane season as an example). Additionally, the global economy continues to grow, propelling increased energy demand. But like nearly every other market today, the oil and gas market is on the brink of a sea change. According to Deloitte’s 2018 outlook on oil and gas, “the digital revolution is here.” The sheer volume of information and data generated by digital devices, such as those associated with the Internet of Things, will allow producers to leverage rich data and combine it to deliver smart, efficient solutions. The rise of digital technologies is unleashing new ideas across the oil and gas industry and even though we are in the beginning stage of being able to harness the power of these types of technologies, innovative ideas are emerging — all designed to support the core business, reduce internal investments, deliver products faster, boost efficiencies, and enhance safety. Maximized Operations And Increased ROI This ongoing growth propels energy producers to embark on extensive exploration and production activities to meet increased demand This is welcome news because there are a number of challenges facing the oil and gas industry, from improving reserve replacement and ensuring workplace safety to reducing operating costs and limiting downtime. All of these objectives must be achieved while maximizing operations and increasing overall return on investment. Never has it been more crucial for critical infrastructure organizations to demonstrate a focus on safety, security, and collaboration. Here's why: Growth and demand According to the U.S. Energy Information Administration, world energy consumption will grow by 56 percent between 2010 and 2040. This ongoing growth propels energy producers to embark on extensive exploration and production activities to meet increased demand. As energy-centric organizations look to emerging markets or remote regions to source production, safety becomes even more mission-critical to their success. Compliance Continuous demand is only one challenge; compliance with industry and government regulations is another significant hurdle that must be maintained or there is risk of production shutdowns. For example, the Department of Homeland Security’s Chemical Facility Anti-Terrorism Standards (CFATS) impose comprehensive federal regulations for high-risk chemical facilities, requiring organizations to conduct vulnerability assessments. This is just one of many regulatory procedures sites must follow to conform to environmental protections, safety precautions, and safe handling of hazardous materials. As energy-centric organizations look to emerging markets or remote regions to source production, safety becomes even more mission-critical to their success Threat Protection, Mitigation, And Collaboration In addition to meeting the requirements of regulatory procedures, mitigating risk in this industry propels leaders to develop stringent strategies to ensure robust protection of people, property, and assets, effective and efficient response to incidents when they occur, and procedures and protocols to ensure business continuity in emergency situations. Energy providers require comprehensive safety planning and technology systems that can augment the capabilities of on-site and remote personnel. In recent years, video solutions have become the standard for monitoring facilities, assets, and employees, and now these organizations require enterprise-class solutions that can help gather intelligent data that allows for enhanced security and safety efforts but also focus on processes that enhance operational efficiencies. Cyber-attacks are becoming increasingly more complex and sophisticated in the oil and gas market IT security is also a concern. Cyber-attacks are becoming increasingly more complex and sophisticated in the oil and gas market. An IT breach can cause operational havoc, risk to the public, and damage to an organization’s brand. Adopting a continuous improvement approach to a security strategy safeguards and helps protect valuable company information and reduces the likelihood of an incident. Also, collaboration between IT and physical security leaders and the correlation of both departments' data makes it much easier to identify a potential breach before havoc ensues. The Digital Age With the rise of the digital revolution and the demand for data to improve insight, oil and gas producers and businesses need to find new ways to capture data, correlate it as needed, and then leverage it to make the most informed decisions. Software platforms are being used in a wide variety of applications to provide a single pane-of-glass view that allows operators to gain critical insight into operations. By collecting intelligence from digital sensors, such as video surveillance cameras, open-source Web intelligence, building systems, crowdsourcing, weather sensors, mobile devices, and more, operators can detect potential risks and manage and respond to situations more efficiently. Furthermore, information can be shared easily with multiple agencies, employees, citizens, and first responders — especially valuable in the event of a safety incident where rapid response is paramount. By creating a single enterprise-wide view across disparate systems and technologies, organizations experience improved response times, lowered operational costs, and increased employee safety. Cyber, traditional security, digital devices, and situational awareness technologies combine to deliver an integrated, automated, and adaptive architecture to efficiently mitigate advanced threats in real time or forensically Traditional Command Centers Intelligent solutions, such as those derived from the idea of artificial intelligence, help organizations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command center technologies within the oil and gas industry, fusing critical data input from emergency calls and responder activity to enhance situational awareness. With traditional command centers relying mostly on call and radio updates, visibility can be limited, but new digital platforms enable operators to oversee a situation and engage with and direct the response force. Overall, these types of automated functions deliver a simplified and modernized operating environment. The Future Is The Intelligent SOC Oil and gas facilities can implement a proactive approach to safety and better mitigate threats and protect assets All of these digital solutions are designed to take center stage within the Intelligent Security Operations Center (ISOC). To combat advanced, multi-stage threats, oil and gas facilities are transforming the traditional SOC into the next-generation unified ISOC with an integrated platform for detection, investigation, communication, and response. Cyber, traditional security, digital devices, and situational awareness technologies combine to deliver an integrated, automated, and adaptive architecture to efficiently mitigate advanced threats in real time or forensically. Energy providers operate in challenging, fast-moving environments in which opportunities, requirements, and regulations can vary widely, change quickly, and evolve significantly over time. As the idea of the digital age continues to transform this market, new technologies will be more widely used to improve business operations from exploration and extraction to transportation and distribution. With the right technology, strategic partnerships, and enhanced situational awareness, oil and gas facilities can implement a proactive approach to safety and better mitigate threats and protect assets, while continuing to focus on achieving business goals that will sustain supply and demand for years to come.
AI Is currently a buzzword in the physical security industry, and it is also a force that has the potential to transform the industry. Following are the basics of AI (and the related term “deep learning") in part one of our AI series. Artificial intelligence (AI) is the broad computing category referring to intelligence that is displayed by a machine, as opposed to a living creature. Informally, AI refers to machines that mimic the cognitive functions we associate with living creatures, such as learning and problem-solving. Trends Driving Growth In AI Three trends in the computer industry are driving rapid growth in artificial intelligence. The trends are: Data capture form to appear here! Video surveillance data makes up 60 percent of Big Data, and the amount is rising 20 percent annually Emergence of computer hardware capable of solving complex calculations, specifically graphics processing units (GPUs, which use “parallel processing” instead of “serial processing” used by familiar central processing units [CPUs]). Multiple computations are carried out simultaneously, in parallel rather than in a series. It’s a more scalable approach: Large problems are divided into lots of smaller problems that can be solved at the same time. Development of programming approaches to “train” systems more effectively, specifically neural networks, which work in conjunction with the parallel processing of GPUs. A neural network is a computing system made up of numerous simple, highly interconnected processing elements, typically organized in layers, with each layer made up of interconnected nodes. As each layer computes a result, that result determines the input for the next layer. There may be more than a hundred layers, which enables processing of large amounts of data into complex classifications. A proliferation of sensors (including video cameras) that produce a large enough mass of data to enable systems to be “trained” effectively (a.k.a., “Big Data”). The proliferation of “Big Data” ensures there is plenty of data for training. Video surveillance data makes up 60 percent of Big Data, and the amount is rising 20 percent annually. This proliferation of data feeds artificial intelligence and increases capabilities for a range of systems. Training Of An AI-Powered System In a neural network operating on a GPU, learning rules modify the weights (importance) of connections; each layer has a different “weighting” that reflects on what was learned at the previous layer. When presented with a data pattern (such as a video image), the neural network analyzes what the pattern might be. Deep learning involves use of large amounts of data from which the system can “learn” in a neural network Training involves determining how far the initial answer is from the actual one and making appropriate adjustment in the connection weights. In highly simplified terms, that’s how the system “learns.” There are multiple stages of classification, almost like filters, with each guiding the path to a correct analysis. Deep learning is part of a broader family of machine learning methods and the concept that is most relevant to the video market. Deep learning involves use of large amounts of data (for example, video images) from which the system can “learn” in a neural network. Deep Learning In Video Surveillance Systems By being exposed to many instances of data, deep learning systems discern patterns and begin to generalizeThe interconnected processing elements of a neural network, working in parallel on a graphics processing unit (GPU) to solve a problem, are designed to mimic the human brain and its billions of interconnected neurons. This aspect of artificial intelligence, known as deep learning, is the basis for a new family of video surveillance systems offering superior performance to historic systems. This approach is poised to transform the effectiveness of video surveillance systems. Historically, computers have been programmed using video analytics algorithms. In contrast, deep learning systems are “trained.” If you want to identify a cat, you provide lots of images of cats, data which the system breaks down into smaller components and looks for commonalities. It then “learns” the common characteristics among the examples. To maximize training, the more data a system is presented, the more refined it becomes – i.e., the more it “learns.” By being exposed to many instances of data, deep learning systems discern patterns and begin to generalize. From Training To Inference Deep learning can achieve super-human pattern recognition accuracy, resist interference, and classify and recognize thousands of featuresWhile a computer programmer might spend months writing instructions to tell a computer what a car looks like, a neural network can “learn” by being exposed to many examples – no additional programming involved. But training a neural network is also time-consuming; it might take hours or days to complete. Training is also computationally intensive. However, once a neural network has been trained, it can be used to “infer,” for example, to decide whether a new image is a cat. Inference is less computationally intensive, which enables deployment of trained systems on devices such as network video recorders (NVRs) or even in video cameras at the network edge. Deep learning can achieve super-human pattern recognition accuracy, resist interference, and classify and recognize thousands of features. Those qualities make it especially useful for video analytics applications. Part two coming soon.
Security is arguably at the heart of the United States partial government shutdown: President Trump’s demand for $5.6 billion to start building a wall along the southern border with Mexico is the major bone of contention as gridlock in Washington prevents passage of a spending bill to keep the government in full operation. The partial government shutdown has affected security in other ways, too, and some of the impact could continue long after the impasse is settled. Some 800,000 federal employees are impacted, some on full or partial leave as a result of the shutdown and others working without knowing when they will get paid. Cybersecurity Initiatives Delayed Furloughed federal employees tasked with cybersecurity are not on hand to address the constant threat to government IT systems from possible hackers and other bad actors. In fact, hackers may decide the government shutdown is a vulnerable time to launch an attack. Data capture form to appear here! Hackers may decide the government shutdown is a vulnerable time to launch an attack Specifically, the new Cybersecurity Infrastructure Security Agency, launched last fall, is operating with a skeleton staff. If the shutdown encourages cybersecurity experts to seek other employment, the resulting drain of “knowledge capital” could be a lasting detriment. New cybersecurity initiatives are also being delayed, such as the 21st Century Integrated Digital Experience Act, aimed at creating a baseline of security defense across government web sites. Some government websites have had their Transport Layer Security (TLS) encryption certificates expire during the shutdown. Impact On TSA Agents Although Transportation Security Administration (TSA) agents remain on the job at major airports, they will not be paid again until after the shutdown is over. The resulting negative impact on morale has arguably slowed down airport security operations, although airports have not reported any major problems. In addition, some agents have called in “sick” and/or sought other employment to provide income during the shutdown. In the Dallas-Fort Worth airport, the number of agents calling out sick reportedly increased by 200% to 300%. The absences can aggravate existing TSA staffing shortages. Impact On Border Protection Agents Customs and border protection agents are also on the job with no assurance of when they will be paid. Other immigration agents in the Department of Homeland Security are also currently without pay. Hearings on immigration cases are being canceled, which can result in a large backlog to be addressed after the shutdown ends. Customs and border protection agents are also on the job with no assurance of when they will be paid What About Worker Documentation? A consequence of the shutdown is unavailability of the government’s E-Verify system, which is used to verify a worker’s immigration status prior to being hired by an employer. During the lapse in government appropriations, employers will not be able to access their E-Verify accounts, create an E-Verify case, edit company information, terminate accounts, run reports, etc. Long-Term Impact On Government Employment The longer the shutdown continues, the more employees will be encouraged to seek work elsewhere The shutdown may lead federal employees to seek work in the private sector, where their paycheck is not likely to be delayed because of a political impasse. The longer the shutdown continues, the more employees will be encouraged to seek work elsewhere, whether on a temporary basis or as a permanent alternative. Manpower shortages can translate into security risks. Trump has argued for funding of the border wall on security and humanitarian grounds and has sought to put pressure on newly empowered Democrats. However, adding physical barriers at the border is only part of the solution to border security, says the conservative Heritage Foundation. Also needed are improved technology to monitor the border and appropriately equipped border patrol agents. Holistic Approach To Border Security This holistic approach of combining barriers, technology, and people is the cost-effective way to secure the border, says Heritage Foundation. It’s also important to enforce immigration laws, and border security does nothing to stop visa overstays, another source of illegal immigration. The Democratic opposition has said Trump’s urgent call to build the wall is a “manufactured crisis,” and the wall would be “immoral” and “ineffective.” Weeks into the impasse, there is no end in sight.
A rapid string of merger and acquisition (M&A) transactions as 2018 passed into 2019 suggests the physical security industry may be on the verge of a busy year of companies buying other companies. Observers have noted a large amount of investment capital currently available to be invested in security M&A, and plenty of entrepreneurial companies are looking to be acquired. Joe Grillo, CEO of ACRE, previously hinted at upcoming M&A activity for his company by the end of 2018, foreshadowing ACRE’s late-year announcement to acquire access control company Open Options, Addison, Texas.The VaaS cloud-based image capture platform includes fixed and mobile license plate reader cameras driven by machine learning Just days later, in the midst of the holiday season, Qognify announced its plan to acquire On-Net Surveillance Systems Inc. (OnSSI) and sister company SeeTec GmbH. Then came an even larger announcement: Motorola has acquired VaaS International Holdings Inc., a data and image analytics company for $445 million. The VaaS cloud-based image capture and analysis platform includes fixed and mobile license plate reader cameras driven by machine learning and artificial intelligence. Most recently, ADT announced yet another acquisition, Advanced Cabling Systems, a technology integration company in the South, thus continuing consolidation on the integration side of the business. There are likely to be further mergers and acquisitions in the video surveillance supply base in 2019 Continuation Of The Trend In the case of the Qognify and Motorola deals, Jon Cropley, Principal Analyst, Video Surveillance & Security Services, IHS Global Limited, sees them as the next chapter in an M&A trend going back several years. “I think this is a continuation of what we have been seeing in recent years of video surveillance software vendors being acquired,” he says.In the face of intense price competition, vendors have found it increasingly difficult to compete based on hardware features" “In the face of intense price competition, vendors have found it increasingly difficult to compete based on hardware features and are looking at software to offer unique competitive advantages.” In short, he sees it as a continuation of a trend that previously saw Canon acquiring Milestone Systems and Briefcam, Panasonic acquiring Video Insight and Tyco acquiring Exacq. “There are likely to be further mergers and acquisitions in the video surveillance supply base in 2019,” adds Cropley. “However, a spree of large-scale mergers and acquisitions is not expected.” Memoori, another market research firm, forecasts that the value of acquisitions could actually decline marginally in 2019 in value terms but increase in number. This observation is based on Memoori’s charting of physical security deals over the last 18 years. Jim McHale, Managing Director of Memoori, says there have been four cycles of increase and decline in activity, often exaggerated by billion dollar deals in one year such as the merger of Johnson Controls and Tyco of $165Bn in 2016. Access control when combined with identity management is punching well above its weight, and this trend has continued Access Control To Open Systems Only time will tell whether the new year pattern of M&A activity is a coincidence or a harbinger of a busy M&A year ahead“It may be too early to make judgements on the future based on the last four weeks, but there are some interesting points that can be made when compared with our 2018 analysis,” says McHale. “Access control when combined with identity management is punching well above its weight, and this trend has continued. "Acre has been a major contributor and has completed some 10 acquisitions. In general, the access control business has been slow to move to open systems, and hopefully we can expect this trend toward openness to continue as it will give additional growth to the business.” For more commentary from Memoori, see their report “Major Trends in the Global Access Control Market 2018”. Only time will tell whether the new year pattern of M&A activity is a coincidence or a harbinger of a busy M&A year ahead. While past trends may provide a glimpse of what’s coming, there are always new variables. It’s a sure bet the overall trend toward consolidation will continue but predicting the pace and timing of individual transactions is almost impossible. In any case, it will be interesting to watch how 2019 unfolds on the M&A front, among other factors in a changing industry.
Most retailers invest in a video surveillance solution to improve security. Many also use it as an investigation tool to help resolve customer disputes, liability claims and reduce losses from theft and fraud. Intelligent Video Solutions Complete Releaf relies on its intelligent video solution for all of those reasons, however compliance with state regulations was the primary objective when CEO and owner Eric Ryant started looking for a video system for his new, 3,000 square foot cannabis dispensary in Lafayette, Colorado. Unlike many other types of retail environments, cannabis dispensaries must comply with strict rules governing the type of video surveillance equipment used, where cameras and equipment are placed, and how long video evidence must be retained. Already familiar with the regulations based on his experience operating a second dispensary and a cultivation center in Lafayette, Colorado, Ryant sourced multiple bids for his new video solution. In the end, I selected the March Networks proposal. It had everything I was looking for, including POS integration, and additional capabilities" POS Integration “Once all the bids were in, I went through the process of analyzing each one and ended up narrowing the contenders down to two,” said Ryant. “In the end, I selected the March Networks proposal from our systems integrator, Falcon Networks. The solution had everything I was looking for, including POS integration, and additional capabilities I thought might be useful down the road. It met all of the compliance criteria, and the price was comparable.” Prior to opening the boutique dispensary in January 2018, Ryant worked with its system integrator to design and install a fully-compliant video solution. IR Dome Cameras Today, IR dome cameras mounted inside the dispensary capture clear 4MP video of all activity at entrances and exits, in storage and equipment rooms, and at each point-of-sale (POS) system. In addition, 360° cameras are installed above the sales floor and in every corner to provide further panoramic coverage. The 360° cameras are also installed on the dispensary’s exterior to capture people entering and exiting, as well as any activity in the surrounding parking lot and back loading area. The cameras were selected and placed strategically to ensure that the system meets multiple legislated requirements, such as recording all activity occurring within 20 feet of any ingress/egress point, capturing clear video in all lighting conditions, and making sure that the recorded video is sharp enough to identify customer and employee facial features at each POS. Hybrid Network Video Recorder At the center of Complete Releaf’s video solution is a hybrid network video recorder (NVR) At the center of Complete Releaf’s video solution is a hybrid network video recorder (NVR). The recorder provides IP and analog video capture and unparalleled reliability through features such as diagnostic LEDs, an internal battery backup, and a customized embedded Linux operating system. All IP channel licenses are included with the recorder, making it a convenient and cost-effective option for the dispensary. Equally important, the recorder provides Complete Releaf with 32TB of internal storage, so it is compliant with the state’s 40-day video retention requirement. “Essentially, we need 100 percent coverage with no ‘blind spots’ on our retail floor, and a clear picture of people’s faces. It’s a truly reliable product, and we’ve had no difficulties achieving our 40 days of archived video,” said Ryant. Searchlight Intelligent Software While security and compliance were both top priorities for Ryant, finding a video solution that would also help him run Complete Releaf more efficiently – and profitably – was also important. That’s why he’s so pleased with the March Networks Searchlight for Retail application software he is also using. The intelligent software enables Ryant and his team to proactively identify and review suspect transactions using integrated video and transaction data pulled from the dispensary’s Green Bits POS system. It provides them with an easy-to-use loss prevention tool that reduces the time it takes to investigate incidents from hours to minutes. It also arms them with strong video and data evidence to support successful prosecutions or recoveries. Ryant is also testing the Searchlight application in his cultivation facility “Having video surveillance in our dispensary definitely deters theft,” said Ryant. “Combining the video with transaction data goes a step further and really causes people to think twice before they do something they’ll probably regret.” Radio Frequency Identification Tags Ryant is also testing the Searchlight application in his cultivation facility, taking advantage of the software’s ability to integrate with data from the Radio Frequency Identification (RFID) tags he is required to add to each plant through the cultivation process as part of Colorado’s Inventory Tracking System (Metrc). The software would enable Ryant to leverage his RFID investment by making the data searchable in the dashboard and tying it to recorded video. If there’s ever an incident during the cultivation process, Ryant could use the software to easily locate the video footage to see what actually happened and who was involved.
Security installation specialist Vision Security Services installed Vanderbilt’s ACT365, a cloud-based access control and video management system, at Work.Life, a co-working and private offices facility in London Fields, east London. ACT365 solution was implemented late in the construction stage, as initially, the client had used a conventional system, before realizing late-on the benefits available from cloud management. Essentially, the client needed unified management of access points and video, both locally and remotely. It was for these reasons that ACT365 was chosen for the task. Remote Monitoring Capabilities ACT365 allows the system user to activate doors and analyze their status from any major web browser or the ACT365 appImportantly, ACT365’s remote monitoring capabilities deliver a force that gives business owners far greater visibility and control of their property. For instance, at the London Fields site, ACT365 allows the system user to activate doors and analyze their status from any major web browser or the ACT365 app. This allows Work.Life to make immediate remote adjustments to a user’s details, including updating access privileges when a lapsed membership is renewed. Crucially, ACT365 can also generate muster reports during a building evacuation, with marshals being able to see instantly from their phone or smart device if members have mustered out. Again, this function can be used remotely if required. Controlling Doors Through Smartphone Devices Vision Security Services operates as an integrator across access control, video surveillance, intruder alarms and barrier systems across the south of England and London from a base in Sittingbourne, Kent. Commenting on the installation of ACT365, Reg Butler, Director of Vision Security Services, stated: “There are very few true cloud-based access control solutions, and the ability of Vanderbilt’s ACT365 to synchronize access control events instantly to camera footage from a single platform means no time is wasted searching through video. Vanderbilt’s ACT365 appeals to our end-users regarding functionality and price point. They also appreciate being able to view sites and even open and lock doors based on what they see on a camera feed, all from a smartphone or web browser.” Protecting People And Assets During Emergency ACT365’s real-time management enables the kind of flexibility that system users need to instantly protect people and assets in the event of an emergency Overall, ACT365’s real-time management enables the kind of flexibility that system users need to instantly protect people and assets in the event of an emergency. Essentially, ACT365’s remote monitoring feature puts business owners first by eradicating once heavy responsibilities that can now be promptly completed through the click of a button on smartphone or desktop devices. This gives business owners convenience through simplicity. As explained by Ross Wilks, Head of Marketing Communications at Vanderbilt: “ACT365 deals with convenience. It deals with things that are at the heart of customer pain points. Vanderbilt has always looked to invest in technology that will match our values of agility, flexibility, and dependability. "Products like ACT365 excel with these criteria. ACT365’s distinguishing characteristics deliver information rapidly, cost-effectively, and can be upgraded with the latest features as and when they become available.”
Technology company Nedap has provided physical access control and long-range readers for vehicle identification at the new AZ Zeno medical care center in Knokke-Heist (Belgium). AZ Zeno, which opened in April 2018, consists of a hospital with rehabilitation center, an outpatient clinic, auditoria, public event space and a heliport. Nedap Identification System and Nedap Security Management have worked together on this extensive project. It is AZ Zeno’s highest priority to guarantee the security of patients and employees. With Nedap’s TRANSIT long-range identification readers, emergency vehicles get swift access to the hospital’s premises. Physical Access Control AZ Zeno combines functionality and sustainability and respects the rural character of the local landscapeWith AEOS, Nedap provides the medical care center with a complete solution for physical access control, and the system will also be used to manage staff lockers. By combining Nedap’s solutions, AZ Zeno is able to offer both patients and employees the best possible security and accessibility. AZ Zeno combines functionality and sustainability and respects the rural character of the local landscape. The link between inside and outside and between medical facilities and public spaces is almost seamless. And the center’s sustainable design focusses on its surroundings, ecological energy and the use of reclaimed materials. Better Accessibility Nedap-CEO Ruben Wegman: “We are proud that two of our business units contribute to the security of this exceptional and innovative center and to a better accessibility for its users. The simultaneous implementation of AEOS and TRANSIT is a great example of the complementary character of Nedap’s products.” To implement the system, Nedap collaborated with partner Electro Enterprise Gullegem.
The University of Birmingham educates over 30,000 students, with more than 6,000 doors providing access to student accommodation. Gallagher’s integrated access control solution is responsible for providing operational continuity and creating a safe and secure environment for students. Access Management System The University recently completed its new state-of-the-art student accommodation development, Chamberlain, which consists of a 19-storey tower and three low-rise blocks. An essential requirement was an integrated access control system, reducing the need for keys. Timothy Owen, General Manager of Student Accommodation at the University says, “We wanted to move away from using keys as students are prone to losing them and trying to manage thousands of locks and associated keys was a constant administration and financial drain.” We need to maintain control over access to our buildings, while ensuring a duty of care to our residents and staff" In order to minimise the complexity of managing a new system, the University required a solution that integrated with, or was an extension of, their existing campus access control and accommodation management systems. “We need to maintain control over access to our buildings, while ensuring a duty of care to our residents and staff so that they can go about their business as required,” says Timothy. “Fundamentally, we needed a system that gives both us and our resident’s confidence in the security of the accommodation.” Adaptable Access Solutions A large and complex estate with buildings of different construction and age, the University needed a solution that was flexible enough to accommodate their unique requirements. Gallagher Command Centre, together with the Aperio® wireless locking technology by ASSA ABLOY Access Control, was selected as the University’s preferred choice, meeting their security needs in a cost-effective way while still delivering to the overall specification. Timothy says, “The completion of our new state of the art Chamberlain development was extremely close to the date of the first student arrival, so the team had to be dedicated and work flexibly to ensure it was ready in time – which it was.” Improved Student Experience The Gallagher Command Centre integration allows for the access key and student ID to be combined in to one card, offering a number of benefits to both students and staff. The student ID and accommodation key is encoded on to one card, so it can be posted out in advance and access to the room automatically granted" Previously the accommodation arrival process required students to arrive at the University with their contracts and queue up so that a member of staff could sign them in manually and hand them the keys to their accommodation. From there students could head to their room. “Arrivals is always a busy time but with the help of the Gallagher solution we’ve not only improved the student experience but also the administration process,” says Timothy. “Now the student ID and accommodation key is encoded on to one card, so it can be posted out in advance and access to the room automatically granted via the accommodation management system. Students no longer need to queue for keys, can get to their rooms instantly, and spend more time enjoying their arrival experience.” Monitoring Access Cards The simple act of swiping an access card automatically checks the student in and a report can be generated to show who has arrived and who hasn’t, allowing staff to follow up accordingly. If the room is no longer required it can be quickly and easily re-allocated to another student, resulting in improved occupancy rates. Using Gallagher Command Centre together with the University’s accommodation management system allows staff to check on the well-being of students by monitoring the use of their access card. The University also houses students under the age of 18, and one of the safeguarding requirements is that the University can monitor their whereabouts on a daily basis. Timothy adds, “This can be difficult to achieve with many students to track, but Gallagher Command Centre can easily confirm the time and location of our resident’s last door access, providing peace of mind that students who may be uncontactable are in fact on site.” Replacing keys with a combined access and student ID card has reduced our operational costs" Creating Business Value University staff are also seeing positive improvements since the installation of the new system – particularly at the start of the year. The arrivals process is now less congested and more relaxed. The team have far fewer issues than with physical keys, enabling them to spend more time on the overall student experience. Since the installation of the first 800 bedrooms at Chamberlain, the University has already extended the system by a further 900 at Mason, with plans in place for an additional 1500 bedrooms this summer. Enduring Partnerships “Replacing keys with a combined access and student ID card has reduced our operational costs as we now have far fewer keys to purchase and store,” explains Timothy. “The student experience has improved, and staff are now free to deal with urgent matters and offer a more personal service. We can easily create reports to help us audit access and have generally provided a much more modern and secure place to live and work.” “The University has worked with 2020 Vision Systems for some time on CCTV and access control systems, so when they won the tender to provide and install the Gallagher and Aperio® systems we had every confidence that they would be able to deliver. The completion of our new state of the art Chamberlain development was extremely close to the date of the first student occupation and so the team had to be dedicated and work flexibly to ensure it was ready in time – which it was.”
Knightscope, Inc., a developer of advanced physical security technologies focused on enhancing U.S. security operations, announced that it is has taken a major step in its commitment to help better secure schools across the country by selecting Clovis Unified School District in California as its beta testing location for a suite of new technologies under development. The Company had prior announced this effort earlier this year when it solicited students to get involved and submit essays on how Knightscope’s fully autonomous security robots could help in a school setting. Security Robots To Monitor School Safety “With over 100,000 schools in the country, we need to develop a new set of tools and technologies as a critical part of our long-term mission to better secure the United States of America,” said William Santana Li, chairman and chief executive officer, Knightscope, Inc. Knightscope’s robots will provide the authoritative presence needed on a school campus and provide actual intelligence by filling in the blind spots" “Being able to utilize a real-world environment to test, sample, and iterate on new capabilities while inspiring students to pursue STEM careers is certainly a winning combination,” continued Li. “As a teacher of thirty years, my philosophy has always been to be proactive instead of reactive, and the idea of security robots monitoring a school is definitely a proactive approach to school safety. Knightscope’s robots will provide the authoritative presence needed on a school campus and provide actual intelligence by filling in the blind spots with their ‘eyes and ears,’” said Clifford A. Nitschke, Jr., AP United States Government and Politics Instructor, Clovis North High School. Trialling A New Technology In School Safety Mr. Nitschke’s class submitted the winning proposal to Knightscope. “We are honored to be chosen by Knightscope and to be given the opportunity to pilot a new and exciting technology in the field of school safety.” The Clovis United Unified School District Governing Board is scheduled to meet on January 16, 2019 to formally accept the beta testing program by Knightscope. The meeting is planned to occur at 6:30pm at the Clovis Unified Professional Development Building, 1680 David E Cook Way, Clovis, CA 93611. Assuming an approval by the Board, the parties will determine implementation timing thereafter.
ASSA ABLOY Access Control, a UK division of ASSA ABLOY, the provider of door opening solutions, has partnered with NetNodes to deliver assured and secure access to a huge new innovation center in London. Based at Queen Elizabeth Olympic Park, Plexal is a new £15 million project, acting as a base for an ‘innovation community’ that brings together startups, enterprises and academics all under one roof. Plexal sits within the larger Here East complex, which is transforming the former press and broadcast centers for the London 2012 Olympics Games into new spaces for technology companies, universities, startups and creatives. Aperio Technology Integrated With DoorFlow In total, 59 Aperio L100 wireless high-security door locks were installed across the siteThe innovation hub has been fitted with Aperio wireless, access card-based locking technology, which is fully integrated with DoorFlow, an online platform for managing and auditing building access created by NetNodes. In total, 59 Aperio L100 wireless high-security door locks were installed across the site. These lock solutions provide Plexal with the highest levels of physical protection and transmit comprehensive information on door status to DoorFlow in real time. A further 31 HiD R10 mobile access locks were also provided where wired solutions were necessary, such as for the main office entrances, and for elevators. For organizations looking to invest in a new access control system, Aperio is an effective, straightforward alternative to a wired, high-end solution. It was installed quickly and easily at the Plexal site without cabling, and will drastically reduce the innovation hub’s maintenance costs and energy consumption going forward. Cost-Effective Security Upgrade Aperio can upgrade existing mechanically locked doors and wirelessly connects them to new or existing access control systemsAperio can also upgrade existing mechanically locked doors and wirelessly connects them – online or offline – to new or existing access control systems. This can be achieved with minimal modification to doors and premises, offering a cost-effective and simple security upgrade. John Herbert, Facilities Manager at Plexal, said: “What really appealed to me about ASSA ABLOY Access Control’s products was the aesthetics. We have a futuristic-style open plan design here at Plexal – our offices are predominantly glass-fronted, so we needed an effective stylistic design which was not only robust but adaptable too. We foresee change in the not-too-distant future and are delighted at our options to modify.” Discreet And Adaptable Locking Solution Stewart Johnson, Director at NetNodes, explains: “Aperio offers a hardware solution that is well-suited to our online platform, DoorFlow. Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install Aperio with minimal disruption. We are delighted to partner with NetNodes to deliver an easily integrated access control system for this new innovation center in central London"“The open-plan layout of the space and the high glass doors installed throughout the site meant Plexal needed an access control solution that was discreet and adaptable, with Aperio perfectly meeting these demands. Should any additional doors need to be added to the system in the future, this can be done easily, without modifying or changing the aesthetics of the environment. This also minimizes future installation costs, offering a cost-effective and straight-forward access control upgrade.” Integrated Access Control System David Hodgkiss, National Sales Manager for ASSA ABLOY Access Control, adds: “We are delighted to partner with NetNodes to deliver an easily integrated access control system for this exciting new innovation center in central London. With up to 800 entrepreneurs using the space to devise, create and launch new products and services, Plexal required a solution that was tried and tested. Aperio enables easy access around the site while providing assured security. “Aperio is a fantastic hardware partner to door security software, such as NetNodes’ DoorFlow. It has been great to work with NetNodes on this project, and we expect to work together on many more successful installations in the future too.”