As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of...
Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, provider of residential security, announces the availability of the contemporary versions of the company’s popular traditional deadbolts: the SmartCode 914 Deadbolt Lock and SmartCode 916 Touchscreen Electronic Deadbolt. With their updated, modern designs, these new stylish versions of the industry’s leading wireless, access control locks continue to utilize Kwikset’s Home Connect technolo...
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay a...
The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-Driven Decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technolog...
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent o...
DMP is excited to announce its ESX TECHVISION Challenge, now two years in a row. This year’s award goes to DMP’s Virtual Keypad Access. In addition, DMP received ESX Innovation Awards in two other categories. In the Installation/Service Tools category is DMP’s Dealer Admin 2.0, and in the Mobile Apps for Consumers category is DMP’s Virtual Keypad 6.0. DMP’s Virtual Keypad Access Receiving the awards at the ESX show this month in Nashville, Tennessee, are DMP&rsquo...
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
Pulse Secure, global provider of enterprise secure access solutions announced that John Pescatore, director of emerging security trends at SANS Institute, and Dave Cullen, manager of information technology and chief security officer (CSO) at Entegrus, will participate in a new webinar to discuss what works when implementing network access control (NAC). Pulse Secure NAC Integration Hosted by the SANS Institute, the online seminar will feature an interview with Cullen on integrating Pulse Secure NAC at Entegrus. Topics include why he chose Pulse Secure; how NAC advances security, visibility, endpoint compliance and IoT risk mitigation; and future plans to further unify Secure Access with Pulse Secure technology by combining NAC and virtual private network (VPN) across on- and off-premise resources from any BYOD device. We considered NAC as an effective way to improve our security posture without dramatically altering how we operate" “The threat landscape is constantly evolving, forcing us to always consider how we can go one step further. With a widely distributed IT infrastructure, we considered NAC as an effective way to improve our security posture without dramatically altering how we operate,” said Dave Cullen, manager of information systems for Entegrus. “We have a long-standing relationship with Pulse Secure. The level of integration between Pulse Secure’s secure sockets layer (SSL) and NAC, as well as the extended feature set, made it a straightforward choice for us. Perhaps the two most important things are that we have increased our security posture, and for the most part, there has been zero impact on our end users.” Secure Remote Access “The SANS What Works program highlights real security professionals who have used real security products to demonstrate measurable business value,” said John Pescatore, director of Emerging Security Trends at the SANS Institute. “Implementing network access control and enabling both secure remote access and safe use of IoT devices is a shining example of security enabling the business.” The SANS What Works program highlights real security professionals who have used real security products to demonstrate measurable business value" People are invited to register for the June 14th, 2:00 p.m. EDT SANS webinar, “What Works in Visibility, Access Control and IoT Security – Pulse Secure NAC Outcomes at Energy Provider.” Entegrus Entegrus serves over 60,000 customers throughout Ontario, Canada. They bring electricity, renewable energy and water across three large regions, with a workforce spread out over 2,300 square kilometers. They leveraged their existing Pulse Secure VPN implementation to expedite NAC deployment and fortify their infrastructure in accordance with National Institute of Standards and Technology (NIST) and North American Electric Reliability Corporation (NERC) guidelines. As a result, their security organization extended visibility for remote and on-premise users and devices, as well as enhanced endpoint compliance and Internet of Things (IoT) risk mitigation. Pulse Secure’s industry-leading NAC solution, Pulse Policy Secure (PPS), is built to protect next generation networks with comprehensive network visibility Pulse Policy Secure Pulse Secure’s industry-leading NAC solution, Pulse Policy Secure (PPS), is built to protect next generation networks with comprehensive network visibility, automatic device onboarding and unified contextual access control across wired and wireless connections, personal and corporate devices, and remote and local access. The PPS deployment provides foundational endpoint intelligence, resource access enforcement and IoT defenses that support industry and regulatory compliance guidelines. These compliance requisites apply to both regional and large national critical infrastructure providers. Presented as a webcast interview, the online seminar is a lessons-learned conversation between Pescatore, SANS director and former security industry analyst, and Cullen, an expert in cybersecurity and IT systems. The webinar attempts to answer questions regarding successful implementation of NAC and the benefits that can result from it.
Lenel, a provider of advanced security systems, is making available LifeSafety Power’s ProWire Unified Power Systems for Lenel OnGuard-connected devices. ProWire is an innovative, next-generation access system that integrates power and panels and is pre-wired for system power, lock power and communication to eliminate hours of installation labour. Available with capabilities for Lenel OnGuard power monitoring, ProWire’s real-time data monitors the performance of network-connected power, ensuring optimal system operation and up time. Lenel is part of UTC Climate, Controls & Security, a unit of United Technologies Corp. Intelligent And Networked Functionality Developed and manufactured by LifeSafety Power, a provider of innovative power management solutions, the ProWire solution for OnGuard offers intelligent and networked functionality that yields a snapshot of the current status of power across the facility. ProWire is available in a pre-wired, non-managed power solution to meet every reseller specification It provides data that shows exactly how access control and other systems are performing, allowing organizations to take proactive measures before potential critical system failures occur. ProWire is also available in a pre-wired, non-managed power solution to meet every reseller specification. Repeatable Results Across The Enterprise The modular, UL/CUL-certified pre-wired ProWire systems come ready to install, yielding consistent and repeatable results across the enterprise or multiple locations, eliminating technician time and guesswork. Also, a single ProWire unit can replace multiple traditional enclosures, saving space on wall and/or system racks. “With access control serving as the hub for many disparate security systems, it’s become critical to have easily accessible, real-time data available about device performance,” said Jeff Stanek, General Manager, Lenel, North America. “There’s never a good time for a security device to fail and with LifeSafety Power’s ProWire solution, end-users can count on getting the information they need to create better efficiencies and greater system uptime.” “ProWire can also be used for managed services like remote monitoring and maintenance—to reset devices, automatically test batteries, actively monitor actual system stand-by time remaining and other capabilities.” Power systems need to provide the latest proactive analytics to increase system integrity Increased Operational Efficiencies Larry Ye, President and Chief Executive Officer, LifeSafety Power, said with the many demands being placed on the OnGuard platform, power systems need to provide the latest proactive analytics to increase system integrity. “ProWire, when combined with intelligent managed power options, lets end-users gain visibility into system health and viability,” Ye said. “As a networked solution, ProWire allows data to be monitored locally or globally at a single user interface to optimize performance and increase operational efficiencies for the end-user customer.” LifeSafety Power ProWire is available now through Lenel value-added resellers throughout the Americas.
Luxul, global innovator of IP networking solutions for AV integrators, has announced its Epic 5 router (ABR-5000) is now shipping with Domotz remote management software. Remote Management Software With the Epic 5's onboard Domotz technology, integrators receive alerts when network issues arise — allowing them to take immediate action — and share device information with Luxul's support team for swift and easy troubleshooting. The router also eliminates the need to purchase a separate Luxul Domotz Pro for remote management. This lowers network costs and speeds setup, improving the bottom line for integrators while providing a better experience for their clients. Router Limits offers cloud-based controls for internet safety and management and puts users in complete control of every aspect of their internet experience, allowing them to manage screen time, filter content, and track browsing history. Router Limits users can also control mobile devices' access to the internet when they leave the home network. Sporting a clean and modern look, the Epic 5 features green or blue front-facing LEDs, while its rear-facing ports include two dedicated WAN and five dedicated LAN ports. The router features dual-WAN capability, allowing the LAN to be connected to two internet connections with load balancing and failover control Cloud-Based Controls And Mobile Access The router features dual-WAN capability, allowing the LAN to be connected to two internet connections with load balancing and failover control. The router delivers gigabit WAN-to-LAN speeds for ultra-fast streaming and bandwidth-intensive applications while also enabling integrators to lower operational costs and improve the customer experience. "We can't wait for integrators to get their hands on the Epic 5 — our fastest and most powerful router ever," said Mike Grubb, vice president of marketing at Luxul. "Beyond speed, the advanced technology included in the Epic 5 really makes it shine. Domotz saves integrators time and money by eliminating the need for truck rolls, while Router Limits provides users with easy-to-access control over their internet experience. Together, these technologies allow integrators to build better relationships with their clients and provide a foundation for added-value RMR service programs."
To better serve the needs of OEMs and machine builders, Moxa has launched a new Remote Connect Suite that provides an easier and more secure way to connect to remote machines and equipment for the performance of critical troubleshooting, maintenance, data acquisition, and device management, resulting in faster and smarter support. Designed for Industrial IoT environments, the Moxa Remote Connect (MRC) is a remote connection management platform that includes server and client software along with a hardware gateway to seamlessly bridge the gap between field devices, engineers, and application servers for greater visibility and support. Hosted on Amazon EC2, MRC connects Ethernet-based edge devices to the server portal with the security needed in today's networks. Client software connects the engineer's laptop to the server portal so that they can manage all devices in real-time through a HTTPS web console. "With an easy to use design, secure connections, and flexible connectivity, the Moxa Remote Connect allows OEMs to access their remote machines effortlessly and streamline their maintenance efforts" stated Li Peng, product manager in Moxa's Industrial Ethernet Infrastructure business unit. MRC empowers companies to remotely manage numerous machines and users at different locations and is an ideal solution as businesses scale to satisfy growing demandSmart IP Mapping The MRC Auto Configuration function makes installation "plug-and-play" simple with no need for extensive IT knowledge and no requirement to configure VPNs, perform complex firewall settings or reconfigure IP Addresses. MRC provides Smart IP Mapping to avoid IP conflicts and is firewall friendly to comply with existing IT security policies, allowing companies that need secure remote access to minimize the amount of time and effort spent on deployment. In order to combat the numerous security risks that present themselves when data is collected through the Internet, MRC is equipped with security features including end-to-end encryption to prevent man-in-the-middle attacks. The Smart Protection function includes an embedded firewall that permits remote access under whitelist control without disrupting local networks. In order to provide an on-demand maintenance service, access to machines is fully controlled by machine operators. MRC delivers greater flexibility by supporting a variety of connections including 1-to-1, multiple-to-multiple, and site-to-site. It empowers companies to remotely manage numerous machines and users at different locations, which makes it an ideal solution as businesses scale to satisfy growing demand.
Change is happening at MOBOTIX, and the German company wants to get the word out. “This company has been around since 1999, and people still give us a blank stare because they don’t understand what’s behind the curtain,” says Joe Byron, Vice President Sales Americas, MOBOTIX CORP. “As we gain visibility, people really want to know ‘what’s going on over there?’” There’s a lot going on. A new CEO, Thomas Lausten, who joined the company last year, is a former Milestone employee who brings with him the Milestone philosophy of open systems. It’s a culture shift for MOBOTIX, which has historically favored closed systems. “We needed a new leader to take us to the next level,” says Byron. “Thomas brings an open-platform mentality. He listens to a variety of opinions – from end users, architects and engineers, and MOBOTIX employees – before formulating a smart decision. That will take us to the next level.”MOBOTIX has been well ahead of the industry’s technology curve, and several early innovations have recently become more common The MOBOTIX Ecosystem Over the years, MOBOTIX has developed a unique “culture” that has many rabid devotees; some say it’s the security industry’s version of tech giant Apple. “MOBOTIX has many loyalists, who are enthused about the products and the culture,” says Byron. “We can build on that with a new level of products, more excitement and a new direction.” In addition to a new CEO, MOBOTIX will soon have a new chief technology officer (CTO), Hartmut Sprave, who will be joining this summer. Providing “fresh eyes on the subject” and an outside perspective from the IT industry will drive further innovation. “We don’t want to be on the bleeding edge, but on the cutting edge, and know the audience and its needs and challenges,” says Byron. MOBOTIX’ existing technology mix provides a foundation as the company makes the transition. In some cases, MOBOTIX has been well ahead of the industry’s technology curve, and several early innovations have recently become more common. An example is MOBOTIX’ decentralized system approach with edge-based recording. Tradeshow Successes Products highlighted by MOBOTIX at the recent ISC West show included the M16 AllroundDual Multisensor IP camera, S16 DualFlex IP camera and the Q26 Hemispheric 360-degree panoramic IP camera for indoor and outdoor applications. MOBOTIX Management Center (MxMC) 1.8 can change the camera settings on 80 cameras at a time. MOBOTIX IP Video Door Stations can interface with iOS and Android smartphone apps. “We have had so many things in place over so many years that people haven’t known about,” says Byron. He argues that MOBOTIX’ emphasis on technology development sets it apart from some camera companies in the U.S. market. Joe Byron, Vice President of Sales, and Ashley Grabowski, Regional Marketing Manager, at ISC West 2018 “People have been let down in the U.S. market with cameras that have been over-marketed, over-reaching and have little substance,” he says. The German engineering of MOBOTIX products and systems provides an antidote to the technology void, he says. “They are looking for the substance, and that’s what we have,” says Byron. What was missing – until now – was the “layer of integration” with other systems in the market, contends Byron. That separated MOBOTIX from the rest of the industry.MOBOTIX offers cybersecurity features that pre-dated the current industry obsession, such as HTTPS/SSL encryption in recording and playback video “But now we are an open platform, and we have these features sets and are the best of both worlds,” he says. “We can align with technology products and bring MOBOTIX to the masses. It’s a matter of listening to customer challenges and formulating a path to meet those challenges.” The fruits of that open system approach were on display at ISC West. The MOBOTIX booth featured integrations with ClearSite, Omnicast by Genetec, Konica Minolta and Mx-MSP by APB Technology. Other MOBOTIX technology partners include Avigilon, Bosch, Exacq, Gallagher, IndigoVision, Lenel, Milestone, Pelco by Schneider Electric, Salient Systems, Verint and Video Insight (Panasonic). Targeting Local Markets Another change under the new leadership is more flexibility to address the needs of local markets. “We need to be aware of our audience in the Americas,” says Byron, “and how approaching the market and the product mix may be different. We have the ability to create what we need here to be successful.” One particular concern in the Americas market is cybersecurity, and MOBOTIX offers cybersecurity features that pre-dated the current industry obsession, such as HTTPS/SSL encryption in recording and playback video. “We already have it, but we have never broadcast it to the masses,” says Byron. “We have the substance but haven’t communicated it.” Looking to enter the government market, for example, MOBOTIX faces the important requirement to be “IA compliant.” The company qualifies as IA (information assurance) compliant but just needs to go through the process of getting the “rubber stamp.” “We have so much under the hood when it comes to our products,” says Byron. He says MOBOTIX’ Internet of Things (IoT) approach can meet any end user challenges. “We can be all things to all people, if they truly get to know us. We just need to develop a vehicle to allow customers to communicate with us: What is the challenge? Nine times out of 10 we can meet that challenge with one of our cameras.”
Security is important for any construction project, but the stakes are higher when the tenants are a team of professional athletes, the parking lot is filled with sports cars and luxury vehicles, the property includes a multi-million-dollar turf field, and a professional training facility where exercises held there must be guarded as corporate secrets. To meet these challenges, Vicon recently completed work with a professional national sports team to install an end-to-end, tightly integrated video management and access control solution that relies exclusively on Vicon software, hardware and cameras. Due to sensitive security demands the team remains anonymous in this piece. The professional team’s Security Director says that he needed a system that would capture footage of everything going on, inside and around the perimeter of the facility, and make sure that access was limited to only authorized personnel. At the same time, the technology needed to make it easy for players and employees to get through security. “It doesn’t do anyone any good if a system is so difficult to use that people just prop the doors open. We had to blend those two things together,” he says. VAX Access Controllers Twenty-six doors, including both exterior exits and interior doors throughout the building, have been secured with VAX access control door controllers. Employee’s permissions are based on their jobs. Administrators can’t enter the locker rooms or training areas and players can’t enter the marketing offices. Many of the players come to the facility wearing athletic apparel and prefer not to carry around a wallet and key card, so Vicon created customized proximity tags embossed with the team’s logo, designed for players and employees to stick on the back of their cell phone cases. This turned out to be a popular solution, as the players always carry their cell phones with them and the tags are attractive and support the team’s branding. VAX Door Panels The panic buttons are wired to open inputs on the nearest VAX door panels In the world of professional sports, athletes must sometimes be protected from overly aggressive fans. This particular training facility is equipped with panic buttons at several spots within the building that allow anyone who notices a problem to immediately instigate a lock down. The panic buttons are wired to open inputs on the nearest VAX door panels, eliminating the need for long electrical runs back to the server room. The player’s practice field is accessible through an external gate that’s used by the media, and VAX provides the ability to control visitors who enter there. As needed, members of the press are given temporary credentials that can unlock the gate only for a designated time period before expiring. Parking Lot Video Surveillance The players’ parking lot also leverages the VAX system The players’ parking lot also leverages the VAX system. The transmitters that players use to open the parking lot gate from their cars are integrated with VAX, providing a record of each time the gate is activated, and by whom. In addition, a 12MP camera captures very high-resolution video of the vehicle entering and exiting, along with the person driving it, and that video is linked to the respective access control event. “Very expensive cars are left in the lot for extended periods, when the team is traveling, and this makes sure that absolutely nobody gets into that parking lot who shouldn’t be there – not even the office staff,” says the Security Director. The facility’s surveillance system includes close to 50 cameras, inside and outside the building, connected to Vicon’s Video Management System, Valerus. They range from 2MP to 12MP, depending on their use, and all are from Vicon. Any doorway equipped with a VAX controller has a dedicated camera mapped to it, so that video verification can be made of anyone entering a restricted area. Valerus VMS and 360-degree Network Cameras Special 360° cameras are mounted high on each of the exterior corners of the building Special 360° cameras are mounted high on each of the exterior corners of the building. Valerus VMS software dewarps their fisheye image and breaks it into four separate views from each camera. Those four cameras provide the security team with 16 different camera views from around the building’s perimeter, providing a very cost-effective way to cover such an expansive area. The same type of cameras is used within the team’s equipment room, where warehouse style racking is filled with valuable inventory. The system is managed by the team’s head of security and head of IT. Valerus’ thin-client web-browser interface provides monitoring access to support staff, including the team’s receptionist. The system’s video search capabilities have made it easy for them to conduct investigations. Video has helped to identify vehicles that were improperly driving on the turf field, document a theft on the property, and trouble-shoot when the parking lot gate had mechanical problems. Motion Activated Cameras Special motion-activated 2MP cameras are positioned at every door that provides access between the players’ area and the field One of the more unusual uses for the system is not related to security at all. The team’s professional athletic league requires team management to retain a full year’s documentation of the time each player spends on the practice field. To do this, special motion-activated 2MP cameras are positioned at every door that provides access between the players’ area and the field. Anyone walking from the field to the building triggers the motion sensor and is recorded in high-definition video. That way, if a player initiates a legal battle saying he practiced too long, there is clear documentation of exactly when he was on and off the field. Vicon’s Valerus delivers powerful, end-to-end security solutions that are easy to manage. Its work with this professional sports team also highlights its ability to deliver convenience to employees and operational efficiencies to management.
3xLOGIC, Inc., global provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, has announced that, in cooperation with Control Installations of Iowa (Ci3), the two companies have donated a completed video surveillance system for this iconic ball field and movie set located in Dyersville, Iowa. Installations Of Iowa Collaboration “Several weeks ago, there was an act of senseless vandalism that occurred on this high-profile ball field and a lot of damage was done by someone with a very poor sense of judgment,” recalled Carl Bracken, Technical Security Sales for Ci3. “The president of my company shot me a text before I even knew about the vandalism, suggesting we get involved and try to help.” Field of Dreams, released in 1989, is a movie that has inspired millions and became an Academy Award nominee for Best Picture of the Year Field of Dreams, released in 1989, is a movie that has inspired millions and became an Academy Award nominee for Best Picture of the Year. “Nearly thirty years later, we still get more than 110,000 visitors a year,” said Denise Stillman, Manager of the Field of Dreams movie site. “Most folks come to run the bases or explore the corn field. We’re the only ball park open 365 days a year, and we’re the world’s largest pick-up baseball game.” The vandalism to the field was fairly extensive and, unfortunately, also involved destruction of expensive irrigation equipment. Bracken contacted Denise Stillman to explore installing a video surveillance system for the tourist site. After initial discussions, he visited the site on a Saturday, with demo gear in hand, to show Stillman the possibilities. She was keen on what she saw but there was nothing in the budget for such a system. 3xLOGIC V250 NVR and Mini Dome CamerasInstallation comprised of a 3xLOGIC 8-channel V250 NVR; one 3xLOGIC thermal imager, pointed at the bridge leading to the site entrance Working with his company president and reaching out to various vendors, including 3xLOGIC, Bracken came up with a plan to provide the Field of Dreams with the enhanced asset protection and increased security they needed. Recently, Bracken and his team of skilled technicians completed the installation comprised of a 3xLOGIC 8-channel V250 NVR; one 3xLOGIC thermal imager, pointed at the bridge leading to the site entrance; a 3xLOGIC 3 MP mini-dome to cover the retail sales area; and two cameras covering the field itself. The recording equipment is installed on a shelf in the retail store, which is convenient and secure. “We hadn’t really thought much about security, because for 29 years we had no incidents,” said Stillman. “Now that the system is in place, it’s doing a lot of things for us. The gift shop staff feels much more confident now that they have eyes and ears watching over them. For me, I have a sense of comfort that wherever I am in the world I can see what is happening at the field at all times—I can even check if the sod is greening up. I love that, and the 3xLOGIC mobile app, View Lite II, is easy to use and empowering.” This place is important to the fabric of Iowa life and lifestyle" “This place is important to the fabric of Iowa life and lifestyle,” continued Stillman, “and Ci3 really stepped up. Carl (Bracken) was very generous with his time and he gave us a solid comfort level in understanding what we needed, what the system would look like, and how it would function. Other local vendors wanted to help, but no one took the time like Carl and Ci3.” “Along with 3xLOGIC, we were happy to make this donation. We knew Denise didn’t have sufficient budget, and they still needed to find the money to pay for their expensive irrigation system repairs,” said Bracken. “This really gives us piece of mind when no one is on site,” said Stillman, “we now have excellent visibility to areas we must be able to see, and the system provides a great deterrent effect, too.”
STANLEY Security, one of the most trusted names in the world of security, has provided a photography studio in Knowsley, Merseyside, with a top class wireless Ricochet technology-based alarm system financed through STANLEY Assure. Studio Argent is a 5,000 ft. sq. studio that houses and uses state-of-the-art digital equipment to produce creative and commercial photography for numerous large national and international clients, making security of their premises a priority. Ricochet Wireless Networking Technology STANLEY Security installed a modern intruder alarm system based on STANLEY’s Ricochet technology. This next generation wireless networking technology operates by receiving repeated wireless transmissions from devices located throughout the studio building to ensure that even the remotest areas are secured. Furthermore, any weak signals between devices prompt the Ricochet network to self-heal and automatically re-route communication so that the studio is protected at all times. STANLEY Security recommended the studio’s existing aging intruder alarm system be replaced, with the costs covered under STANLEY Assure STANLEY Security recommended the studio’s existing aging intruder alarm system be replaced, with the costs covered under STANLEY Assure. STANLEY Assure is a finance solution for customers wishing to benefit from up to date security technology without the risks of ownership and with evenly spread, manageable payment terms with no hidden extra costs. Additionally, included is a full monitoring package for total peace of mind. STANLEY Intruder Alarm System STANLEY Assure removes the need to justify and raise significant capital outlay in a depreciating asset. Instead, STANLEY will buy back and take over an existing security system, upgrade it to incorporate the latest security technology, and then hire it back for usage. It provides an affordable means of upgrading a complete security system. Studio Argent not only benefitted from STANLEY Security’s product technology, but also gained access to STANLEY’s NSI Gold accreditation ProtectionNet Customer Service Center (PNC) as a part of the contract. As a result, Studio Argent receives 24/7, 365 days a year monitoring and immediate customer care. The ease of usage of the new STANLEY intruder alarm system allows Studio Argent to activate the system in under five minutes Mesh Technology and Reduced False Alarms The ease of usage of the new STANLEY intruder alarm system allows Studio Argent to activate the system in under five minutes, while previously the process took approximately 40 minutes. Furthermore, whereas the old system was hypersensitive and would often be set off by mice and moths in the building, the new system, relying on latest mesh technology, ensures no false alarms occur while offering airtight security which is easily scalable, should the studio expand its premises. After repeatedly having to pay additional, hidden costs to the previous security supplier for patch up work to the studio’s 20-year-old alarm system and dealing with subpar service which in one incident breached the national code of conduct for UK Alarm providers, Studio Argent was pleased to make the cut and move to a reliable security provider. John Organ, Owner of Studio Argent, happy with the move to STANLEY’s new alarm system said, “From the knowledgeable and expert representatives who contacted me to the total peace of mind and ease of operation that it offers, I feel that STANLEY Assure has really changed my life. I would not hesitate in recommending STANLEY to anyone.”
ANSecurity, a specialist in advanced network and data security, has announced a successful project with Nottinghamshire Healthcare NHS Foundation Trust to move to the SHA-2 cryptographic standard to help strengthen its security posture. With over 12,000 computing devices and 500 servers under its management, Nottinghamshire Healthcare has maintained an ongoing strategy to continually improve its security controls. Most of its systems are used internally and unconnected to the internet. However, increased use of BYOD and more interconnection has prompted the IT department to instigate a migration of its PKI infrastructure to the newer SHA-2 (Secure Hash Algorithm 2), a set of cryptographic hash functions that is widely used in security applications and protocols, including TLS and SSL, PGP, SSH, S/MIME, and IPsec. ANSecurity helped the Trust to overcome the complexity of its legacy PKI, along with dependencies on existing services including mobile device onboarding and remote access control Overcoming The Complexity Of Legacy PKI “SHA-1 has been depreciated in terms of its security capability, however not all our applications or servers natively supported SHA-2 which meant we needed to consider the upgrade with the context of a wider application server upgrade,” explains Andy Spencer, System Team Leader for Nottinghamshire Healthcare, “It is a significant project that we felt could benefit from dedicated security expertise for which we turned to ANSecurity.” ANSecurity helped the Trust to overcome the complexity of its legacy PKI, along with dependencies on existing services including mobile device onboarding and remote access control. As Jason Parry, Network Security Architect for ANSecurity explains, “We discussed at length with Andy and his team the merits of several deployment scenarios to determine the best course of action. Next, we agreed a process with various business groups who consume PKI and once ratified completed our standard scope of works documentation with pre-requisites to streamline the deployment.” The entire migration project including legacy operating systems migration and remediation of weaknesses within the SHA-1 signatures took just 3 days Improved Security Posture The actual project was driven by the Nottinghamshire Healthcare’s IT department under guidance from ANSecurity to ensure high levels of knowledge transfer. The entire migration project including legacy operating systems migration and remediation of weaknesses within the SHA-1 signatures took just 3 days, leading to improved security posture without any disruption to its 24/7 operations. “Any organizations with a legacy windows PKI environment need to perform something similar,” Parry explains, “This may not require a wholesale replacement and in many cases, it might be applicable to perform a simpler migration to new servers along with an upgrade that renews existing PKI infrastructure.” ANSecurity have performed dozens of these projects over the last 24 months and has a significant number planned for the next year. “The NHS with its large number of legacy systems is a sector that is rapidly moving to SHA-2,” says Parry. “Busy IT staff that may have overlooked these types of projects due to the complexity of legacy applications servers should not be overly concerned as the process for migration is relatively straightforward and uses a well understood process.”
DUOX, the Fermax 2 Wire digital system using stylish VEO video monitors was the system of choice for DUK Construction LTD responsible for the installation of electrical and security systems in this prestigious new development in South London consisting of 88 apartments and 5 communal entrances together with 13 bike and bin storage areas. DUOX Access Control System The Fermax system combines the modern innovative 2 wire DUOX access control system with high specification 316 MARINE grade stainless steel door entry panels, laser cut at the Fermax manufacturing facility in Valencia, Spain and specifically designed to meet the needs of the project by integrating a stylish proximity access control reader at each entry point. Networked CCTV also provided by Fermax UK completed the site security and door entry system The system provides ease of access for residents, visitors and trades people as well as offering a host of features for residents using the new DUOX VEO monitor installed in each apartment. As well as its elegant design the VEO monitor complete with handset provides the added PHOTOCALLER feature which enables residents to capture and store images of visitors who have called their apartment from the entrance panel while they were away. Networked CCTV also provided by Fermax UK completed the site security and door entry system. Fermax 2 Wire DUOX System System design and onsite technical support by the Fermax engineering and commercial team ensured that the project was completed on time and to specification. DUK Construction project manager commented “The Fermax 2 wire DUOX system was very easy to install and we were given excellent support from Fermax UK in the face of very tight schedules and a number of technical challenges. We are delighted with the system solution provided by Fermax.” If you want to know more about DUOX advantages, download our e-book. Discover the power of digital in 2 wires!
Developer of complete end-to-end video security solutions, IndigoVision, along with their authorized partner, Boston Networks and valued technology partner, Dell Technologies, has provided Social Bite with a security system for their Social Bite Village. Social Bite is on a mission to build a collaborative movement to end homelessness in Scotland, thanks to recent fundraising efforts the Social Bite Village has become one of their many projects to help achieve this goal. The idea is to bring people from all walks of life in Scotland together to ensure that no one ends up homeless. The Social Bite Village aims to provide a low cost, innovative and safe environment for up to 20 people for 12-18 months. Residents will be provided with the support, community and skills required to get their life back on track, including work placement opportunities and employability support. After the 12-18 months period expires, the residents will transition to permanent accommodation and receive support in gaining employment, supporting their return to society. As one group of residents leaves the village, another can then enter and begin their journey. Residents will be selected from individuals in temporary and unsupported accommodation. The ambition behind this project is to create a full circle solution to the issue of homelessness – from housing to support to employment. IndigoVision is proud to have been a part of a project that will contribute with such a positive change in Scotland" Site Surveillance IndigoVision, Boston Networks and Dell Technologies have worked together to help Social Bite reach their goal by installing a security system to provide surveillance for the village site, specifically during the evening hours to ensure all people on site were kept safe. Commenting on our involvement with this project IndigoVision’s Chief Executive Officer, Pedro Simoes, said “IndigoVision is proud to have been a part of a project that will contribute with such a positive change in Scotland. It’s been a great privilege to work along with Boston Networks and Dell Technologies to provide the Social Bite Village with innovation that makes you safe.” Vandal-Resistant Minidome Cameras As part of the installation, IndigoVision provided 11 state-of-the-art BX HD vandal-resistant minidome cameras, which deliver high-quality video and audio in all environmental conditions. Boston Networks provided a survey of the Granton Road site, following which they laid cabling and set up point-to-point links to provide backhaul connectivity to support the network, before installing the cameras and configuring the security system. Purdicom and InfiNet, Boston Networks’s distribution and wireless partners, provided the back-to-back wireless kit and license. IndigoVision, Boston Networks and Dell Technologies have gone above and beyond in supporting Social Bite to create the Social Bite Village" Hybrid NVR Workstation Finally, a Hybrid NVR workstation, which allows Social Bite to save recordings from the site, and a workstation monitor have been provided by Dell Technologies to complete the security system. Founder of Social Bite, Josh Littlejohn MBE, said: "Companies such as IndigoVision, Boston Networks and Dell Technologies have gone above and beyond in supporting Social Bite to create the Social Bite Village in Granton, Edinburgh. We are deeply thankful - your contribution will help ensure that we are able to support people towards independence, changing lives for the better."