With the Government directives brought into action earlier this week, Security Systems and Alarms Inspection Board (SSAIB) has had to change certain aspects of their working practices, while also ensuring that it doesn’t impact negatively on the registered firms and the level of service that the company provides to customers. UKAS accreditation SSAIB is fully aware of the uncertainty and worry that our firms will be facing at this difficult time" Security Systems and Alarms Inspection B...
Alertus Technologies LLC, a provider of mass notification and critical communication solutions, announces it is releasing a new feature to its Alertus Recipient Mobile App, ‘ThreatWatcher™ Mobile,’ that will allow users to track their recent movement against those users who reported having COVID-19. The ‘Pandemic Alerts’ feature of ThreatWatcher™ Mobile will be free and accessible to the public in response to the increasing concerns regarding the COVID-19 pand...
Pedestal PRO, the manufacturer for access control pedestals, in cooperation with Aiphone, the international manufacturer of intercom and security communication products, has introduced a freestanding entry station tower for use with Aiphone’s multi-tenant GT Series. Pedestal PRO’s 64TOW-AIP-001-304 is a beautiful, low-profile, brushed stainless steel tower designed to accommodate the Aiphone GT-DMBN-SSP Video Entry Station component. Its modern shape, featuring a...
Allot Ltd., the global provider of innovative network intelligence and security-as-a-service (SECaaS) solutions for communication service providers and enterprises, announced that it was chosen by Broadcom as the recommended vendor to offer a transition path from the discontinued PacketShaper line of products to the Allot Secure Service Gateway (SSG). Following their Broadcom acquisition, the Symantec Enterprise Division has chosen to End of Sale the PacketShaper line of produc...
ASIS International and the Security Industry Association (SIA), the membership associations for the security industry, have entered into a partnership to best aid in the COVID-19 recovery and rebuilding efforts of its diverse group of 34,000 member professionals and over 1,000 member companies respectively. The partnership will begin by addressing two primary areas of focus – business operations and advocacy – as well as content development and coordination. SIA will lead a team com...
GlobalPlatform, the standard for secure digital services and devices, publishes a new specification that simplifies the communication between embedded Secure Elements (eSEs) and connected devices. The specification now supports the serial communication interfaces – Serial Peripheral Interface (SPI) and Inter-Integrated Circuit (I2C) – that are widely deployed in smartphones, wearables and other internet of things (IoT) devices. Biometrics matching on SE The standardization of the...
Beyond Encryption, the provider of secure email systems, road tested its working from home policy, safe in the knowledge that their ‘Digital Recorded Delivery®’ email system will continue to keep their communications secure. With the fears surrounding the Coronavirus (COVID-19) outbreak worsening by the day, businesses are already relying on technology for remote working. According to Cisco Systems, WebEx meeting traffic connecting Chinese users to global workplaces has increased by a factor of 22 since the outbreak began. Protecting external email communications Traffic in other countries is up 400% or more and specialist video conferencing businesses have seen a near doubling in share value, when the rest of the market is shrinking. Reliance upon email communications will increase significantly but basic email security has remained unchanged for 30 years. The default state of all email services is unencrypted, unsecure and open to attack Many smaller businesses are still likely to be using outdated Simple Mail Transfer Protocol (SMTP) when sending or receiving email. As such, the default state of all email services is unencrypted, unsecure and open to attack – putting crucial information at risk. Ensuring our external email communications are protected and not susceptible to interception and abuse will be increasingly important. Protecting communications and data Paul Holland, CEO of Beyond Encryption said: “With remote working a likely outcome for many of us in the coming weeks, the security and reliability of our electronic communication will be a high priority. We decided to road test our own remote working policy to ensure that we truly practice what we preach, that our meetings and conversations were unhindered, and, indeed arguably, we operated more efficiently!” “Many other companies, large and small, are already trialing their remote working policies, from those in Silicon Valley to us here at Beyond Encryption. As well as protecting our health by working from home, it’s important that we also protect our communications and data,” added Paul. “Mailock® allows businesses and their clients the peace of mind to be able to work from any device on any network, at home or in the office, without the worry of data compromise or cyber security issues.
Pulse Secure, the provider of software-defined secure access solutions, announces a new distribution partnership with Inforte to grow and better support its channel community across Turkey, and to meet accelerating demand for Zero Trust access security. Inforte is a value-added distributor specializing in the new generation of information security solutions. Inforte provides innovative services to support its community of over 100+ partners with pre-sales and post-sales services, logistics, marketing, demand generation and product training, through its team of experts based in Istanbul and Ankara. Zero trust-Based access suite The agreement will include Pulse Secure’s Zero Trust-based Access Suite which delivers protected connectivity Inforte will offer the integrated portfolio of Pulse Secure solutions, including virtual private network (VPN), software-defined perimeter (SDP), network access control (NAC), and virtual application delivery controllers (vADC). The agreement will include Pulse Secure’s Zero Trust-based Access Suite which delivers protected connectivity, operational intelligence and threat response across mobile, network and cloud environments. IT spending on hardware, software and related services in Turkey reached $27.5 billion in 2018 according to TÜBİSAD, a Turkish ICT industry group. The cybersecurity segment is expected to grow as corporate and government ICT security systems still need to attract significant funding. Network security against attackers and viruses, email and web security, cyber governance, identity and certificate governance, mobile security, system security, data and application security are the top priorities in the market. Delivering more advanced solutions Turkey is one of the fastest growing countries in the region and has an ICT community” “Turkey is one of the fastest growing countries in the region and has an ICT community that is embracing innovative new technology to support major public and private sector projects,” says Güngör Gündoğdu, Managing Director for Inforte. “This new agreement with Pulse Secure will bring the most complete end-to-end secure access portfolio to help our channel partners deliver more advanced solutions that support their clients goals that also include a move towards a more Zero Trust approach to cyber security.” As part of the new distribution agreement, Inforte will run several educational seminars and technical workshops to update channel partners around the expanded portfolio and new products and services that will be launched during 2020. In addition, Inforte will work closely with Pulse Secure to deliver an enhanced program of sales enablement, lead generation and education, alongside a certification program update to ensure partners have the skills to succeed. Complementary security solution portfolio “Inforte is a highly respected and pro-active distribution partner that has successfully developed a rounded and complementary security solution portfolio that will help support our growing channel community across Turkey,” said Alan Finden, Director of EMEA channel and distribution sales for Pulse Secure. Pulse Secure’s Zero Trust focus is delivered with the Pulse Access Suites “The expansion of our product portfolio and new areas such as Zero Trust make now a perfect time to work with a progressive distribution partner and increase our investment in one of the most exciting markets within the region.” The Zero Trust security market size is projected to grow from USD 15.6 billion in 2019 to USD 38.6 billion by 2024, at a CAGR of 19.9% from 2019 to 2024 according to MarketsandMarkets Research. Pulse Secure’s Zero Trust focus is delivered with the Pulse Access Suites. Application security with comprehensive VPN The Suites provide remote, mobile, cloud, network and application security with comprehensive VPN, Mobile Device Management (MDM), Single Sign-on (SSO), endpoint and IOT device security, Network Access Control (NAC) and virtual Application Delivery Controller (ADC) functionality. Pulse SDP is a Suite add-on which activates Software Defined Perimeter (SDP) components within existing Pulse solutions to provide direct device-to-application trusted connectivity only after successful user, device and security state verification. This approach extends the company’s foundation of Zero Trust access for hybrid IT with enhanced usability, deployment flexibility, automated provisioning and resource optimization. In November, Pulse Secure won the software defined vendor of the year at CRN Channel Awards 2019 recognizing its development of new software defined technologies to help the channel meet growing demand for Zero Trust security.
Accellion, Inc., provider of the enterprise content firewall that consolidates, controls, and secures sensitive third party communications, announces key capabilities that protect the sensitive data remote employees access, share and collaborate on while working from home. Hackers tap into a treasure trove of PII, PHI, and IP when they leverage home network vulnerabilities like weak passwords, unpatched software, and connected IoT devices such as smart TVs and virtual assistants. Now, confidential corporate information like contracts, financial data, and customer records become susceptible to unauthorized access as more employees begin working from home to contain COVID-19. Data protections at home With the Accellion enterprise content firewall, remote employees receive the same data protections at home that they have in the office. Accellion consolidates security across third party communication channels, including email, file sharing, enterprise apps, web forms, SFTP, MFT, and mobile. With Accellion, employees working from home utilize a single platform to share PII, PHI, IP and other sensitive information with complete security and control. Accellion also provides employees secure access to connected business systemsEvery file uploaded, downloaded, sent, and received is logged and auditable to demonstrate compliance with data privacy regulations like GDPR, HIPAA, CCPA, and more. Accellion also provides employees secure access to connected business systems like Salesforce, Oracle, Office 365, and SAP, as well as cloud and on-premises content stores like Box, OneDrive, and SharePoint. Employees upload, download, edit, and share confidential files of any size or type in these and other systems without requiring any content migration or a VPN. Enterprise content firewall As a result, employers avoid adding costly software licenses and configuring VPN accounts. “While the COVID-19 pandemic affects work environments, it must not impact workflows,” commented Jonathan Yaron, chief executive officer of Accellion. “The Accellion enterprise content firewall ensures organizations continue working seamlessly, securely, and in compliance with industry regulations, regardless of their locations.” Organizations know their PII, PHI, and IP is protected when employees work remotely because the Accellion content firewall provides: Multi-factor authentication Data encryption in transit and at rest A hardened virtual appliance Compliance with most data privacy regulations Auditable logs of all file activity Seamlessly scan file uploads with AV and your ATP Seamlessly scan file downloads with your DLP
Tavcom Training, globally renowned provider of accredited security systems training courses and part of the Linx International Group - is celebrating its 25-year anniversary with the opening of a state-of-the-art training center of excellence. Developed in partnership with CrossConnect Training, the center in Shipley, West Yorkshire is ideally located to meet all the training needs of the many security professionals in the North of England. Security systems training courses Expansion of Tavcom is in response to unprecedented demand for our accredited courses" With two world-class teaching facilities in the UK (Hampshire and West Yorkshire) and a growing portfolio of bitesize and online interactive courses, Tavcom is making it easier for security professionals at all levels, to access its award-winning and internationally recognized security systems training courses. Managing Director of the Linx International Group, David Gill, said, “This significant investment and expansion of Tavcom is in response to unprecedented demand for our accredited courses, by installers the length and breadth of England.” The new center boasts excellent road and public transport links to and from Liverpool, Manchester, Warrington, Huddersfield, Bradford, Leeds, Harrogate, Doncaster, Darlington and Middlesbrough. Technical security training expert David Gill adds, “As part of Linx’s commitment to professionalism and the raising of standards across the industry, we need to make the right training available, accessible and affordable to all. This important new center replicates the class-leading facilities at our facility in Hampshire that has established Tavcom as the premier provider of technical security training in the UK, for more than 25 years.” Technical Director at CrossConnect Training, Geoff Crossley commented, “We at CrossConnect Training are really looking forward to the opening of our new training center, and excited by the opportunity to work closely with Tavcom Training to provide a high quality learning experience to delegates from across the Northern Britain.” BTEC Level 3 courses Practical CCTV installation Both future-proofed centers are fully equipped with all the technical infrastructure and equipment (Tavcom is vendor agnostic) required to deliver Tavcom’s portfolio of more than 100 training courses. The new center will welcome students in June and July, when it runs its hugely popular BTEC Level 3 courses Practical CCTV installation and Practical Intruder Alarms. In addition to its extensive facilities and training programmes in the UK, Tavcom also operates internationally through a purpose-built training center in Singapore and courses hosted in Africa and the Middle East.
Egress, the provider of human layer email security, has announced that its Egress Protect solution will be integrated into NHSmail to offer enhanced protection and improve user experience. NHSmail is used by up to 1.5m healthcare staff daily, and is the largest closed secure email network in the UK. The announcement comes as part of NHS Digital’s commitment to use innovative technology to transform the UK healthcare landscape. Effective communication is an integral part of the NHS, and Egress’ email encryption technology has a significant footprint in UK Government. NHSmail secure email service NHSmail is a secure email service, approved by the Department of Health and Social Care, for sharing sensitive information. NHSmail has a function for sending sensitive emails which are encrypted, to non-secure email addresses. Egress Protect improves healthcare practitioners’ experience by enabling them to use NHSmail to send encrypted emails to unsecure domains, including patients and other areas of the health and care system, as well as offering automatic decryption for inbound email. This allows those recipients of NHSmail emails that are encrypted using Egress Protect to read and reply free of charge via an easy-to-use online portal or using Egress’ free app for Outlook integration. Streamlining communications NHSmail is already a safe, secure email system, used by almost 1.5 million health and care professionals" Consequently, secure email communication is available free of charge and in a simple and accessible way, to everyone who needs it. Egress Protect is already used by many local government organizations, and major private healthcare providers in the UK and will streamline communications between these organizations and the NHS. Following an initial pilot phase, Egress is now the new provider for sending sensitive emails from NHSmail accounts encrypted to external email accounts. Chris Parsons at NHS Digital said, “NHSmail is already a safe, secure email system, used by almost 1.5 million health and care professionals, enabling them to send sensitive information and deliver effective care. The partnership with Egress will continue to build on this, delivering an effective user experience, supporting security and compliance with GDPR with detailed auditing and reporting.” Innovative email security solutions “We are delighted to be working with NHS Digital to improve the NHSmail experience for healthcare practitioners and patients throughout the UK,” commented Egress CEO Tony Pepper. “Modern and efficient healthcare requires an accessible and secure communication network built on the best data security and IT architecture available.” “At Egress, we deliver innovative email security solutions that makes it easy for users to protect data, and meet compliance requirements, and then quite simply, get on with their day-to-day work. We look forward to an ongoing relationship with NHS Digital, supporting them in the delivery of this critical communication network.”
SecureCom Wireless LLC has called on customers to know that they can now use Virtual Keypad if they ever need to trigger a system panic. The app, as well as VirtualKeypad.com can display Police, Emergency and Fire panics in the menu, and all the user needs to do is to add it to the app user in Dealer Admin. “Because most people have their phones with them, we wanted customers to be able to trigger a system panic if they needed to, even if the keypad isn’t nearby,” said Clayton Tummons, Vice President of Software for SecureCom Wireless. He adds, “If there’s a break-in, and you’re inside, calling 911 may put you at risk of being heard talking. Without saying a word, you can silently trigger a system panic and expedite the dispatch of the type of emergency personnel you need.” Dealer Admin Version 2.40.0 Dealer Admin Version 2.40.0 allows users to go to the App User section where they can select the panic options To enable customers’ System Panic feature instantly, Dealer Admin Version 2.40.0 allows users to go to the App User section where they can select the panic options available. Depending on what they need or what they want them to have, users can check the appropriate boxes. When they log in to their Virtual Keypad app or website account, they’ll see “Panic” displayed in their menu. To initiate a panic, the users have to simply tap Panic, then press and hold the desired panic option for three seconds. Virtual Keypad continues to expand, giving customers more functionality and flexibility than ever before. “The System Panic functions the exact same way as if you’d initiated the panic from the keypad,” Tummons adds, further stating “We just want to make sure customers can always have access to their systems, wherever they are.”
As New York City hip hop group Non Phixion boldly proclaimed in their 2002 debut album: The Future Is Now. From drone fleets and autonomous transportation systems to smart homes with computer-controlled lighting, heating, media and security systems, a new group of highly-automated technologies is gripping the popular imagination. These technologies – known collectively as the Internet of Things (IoT) – form advanced ecosystems of interrelated devices with the capacity to monitor, detect, communicate and act on the real world independently of human intervention. Promising to fulfill all of our wildest technological dreams and needs, the IoT age has arrived – and it looks like its here to stay. While the consumer applications of IoT tend to receive the most attention, one area that is seeing strong growth in the uptake of IoT devices is workplace safety. Workplace safety costs businesses billions every year, and industries with especially hazardous working environments – Construction, Oil & Gas, Mining, Utilities, Rail, etc. – are beginning to adopt IoT technology to help minimize risk and address preventable threats. Before exploring these IoT solutions, however, let us first consider some of the key threats faced by workers in these industries. Workplace safety Construction is one of the world’s most dangerous occupations, accounting for 1 in 5 worker deaths in the US and incurring tens of thousands of short- and long-term injuries each year. In construction, the major risk is falling from a height, which accounts of 26 per cent of fatal injuries in the workplace. Additional risks come from being struck by vehicles and heavy moving objects, proximity to overhead/underground high voltage power lines, confined spaces, high noise environments, and exposure to dust and fumes. In underground mining operations, hazards include respiratory health problems In Mining & Quarrying, sustained overexertion is the most common threat to workplace safety, accounting for 24 per cent of nonfatal injuries. In surface mining operations, specifically, the leading hazards come from geological instability (i.e. falling rocks), blast debris and collisions with large and heavy plant equipment. In underground mining operations, hazards include respiratory health problems (e.g. Black Lung), explosions and gas leaks (particularly in coal mines), heat stress, confined spaces and ionising radiation. Other industries are often faced with some combination of the above, or similar, threats. In the Rail sector, for instance, there is high risk from collisions with vehicles, objects and machinery and vulnerability to electric shock. In Utilities, the number one risk is slips, trips and falls, accounting for 30 per cent of Lost Workday Injuries (LWIs) in 2016. And in Oil & Gas extraction, exposure to flammable gas, chemical emissions and oxygen-deficient atmospheres creates vulnerability to explosions and chemical poisoning. Tackling threats in a high-tech world What, then, is being done to tackle these threats? In a high-tech world, many safety measures currently in use – hardhats, earplugs, gloves, gas masks, guardrails, harnesses, protective goggles and high visibility clothing – appear decidedly primitive. Therefore, whilst these measures are still useful in minimizing risk, companies have started to integrate IoT technologies to enhance their application. These technologies bring together real-time analytics, machine learning, advanced sensors and embedded systems to offer a number of key functionalities: Physiological monitoring Wearable technology is used to monitor a worker’s physiological state in real-time. Japanese wearable tech company Mitsufuji is active in this space, creating smart clothes woven from silver-metallised fibres that collect a range of data about its wearer, including heart rate and body temperature. Other examples include wristbands with bio-sensors to accurately measure stress levels and glasses that detect eye movements to identify fatigue and periods of micro-sleep. Environmental monitoring Sensors used to measure temperature, radiation, gas leaks, carbon monoxide and other harmful chemicals can automatically alert workers to unsafe external conditions. Additionally, visual imaging software can map 3D representations of a worker’s environment, facilitating effective two-way communication between supervisors and personnel in the field, and remote guidance technologies provide live assistance to workers caught in serious danger (e.g. guide a miner trapped in a tunnel to the best way out). Situational awareness, training and behavioral data Augmented Reality (AR) technologies offer new ways to support decision making in the field by providing holographic representations of physical equipment, while Virtual Reality (VR) technologies offer immersive situational training without the risks associated with real-life procedures. These technologies also offer up valuable behavioral data, which can be used to gauge a worker’s risk tolerance level and tendency to respond to danger. Proximity detection Proximity detection systems utilize wearable sensors to monitor workers’ location, map their movements, and alert them to nearby hazards. One example of this are radio-frequency identification (RFIDs), which can measure a worker’s proximity to moving equipment and alert them to possible collisions and near misses. Another piece of kit is the ‘smart helmet’, which can immediately detect an accident, determine the worker’s location and send an alert containing coordinates to a safety control centre. The centre is able to make video and audio contact and communicate with the worker until help arrives. Exoskeletons Exoskeletons can assist with heavy lifting and the prevention of musculoskeletal disorders (MSDs) by analyzing worker movements and providing the necessary support. The Chairless Chair, for example, used by factory floor workers, fixes around the back and legs to provide support whenever the worker sits or crouches. Exoskeletons are also used to monitor worker movements, identifying repetitive movements and sustained periods of overexertion. IoT technologies and innovations IoT innovations are helping to improve workplace safety on multiple fronts Taken together, these IoT innovations are helping to improve workplace safety on multiple fronts. Firstly, they are preventative. By closely monitoring one’s environment – both internal and external – IoT technologies can pre-empt and alert workers to potential dangers. Secondly, they are responsive. In the case of an accident, IoT technologies can alert supervisors and help coordinate a quick and effective response. Thirdly, they are informative. By accumulating and analyzing rich pools of data, IoT technologies can help optimize work in the field and find improved ways to limit risk. While IoT certainly cannot eliminate all risk from the workplace – it cannot prevent rocks falling in quarries, explosions on oil rigs or gas leaks in mines – it can go a long way to make these environments safer and better places to work. Because when it comes down to it, workplace safety is certainly no accident!
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimization easier. In most cases, digital transformation will fundamentally change how an organization operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-Driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more. As the data from each of these sensors is collected and analyzed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organizations are using for enhancement and improvements is comprehensively protected from unauthorized access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organizations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-Connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organizations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organizations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organization’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetize the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organization. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organizations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organizations, not technology. If we truly understand the risks to the organization, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organizations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organizations.
When violence or a life-threatening incident occurs, hospitals and other healthcare institutions are often in the crosshairs. Hospitals increasingly face a reality of workplace violence, attacks on patients, and threats to doctors and other support staff. And even if violence happens outside a hospital – such as an active shooter at a public place – the local hospital must be prepared to respond to an influx of injured victims. When conflicts arise inside a hospital, there is an urgent need to lock the facility down quickly. Security professionals and their teams need access control options that allow lockdowns to occur at the touch of a button. Lockdown capabilities are an important aspect of safety and security for hospitals, doctor’s offices and medical facilities The need for mass notification is also growing in the healthcare environment Fire alarm public address system The need for mass notification – another aspect of responding in an emergency – is also growing in the healthcare environment. Various systems can communicate through the fire alarm public address (PA) system to notify people in an emergency, or, alternately, to use email notification, text messaging, pagers, smart phones and/or personal computers (PCs). In lockdown situations, access control systems provide an emergency button with various triggers in the system – a hospital can lockdown specific units or the entire facility. Data capture form to appear here! Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products, points out that the safety of hospital staff, particularly nurses, cannot be overlooked. In the emergency room, 55 percent of nurses are assaulted in some way each year, which is a high percentage. The safety of nurses and all hospital staff deserves more attention. Duress/emergency notification technology Stankevich says one solution is to use duress/emergency notification technology: staff can carry and wear a ‘panic button” or have a two-key combination on their computer as an alarm trigger. When the staff member hits the panic button, a direct message can be sent to security, alerting security staff about the event and requiring a response. There has been an increase in demand for the safety and security of patients, staff and visitors at healthcare institutions, as evidenced by the recent CMS (Centers for Medicare and Medicaid Services) Emergency Preparedness Rule. As of Nov. 17, 2017, healthcare institutions that participate in Medicare or Medicaid must demonstrate compliance with the rule. Emergency preparedness systems A major challenge in compliance to this rule is balancing patient safety with comfort At its core, the rule seeks to establish national emergency preparedness requirements to ensure adequate planning for both natural and man-made disasters, and coordination with federal, state, tribal, regional and local emergency preparedness systems. A major challenge in compliance to this rule is balancing patient safety with comfort. Institutions should consider two-way communication that enables leadership to disseminate targeted messages quickly and efficiently, while arming all employees with a tool that can alert the appropriate staff should an incident occur. Solutions like this enable swift communication of issues without disturbing patients and visitors unless necessary. Effective response to emergencies “Fortunately, hospitals and their security departments are generally well equipped to respond to most emergency situations”, said John M. White, president/CEO of Protection Management, a consultant who works with hospitals to address their security needs. During the Ebola scare in 2014, however, hospitals had to re-examine their plans to ensure they were prepared to meet the challenges specific to rare and deadly disease. “Hospitals are prepared for most things, but Ebola seemed to have caught the whole world off guard, so people responded in different ways,” says White, who previously was security director of two multi-campus medical facilities before becoming a consultant. Hospital security Hospitals made adjustments to their emergency programs to determine how best to handle Ebola patients" He adds, “Hospitals made adjustments to their emergency programs to determine how best to handle Ebola patients and to protect other patients and staff. It was a new threat that healthcare organizations had not specifically addressed.” A particular concern was the possibility of an infected person walking into an emergency room and infecting other people and/or requiring facility decontamination. One role the hospital security department plays in such an emergency is to control access to the facility and to control visitors’ movements once they are inside the facility, says White. If the Ebola scare had progressed to the point that a hospital would need to screen patients, security would be positioned at the front entrance to help with that screening and, if necessary, to direct patients to a specific area for quarantine. Protective equipment Security might also need to wear protective equipment to handle a patient who is resistant to treatment, for example. There are often interactions between security personnel and the general public, a scenario that becomes more complicated if Ebola or a similar infection is likely. In general, security would be tasked with maintaining order and keeping people where they need to be, freeing up the medical professionals to do their jobs more efficiently, says White. To prepare for the impact of the Ebola scare, hospitals addressed various training and equipment needs and adjusted their disaster/emergency response plans. Read parts two and three of our heathcare mini series here and here.
For the security market, the ‘fine ranging’ capabilities of ultra-wideband (UWB) technology opens up a range of new uses based on the ability to determine the relative position and distance of two UWB-equipped devices with pinpoint accuracy – within centimeters. UWB is more accurate and secure, even in challenging environments full of interference, compared to narrow band wireless technologies. UWB technology transmits a large amount of data over short distances using a small amount of energy. It will be used in seamless access control, location-based services, and device-to-device services across industries including smart homes, cities, retail services, and healthcare. Increasing the accuracy of ranging measurements UWB technology will support any application that benefits from knowing the precise location of a connected deviceUltra-wideband is a mature radio technology that transmits information spread over a large bandwidth, as described by the IEEE 802.154 standard. A new, enhanced amendment to the standard – IEEE 802.15.4z – focuses on improvements to existing modulations to increase the integrity and accuracy of ranging measurements. Moving forward, UWB technology will support any application that benefits from knowing the precise location or presence of a connected device or object. This reflects a move from data communication to secure sensing. New capabilities of UWB are largely unfamiliar to the market, but a new Consortium – the FiRa Consortium – has a mission to educate the market, provide use cases, and promote UWB technology. Delivering interoperability across devices “With a consortium, we can better deliver interoperability across devices, software, and chipsets,” says Ramesh Songukrishnasamy, Director and Treasurer of the FiRa Consortium, and SVP & CTO of HID Global. “This creates a frictionless experience for the user, which is vitally important with a new technology. People are more likely to adopt emerging technology when it runs smoothly without interruptions or errors.” The FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive" An industry consortium can create a UWB ecosystem of interoperable technologies instead of individual companies launching products that consumers struggle to make work together, says Songukrishnasamy. “Simply, the FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive.” Founding members of the FiRa consortium ASSA ABLOY and HID Global, pioneers in secure access and identity solutions, are founding members of the consortium. Their technology manages access to physical and digital places, things, and identities. Another founding consortium member, NXP Semiconductors, is a pioneer in secure connectivity solutions for embedded applications. Other founding members are Samsung, which creates top-of-the-line TVs, smartphones, wearables, and other connected devices; and the Bosch Group, a global supplier of technology and services that is at the forefront of IoT innovations. Sony Imaging Products & Solutions Inc., LitePoint and the Telecommunications Technology Association (TTA) are the first companies to join the newly formed organization. Immune to radio frequency interference UWB is also immune to radio frequency interference, so it functions in high traffic settingsUWB introduces higher levels of accuracy in positioning capabilities and increased security for ranging data exchange compared to existing technologies. Fine ranging with UWB technology can localize devices and objects to 10 centimeters of accuracy with or without line of sight. UWB is also immune to radio frequency interference, so it functions in high traffic settings. These capabilities will enable a variety of use cases like secure, hands-free access control in hospitals, location-based services for ride sharing, and targeted marketing for retailers. FiRa will demonstrate UWB technology at upcoming trade shows. The FiRa Consortium aims to build on IEEE’s work with an interoperable high rate physical layer (HRP) standard, including defining an application layer that discovers UWB devices and services and configures them in an interoperable manner. The consortium also plans to develop service-specific protocols for multiple verticals and define necessary parameters for applications including physical access control, location-based services and device-to-device services. Promoting the adoption of UWB solutions As a consortium, FiRa is not just setting standards but actively championing use cases for UWB technology. Creating the consortium addresses the need to develop interoperability and implementation standards; brings key players together to create a rich UWB ecosystem; allows for the sharing of intellectual property; and promotes the adoption of UWB solutions. The FiRa Consortium is committed to educating and promoting new use cases" “Since UWB is a mature technology with new potential uses, there is a general lack of awareness of potential applications that take advantage of the technology,” says Songukrishnasamy. “The FiRa Consortium is committed to educating and promoting new use cases.” The FiRa name comes from Fine Ranging to highlight UWB technology’s use cases and distinction from older UWB technologies and solutions. Enhanced security in challenging environments Fine ranging powered by UWB can outperform other technologies in terms of accuracy, power consumption, robustness in wireless connectivity, and security, especially in challenging, high density environments. UWB previously served as a technology for high data rate communication and as such was in direct competition with Wi-Fi. Since then, UWB has undergone several transformations: UWB has evolved from an OFDM-based data communication to an impulse radio technology specified in IEEE 802.15.4a (2ns pulses with Time of Flight); and A security extension being specified in IEEE 802.15.4z (at PHY/MAC level) makes it a unique secure fine ranging technology. Moving from data communication to secure ranging allows ‘spatial context capability’ to be utilized by a variety of applications: seamless access control, location-based services, and device-to-device (peer-to-peer) services. Information is available at firaconsortium.org.
Three more UK police forces have jointly upgraded to Sepura SC20 TETRA radios, significantly improving their front line officers’ ability to communicate with colleagues. Bedfordshire Police, Cambridgeshire Constabulary and Hertfordshire Constabulary made use of their joint purchasing power to equip officers from across all three forces with the new SC20 TETRA radios. In all over 1,900 radios were purchased across the three forces, to work alongside their existing fleet of Sepura radios. SC20 TETRA radios By using the SC20 TETRA radios, officers will benefit from powerful, robust radios with loud, clear audio By using the SC20 TETRA radios, officers will benefit from powerful, robust radios with loud, clear audio, ensuring that critical voice communications can be clearly heard and understood, even in noisy environments. In addition the radios are applications ready, meaning that each force can in time develop bespoke applications to enable quick, secure access to critical data. A key advantage of the Sepura solution is that their radio programming solution Radio Manager can work across different Sepura products, meaning that the transition to new devices is as smooth as possible. Intuitive user interface Andy Gregory, Business Development Director at Sepura said, “After conducting trials, the response from the forces was that the SC20 benefitted from robust design, an intuitive user interface and loud audio, making it ideally suited to the users’ operational needs. The sale is significant to Sepura of course, as Cambridgeshire are Sepura’s ‘home’ force, and many of our staff live in Bedfordshire and Hertfordshire where the new radios are now being deployed.” Gary Maughan, Regional Sales Director for the UK and Ireland at Sepura added, “Sepura radios continue to be chosen by police organizations in the UK and across Europe as the leading TETRA device available on the market today. We are proud to work with our local forces as we do with all UK police forces, ensuring that they are equipped with the best communication solution possible.”
Navata Road Transport, a road logistics service provider, established in the year 1982, by founder Late Parvataneni Subhas Chandra Bose, now occupies a place of pride among the leading Road Transport Organizations in South India. Navata is spread across a network of 672 branches across India. Warehouses and distribution centers are an integral part of a hub and spoke operations at Navata. HR people at the Navata Road Transport had to manage and do manual work for time-attendance and overtime data. With manual work, data are prone to error. With error-prone data, it was difficult for them to proceed for salary payment. Not only this, but centralized monitoring of time-attendance data of employees of 20 locations across Andhra Pradesh was a difficult task for them. Time-Attendance systems As they already had their inhouse application, communication/integration of the time-attendance devices with that inhouse application was the biggest question for them. To communicate with the Linux Server and devices, they required a third party application interface which was not feasible. Established in 1991, Matrix is a provider of Security and Telecom solutions for modern businesses and enterprises. Matrix Door Controller comes with built-in API for system integration As an innovative, technology driven and customer focused organization, the company is committed to keeping pace with the revolutions in the Security and Telecom industries. With around 40% of its human resources dedicated to the development of new products, Matrix has launched cutting-edge products like Video Surveillance Systems - Video Management System, Network Video Recorder and IP Camera, Access Control and Time-Attendance systems as well as Telecom solutions such as Unified Communications, IP-PBX, Universal Gateways, VoIP and GSM Gateways and Communication Endpoints. Built-In API for system integration These solutions are feature-rich, reliable and conform to international standards. Having global footprints in Asia, Europe, North America, South America, and Africa through an extensive network of more than 2,500 channel partners, Matrix ensures that the products serve the needs of its customers faster and longer. Matrix has gained trust and admiration of customers representing the entire spectrum of industries. Matrix has won many international awards for its innovative products. With extensive analysis of the existing system and Navata’s requirements, Matrix came up with the solution to provide Door Controllers. Matrix Door Controller comes with built-in API for system integration. It directly pushes all the entry and exit records to the company’s Linux server. In addition to that, the customer can command and control the devices now through the inhouse Attendance Management and Payroll Application which was not possible earlier. Additional dedicated server Elimination of the errors has been possible in the data of Time-Attendance and overtime So, there is no requirement of any additional dedicated server for the interface with Matrix’s Door Controllers. Ultimately, these Door Controllers have overcome the challenge of communication with the company’s Linux server. By overcoming the challenges of the entire system, the customer enhanced the productivity of the employees and can effectively use the resources. After acquiring the solution from Matrix Comsec, Navata got the efficiency in Time-Attendance management. Elimination of the errors has been possible in the data of Time-Attendance and overtime. Now, employees get an accurate and timely salary at Navata Road Transport after the atomization of Time-Attendance record and calculation. This increased the productivity of the employees because of the accurate data. This also made the HR work smooth and hassle free. Through live monitoring, centralized control of all the 20 sites has been taken. Reduces installation and maintenance cost Product Offered: COSEC DOOR FOT A Door Controller with higher storage capacity and touch sense keypad. It identifies the user in less than one second. With multiple connectivity options like 3G/4G/LTE it gives flexibilities with the customer’s existing system and therefore, reduces installation and maintenance cost.
Critical building management and security systems at one of the most advanced super-high-rise towers, the landmark Wasl Tower in Dubai, are to be integrated with Maxxess eFusion technology. The 302-meter multipurpose tower, which will be operated by the Mandarin Oriental Hospitality Group, incorporates offices, guest rooms, public areas and apartments, and is situated in a pivotal Dubai location. The Wasl Tower is designed with advanced sustainability features including natural shading and cooling, adaptive lighting, one of the world’s tallest natural ceramic facades, and a vertical boulevard. eFusion was selected for the project because of the flexibility it allows, enabling rapid integration, off-the-shelf, with a wide choice of security, safety and business-critical technologies. With a modular, building block approach, eFusion provides an umbrella management system and drives service efficiency by removing the need for operators to continually switch between systems. Visitor management system By keeping it simple and integrating with the widest choice of technologies, Maxxess removes the complexity A key use of the technology will be to integrate back-of-house operations at the Wasl guest apartments with front-of-house systems, for maximum ease of use and operational efficiency using the Maxxess unified platform. This eFusion solution comprises a 900-plus reader ASSA ABLOY VingCard access control system, a 1700 camera Hanwha surveillance system, and advanced key management with Deister ProxSafe, and it will use the BACnet protocol to integrate the building management system (BMS). The Tower will also benefit from Maxxess VisitorPoint visitor management system, a Zenitel intelligent communication system and disabled call-to-assist alarms. The VisitorPoint integration will improve the guest and resident experience, reduce administration and front-desk queuing, and ensure smooth running of functions from visitor and contractor management to collections and deliveries, and security. Streamline security, safety and facilities management “The challenge with projects of this scale is to find a simple, straightforward platform that communicates with everything and works with all the systems involved,” says Lee Copland, Managing Director EMEA, Maxxess. “By keeping it simple, and integrating with the widest choice of technologies, Maxxess removes the complexity.” The Wasl Tower project is the latest of a growing number of mixed-use developments, including hotels, retail, office and residential complexes to use eFusion to streamline security, safety and facilities management. Last year Maxxess won an Intersec Award for its major eFusion implementation at Bluewaters Island.
PACOM Systems, which designs, develops, and manufactures security platforms for enterprise multi-site and campus environments, announces that Hancock Whitney Corporation continues to roll out the PACOM GMS security management platform to their growing number of bank financial centers and ATMs. Hancock Whitney Corporation operates bank offices and financial centers in Mississippi, Alabama, Florida, Louisiana, and Texas, offering comprehensive financial products and services, including traditional and online banking; commercial and small business banking; private banking; trust and investment services; healthcare banking; certain insurance services; and mortgage services. Multi-Site security management platform GMS meets end-user demands for a multi-site security system with multiple integrations PACOM’s relationship began with Hancock Bank in Mississippi and, after Hancock’s acquisition of Louisiana-based Whitney Bank in 2011, blossomed further still. Currently, the PACOM GMS software platform manages card access and intrusion monitoring at 258 locations and growing. Hancock Whitney does all its own 24/7/365 alarm monitoring from a central location in Gulfport, Mississippi. There are also two company data centers monitored and protected by PACOM GMS. GMS is a robust multi-site security management platform, providing integration between access control, intrusion, video, intercom and virtually any building management or security solution. Designed to manage thousands of locations simultaneously through a single interface, while providing industry-leading availability and redundancy. GMS meets end-user demands for a multi-site security system with multiple integrations. Third-Party monitoring companies “One of the biggest advantages of the PACOM system,” commented Al Tapper, CPP, Manager, Bank Protective Services for Hancock Whitney Corporation, “is it’s all-inclusive with integrated card access and alarms. We have our entire company on a single, integrated platform. We do our own alarm monitoring, which is a big plus because we can immediately verify what is going on in any of our financial centers.” One of our banking acquisitions had two third-party monitoring companies" Tapper continued, “One of our banking acquisitions had two third-party monitoring companies. It was one false alarm after another. That’s dangerous, and it can be quite expensive. With PACOM and self-monitoring, we avoid that. The PACOM system also helps with disaster recovery. We can see what’s going on in our financial centers and know if our alarms are working.” Central monitoring station Hancock Whitney has launched another phase to their company-wide security platform: video integration. When an alarm goes off in any branch, the central monitoring station will automatically be able to see events associated with that alarm. Eventually, all branches and ATMs will have video monitoring with a number of integrated cameras at each location. The system currently provides access to more than 5,000 card holders with varying levels of access privileges. Alarm protocols are in place for each location, with Tapper and his team managing and monitoring the system. “PACOM helps us adapt the system to our changing needs; and when we provide feedback, PACOM listens and will consistently respond directly to that feedback, said Tapper.”
Motorola Solutions and Avigilon Corporation, a Motorola Solutions company, announces that they have been selected to help protect Marino’s Market in Alabama. With over 18,000 customers shopping each week at its two store locations, it is crucial for Marino’s Market to protect its business from customer theft, false liability claims, shrinkage and procurement issues. To address these concerns, Marino’s Market deployed a security system that provides greater visibility throughout their stores to help ensure that employees follow cash handling procedures correctly and track down deliveries. Since deploying a comprehensive Avigilon and Motorola Solutions system, Marino’s Market has seen an improvement in the efficiency of its security operations by 75% and its shrinkage has been reduced by 50%. Efficient communication between store managers Marino’s Market worked with integrator American Video & Alarm, Inc. to install a complete Avigilon and Motorola Solutions security system. The new system features Avigilon Control Center (ACC) video management software, an Access Control Manager™ system and a suite of Avigilon cameras including the H4 Mini Dome and H4 Pro models as well as the H4 Multisensor, H4 Fisheye, H4A Bullet and H4 IR PTZ cameras, which feature self-learning video analytics. The Avigilon video security system helps take care of the detection aspect of security Marino’s Market also uses Motorola Solutions CLS1410 two-way radios to enable efficient communication between store managers. The Avigilon video security system helps take care of the detection aspect of security while Motorola Solutions radios help easily maintain fast communication between managers in the moments that matter most. Safe and positive shopping experience “Having an Avigilon system is like having a virtual security guard; it gives me so much more freedom because I don’t have to do all the work myself — the analytics and search functions of ACC™ takes a lot of that work off my plate,” said AJ Marino. “And you can find information so fast that you can respond in near real-time before the perpetrator even leaves the store so that you can intercept them and address the issue.” “We are pleased to offer Marino’s Market technology that helps them provide a safe and positive shopping experience to their customers, while also ensuring the proper handling of goods,” said John Kedzierski, senior vice president, Video Security Solutions at Motorola Solutions. “The system has enabled the market to operate more efficiently and demonstrates the potential of Avigilon and Motorola Solutions security offerings within a busy retail environment."
Everbridge, Inc., globally renowned provider of critical event management solutions, has announced that it has been selected by Peru’s Ministry of Transportation and Communications (MTC) to power the nation’s Sistema de Mensajería de Alerta Temprana de Emergencia (Sismate), Peru’s Early Warning Emergency Messaging System. The news marks the completion of contract negotiations with the MTC that Everbridge had initially disclosed in September, without naming the country. The win reinforces Everbridge’s position as the global leader in population warning systems with contracts in the Americas, EMEA, and APAC regions. Critical messages to mobile phones After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident. The system, powered by Everbridge Public Warning, will send critical messages to mobile phones before, during and after the emergency. Sismate alerts can also be used in drills and to provide support in search and rescue operations. The Sismate is designed to serve over 37 million people including Peru’s 33 million residents and 4 million annual visitors. “This technology marks a milestone in risk and disaster management at the national level, which will be consolidated by combining joint efforts between various institutions and citizens,” explained Deputy Minister of Communications, Virginia Nakagawa to El Economista. National warning system “Everbridge is honored to support Peru with its national warning system,” said David Meredith, Chief Executive Officer at Everbridge. “Peru joins a growing number of countries that have chosen to partner with Everbridge to implement a nationwide system to protect their population and visitors amid an escalating threat environment.” The Everbridge Platform has been deployed by more local, state, and national governments across the globe than any other solution, offering the ability to reach over 500 million people in more than 200 countries. In addition to Peru, Everbridge Public Warning has been deployed to reach the mobile populations on a country-wide scale in Sweden, Iceland, the Netherlands, Singapore, Greece, and a number of the largest states in India, and is currently being implemented in Australia. Everbridge Public Warning system Everbridge is the first population alerting provider to support four EU countries in conjunction with the recent EU mandate requiring member countries to have a population-wide alerting system in place by June 2022. Everbridge Public Warning represents the only multi-channel solution which allows countries to deploy their preferred combination of emergency communications methods. The Everbridge population warning system communicates across all phases of an incident, leverages location intelligence (static location, last known location, and expected location). It provides directed two-way communications, and enables countries to combine both speed of delivering alerts with the broadest reach to cover the full population and visitors.
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditization is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals