Pulse Secure, global provider of secure access solutions to both enterprises and service providers, has announced that the IAIT Lab (Institute for the Analysis of IT components) has completed an extensive test of Pulse Connect Secure, resulting in superb findings across usability, comprehensiveness and interoperability for the market leading VPN solution. Pulse Connect Secure Pulse Connect Secure provides easy, secure, authenticated access for remote and mobile users to corporate resources&mda...
Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announced the release of Pulse Policy Secure (PPS) 9.0R3 to extend its Zero Trust Security model to IIoT devices and smart factories. The new version enables factories to streamline machinery repairs and diminish costly production downtime through IT-managed secure access. It also secures networks by expanding its behavioral analytics to IoT devices, detecting anomalies and preventing their compromis...
Ava Group (AVA), global provider of security risk management services and technology will be presenting its portfolio of security solutions at International Security Expo, stand E74. The expo also hosts a range of certified conferences and workshops covering every major sector of the security industry. Taking place over two days at London Olympia, the event focuses on the needs of government and CNI amongst other key sectors. Fiber Optic Intrusion Detection Ava Group will be showcasing the lat...
ISS, Intelligent Security Systems, global provider of intelligent VMS and analytics, is showcasing two highly specialized analytics solutions for vehicle surveillance and law enforcement applications at ISC East 2018 (booth #527). Natively developed and designed to seamlessly integrate with ISS’ SecurOS v10 platform, SecurOS UVSS (Under Vehicle Surveillance System) combines advanced software and hardware for remote under-vehicle surveillance. Furthermore, the ISS SecurOS Motus is an IP-cam...
Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announces that the company has been recognized as one of the private technology startups in the elite 2018 Red Herring Top 100 Global ranking. “With the pervasiveness of mobile, IoT and cloud, assuring protected access to applications and sensitive information is a key challenge for IT organizations of all sizes. This is exactly the problem that Pulse Secure has addressed with its portfolio of...
Having returned from Security Essen, Traka’s International Sales Director, Martin Woodhouse, reflects on the show and why it was so important to attend for the industry leader in innovative key and equipment management systems. Q: How was the show? Martin Woodhouse: Security Essen was great in allowing us as a global brand, and part of the ASSA ABLOY Group, to demonstrate how we are listening to our customers (new and existing) and responding with latest advances in intelligent solutio...
A dependable Internet connection is virtually every industry’s sustenance and without it, business dies. Yet many don’t realize how frequently the worst occurs, or how dramatically it could impact their livelihood. According to industry research, network downtime can cost small and midsize businesses (SMBs) anywhere from $5,600 per minute, to between $8,600 and $74,000 an hour. Whether it’s business continuity for users in retail/point-of-sale (POS), construction, banking, insurance, restaurants and hospitality, or its primary connectivity for end users in utilities, transportation, security, municipalities, kiosks, ATMs and digital signage, in addition to the financial drain, IT failures have far-reaching repercussions that can result in permanent client loss, missed deadlines, devalued brands and more. Fleet Management And Asset Tracking SensLynx Seamless Failover automatically rescues lost primary wired or broadband connections to maintain business continuity Though many backup options exist, most are complex or costly, and almost none provide a complete and easy to set up solution. SensLynx, widely known for its popular fleet and asset tracking program, painstakingly designed its new suite of seamless IoT solutions to fill this void. Their integrated plug-and-play bundle comes with everything needed to prevent interruption including software, hardware and connectivity, plus fully managed services and monitoring built-in through their cloud manager services, all wrapped up in one low monthly rate. SensLynx Seamless Failover automatically rescues lost primary wired or broadband connections to maintain business continuity. SensLynx Seamless LTE almost instantly deploys primary connectivity to new or temporary (pop-up) locations, while also functioning as a backup or secondary connection. Its applications encompass trade shows, oil and gas remote monitoring, in-vehicle, mobile or portable uses, disaster recovery and every other primary connectivity category. Both solutions are feature rich and ready-to-go, but it’s the SensLynx Seamless SD-WAN technology that’s truly changing the connectivity game. SensLynx Seamless SD-WAN Technology Initially, SensLynx Seamless IoT Solutions will focus on cellular carriers, master agents, telecom VARs and managed service providers (MSPs) We all need reliable IT connections, but we all want faster speeds and broader throughput. SensLynx Seamless SD-WAN delivers both. This solution is capable of combining multiple wireless or wired networks (e.g. cable, DSL, and broadband), into one seamless and super-quick connection that’s unbreakable. Even if one goes down, the others will continue. That means customers benefit from ‘always on’ connectivity and increased productivity to boot. Traditionally, SD-WAN technology of this caliber is too cost prohibitive for SMBs, but with SensLynx’s introduction of Seamless SD-WAN, what was once unattainable is now accessible. Rob Garry, SensLynx Co-Founder and CEO said, “I’ve worked with the most prominent wireless communications companies in the world and founded two IoT/M2M corporations in the last 20 years but, until now, I’ve never been more confident in the potential success of our new solutions.” Initially, SensLynx Seamless IoT Solutions will focus on cellular carriers, master agents, telecom VARs and managed service providers (MSPs). However, being partner-centric, SensLynx is already in development on a synergistic Channel Partner/Reseller Program to support indirect sales avenues. “By simplifying IoT and providing SMBs with bundled, affordable solutions, worry-free wireless failover and primary connectivity, SensLynx is fulfilling its vision of bettering businesses with cost savings and efficiencies,” said Tom Maguire, COO and CMO of SensLynx.
Opening up new possibilities for competitive video surveillance deployments in retail, restaurant and small business applications, IDIS has launched a compact range of robust, high performance cameras and recorders. The IDIS Compact Solutions series is designed for rapid installations and both single and multi-site roll outs, allowing for the mixing and matching of analog and IP technologies, making upgrades and system extensions more affordable than ever. IDIS Compact Solutions The new line includes a choice of network and HD-TVI cameras and recorders, all of which are easy to install through one-click network configuration. A highly competitive price point comes without any compromise on IDIS’s signature reliability and performance, while hardened network security protocols provide complete reassurance against hacking risks. The new Compact Solutions line features 4-channel compact recorders that can be conveniently desktop or wall mounted, and for end-users and operators - including branch managers, small business owners and security personnel – the line combines high performance features with simple operation and a choice of client software. The IDIS Compact Solutions range is hard-wearing, making it particularly durable and perfectly suited for busy environments where reliable capture of high definition video images is important. IDIS Dome And Bullet PoE Cameras IDIS’s DC-D4212R dome and DC-E4212WR bullet PoE cameras are perfect for confined spaces yet deliver full-HD performance IDIS’s DC-D4212R dome and DC-E4212WR bullet PoE cameras are perfect for confined spaces yet deliver full-HD performance in live view and playback (including on remote devices such as smartphones) and come with motion detection, tamper alarms, zoned privacy masking, day and night ICR and IR LED up to 20m. A choice of four and eight channel IP or HD-TVI recorders allows fast and trouble-free installation and lets installers take advantage of existing coax cabling. The IP recorders also benefit from H.264 live view which eliminates the need to upgrade hardware peripherals. For highest performance streaming capacity, H.265 and IDIS Intelligent Codec compression deliver bandwidth savings of up to 90 percent, ensuring smoother real-time viewing and full evidence retention. “The new IDIS Compact Solutions line continues our longstanding tradition of market-responsive offerings, designed and developed in house to meet the real-world needs of our industry partners and end-users. This new line of fills an important need in the market, for high value, high performance technology from proven market leaders able to reliably meet highly specific requirements in vertical spaces, such as retail, and smaller business operations,” noted Keith Drummond, Senior Director, IDIS America. IDIS Total Solution As with all IDIS products the Compact Solutions range is backed by industry-lauded technical support and service, including the company’s global technical support operation, co-located with IDIS America’s regional headquarters near Dallas, Texas. The new IDIS Compact Solutions line is the latest offering in the powerful and award-winning IDIS Total Solution—an end-to-end, single sourced offering that delivers unrivaled plug-and-play simplicity (combined with highest-quality performance, compatibility, now featuring the longest recorder warranty in the industry), with a low total cost of ownership.
Pulse Secure, the provider of Secure Access solutions, announced its designation as a Distinguished Vendor in this year’s ‘2019 TAG Cyber Security Annual’. Pulse Secure recently became a member of the world’s leading cybersecurity vendors as selected by Dr. Edward Amoroso, CEO of TAG Cyber, and added to this year’s report. Each year TAG Cyber publishes its three-volume report to the IT community for download at no cost. Volume Two of the report also includes an informative interview with Pulse Secure CEO, Sudhakar Ramakrishna. Assisting Chief Information Security Officers This year’s ‘TAG Cyber Security Annual’ was developed to assist chief information security officers (CISOs) and security teams as they advance their information enterprise cybersecurity protection programs and best practices. Beyond offering a ‘periodic table’ of cybersecurity controls, the volume offers insights as to key control trends based on expert and practitioner participation. Beyond offering a ‘periodic table’ of cybersecurity controls, the volume offers insights as to key control trends based on expert and practitioner participation “Ed Amoroso and his team have put together a pragmatic compendium of security controls and outlooks that can be readily applied by information security professionals. We are pleased to have participated and to be distinguished in this report as TAG Cybers’ service to the IT community and their best practices are to be commended,” said Sudhakar Ramakrishna, CEO of Pulse Secure. Expediting multi-factor authentication The 2019 Tag Cyber Volume Two highlighted key trends within 50 top controls. Key findings within Secure Access controls highlighted in the report include: Where initial generations of remote access focused on teleworkers and two-factor authentication, next-generation secure access solutions are increasing effectiveness by expediting multi-factor authentication and integrating with modern cloud and mobility platforms Leading secure access vendors are delivering solutions equally focused on user experience with the goal of minimizing the steps required to establish secure connectivity The future of secure access lies in device-to-cloud, where mobility and embedded controls ensure that authentication, encryption and integrity are in place. While the use of public clouds to host enterprise applications will eventually remove access to the corporate LAN, this function will remain in hybrid mode for several years where traditional remote access will remain in place during this transition period Simple, robust and interoperable approach “Ensuring secure access to a multitude of applications and resources is a business imperative that challenges IT as enterprises accelerate data center virtualization and cloud computing. As such, organizations are reassessing their technology stack that comprises Secure Access,” said Amoroso. “Pulse Secure is among leading vendors focused on offering a simpler, more robust and interoperable approach for enterprises as they migrate from remote access to more advanced hybrid IT access protection.”
Eyecloud Cam, smart home security camera, is now available via a Kickstarter campaign. Aimed at keeping house, family and belongings safe, Eyecloud Cam ensures affordable security with a single Eyecloud Cam costing less than $100. Eyecloud Cam Home Security Camera Eyecloud Cam is a home security camera that constantly monitors the safety of the family and home by putting one of the most advanced computer vision AI technology right inside the camera. After positively identifying a threat, Eyecloud Cam sends out a notification with a description of the event, with unprecedented accuracy as to why it has chosen to send out this alarm. To make a Smart Home even more safe, Eyecloud is working on making the Eyecloud Cam fully compatible with Amazon Alexa. Computer Vision AI Technology Eyecloud Cam is completely cordless and requires no base station to operate The Eyecloud Cam is stylish, yet compact and discrete. Put the easy-to-mount Eyecloud Cam at the precise location to facilitate 24-hour detection and surveillance. An Eyecloud Cam at the front door can monitor visitors, inside the home, the Eyecloud Cam can warn of intruders, watch over pets and children, or could help provide early warning of safety incidents. To ensure the safety of property, put an Eyecloud Cam in the backyard or watch over the garage. With its long six-month battery life, onboard AI, and 8GB of local storage, Eyecloud Cam ensures all-round residential, family, and property security, even while power and internet access are unavailable. Eyecloud Cam is completely cordless and requires no base station to operate. Configurable For Alert Situations The cam's smart technology can tell the difference between intruders, visitors, acquaintances, or kids playing in the backyard, and sends alerts only when it detects unusual events. For privacy reasons, the Eyecloud Cam will send a text notification warning to all the connected users, who can then open the app to find out the real reason for the alert. The Eyecloud Cam is completely configurable for alert situations, from snapshots or videos, the owner is in complete control.
GlobalPlatform, the standard for secure digital services and devices, has published two configurations to simplify and expedite the implementation of its Trusted Execution Environment Management Framework (TMF). The configurations offer guidance on the specific parts of the framework that need to be implemented to remotely manage Trusted Execution Environments (TEEs) and their trusted applications (TAs) on particular device types. “The original TMF specification is extensive, covering a wide range of use cases and business models, from basic IoT devices to rich-featured devices like smartphones,” comments Gil Bernabeu, Technical Director of GlobalPlatform. “To help manufacturers of IoT devices - like automotive equipment, gateways, and industrial devices and appliances - we have developed two configurations to define a minimum subset of remote functions that allow a consistent level of management. This will dramatically reduce the time needed to implement TEE application management on those devices.” Single Purpose And Rich-featured IoT Devices The configurations and framework will be used by service providers, application developers, device manufacturers and TEE implementers The two configurations address the needs of different use cases: Single purpose IoT devices that fulfill simple use cases like sensors for smart homes, buildings and cities. They are often controlled by a single entity, manage a single application and contain one security domain and therefore need fewer management commands. Rich-featured IoT devices like gateways, automotive in-vehicle infotainment (IVI) systems and smartphones. They require a richer management framework, that enables numerous service providers’ applications to be isolated within their own security domains in the same TEE. The configurations and framework will be used by service providers, application developers, device manufacturers and TEE implementers. They enable TEE users to securely install, update and personalize trusted applications on a TEE once it is active, providing clear and practical direction into the management requirements of trusted applications. Better Clarity And Stability To On-device Security The ongoing standardization of TEE management brings significant value and flexibility to those providing trusted services on connected devices" “The ongoing standardization of TEE management brings significant value and flexibility to those providing trusted services on connected devices. This work is bringing greater interoperability to the management of trusted applications across devices, streamlining deployments and bringing greater clarity and stability to on-device security. With the IoT world developing at pace, these configurations will be invaluable to the deployment of foundational security without impacting the pace of innovation,” adds Gil. GlobalPlatform will examine critical security technologies, such as the Trusted Execution Environment (TEE) and Secure Element (SE), and also delve into their associated business and technical use cases to explore more deeply the need for security in the connected world at their 6th annual seminar on September 19 in Beijing, China.
Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, provider of residential security, announces the availability of the contemporary versions of the company’s popular traditional deadbolts: the SmartCode 914 Deadbolt Lock and SmartCode 916 Touchscreen Electronic Deadbolt. With their updated, modern designs, these new stylish versions of the industry’s leading wireless, access control locks continue to utilize Kwikset’s Home Connect technology. As a result, they integrate with home security and automation systems to deliver convenience and peace of mind to homeowners with remote locking/unlocking via smartphones and tablets. Wireless Security Features The new versions of the SmartCode 914 and SmartCode 916 with Home Connect technology incorporate the new Z-Wave 500 Series chip. The new chip provides a number of enhancements, including extended wireless range and wireless security features that reduce the vulnerability of the network during enrollment, as well as increased battery life. Said Keith Brandon, Divisional Vice President of Residential Access Solutions, Spectrum Brands, Inc. – Hardware & Home Improvement Division, “These additions to the SmartCode line exemplify Kwikset’s commitment to not only meeting customer demand for convenience-enhancing technology, security and innovation, but also providing a variety of aesthetic options.” SmartCode 916 also features Kwikset’s unique SecureScreen, which helps mask ‘smudge’ attacks Convenience Of Features Both the SmartCode 914 with its 10-button keypad and the SmartCode 916 with its responsive capacitive touchscreen offer the convenience of features like keyless entry and dedicated one-touch locking, as well as the security of an all-metal, tamper-resistant interior escutcheon, ensuring top-quality and durability. The SmartCode 916 also features Kwikset’s unique SecureScreen, which helps mask ‘smudge’ attacks in which users codes can be potentially jeopardized by detecting frequently used numbers from the oily residues on the touchscreen surface. Both locks are available in three finishes: Polished Chrome, Satin Nickel, and Venetian Bronze. MSRP for the SmartCode 914 is $199; MSRP for the SmartCode 916 is $229.
As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of security — it’s here. If you’re hesitant to make the move to the cloud, consider these six reasons to embrace this new technology now. Cloud technology has created an opportunity for integrators to offer managed services to their customers Increased RMR Cloud technology has created an opportunity for integrators to offer managed services to their customers, producing a new business model that generates more stable and predictable income streams. By offering managed services on a subscription basis, integrators can build a part of their business to provide recurring monthly revenue (RMR), allowing them to scale faster. This business model is especially beneficial for customers who prefer to pay a fixed monthly or yearly rate for services rather than a large upfront fee, which can help attract new business while growing revenue from current customers. Stickier Customers Providing managed services fosters a more involved relationship between integrators and their customers, which can help boost customer retention. This is primarily the result of three factors. Firstly, customers who buy managed services are committed for a specified term, which helps develop an ongoing business relationship between them and the integrator. Secondly, providing managed services creates an opportunity for more customer contact — each interaction is an opportunity to build rapport and monitor customer satisfaction.While the functionalities of each system vary, their potential is evident in the cloud-based services available Third, customers who purchase managed services generally tend to do business longer than customers who purchase products or services individually; with the monthly purchase of their services on autopilot, customers get into the habit of receiving these services, which helps reduce the chance that they’ll cancel their subscription while also building customer loyalty. High Gross Profit Margins Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. On an ongoing basis, cloud service platforms offer a new level of accessibility to integrators, helping to provide better insight on activity trends to identify opportunities to continuously grow their revenue through subscription-based streams. Easier To Provide Managed Services Traditionally, serving more sites required integrators to hire more technicians to meet the needs of their growing customer base, but the cloud has helped overcome this demand. While the functionalities of each system vary, their potential is evident in the cloud-based service platforms that are available today. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue The Avigilon Blue™ platform, for example, is a powerful new cloud service platform that helps integrators address the needs of their customer sites using fewer resources by offering the ability to administer system upgrades, fixes, health checks, and camera or system settings adjustments remotely. The Avigilon Blue platform automatically sends, and stores video analytics highlights in the cloud, which can easily be accessed from any PC browser or mobile device. This data can be used to efficiently manage customer sites and maintain the health of those sites, helping to increase speed of service and expand the capacity to have more sites up and running.Cloud service platforms have the potential to revolutionize the security industry by providing new opportunities for integrators Not only does this help integrators scale their business faster, it creates an opportunity to provide added value to the customer at a lower cost as new upgrades and services come out. Proactively Fix Problems Before They Occur In addition to automating notifications and tedious maintenance tasks, cloud service platforms help provide integrators with the information and abilities they need to keep their customer sites running smoothly. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue — possibly before the customer even notices a disruption in service. They can then identify the problem and determine whether it can be resolved remotely or requires a technician to be deployed. By having the capacity to pinpoint service needs and make certain adjustments via the cloud, integrators can streamline their customer service processes and lower their response times to provide better, more efficient service. Increased Valuation Of Business Companies that utilize cloud technologies are experiencing as much as 53 percent higher revenue growth rates The ability of cloud service platforms to help integrators manage more sites remotely and expand their revenue through subscription-based streams offers a competitive business advantage. Security innovators have harnessed the power of the cloud to enhance integrator efficiency so that they can spare their attention, resources and effort for where it’s needed most. As a service that helps offer scalability and a high gross profit margin while requiring fewer resources to maintain customer sites, cloud service platforms have the potential to revolutionize the security industry by providing new opportunities for integrators that may ultimately increase their business valuation. According to a study by Dell, companies that utilize cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Integrators who adopt cloud service platforms can benefit from numerous advantages — cost-saving maintenance capabilities, the potential to generate new monthly recurring revenue, and user-friendly design and data security — which make them a significant development within the industry as well as a potential lucrative new business model. The dream of cloud technology is no longer a distant idea of the future, it can become a present reality — and integrators who harness its power can reap its business benefits now.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable Advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorized user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted Part Of Security Network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorized user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorized individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security By Location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal Items Using QR codes seem to be a simple but reliable identity and access control authentication optionMobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost Savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated Technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading Existing Security Systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid Systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organizations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing The Benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-Driven Decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technological improvements to the places we live offer a significant opportunity to not only improve our personal lives and wellbeing, but to also ensure our cities are able to continue contributing to the wider economy. One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyze data on large crowds at sporting eventsThe IoT already accounts for swathes of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. In an IDC study sponsored by Seagate, Data Age 2025 estimates that by 2025, nearly 20% of data will be critical to our daily lives and nearly 10% of that will be hypercritical. Data is no longer just going to provide simple insights and recommendations, it is going to be making decisions that impact the fabric and quality of everyday life. Analysis And Application The decisions that this critical data is attached to must be made quickly. A living, breathing city must constantly be monitoring, assessing and utilizing data in order to ensure it keeps people safe and mobile. A prime example of this is in the Dutch city of Almere, where the local police force and parking management teams are using surveillance technology to improve congestion and manage traffic flow. This is hugely important when 20% of city traffic is caused by drivers circling around trying to find a parking space, according to Stuart Higgins, Strategic Lead - Cisco Impact. While older cities such as London may not be as equipped with new technology like modern cities, such as Dubai, an appreciation of the different ways individual cities can adopt technology is vital. For those that have the right infrastructure, one key benefit will be the ability to use video surveillance to analyze data on road congestion, or even large crowds at sporting events or national ceremonies. Using this data to spot patterns of behaviour will enable city planners to develop long term solutions to ensure city life runs smoothly. Instant Access To Connected Devices By 2025, an average connected person anywhere in the world will interact with connected devices nearly 4,800 times per day — that’s one interaction approximately every 18 seconds. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever It isn’t just new-paradigm services such as Uber that are causing this. Increasingly, the ability to instantly access data relevant to many aspects of our lives will drive our interactions with these devices, and industries around the world are undergoing a digital transformation motivated by these evolving requirements. The benefits of data access is best shown through Project Green Light in the US city of Detroit, where the police department has partnered with gas stations across the city and the community to improve the quality of life within the neighborhood. The result is a strengthened relationship between public services and private businesses operating in the area. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever. When it comes to surveillance in our cities, the need for not only the technology but the hardware to analyze this data is of imperative importance. Real Time Data Storage Availability The growth of real-time data will cause a shift in the type of storage needed in the future – with fast, uncompromised access to data being non-negotiable. Data Age 2025 predicts that by 2025 the global datasphere will grow to 163 zettabytes. The security of our data and how it is stored will be the foundation to any future smart city strategy That’s ten times the 16.1ZB of data generated in 2016. This increase in data will propel the need for data to be available in real-time to heighten the focus on low-latency responsiveness from enterprise edge storage, as well as from the endpoints themselves. The rise in edge computing exemplifies how this demand is already present. The stakes are rising and with them, the critical importance of our data’s veracity and timeliness. It is important to identify city-wide data partnerships, architecture, and standards for effective and safe data sharing when developing a data strategy. Securing Stored Data It’s important to note that the security of our data and how it is stored will be the foundation to any future smart city strategy, ensuring that safety, regulatory, speed and access requirements are all met. Securing the data that underpins life as we know it is circular, not linear. Every company that creates, uses or touches data has to have a role in keeping it secure and should be the backbone of any smart city. What’s evident however is that digital transformation is shaping the surveillance industry and in turn how our cities operate. As a result, data is the fuel that will ensure the impact is a positive one. People, government and businesses all contribute to the cities of today, so no one can afford to ignore the shift we are seeing. The cities that utilize surveillance data when considering any changes to their infrastructure will ultimately become the cities of tomorrow, not only future-proofing, but prospering in the data-driven age.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign soccer fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk Management Best Practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralized and flexible, with resource deployment guided by effective situational awareness.Primary security and emergency operations centers will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces.” Primary security and emergency operations centers will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role Of Law Enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centers on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behavior analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous Anti-Terrorism Measures A Fan ID card is required to enter the 2018 FIFA World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private Security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games.Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armored cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive Security Approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognizant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.”Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travelers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travelers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
Change is happening at MOBOTIX, and the German company wants to get the word out. “This company has been around since 1999, and people still give us a blank stare because they don’t understand what’s behind the curtain,” says Joe Byron, Vice President Sales Americas, MOBOTIX CORP. “As we gain visibility, people really want to know ‘what’s going on over there?’” There’s a lot going on. A new CEO, Thomas Lausten, who joined the company last year, is a former Milestone employee who brings with him the Milestone philosophy of open systems. It’s a culture shift for MOBOTIX, which has historically favored closed systems. “We needed a new leader to take us to the next level,” says Byron. “Thomas brings an open-platform mentality. He listens to a variety of opinions – from end users, architects and engineers, and MOBOTIX employees – before formulating a smart decision. That will take us to the next level.”MOBOTIX has been well ahead of the industry’s technology curve, and several early innovations have recently become more common The MOBOTIX Ecosystem Over the years, MOBOTIX has developed a unique “culture” that has many rabid devotees; some say it’s the security industry’s version of tech giant Apple. “MOBOTIX has many loyalists, who are enthused about the products and the culture,” says Byron. “We can build on that with a new level of products, more excitement and a new direction.” In addition to a new CEO, MOBOTIX will soon have a new chief technology officer (CTO), Hartmut Sprave, who will be joining this summer. Providing “fresh eyes on the subject” and an outside perspective from the IT industry will drive further innovation. “We don’t want to be on the bleeding edge, but on the cutting edge, and know the audience and its needs and challenges,” says Byron. MOBOTIX’ existing technology mix provides a foundation as the company makes the transition. In some cases, MOBOTIX has been well ahead of the industry’s technology curve, and several early innovations have recently become more common. An example is MOBOTIX’ decentralized system approach with edge-based recording. Tradeshow Successes Products highlighted by MOBOTIX at the recent ISC West show included the M16 AllroundDual Multisensor IP camera, S16 DualFlex IP camera and the Q26 Hemispheric 360-degree panoramic IP camera for indoor and outdoor applications. MOBOTIX Management Center (MxMC) 1.8 can change the camera settings on 80 cameras at a time. MOBOTIX IP Video Door Stations can interface with iOS and Android smartphone apps. “We have had so many things in place over so many years that people haven’t known about,” says Byron. He argues that MOBOTIX’ emphasis on technology development sets it apart from some camera companies in the U.S. market. Joe Byron, Vice President of Sales, and Ashley Grabowski, Regional Marketing Manager, at ISC West 2018 “People have been let down in the U.S. market with cameras that have been over-marketed, over-reaching and have little substance,” he says. The German engineering of MOBOTIX products and systems provides an antidote to the technology void, he says. “They are looking for the substance, and that’s what we have,” says Byron. What was missing – until now – was the “layer of integration” with other systems in the market, contends Byron. That separated MOBOTIX from the rest of the industry.MOBOTIX offers cybersecurity features that pre-dated the current industry obsession, such as HTTPS/SSL encryption in recording and playback video “But now we are an open platform, and we have these features sets and are the best of both worlds,” he says. “We can align with technology products and bring MOBOTIX to the masses. It’s a matter of listening to customer challenges and formulating a path to meet those challenges.” The fruits of that open system approach were on display at ISC West. The MOBOTIX booth featured integrations with ClearSite, Omnicast by Genetec, Konica Minolta and Mx-MSP by APB Technology. Other MOBOTIX technology partners include Avigilon, Bosch, Exacq, Gallagher, IndigoVision, Lenel, Milestone, Pelco by Schneider Electric, Salient Systems, Verint and Video Insight (Panasonic). Targeting Local Markets Another change under the new leadership is more flexibility to address the needs of local markets. “We need to be aware of our audience in the Americas,” says Byron, “and how approaching the market and the product mix may be different. We have the ability to create what we need here to be successful.” One particular concern in the Americas market is cybersecurity, and MOBOTIX offers cybersecurity features that pre-dated the current industry obsession, such as HTTPS/SSL encryption in recording and playback video. “We already have it, but we have never broadcast it to the masses,” says Byron. “We have the substance but haven’t communicated it.” Looking to enter the government market, for example, MOBOTIX faces the important requirement to be “IA compliant.” The company qualifies as IA (information assurance) compliant but just needs to go through the process of getting the “rubber stamp.” “We have so much under the hood when it comes to our products,” says Byron. He says MOBOTIX’ Internet of Things (IoT) approach can meet any end user challenges. “We can be all things to all people, if they truly get to know us. We just need to develop a vehicle to allow customers to communicate with us: What is the challenge? Nine times out of 10 we can meet that challenge with one of our cameras.”
A few friends from the security industry will gather this April to see, hear and touch the latest technologies to make the world a safer place. Actually, more than a few: there will be more than 30,000 security professionals gathering at the Sands Expo in Las Vegas April 11-13 for the International Security Conference and Exposition, usually known as ISC West. Many of the attendees will be returning to what has become a yearly ritual. The site, the players, the pace and even atmosphere of ISC West are as familiar to many as a family reunion. But the industry is changing, and those changes will be reflected in big ways at ISC West. Let’s consider a few themes we will be hearing about at the show. The Cybersecurity Of Physical Security Systems Cybersecurity has gone from being the “elephant in the room” to an existential crisis for the physical security industry: How can an industry promote security unless its own products and systems can operate securely? For a long time, no one talked about cybersecurity. Some attending ISC West may wonder if now we are talking about it too much, at the risk of too much talk and not enough action. Almost every contribution to our “review and forecast” articles for 2018 mentioned cybersecurity. Every industry event I have attended so far this year has put cybersecurity front and center. It will certainly be a major topic at ISC West.Cybersecurity has gone from being the “elephant in the room” to an existential crisis for the physical security industry Here’s the challenge for attendees to ISC West: If every manufacturer talks earnestly about cybersecurity, how can potential customers tell who is really serious about the topic, and who is merely paying lip service to the latest industry buzzword? If we all agree that cybersecurity is “everyone’s problem” – not just manufacturers, but also integrators and users – does no one really take responsibility? As the industry becomes more educated about cybersecurity, we can expect more detailed and challenging questions on the subject to permeate the ISC West show floor. Some manufacturers have likened cybersecurity more broadly to the issue of trust. Do you trust a manufacturer to address cybersecurity issues? Or do you trust them in general? The cybersecurity discussions will begin even before the show floor opens, on Tuesday, April 10, in a session titled “Cybersecurity Tier Zero: A Guide to the First Steps of Cyber Hardening.” – just one of the many other education sessions on Tuesday. The Emergence Of Video Analytics 2.0 Deep learning and artificial intelligence (AI) have become more familiar to the physical security market, and some AI applications are driving new industry trends such as robotics and analyzing Big Data. But the biggest potential impact of deep learning is in the field of video analytics, a decades-old technology that has perpetually overpromised and underdelivered. The video analytics systems are not programmed, they “learn,” using massive data sets and neural networks and GPU processors and all the rest The new wave of video analytics products claims to provide a higher level of accuracy because they operate more like the human brain. These new systems are not programmed, they “learn,” using massive data sets and neural networks and GPU processors and all the rest. But consider the bottom line: Do the new video analytics products really perform and eliminate excessive false alarms? Can they effectively search large amounts of stored video and find the few frames that can make the difference in an investigation? Months have lapsed since the first deep learning products were announced, or at least, “teased”. It’s been sufficient time for manufacturers to develop products that are ready for market, but are they? ISC West attendees will be scouring the booths for the latest developments and asking tough questions about how well these newfangled systems will actually perform.It’s all happening in the smart home market – but how fast and what will be the impact on the traditional burglar alarm business The Changing Smart Home Market We all want Siri to set our thermostat or Cortana to arm the alarm system. We want to view video from our nanny-cams on our smart phones, and to turn on the lights from anywhere around the world. It’s all happening in the smart home market – but how fast and what will be the impact on the traditional burglar alarm business that is the bread-and-butter of many security companies? Bluetooth and Wi-Fi can make a lot of things happen in the smart home environment, but what about other networking standards such as ZigBee and Z-Wave? The stakes are huge, which is why the big tech companies – from Apple to Amazon to Google – are staking their claims in the home automation market. Just this year, Amazon has purchased Ring, a video doorbell and security camera company – which will also be exhibiting at ISC West. But it’s unclear what such moves in Silicon Valley will mean for traditional security companies. The growth of do-it-yourself (DIY) systems introduces even more variables, as do alarm companies with new business models and even cloud-based approaches. Many exhibitors at ISC West – from ADT to Z-Wave – are addressing the new smart home environment and can help those attending the show do the same. About 40 companies are exhibiting in the “Connected Home” arena. The Unmanned Security and Safety Expo will return, including a dedicated complimentary education theatre for attendees Drones, Robotics and Education From robots to drones to counter-drone solutions, there other new technologies being displayed at ISC West. The Unmanned Security and Safety Expo will return, including a dedicated complimentary education theater for attendees offering sessions on topics such as “Drones – Friends or Foes to the Security Industry?” There is a level of novelty to these technologies, and attendees might be lured by the entertainment value of a subject that may fall outside their job description. But one education session addresses the nuts and bolts in the real world: “Selling the Value of Security Robots by Setting Realistic Expectations.” Could these new gadgets play a bigger role than we think in the future of the security market? For all its familiarity, there is always something new for attendees at ISC West. It may be a startup company with an intriguing value proposition tucked into a tiny booth at the back of the hall. Or it could be a big surprise news announcement from a major player. For attendees, the best surprise of all is that valuable piece of information they can take home to make their business better. Here’s hoping you find it!
On his 2018 two-day visit to Ireland for the World Meeting of Families, Pope Francis’s scheduled activity was protected by high-performance Predator and Invictus cameras from UK CCTV design and manufacturing company, 360 Vision Technology. Specialists in a wide range of leading-edge CCTV, Access Control, PA, AV and radio communications, County Kildare-based Mongey Communications was chosen to provide the additional security surveillance protection measures necessary to secure the Pope’s visit to Dublin. With the massive crowds expected to see the pontiff, the temporary surveillance installation needed to be minimally disruptive and use mobile radio to provide the multi-scene coverage required during the two-day visit. Multi-Site CCTV Surveillance The camera images were to be used for co-ordination and management by multiple agencies To support an existing small-scale CCTV installation at the Pope’s final venue of Phoenix Park (the largest enclosed city park in Europe), there was a need for further camera coverage along the park’s approach routes, entrance/exit gates, search areas and general areas of crowd movement and congregation. A similar solution was also required for the Pope’s visit to the Knock Shrine pilgrimage site and the Capuchin Day Center, where public space CCTV was again already in place but of limited overall coverage. Full integration with the existing CCTV system at the 82,300 capacity Croke Park stadium for a papal address to the Festival of Families extravaganza was also required, with communications and CCTV feeds from all locations required to be transmitted back to local on-site control rooms at each location, and additionally to a central Command and Control room at Dublin Castle. At the main Command and Control Center, the camera images were to be used for co-ordination and management by multiple agencies, including the Office of Public works (OPW), Garda Síochána, Defense Forces Ireland, Dublin Fire Brigade, HSE / Ambulance Services and Civil Defense. High-Definition Video Security To Secure Phoenix Park “With 300,000 people expected to attend a papal mass at Phoenix Park to close the World Meeting of Families, we were briefed to provide the very best possible reliability and imaging performance from the additional cameras we employed,” explains Kevin McGrath of Mongey Communications. We needed to be confident of camera reliability straight out of the box, along with simple and fast set-up" He further added, “With this in mind, we needed to be confident of camera reliability straight out of the box, along with simple and fast set-up, and quality high-definition video for forward transmission to the various control rooms. Our very positive experience of employing 360 Vision Technology cameras on many high-security installations in the past led us to be confident about the image and build quality of the manufacturer’s cameras, and product support.” “So, to fulfill the challenges we faced for this high-profile project, we specified the latest version of 360 Vision’s Predator camera, and also their new cost-effective and ruggedized Invictus Hybrid HD PTZ camera.” 360 Vision Invictus Hybrid HD PTZ Camera The new 360 Vision Invictus cameras specified for the project employ the latest compact camera modules with a choice of 20:1 or 30:1 zoom and are available with 1/2.8” Sony StarVis or 1/1.9” Sony Exmor (Ultra) sensor packages. Bridging the divide between analog and IP technology, all Invictus cameras are equipped with Hybrid functionality enabling installation in existing analog systems and also in full 1080P HD IP video streaming networks. Alongside ONVIF 2.4 Profile S compatibility, this means the Invictus range is not only economical, but simple to install, providing Mongey Communications engineers with a reliable, flexible and high- performance solution with which to enhance the existing electronic surveillance measures for the Pope’s 2018 visit. HD IP Video Streaming Networks An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view Further enhancing camera reliability for this important event, the new Invictus camera range design draws cost-effectively on features usually associated with very high-end cameras, including construction from high grade, hardened aluminum and stainless steel, to ensure a rugged, durable and compact camera. An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view, plus the ability to tilt above the horizon – enabling operators to view targets above camera installation height (i.e. up hills) – an invaluable asset where cameras were being installed in the difficult installation and operational conditions of Phoenix Park. Technical Relationship With 360 Vision Technology “Our decision to once again entrust the provision of the best technology available for the project to 360 Vision Technology was proven correct, and we had no issues of consequence with the installation, commissioning and performance of all the cameras - straight out of the box,” explains Kevin. “Because of the condensed set-up period available and challenging terrain of some of the installation areas, we had to act fast to ensure the successful inclusion and full control of the cameras for the multi-agency command and control room,” adds Kevin. “Here our technical relationship with 360 Vision Technology really paid dividends throughout this time-critical project, affording easy integration of all the additional cameras into the control room’s Cathexis VMS. Cathexis VMS Images from the cameras were relayed back to the various event control centres In all, over 60 additional 360 Vision Technology cameras were employed over the various sites throughout the Pope’s visit. With extensive digging and cabling not a practical option, images from the cameras were relayed back to the various event control centers via a network of reliable and secure microwave transmission links, powered by temporary generators and back-up batteries. “The new Invictus cameras were perfect for the role thanks to their low power consumption compared to other similar specification PTZ cameras,” explains Kevin. “Low power consumption really helps when adding multiple cameras to a network with a temporary power system - and meant we could add more cameras for the benefit of maximum scene coverage.” High-Speed Fiber-Optic Connectivity High-speed fiber-optic connectivity between the various remote sites and Dublin Castle was installed, together with video walls at the various control rooms. “The Pope’s visit was a great success with no security issues reported,” says Kevin. “Images relayed to the control room from the additional 360 Vision Technology cameras were vital in the smooth running of the visit and allowed all of the state agencies involved to keep a constant update on the movements of the vast crowds drawn over the pontiff’s two-day visit.” “Our long-term technical partnership with 360 Vision Technology and our direct input in to the development of their new products really pays off with high-profile projects like this,” concludes Kevin. “We have many new and exciting installation challenges on the horizon and I’m confident that 360 Vision Technology camera products will continue to be an integral part of those future projects.”
IDF Aluminium has installed transom closers and latch locks from Alpro Architectural Hardware at a building that provides premium co-working and flexible office space in central London near Victoria Station Thomas House in Eccleston Square is a seven-story structure with a facade in Regency style and a distinctive timber-clad reception that leads to two wings. It has collaborative drop-in work areas, meeting rooms and facilities to suit present-day practices. The building has been refurbished for The Office Group who pioneered shared workspaces in Britain and now offers these services across multiple London locations as well as Bristol and Leeds. Hydraulic Door Controls The Alpro transom closers are a means of hydraulically controlling the opening and closing of aluminum doors The Alpro transom closers are a means of hydraulically controlling the opening and closing of aluminum doors. They allow precise adjustment of the latching and closing force generated by the valve according to the weight and height of individual doors as well as type of usage. Aesthetics are a major consideration for The Office Group who briefed Soda Studio, an architectural practice known for its clean simple interiors, to create a design in keeping with the neighbouring Georgian squares. In addition to the working facilities, Thomas House has a library, music room, roof terrace and gymnasium. It is named after the early nineteenth-century architect Thomas Cubitt who created much of the surrounding area and also designed the eastern front of Buckingham Palace. Preserving Interior Geometry Fabricator IDF devised a solution featuring tailored SBD aluminum profiles from Jack Aluminium Systems, bespoke glazing, internal screens and the Alpro door management. The Alpro products include Europrofile cylinder deadlatches which can be combined with electric strikes to provide the added option of remote access control. All of The Office Group premises are design-led, and we have now supplied equipment to five of their sites including Henry Wood House" Peter Keen, sales director at Alpro, said: “Installing transom closers on internal doors is unusual but the concealed nature of these closers, within the transom header bar, means they are unobtrusive and meet the architect’s goal of preserving interior geometry.” He continued: “All of The Office Group premises are design-led, and we have now supplied equipment to five of their sites including Henry Wood House, a former BBC building in the West End. Our transom closers are durable and have been tested independently at 250,000 double-action cycles.” Commercial Door Market IDF specializes in the design, manufacture and installation of aluminum doors. The door projects are often in commercial and public sector environments where usage may be high but maintenance costs must be minimized. IDF has 30 years’ experience in the shop front and commercial door market. The company ensures a quality service by designing and fabricating all of its doors and shop fronts in-house with no use of sub-contractors. The client portfolio covers transport, local government, healthcare and education from schools through to universities.
Denmark’s Evotec chose Idesco readers to complete their cargo securing system they had designed for transport companies’ vehicles. Evotec’s system does more than merely preventing cargo theft. Drivers also feel more secure when delivering because hijack risks are also reduced. This is because cargo is robustly secured when drivers leave vehicles behind. Idesco 8 CD 2.0 DESFire Readers Evotec selected Idesco 8 CD 2.0 DESFire readers for deployment on delivery vehicles Danish cargo companies had been struggling with regular delivery cargo thefts. Drivers did not feel secure when delivering and financial losses were growing. Evotec decided to develop a novel vehicle security solution for cargo companies. As part of their solution, Evotec selected Idesco 8 CD 2.0 DESFire readers for deployment on delivery vehicles. Idesco readers have since been installed on several hundred Danish cargo trucks and vans. Early in their design process, Evotec had seen a clear need to strictly limit access to vehicle’s cargo space to authenticated personnel only. They had known RFID technology could provide accurate, secure user identification and authentication. They learned that Idesco’s MIFARE DESFire readers, paired with 128-bit AES-encrypted DESFire transponders, would easily repel transponder hacking or cloning. Best of all, they learned Idesco designed many of its readers for installing outdoors, reliably resisting impacts, moisture, dirt and temperature extremes. Security Key Management Service Idesco’s Security Key Management service saved Evotec extensive time and resources"Bo Schønning, Evotec Aps CEO, described the subsequent cooperation of Idesco with his company, “We got great assistance in choosing the correct solution for our system”. In addition to coded readers, Evotec ApS also subscribed to Idesco’s convenient Security Key Management Service for ensure compatibility with every vehicle’s readers. Since DESFire demands readers and transponders be encoded with matching security keys, Idesco’s Security Key Management service saved Evotec extensive time and resources, freeing them to focus exclusively on installations for their customers’ vehicles without worrying about managing DESFire keys themselves. “We feel safe when Idesco handles this data for our customers”, says Bo Schønning. The cargo drivers of Evotec’s customers are assigned vehicle specific transponders to carry, which open the cargo space when presented to the reader guarding it. For increased security, the driver cabin locks automatically when the cargo space unlocks. Additionally, cargo doors automatically lock when they close and will remain locked when the vehicle’s engine is running. The system works equally well in vehicles equipped with liftgates. Opening the vehicle’s driver cabin with the ignition key doesn’t affect its cargo space: it remains continuously locked. If needed, a vehicle’s cargo space could be opened remotely via fleet management software. If a transponder is stolen, a vehicle’s readers can be reprogrammed to not recognize the transponders. Fleet Management And Vehicle Tracking Vehicles are also equipped with GPS transmitters that update fleet software with vehicle locations and routes Vehicles are also equipped with GPS transmitters that update fleet software with vehicle locations and routes. The fleet software’s online tracking and route reporting also provides cargo companies a powerful fuel control ability that can reduce fleet costs. “This system has significantly increased drivers’ security at work while reducing costs caused by theft”, notes Bo Schønning, CEO, Evotec ApS. “Fuel costs have also been reduced, as the cars aren’t left idling anymore. It is easier to control the fleet, and our customers can also follow the quality of deliveries with this system”, he continues.” RFID Technology Founded in 1989, Idesco is an experienced company in the field of RFID technology. From the very beginning, Idesco was a pioneer in using RFID, deploying it for identification in industrial applications. Down through the years Idesco continued expanding its reputation as a pioneer provider by innovating numerous technological alternatives and multiple technologies for a variety of different application areas. Every day, Idesco devices collect data and enhance security for a variety of access control, vehicle identification, logistics and inventory control systems.
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8.8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometres distribution network and 4,386 kilometres of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management SystemBosch’s Building Integration System Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. Cameras With Built-In Video Analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities All systems and cameras are monitored by security personnel at the company’s control center in Recife. For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfills the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
One of the UK’s top business and management schools, the Bloomsbury Institute, has upgraded its access control capabilities to the award-winning ASSA CLIQ Remote wireless locking technology from ASSA ABLOY, the global leader in door opening solutions. Based in central London and formerly the London School of Business and Management, the Bloomsbury Institute delivers full-time undergraduate and postgraduate courses in business, accounting, finance and law, which are awarded by the University of Northampton. ASSA CLIQ Remote Wireless Locking Technology The Bloomsbury Institute has to contend with a high turnover of students each academic year, as well as any changes to staff. The sheer number of people using the Institute’s buildings meant that its existing mechanical master key system was simply no longer feasible, unable to provide adequate protection for areas that might hold sensitive information, such as exam scripts. As a result, the Bloomsbury Institute needed a flexible access control system that would be easy to maintain, granting secure access to individuals as and when needed, while delivering greater key control too. Electromechanical Locking System Providing an easy-to-use electromechanical locking system, the ASSA CLIQ Remote solution uses high-end micro-electronics and programmable keys The answer was ASSA CLIQ Remote, which has been installed throughout the Bloomsbury’s Institute’s 7 Bedford Square teaching site, and selected areas within the institute’s 99 Gower Street building. Providing an easy-to-use electromechanical locking system, the ASSA CLIQ Remote solution uses high-end micro-electronics and programmable keys and cylinders to offer flexible control over access rights. The Bloomsbury Institute can now program and update each key remotely, removing or granting access privileges for the key holder in real time. This allows only those with the necessary authority to obtain access to private areas without inconveniencing others and removes the security risks associated with lost or stolen keys. Remote Key Access ASSA CLIQ Remote also provides a full audit trail for assured peace of mind and has the functionality to create time-defined user keys, only allowing access to an individual for a specified period. This feature is proving invaluable to the Bloomsbury Institute, which plans to eventually convert all cylinders at its 99 Gower Street site to ASSA CLIQ Remote, as part of its expansion plans. Stephane Middleton, Estates & Facilities Manager at the Bloomsbury Institute, explains: “We are committed to the security and safety of student data, which led us to consider upgrading the mechanical master key system that we previously had in place. Using ASSA CLIQ Remote could not be easier. It is saving us countless hours of key cutting and changing cylinders, while significantly improving our key control.” ASSA CLIQ Remote Key For Enhanced Security When a new employee joins the team, the ASSA CLIQ Remote key is the only one they will need"“When a new employee joins the team, the ASSA CLIQ Remote key is the only one they will need, irrespective of how many rooms they may occupy or how many areas they may need access to during their time with us. In addition, the system provides robust security; if a key is lost or stolen, we can cancel it, safe in the knowledge that we are completely secure.” “The service from ASSA ABLOY has been outstanding. The company really made the effort to understand our business and its requirements. During the implementation phase, ASSA ABLOY provided comprehensive training on how to use the system to all staff that have administration rights, while working with our IT team to ensure the systems’ software is uploaded onto their machines.” High-Security Physical Master Key System “The best part of the service has been having a dedicated contact that has been onboard since the start, providing us with new updates, support and guidance. This part of the service is proving to be of great value, filling us with confidence to continue using ASSA ABLOY products in the future. Indeed, as we look to expand the sites we operate in, we envisage that all the cylinders will one day be converted to this system.” Simon Wilson, National Sales Manager for ASSA CLIQ Remote at ASSA ABLOY, said: “Our ASSA CLIQ Remote solution combines all the benefits of access control with a high-security physical master key system. The system was easily retrofitted, meaning there was very little disruption to the university during the installation process, and the institute no longer has to worry about the security concerns that come with a misplaced key. Data Security “The fact that ASSA CLIQ Remote also offers the capability to log and provide a record of who has entered and exited an area is helping to ensure rooms that hold confidential papers or sensitive information remain secure.” “We’re delighted to help the Bloomsbury Institute revolutionize its key management systems, delivering greater security, flexibility and key control.”
ACT365 is a complete access control and video management solution. Access control and video management are key security systems and ACT365 creates a unified integrated system, delivering a force that gives users far greater visibility and control of their assets. ACT365 Access Control Solution Ease of use and convenience are key ingredients to the product’s strength and depth in the field. Critically, it allows end-users the ability to manage their systems remotely, including viewing live cameras. It is this remote monitoring capability that makes ACT365 ideal for multiple sectors. A Study Abroad University in London that hosts students from the USA wanted a security system to protect their student accommodation. The university wanted a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. Monitoring And Recording ACT365 keeps audit trails of who is in the student accommodation by monitoring and recording fob activity ACT365 keeps audit trails of who is in the student accommodation by monitoring and recording fob activity. ACT365 produces diagnostic reports on door status and can investigate situations such as door forced, door ajar and break glass activation either locally or remotely. If an incident should arise in the student accommodation, ACT365 links events at doors through video footage so campus security can quickly identify and react. Live and recorded footage can be viewed remotely, and footage can be used in evidence. Campus Security Campus security can provide pin codes, access fobs, and cards to students. These credentials can be easily enabled or disabled remotely if required. This can be managed on desktops, laptops tablet, or smartphone device. In the event of a fire or other emergency, ACT365 automatically unlocks all doors allowing students to reach safety. The ACT365 muster report gives security campus a real-time list of all students in the campus accommodation building. When students exit their accommodation and swipe out, the muster report automatically updates. If someone is missing, campus security can check cameras and call them directly by clicking on their name in the dashboard.