HID Global, a pioneer in trusted identity solutions, announced that it is collaborating with VMware to drive mass adoption of cellphone access to digital and physical places by adding HID Cellphone Access for opening buildings and doors to VMware Workspace ONE, an intelligence-driven digital workspace platform for managing any app on any device. The collaboration will make it possible for Workspace ONE users, for the first time, to more securely open doors with their smartphones as part of a un...
Penetration testing of physical security systems is used to evaluate if a company’s security measures operate as intended. From a technology angle, penetration testing (pen testing) assesses whether the totality of the systems operate as designed, rather than testing each individual component. Does the system work with the officers, the policy and procedures that are in place? A session at ISC East, Nov. 20 in New York, will address the need for and benefits of penetration testing (also k...
Tools such as standard operating procedures (SOPs) and checklists ensure that every factor is considered when installing a physical security system – or do they? Security system installations are detailed projects, and any overlooked detail is a missed opportunity to make the system better. We asked this week’s Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?
As an innovator in certified physical security for asset protection, Technocover will be demonstrating the depth and breadth of its LPCB approved steel systems for the hardening of every type of site against unauthorized access. The Mid Wales-based expert in turnkey high security, including UltraSecure doors, access covers, enclosures, access control and accessories, will be participating in LPCB’s highly anticipated Live Lab over the two days of the show. Visitors will be able to view th...
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional...
CNL, global provider of Physical Security Information Management (PSIM) software and solutions, is pleased to announce that it has been awarded the 2019 Technology Partner of the Year by Edge360, internationally renowned designer, developer, manufacturer and integrator of intelligence-based public safety technologies and solutions for federal, state and local governments, as well as commercial and private organizations. The award recognizes CNL’s excellence in innovation and implementatio...
Ping Identity, a pioneer in Intelligent Identity, announces an expansion of its Northern European operation with the opening of a new office in Utrecht, Netherlands. The growth of the identity market has been rapid across Benelux and Scandinavia, and Ping Identity continues to drive attention to the importance of identity security in the cybersecurity landscape, as well as support for its local clients and channel partners. Providing secure access to applications The Ping Identity ecosystem in Northern Europe includes a variety of partners ranging from security specialists such as Arctic Group, Intragen and Traxion, to large scale systems integrators. Additionally, customers including ABN AMRO and Wolters Kluwer leverage Ping Identity’s solution to provide secure access to applications. “Ping Identity is a strategic partner for us in the security space and we appreciate the commitment it has shown to support our technical needs within the region,” said an identity and access management professional with ABN AMRO. “We look forward to working closely together to deliver secure access that uses identity intelligence to detect and block cyberattacks, prevent security breaches and meet regulatory requirements.” Excellent delivery support to the customers "Our partnership with Ping, which combines its vendor technology and our consultancy expertise, has enabled excellent delivery support to our customers in their infrastructure and security projects," said Ian Yoxall, co-founder, Intragen. "The customer demand for easily integratable, standards-based technology—whether in the cloud or on premises—means Ping Identity solutions are ideally suited. We're thrilled to see Ping's expansion and continued commitment in the region." “Traxion has implemented Ping Identity solutions for customers for many years. What we like about Ping Identity is the ease of implementing complex use cases and especially the scalability of its solutions. The combination of the quality of Ping’s products and Traxion’s skilled team create happy and successful customers,” commented Erik de Jong, founder and chief technology officer, Traxion B.V.
DigiCert, Inc., the provider of TLS/SSL, IoT and PKI solutions, announces that private equity firms Clearlake Capital Group, L.P. (‘Clearlake’) and TA Associates have completed their previously announced investment in DigiCert. Terms of the deal are not being disclosed. “DigiCert is excited to work with Clearlake and TA Associates as our new lead investors, and to continue our leadership in providing the best TLS/SSL products and solutions, focused on improving and automating certificate management,” said DigiCert CEO John Merrill. “We are confident in our vision for growth and the increasing value we’ll bring to our customers.” Capitalize on new growth initiatives TA Associates made its first investment in DigiCert seven years ago. “TA has had a front-row seat to DigiCert’s impressive rise as the industry leader in its space, and we look forward to continuing to work closely with the management team to invest in and support DigiCert’s innovation and growth efforts,” said Jason Werlin, a Managing Director at TA Associates. “DigiCert has a unique opportunity to capitalize on new growth initiatives that we believe will help them better serve their customers and their industry. DigiCert has an exciting business and a compelling vision for internet security based on the company’s legacy of innovation and roadmap for building trust in identity and digital interactions,” said Behdad Eghbali, Co-Founder and Managing Partner, and Prashant Mehrotra, Partner, of Clearlake. Integrity and identity for the IoT DigiCert leads with its certificate-based encryption, authentication, integrity and identity for the IoT “We are ready to leverage Clearlake’s O.P.S.® framework to help the company to continue to build upon its product offerings for customers and fuel new growth through organic investments and acquisitions.” DigiCert has a history of industry leadership, including being the first certificate authority to provide post-quantum cryptography for digital certificates, the first to launch an independent log for Google Certificate Transparency, and the first to offer TLS for the TOR browser. The company’s award-winning certificate management platform, DigiCert CertCentral®, automates the tasks of certificate issuance, renewal, discovery and remediation, with features including ACME protocol. DigiCert also leads with its certificate-based encryption, authentication, integrity and identity for the IoT. The company operates PKI for enterprise authentication and many IoT device industry consortia and manufacturers, and has issued billions of device certificates to-date. DigiCert is also developing solutions in related emerging technologies, such as blockchain.
Cobalt Iron Inc., a provider of SaaS-based enterprise data protection, announces Cobalt Iron Compass™, the new name for its flagship SaaS-based enterprise data protection platform. The new name signifies the immediate insights and guidance the company delivers to its customers. With the renaming, Cobalt Iron kicks off a new phase of growth for the company and a new level of innovation for the platform. Previously known as Adaptive Data Protection, Compass is the full software stack of Cobalt Iron technologies that allows enterprise data managers to save time and money while increasing their data protection and performance. Analytics-Driven data management capabilities Cobalt Iron has delivered significant improvements to the platform, grown its high-performing team With this proven platform, data custodians can implement the right solution to fit their unique business needs, and they have access to a range of analytics-driven data management capabilities through a unified web user experience. Renaming its flagship platform is the first step in a series of updates from Cobalt Iron as the company continues expanding its capabilities. In the past 12 months, Cobalt Iron has delivered significant improvements to the platform, grown its high-performing team, and taken on strategic partnerships that have allowed it to deliver increased value to the enterprise data protection market. The components of the platform remain the same. Today, Compass includes four product components: Commander, Analytics Engine, Accelerators, and Accelerator Operating System. Enhanced cloud platform and application protection In the next 12 months, Cobalt Iron will roll out version enhancements and accelerate company growth to meet market demands and exceed customer expectations. The next version of Compass will contain new capabilities such as enterprise search, which will enable users to perform centralized searches and identify where objects exist across the enterprise. These enhancements will deliver improved technology features for VMware, Hyper-V, and cloud providers This new release will also have enhanced virtual environment support as well as enhanced cloud platform and application protection. These enhancements will deliver improved technology features for VMware, Hyper-V, and cloud providers. Cobalt Iron will also expand the Compass technology integrations with a wider portfolio of data protection features and functions to help customers make better use of their investments. Simplified migration experience Finally, users will see a simplified migration experience that reduces the timeline and complexity of data migration and fully enables them to decommission their legacy backup systems and infrastructure. "Cobalt Iron provides Compass as the way to navigate through the complexity of data backup and recovery while meeting all the business outcomes the enterprise requires," said Andy Hurt, chief marketing officer of Cobalt Iron. "Defining our platform with the name 'Compass' marks a milestone for us as a company and as a technology leader in the industry. The name reflects our commitment to empowering companies to improve their data protection outcomes. What is more empowering than a tool that points you in the right direction?"
BCDVideo announced the landing of the company’s 100,000th video surveillance recording appliance. The pioneer in video data infrastructure and appliances for the physical security industry is celebrating 20 years in the computer industry, with over a decade in the video surveillance arena. The multinational hardware manufacturer currently records video in 75 countries worldwide under the BCDVideo brand, as well as through over 30 OEM software and camera partners, for whom they private-label systems. The 100,000th system installation was a Genetec™ StreamvaultTM video appliance which will be used in the management of surveillance at an enterprise customer site in the United States. BCDVideo is trusted in purpose-built video surveillance recording appliances and infrastructure. The company’s innovative video surveillance solutions portfolio includes IP video recording servers and storage, revolutionary Hyperconverged Infrastructure (HCI-VS), and network architecture. “We are proud to provide innovation to some of the most influential names in the security industry. This mutual brand trust allows us the partnership to provide and record the video surveillance at marquee companies all over the world.” says BCDVideo’s Chief Executive Officer Jeff Burgess. CRN Magazine named BCDVideo one of North America’s top Technology Solutions Providers and Inc. Magazine designated BCDVideo as one of the ‘fastest-growing private companies’ in the U.S. Also in 2019, the company was honored in as one of the “Best Places to Work in Illinois.”
ShotSpotter, Inc., a pioneer in solutions that help law enforcement officials identify, locate and deter gun violence, announced that the U.S. Patent and Trademark Office (USPTO) has granted ShotSpotter U.S. Patent No. 10,424,048 entitled “Systems and Methods Involving Creation and/or Utilization of Image Mosaics in Classification of Acoustic Events”. ShotSpotter’s real-time gunshot detection solution uses a two-step process that employs both machine classification and human review. The system is able to distinguish with high accuracy whether a loud, impulsive sound detected by its acoustic sensors is a gunshot or a non-gunshot incident, such as fireworks, in less than 60 seconds. The innovation behind this 33rd patent granted to ShotSpotter covers the conversion of multiple features of the audio event into a set of visual displays that are combined into a single image mosaic. This enables the system to leverage “deep learning” neural networks that typically identify and classify images, not sounds. Innovation in AI efforts We continue to advance our solutions so that our customers are provided best gunshot detection solution” Since its implementation, this approach, along with the ability to train the system using ShotSpotter’s proprietary database of over 14 million gunshot and non-gunshot incidents, has resulted in significant improvements in machine classification accuracy. Events that are machine-classified with high confidence as non-gunshots can now be excluded from the human classification step. This allows more focused expert review of probable gunshots in ShotSpotter’s Incident review Center (IRC) prior to notifying patrol officers digitally about the gunfire incident location. Additionally, the company expects to benefit as its customer base grows by being more efficient in the staffing of the IRC. “Despite having no direct competitors for our wide-area municipal gunshot detection service, we continue to invest in R&D to extend our platform and improve the associated technology. This patent represents another important innovation in our AI efforts,” said Ralph A. Clark, President and CEO of ShotSpotter. "We will continue to advance our solutions so that our law enforcement customers are provided the highest-quality gunshot detection solution to help keep their communities safe.”
PerpetuityARC Training, part of Linx International Group announces that security management professionals operating in Dubai and the wider UAE, will have the opportunity to train for the internationally recognized ASIS Certified Protection Professional (CPP®) accreditation, when it runs its renowned five-day intensive bootcamp from 3rd to 7th November 2019. ASIS International is an organization for security professionals and its CPP® qualification is widely acknowledged at the ‘gold standard’ for security management professionals. Exam preparation courses PerpetuityARC Training’s five-day bootcamp provides those with nine or more years’ experience (seven with a bachelor’s degree or higher) and three of which have been spent in a security management function, with a fast track to attaining the coveted qualification. 98% of learners who took one of its CPP® or PSP® courses went on to pass their ASIS exam at the first attempt PerpetuityARC Training is proud that in 2018, 98% of learners who took one of its CPP® or PSP® exam preparation courses went on to pass their ASIS exam at the first attempt. Sarah Hayward-Turton, Sales & Marketing Director at the Linx International Group comments: “It is our experience that employers who are recruiting for senior security roles are increasingly mandating that candidates have the CPP® post-nominal.” Security principles and practices Sarah adds: “The PerpetuityARC Training five-day bootcamp is the best way for those aspiring to take the next big career step, to pass this challenging test of their security management knowledge, hopefully at the first attempt, and prove their competency.” Through a process of mock examinations, discussions and feedback sessions with expert tutor, Colin Myers (who himself has successfully completed the CPP®), bootcamp participants will be ready to take the CPP® exam, which comprises up to 225 multiple-choice questions on seven broad domains of security management - security principles and practices; business principles and practices; investigations; personnel security; physical security; information security and crisis management.
Growing up, I was surrounded by the military way of life as my father was a Captain in the Marine Corps during the Vietnam War and my grandfather and uncles all served in the military. Even from a young age, I knew I was going to serve our country. My 22-year career in the military includes serving in the United States Air Force, the California Air National Guard and as a reservist assigned to an active-duty Air Force unit. Training and development operations Over the course of my military career, I held a variety of assignments from starting out as a Gate Guard to becoming a Flight Chief and Non-Commissioned Officer in Charge (NCOIC) of a Security Forces section. I retired from the military as a Master Sergeant. After my deployment to Afghanistan, I joined Allied Universal as a security director. My 17-year career at Allied Universal encompasses roles including Service Manager and General Manager at the West Los Angeles Branch and leading the Training and Development operations and Fire Life Safety Division. In 2008, I was tasked to develop and implement the company’s Healthcare Division. Attaining meaningful employment opportunities Below are just a few reasons why the physical security sector is a natural fit for military veterans: Self-Discipline and Organization Coveted in Security Sector - I believe that the skills learned in the military, such as self-discipline and organization, have provided the necessary tools to be successful. I truly enjoy working with other veterans at my company as we all know that we can count on each other to get the job done right. This bond and sense of commitment to each other is always there. Multi-faceted Career Paths Available - The security sector also offers veterans the ability to attain meaningful employment opportunities with multi-faceted career paths. A veteran’s background and experience are highly valued in this sector and there are many positions to match our skill sets and expertise. The responsibility we have for those in our charge is really not any different than what we have learned in the military. Team Players - Teamwork is a lesson all military veterans learn. In the military, you live and work together, and are taught to support your team members and efficiently collaborate with the people around you. This is an invaluable skill in the security sector whether you are seeking an entry level or management position. No Military to Civilian Decoder Needed - Veterans need a ‘military to civilian decoder’ system to help explain the significance of their military skills and how they translate to the general employment landscape. The physical security sector, however, understands the language of the military and don’t generally require that military responsibilities be coded into language that non-military can understand. Securing mid-Level appointments The physical security sector features a wide variety of jobs from entry level, middle management to senior positions. A retired veteran with a pension may look to the security sector for part-time or full-time entry level work. Other former military, who are not eligible for retirement benefits, may secure mid-level appointments with the goal of climbing the ladder to the highest rungs. The flexibility and opportunity are unparalleled in the security sector. Veterans generally enter the workforce with identifiable skills that can be transferred to the physical security world and are often skilled in technical trends pertinent to business and industry. And what they don't know, they are eager to learn - making them receptive and ready hires in physical security environments that value ongoing learning and training.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilized than others: financial services were quick to recognize the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realize is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-Effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimize displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyze and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
In addition to providing the Northeast’s largest security trade show, ISC East will include free conference sessions and keynote speeches right on the show floor and several paid workshops. The Nov. 20-21 event at New York’s Javits Center will also include vendor solution sessions from Axis Communications, Hikvision and NAPCO. Wide variety of paid workshops An advantage of the International Security Conference & Exposition in New York is that much of the programming is complimentary to registered attendees, and location of the sessions on the show floor means attendees don’t have to leave the exhibition to take in a session. The paid workshops include technology sessions about cyber terminology for physical security integratorsThe paid workshops include an Active Shooter Workshop and technology sessions about cyber terminology for physical security integrators; and basic installation and configuration of video surveillance solutions. An OSDP (Open Supervised Device Protocol) Boot Camp Short Course will also be offered. As a smaller show, the topics of ISC East conference sessions are broader and of more general interest, rather than organized into focused “tracks” as at ISC West. Attendance at sessions can provide continuing education (CE) credits with organizations that partner with ISC East – one credit for each hour-long session. Attendees can use their Certificate of Attendance from any session to self-report their education hours to relevant industry bodies: ALOA (AEU education credits), ASIS (CPE continuing professional education credits) and NICET (CPD Continuing Professional Development points). An advantage of the International Security Conference & Exposition in New York is that much of the programming is complimentary to registered attendees Keynote sessions at the Main Stage The Main Stage will be the venue for keynote sessions delivered by Deanne Criswell, Commissioner, New York City Emergency Management (on Day 1 – Nov. 20); and Angela Stubblefield, Chief of Staff at the Federal Aviation Administration (FAA) (on Day 2 – Nov. 21). The two SIA Education@ISC East educational theaters on the show floor will be booked up both days with a variety of interesting topics. A new session covers penetration testing for physical security, presented by Michael Glasser of Glasser Security Group. A session on LiDAR (Light Detection and Ranging) sensors will be presented by Frank Bertini, UAV and Robotics Business Manager, Velodyne LiDAR. Another popular topic is Safe Cities, and FLIR will present a session on moving from secured to smart cities with intelligent, connected systems. New addition is Active Shooter Workshop The Active Shooter Workshop is a new addition to the ISC East program. It has been a popular session at ISC West for three years now. At ISC East, presenters of the workshop will be David LaRose, System Director Public Health, Lee Health; and Ben Scaglione, Director of Healthcare and Security Programming, Lowers and Associates. At the end of the workshop, an additional hour of programming will be the “Stop the Bleed/Save a Life” session presented by Jerry Wilkins, Co-Owner of Active Risk Survival. The Main Stage will be the venue for keynote sessions delivered by Deanne Criswell, Commissioner, New York City Emergency Management, and Angela Stubblefield, Chief of Staff at the Federal Aviation Administration Woman in Security event A Women in Security Forum breakfast event will be held on Nov. 21 (Thursday). It’s the second annual event and this year will focus on diversity and inclusiveness in the workplace of the future. Valerie Anderson, President of Boon Edam, will lead a discussion on “Diversity 2.0: Next Steps for Creating an Empowered Workforce”Moderator Valerie Anderson, President of Boon Edam, will lead a discussion on “Diversity 2.0: Next Steps for Creating an Empowered Workforce.” Panelists are Lisa Terry of Allied Universal, Andrew Lanning of Integrated Security Technologies, Elaine Palome of Axis Communications and Dawne Hanks of Milestone. The Women in Security event is likely to attract up to 100 attendees. SIA’s Women in Security is an active organization, with monthly meetings and a newsletter that recognizes prominent women in the security industry. “It’s really a group for both men and women,” says Mary Beth Shaughnessy, Event Director, ISC Events at Reed Exhibitions. “There are many programmes, recruiting efforts, and professional and networking opportunities. They are a robust group of people who are active in making a difference. It’s important to support women in the security industry, which is 95% male, and to develop a new generation of women to be a part of the industry’s future.” The keynote addresses at ISC East will also highlight two high-profile women.
ISC East continues to flourish as the Northeast’s largest security trade show. Focused on the big Tri-State market and overall Northeast sector vs. the flagship ISC West event in Las Vegas in the spring, the International Security Conference & Exposition at New York’s Javits Center will be held Nov. 20 and 21. “Anybody who has been to the show has commented and seen the growth,” says Mary Beth Shaughnessy, Event Director, ISC Events at Reed Exhibitions. Ninety new exhibitors When the show opens, there will be around 90 new exhibitors, including Gunnebo, Mobotix, Liftmaster, Cypress Integration Solutions, SAFR from Real Networks and Security Brands. Because it is a regional show, some large companies have smaller exhibits that feature their local and regional personnelLarger exhibitors at the show include Brooklyn Low Voltage Supply (distributor), Axis Communications, DoorKing Inc., NAPCO Security Technologies, and All American Monitoring. Because it is a regional show, some large companies have smaller exhibits that feature their local and regional personnel eager to meet with security professionals from the Northeast corridor. ISC East will be co-located with the Infosecurity ISACA North America Expo and Conference. The combination provides a comprehensive approach to physical and cyber security products and services. Rapid growth in past three years The audience at ISC East is unique – about 90% of attendees do not attend ISC West. The show has seen rapid growth in the past three years, and attendees report a new energy and passion among exhibitors and attendees. By every measure, the show will be bigger than last year, while maintaining the intimate, smaller vibe of a regional show. A “Crack the Tap” cocktail reception will be held at the end of the first day on the show floor. A charity activity on the ISC East show floor will be presented in partnership with Mission 500, an organization that works to serve the needs of children and communities in crisis. At the Mission 500 booth which will be adjacent to the Main Stage, each exhibition attendee will be invited to create a “care package” of essential hygiene items that will be delivered to children and families in need, in partnership with Volunteers of America - Greater New York. Attendees may write a note of encouragement to be included in the package they assemble. Event will highlight security startups A Nov. 20 (Wednesday) session at ISC East will highlight startup companies in a format reminiscent of television’s “Shark Tank.” Four finalists will take to the main stage and provide a seven-minute pitch about their new product or service. After the “Tech Tank” presentations, audience members vote live on their mobile app for their top choice, and the winner will be announced during the “Crack the Tap” cocktail reception.Four finalists will take to the main stage and provide a seven-minute pitch about their new product or service “It’s a program that allows attendees to see and hear about cutting edge technologies,” says Nicole Miller, Senior Conference Manager, ISC Security Events. The four finalists, chosen from more than 40 exhibitor submissions, are Arrow Labs’ MIMS Smart Watch for mobile incident management; Cepton Technologies’ Helius Smart LiDAR System; SAFR from RealNetworks’ Facial Recognition system, and ZeroEyes’ Weapons Detection and Active Shooter Mitigation Platform. New partnership with ASIS New York Beginning in 2020, ISC East will be combined with the ASIS New York chapter’s annual conference and expo, which was held in May this year. Starting next year, the events will be rolled into one industry-wide expo and education event geared to serving the total security industry in the tri-state area (New York, New Jersey and Connecticut). In 2020 there will be an enhanced education program along with the combined event next fall. In recognition of the new partnership, ISC East is involving the ASIS NYC chapter in this year’s show, too, with a booth on the show floor, and promotional logos and signage. The ASIS chapter will have a table at the SIA Honors Night event on Nov. 20. “We are really involving them this year to show we are working together and partnering going forward,” says Shaughnessy.
Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cloud. The flexible deployment model – enabling a cloud installation, an on-premise installation or any combination – is one of the ways Qumulex seeks to differentiate itself in the market. Installing fully on-Premise system The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected The system is designed so that an integrator can install a fully on-premise system and then later ‘flip a switch’ and transition to a cloud model, says Tom Buckley, VP Sales and Marketing. The Qumulex initial 1.0 system launch is currently entering its final beta test. Full commercial availability is expected in the first quarter of 2020, which the company will highlight in a bigger 20x20 booth at ISC West next year. The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected. Ensuring cybersecurity, the gateway provides a ‘firewall’ of sorts to avoid any cybersecurity threat from entering an enterprise through a vulnerable IP camera. The system is designed to be ‘cloud-agnostic’ and to work with any public or private cloud, using Docker software and ‘containers,’ a standard unit of software that packages code and all its dependencies so an application runs quickly and reliably from one computing environment to another. At launch, the Qumulex system will use the Google cloud. Greater situational awareness The open platform approach will enable users to assemble best-of-breed solutions Another point of differentiation for the new platform is a unified access control and video surveillance environment – both are part of the same program. Access control can drive video events and vice versa for greater situational awareness. A unified system avoids having to integrate separate systems. A big emphasis for Qumulex is ease of use. They have designed the user interface to be as simple and intuitive as possible, using consumer-oriented systems such as Nest and the Ring Doorbell as a model of simplicity. Finally, the open platform approach will enable users to assemble best-of-breed solutions. Keeping it simple, the system offers native integration with only the major camera manufacturers that represent most of the market: Axis, Hanwha, Arecont, Panasonic, Vivotek and Sony. Longer-Term storage Other cameras can be included using the ONVIF interface. On the access control side, the system will initially be compatible with Axis door controllers, Allegion wireless door locks and ASSA ABLOY Aperio wireless door locks. Future versions of the software will seek to integrate HID Edge and Vertx and eventually Mercury panels. The gateway device may incorporate only a solid-state drive (SSD) for buffering Qumulex is taking a ‘mobile-first’ approach. The software is designed as a ‘progressive web app,’ which means is it is adaptable to – and fully functioning in – any smart phone, mobile device, laptop, or on a desktop computer with multiple monitors. The gateway device may incorporate only a solid-state drive (SSD) for buffering, or as many hard drives as the customer wants for storage. Short-term storage is available in the cloud, but local hard drives may be used for longer-term storage which can get expensive given the monthly fees of cloud storage. Using third-Party server To manage the variety of scenarios, Qumulex will offer a line of gateways and recorders, or a customer can use a third-party server along with Qumulex, which is an open system. Qumulex will use a manufacturer’s representative sales model and has already signed up 11 rep firms covering the United States (the initial target of the launch). The company has been spreading the word among integrators, too, first at the ISC West show last spring, when 98 integrators saw demonstrations of the system at a suite in the Palazzo. Another 48 integrators saw the system at ESX in Indianapolis in June. At the recent GSX show in Chicago, Qumulex had a booth on the show floor, where they scanned 450 badges that yielded 176 unique integrators. Entering the physical security market Qumulex just closed a second round of funding, which does not include any ‘institutional’ money Buckley estimates there are around 10,000 total security integrators in the United States that sell products similar to theirs at their price point. They are working to build their database to reach out to those integrators. (Exacq had more than 4,500 dealer/integrators before it was sold to Tyco/Johnson Controls.) Qumulex is the third company to enter the physical security market by the same team that launched two other successful startups in the last 20 years: Exacq Technologies (sold to Tyco in 2013) and Integral Technologies (sold to Andover Controls in 2000). Both previous companies were built around a need to help the integrator community transition to newer technologies. Qumulex just closed a second round of funding, which does not include any ‘institutional’ money. The first round of investment involved only the founders, and the second round added some ‘angel’ investors to the mix. The funding allows more flexibility and control over the company’s timeline and the evolution of the product’s feature set, free of outside mandates, says Buckley.
There are many matters that must be taken into account when organizing a casino. A top priority is the security of the entire workforce and clientele. An access control system that is reliable and easy to operate provides the basis for that. Casino Baden-Baden is open 358 days a year. In addition to various different pay scale groups and work-time models, a variety of bonuses need to be assigned. Pay may therefore be partly exempt of tax or liable to tax, with holiday bonuses and weekend pay. Recording staff work timings Intensive workshops and consultations were conducted to establish the specific requirements of the casino, so that the best possible solution could be developed. The main focus was on recording work times and transmitting that data to the casino's own specially developed shift schedule program. Given the various different work time models and wage types in numerous variants, complex manual procedures must be automated in future. IF-4735, IF-810, and IF-800 access control terminals Employees can use their passes for cashless payment in the cafeteria and at the vending machines In 1991, a solution for physical access control and time recording was implemented in the form of the IF-5020 software. Since 1998, the IF-6020 software solution has been in use. The hardware terminals IF-4735, IF-810, and IF-800 ensure smooth recording of work times and grant authorized employees access to the various separate areas. Also, the employees can use their passes for cashless payment in the cafeteria and at the vending machines. The system solution from Interflex, with its hardware and software components, now brings employees and administrators substantial time savings and a great deal of convenience. Central access control system All access permissions and work times are now recorded and controlled in one central system, eliminating the disruption of transferring from one system to another, such as to the program for pay and shift planning. This has brought considerable improvement in transparency and in the freshness of data, and paper has been completely banished from work time control.
HID Global, globally renowned trusted identity solutions provider, has announced support for Seos-enabled student IDs in Apple Wallet. Beginning this fall, students, faculty and staff at Clemson University will be able to add their IDs to Apple Wallet and use their iPhone and Apple Watch to access buildings on campus, purchase meals and much more. Seos-enabled student IDs “HID Global is excited to play an important role in creating transformative connected university experiences that make it easy for students to simply use their iPhone or Apple Watch to enjoy all that daily campus life has to offer,” said Stefan Widing, President and CEO with HID Global. HID’s technology and electronic locks from our parent company ASSA ABLOY are helping Clemson University students" Stefan adds, “HID’s broad range of technology and electronic locks from our parent company ASSA ABLOY are helping Clemson University students, faculty and staff take full advantage of convenient mobility applications. This fall, their Apple devices can be used for everything from entering buildings – such as residence halls and individual rooms – to buying meals, accessing the gym, and using secure print services and numerous other university resources.” iCLASS SE reader modules To support student IDs in Apple Wallet on iPhone and Apple Watch, HID provides Seos-enabled credentials, HID iCLASS SE and HID OMNIKEY readers, embedded HID iCLASS SE reader modules, and Corbin Russwin and SARGENT electronic locks from ASSA ABLOY. Through HID’s support of student IDs in Apple Wallet, Clemson students will be able to seamlessly access residence halls, libraries and fitness centers, buy lunch, make purchases at the university store, print documents and more by placing their iPhone or Apple Watch near a reader where contactless student ID cards are accepted. Contactless student IDs Contactless student IDs are supported on iPhone 6 and later and iPhone SE. On iPhone XS, iPhone XS Max, and iPhone XR, student IDs may still be used for up to five hours in power reserve mode when the iPhone battery needs to be charged. Student IDs in Apple Wallet are not only convenient, they also provide an extra level of security as students no longer have to worry about misplacing their physical card. School credential provisioning is protected by two factor authentication.
There are over 55,000 electrical substations in the United States. These substations, along with power plants and transmission lines, provide power for millions of people. It is imperative that these locations remain secure from intrusion and sabotage. If just a handful of these substations were rendered inoperable, the U.S. could face a serious blackout. The 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, which knocked out several transformers and totalled over $15 million in damages, was a catalyst for the Federal Energy Regulation Commission (FERC) establishing new security standards for utilities. One of the most notable policies introduced was the Critical Infrastructure Protection Standard 014 (CIP-014). This statute requires utilities to identify ‘mission critical’ facilities and assets, conduct a security inspection to identify threat, and implement a security system to address those risks. Replacing traditional fencing systems VTI Security has been servicing security needs in the commercial, utility, and oil and gas sectors for over 35 yearsIn response to security incidents such as Metcalf and other FERC activities, a large electrical utility with hundreds of substations across the country looked to expand security beyond its fence line. The end user wanted to enhance and possibly replace traditional fence protection systems – including fiber optics, microwave barriers, and video analytics – as these systems all proved to be costly, as well as time and labor intensive. In the end, the utility company relied on VTI Security, an industry-leading integrator, for a recommendation. Based in Burnsville, Minnesota, VTI Security has been servicing security needs in the commercial, utility, and oil and gas sectors for over 35 years. To determine the best system for its end user, VTI reviewed six different technologies, including some with multiple vendors. VTI also tested systems in field deployments and conducted cost analysis. The integrator concluded that SpotterRF’s product was superior to all others and selected it as its sole radar standard for perimeter solutions. SpotterRF perimeter protection solution “Our findings were that SpotterRF not only provided the most comprehensive detection in a substation environment, but SpotterRF was also by far the most cost-effective total solution based on the ability to mount equipment on existing structures,” said Jerry Klapak, Senior Account Manager for VTI Security. SpotterRF provides perimeter protection through its patented Compact Surveillance Radar (CSR) systems SpotterRF, based in Orem, Utah, provides perimeter protection through its patented Compact Surveillance Radar (CSR) systems, which provide up to 300 acres of radar tracking power in a hand held, four-pound device. The CSRs enable security monitors to never be blind, providing 100 percent coverage, 24 hours a day, in all weather conditions. They are designed to detect threats up to 3300 feet beyond the fence line and provide early warnings to staff before situations escalate. PT-Series thermal camera While radar casts a wide circle to detect the presence of potential intruders, the FLIR thermal camera provides visual verification along specific perimeters. Upon selecting a radar system, VTI needed a video manufacturer to supply cameras to deploy with the radar. In 2015, the integrator approached FLIR Systems for a solution and selected PT-Series thermal camera for the project. “The ability for FLIR's products to perform beyond published performance specifications was a surprise we don’t often see,” said Klapak. “Each product exceeded published performance metrics on our field testing and actual deployments.” Features thermal and visible-light imaging SpotterRF radars, combined with FLIR PT-Series cameras, deliver maximum coverage and perimeter protectionThe PT-Series is a pan/tilt camera that features both thermal and visible-light imaging. The pan/tilt mechanism gives end users precise pointing control, fully programmable scan patterns, and both radar slew-to-cue and slew-to-alarm functions. With the radar and thermal technologies selected, VTI worked to ensure seamless integration and performance between the two systems. “We worked with each company’s support and development teams, as well as the VMS manufacturer, to ensure the technologies not only worked with one another, but also met the client’s needs for bandwidth consumption and VMS interface and display,” said Klapak. Together, SpotterRF C20 and C40 radars, combined with FLIR PT-Series cameras, deliver maximum coverage and perimeter protection. Cost-effective solution for substations "The FLIR PT-Series, when deployed with SpotterRF, can cover a wide area of substation footprint. It is a cost-effective solution for substations needing to monitor the perimeter as well as inside the yard," said Michael Chaffee, Director of Business Development at FLIR Systems. “The speed at which the FLIR PT-Series slews to the cue of the SpotterRF detection is impressive." A number of environmental factors affected performance, including weather" When someone walks into the field of view of SpotterRF’s C20 or C40 radar, the radio waves bounce off the person and back to the radar, which then calculates the precise GPS location of the target, as well as its size. The radars then tell the FLIR PT-Series camera to zoom to that location. The camera automatically stays on and tracks the target. Because the radars control the cameras, the cameras only move upon detection, which significantly extends the shelf life of the cameras, allowing them to last for years without replacement. Locates person in a 15 or 100-acre space This FLIR and SpotterRF solution addresses an important pain point for the perimeter security and intrusion detection market. “In the past, utilities tried to use video analytics to find targets. Because these systems were outdoors, a number of environmental factors affected performance, including weather, lighting and moving trees,” said Logan Harris, CEO of SpotterRF. “However, by combining our radar with FLIR’s pan tilt thermal cameras, you’re able to solve this problem.” He added, “Together, SpotterRF’s radar technology and FLIR’s thermal imaging are able to locate a person in a 15 or 100-acre space, see hundreds of yards beyond the fence line, cue the camera, and alert the personnel, all without the help of an operator.” Activates security lighting based on motion One surprising benefit was the ability to use both the thermal cameras and radars for additional security and production uses"In the past, only military organizations could access this level of advanced technology. Now, the FLIR and SpotterRF solution makes this security capability accessible and affordable for critical infrastructure, power distribution and commercial applications. "Our client is very pleased with the ability of the technologies to provide security for their critical sites," said Klapak. "One surprising benefit was the ability to use both the thermal cameras and radars for additional security and production uses. They now use the radars to activate security lighting based on motion within and outside the fences. This provides not only a green approach to security by lowering energy costs but also improves customer relations by reducing light pollution in residential neighborhoods.” The entire team was also impressed by the solution’s minimal installation time. Unlike installing fiber optic cables on fence lines, which requires months for digging trenches, the FLIR PT camera and SpotterRF radar can be mounted easily on control shacks or lattice poles within a week. Four times faster installation of systems “The deployment occurred four times faster than it was anticipated,” said Harris. “VTI installed the systems at 25-30 sites in just three months.” VTI began installation in 2016, with plans to roll out the solution in a phased approach as part of a multi-year plan. Approximately 50-75 sites will deploy the camera and radar solution. On average, each substation has two FLIR PT-Series cameras and four SpotterRF radars. Some of VTI’s other clients are also expected to deploy the same solution at 10-20 sites over the next few years, based on the success VTI has proven in the utility environment.
Ping Identity, the provider of Identity Defined Security, announces its successful completion of the Financial-grade API (FAPI) conformance testing, as part of the process defined by Open Banking Ltd. This builds on Ping Identity’s previous success as the first identity platform to pass all 70 technical security tests, as set by Open Banking Ltd., with zero warnings. The most recent set of FAPI conformance testing evaluated the latest versions of the Ping Intelligent Identity platform, including PingFederate, PingAccess and PingDirectory, within a mock banking environment. Additional technical requirements It switches to an API model with structured data that utilizes a token model such as Open Authorization The inclusion of FAPI within the Ping Identity solution for Open Banking helps allow banks to overcome insecure practices such as screen scraping by using stored user credentials. Instead, it switches to an API model with structured data that utilizes a token model such as Open Authorization. FAPI is a technical specification developed as a multi-industry standard by the FAPI Working Group of OpenID Foundation (OIDF). It leverages OAuth 2.0 and OpenID Connect (OIDC) to define additional technical requirements for the financial industry and other sectors requiring higher security. For banks specifically, FAPI provides various advantages. This includes enabling applications to securely interact with financial accounts, while also enhancing the user’s ability to control security and privacy settings. Secure identity requirements In concurrence with the specification, OpenID Foundation maintains a cloud-based testing suite for conformance testing by banks, certified third-party security providers and platform vendors—such as Ping Identity. The Ping Intelligent Identity platform is used by hundreds of financial services enterprises, including many of the CMA 9 and Open Banking Ltd. itself. Additionally, FAPI is of increasing relevance to the growing number of new fintech start-ups in areas such as investment, wealth management, insurance, payments and even real estate. “This is significant beyond the Open Banking and financial services sector,” explains Rob Otto, EMEA Field CTO, Ping Identity. “Other digitally-focused sectors, with similar secure identity requirements, now have a proven template that can allow them to quickly deploy their own security controls, which have been stringently tested by the largest financial institutions in the UK.”
Merthyr County Council were experiencing high levels of break-ins and thefts in its three household recycling sites resulting in high repair and replacement costs. The Council employed a security company to man guard three sites which cost over £150,000 per annum however, the break-ins were still occurring. The Gallagher Channel Partner designed a solution to detect, deter and protect. They installed a Gallagher Monitored Pulse Fence to detect intruders climbing or breaking through the fence, deter by delivering a short, sharp but safe shock, while protecting the Council's assets and on-going operation. Cost-Effective installation The system was retrofitted to an existing fence structure ensuring an easy, efficient and cost-effective installation. Since the fence was installed break-ins have ceased and the requirement for man guarding is no longer needed. Electrical Statutory Compliance Inspector at Merthyr County Council, Les Lewis, said: “I was thrilled with the completed project. Not only is it aesthetically pleasing, but it has met all of our security requirements. It has also helped make huge cost savings as we no longer require manned security out of hours or need to repair damaged fences and replace expensive assets. I believe the Gallagher system will pay for itself within 18 months.”
Modern office design needs an advanced access control system that is powerful, flexible and aesthetically in tune with workspace users and their needs. At Plexal, a new £15 million flexible work environment located in the heart of Olympic East London, where the city’s ‘innovation community’ meet to brainstorm and explore new ideas, Aperio achieves all the three virtues wirelessly. At Plexal enterprise and academia work together, with technology companies, start-ups, universities and creatives under one roof. Up to 800 entrepreneurs use the workspace to devise, create and launch products and services. Innovative access control solution Easy, non-disruptive installation of new locking devices was another goal: Plexal preferred a wireless solution Plexal required a tried-and-tested access control solution they could rely on for high-end security to protect this new co-working office against unauthorized intrusion and burglary. Easy, non-disruptive installation of new locking devices was another goal: Plexal preferred a wireless solution. Any chosen solution would need the flexibility to expand access control as Plexal’s site scales over time. Device aesthetics must complement a contemporary, light-filled interior design with lots of glass. Powerful, flexible, wireless connectivity Plexal offices are now fitted with Aperio wireless, access card-based locking technology. Plexal’s battery-powered Aperio locks are integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. So far, 59 Aperio L100 wireless high-security door locks have been installed and integrated online with DoorFlow. These Aperio locks provide Plexal with a high level of physical protection and transmit door status to DoorFlow in real time. Adaptable locking solution Plexal required an adaptable locking solution for a range of different doors and, with no wiring required" “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install Aperio with minimal disruption,” says Stewart Johnson, Director at NetNodes. Because Aperio locks are battery- rather than mains-powered, the new wireless solution also keeps Plexal’s maintenance costs and energy consumption low. Aperio wireless locks use no power when idle, only “waking up” to read credentials or maintain a system heartbeat. Annual running cost savings over traditional wired doors are significant. Modern locking device design Aperio aesthetics were a good fit for Plexal’s modern workspace. “We have a futuristic-style, open-plan design here at Plexal — our offices are predominantly glass-fronted, so we needed an effective design which was not only robust but adaptable, too,” says John Herbert, Facilities Manager at Plexal. “What really appealed to me about ASSA ABLOY access control’s products was the aesthetic.” Aperio technology integration And because Aperio technology is built on an open platform for integration with almost any security or building management system, Plexal’s access control solution is fully future-proofed. They have the option to expand to new offices, floors or even buildings easily. Aperio can upgrade mechanically locked doors and wirelessly connect them — online or offline — to new or existing access control systems. This is achieved with minimal modification to doors and premises, offering a simple, cost-effective security upgrade. Aperio can upgrade mechanically locked doors and wirelessly connect them to new or existing access control systems Wireless access control “Should any additional doors need to be added to the system in the future, this can be done easily, without modifying or changing the aesthetics of the environment,” confirms Stewart Johnson. “This also minimizes future installation costs, offering a cost-effective and straightforward access control upgrade.” “We foresee change in the not-too-distant future and are delighted at our options to modify,” adds John Herbert. Secure physical and digital access ASSA ABLOY's innovations enable safe, secure and convenient access to physical and digital places, offering efficient door opening solutions, electronic locking devices, trusted identity solutions and entrance automation technologies.
Round table discussion
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?