The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centers and their facilities can...
Arecont Vision Costar, the provider of network-based video surveillance solutions, announces the addition of Apex Technology Sales, Inc. (Apex) to its Authorized Manufacturer’s Representative Program. A proven and experienced representative agency, Apex will provide expert pre-sales assistance for Arecont Vision Costar’s Total Video Solution offerings across the US North Central Region, including Minnesota, both North and South Dakota, and Western Wisconsin. “Mike Pride and hi...
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-a...
ELATEC introduced the TCP3 authentication/release station, a small network appliance that enables devices without a USB port to incorporate an RFID or biometric reader, PIN pad or other form of user authentication and access control, and which supports USB 3.0 and gigabit Ethernet networks. Most organizations extend the use of their employee ID badge or card to authenticate for applications beyond building access. This includes most multi-function printers. However, not all printers and devices...
In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organization, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR wor...
Antaira Technologies is a global developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the FCU-6001-SFP+. Antaira Technologies’ FCU-6001-SFP+ media converter is equipped with one 10G/5G/2.5G/1G Base-T auto-negotiation port and one 10G Base-X SFP+ slot. It supports 10Gigabit Ethernet media conversion from cop...
DoorBird's IP-based video door intercoms can now be integrated seamlessly with Snom phones. When the doorbell rings, the audio and video signal from the door intercom is transmitted to the Snom IP phone providing two-way audio communication as well as video via the phone video display. IP door intercom With the DoorBird and Snom integration, the video image is immediately visible when the doorbell rings, even before the call is answered. Bird Home Automation, the Berlin-based manufacturer of the DoorBird product line, developed a special Common Gateway Interface (CGI) to enable Snom IP phones to retrieve image data from the DoorBird camera. All other data is transmitted via standard SIP protocol. The user can communicate with the visitor via the hands-free function or by picking up the handset. The IP door intercom can also be controlled via the Snom phone to open the entrance door whenever required.
Genetec Inc. (‘Genetec’), a technology provider of unified security, public safety, operations, and business intelligence solutions announces a number of strategic hires in Europe to support the company’s sustained growth in both Europe and the Middle East. Francesco Serra, has taken on the role of Vice President of Sales for Europe, based in the Genetec European headquarters in Paris. Having held senior roles with Siemens, Avaya and Polycom, Francesco brings over 25 years of management experience in the technology industry. His extensive background in sales and sales management will be an asset to the Genetec leadership team as the company continues to accelerate its growth in this region. New Market Opportunities Georges Tannous has taken on the new position of Director of Marketing In his new role, Francesco will be responsible for driving the Genetec European sales and channel operations to deliver on the company's ambitious growth plans. “We are excited to welcome Francesco to the Genetec team. His industry experience and sales acumen will help us to continue to propel our business forward in Europe by building on our existing successes and opening up new market opportunities under his leadership,” added Michel Chalouhi, Vice-President of Global Sales at Genetec. With over 15 years of experience in global partner management, and an MBA from Western University's Ivey school of business, Georges Tannous has taken on the new position of Director of Marketing for Europe, Middle East, Turkey and Africa. End-User Awareness Also based in Paris, Georges will lead the company’s EMEA marketing teams and guide the continued growth of the Genetec brand in the region while continuing to oversee the company’s global portfolio of strategic technology alliance partners. A key player in the global Genetec Marketing Leadership program, Georges will work closely with the sales organization to build powerful demand generation, channel engagement, and end-user awareness programs. “Francesco and Georges are experienced leaders with impressive track records of driving high-performance sales and marketing teams. They bring considerable experience to our European sales and marketing organization, as we continue to accelerate our growth and expand into new regions such as East Central Europe,” said Guy Chenard, Chief Commercial Officer at Genetec. Business Intelligence Solutions Security industry veteran Jakub Kozak, has joined Genetec to become the new Regional Sales Manager Continuing the sales and marketing expansion in Europe, security industry veteran Jakub Kozak, has joined Genetec to become the company’s new Regional Sales Manager for East Central Europe. Having held senior sales position in the region with Axis communications, and L3 Technologies, Jakub will be responsible for expanding the company’s footprint in Eastern Europe. With ever-increasing increasing market demands for powerful, enterprise-class IP video surveillance, access control, license plate recognition, and business intelligence solutions, Genetec has enjoyed a compound annual revenue growth rate (CAGR) of 30 percent for the last 10 years. With flagship European customers that include Paris, Rome and Schiphol airports, The Danish Police, Twickenham Stadium, and The University of Hull, the company is continuing its rapid expansion in the region and is looking to further add to its global team of 1,300 talented employees.
Allegion US, a provider of security products and solutions, and Open Options, a global access control solutions company, integrated the ENGAGE IP Gateway with DNA Fusion software to expand their offering of scalable security solutions. Open Options is a longstanding Allegion software alliance member and is committed to offering the most up-to-date technology available. The integration of the ENGAGE IP Gateway with Open Options’ DNA Fusion access control platform offers users another cost-effective option in their access control solution. Simplify Installation The ENGAGE Gateway provides the ability to leverage existing IP-based infrastructure for maximum efficiency The ENGAGE Gateway provides the ability to leverage existing IP-based infrastructure for maximum efficiency. Ethernet connectivity provides the ability to connect to the network for real-time access control directly from an in- or out-of-network host to an edge device. To further simplify installation, the Gateway can be powered over ethernet (PoE), removing the need for separate power supplies or wiring. The ENGAGE Gateway performs regular, frequent communication between the Gateway and linked ENGAGE enabled devices. The Gateway is able to send commands such as lock, unlock and lock down from an IP host in real-time. Commands are executed in less than five seconds. As an Internet of Things (IoT) device, the Gateway leverages network security practices, including AES-256 bit and TLS encryption to provide customers with secure, dependable experiences. Real-Time Communication These secure communication protocols, in addition to real-time communication between devices, help to ensure the end user’s facility security is constantly monitored and allows access events to be addressed immediately. This solution also minimizes traditional hardware infrastructure, which provides the end user a smaller security footprint and cost savings. “Open Options is dedicated to providing open platform solutions, which is why we continually work with leading security providers to develop integrations that give end users a choice in their access control products,” said Ben Vestal, vice president of sales and business development at Open Options. “We’re excited to join with Allegion in offering our end users an opportunity to further enhance their security by utilizing real-time connectivity between their electronic lock and access control solution.” Access Control Software DNA Fusion is designed with valuable customer input to ensure it delivers a user-friendly and open access control platform DNA Fusion, Open Options’ award-winning open architecture access control software, seamlessly integrates with security systems like Schlage’s electronic locks, readers and credentials. Developed by experts with years of industry experience, DNA Fusion is designed with valuable customer input to ensure it delivers a user-friendly and open access control platform. Other supporting products—visitor management, photo ID and more—work together to provide a complete security solution. Numerous Allegion products have a deep integration developed by Open Options. The integration between DNA Fusion and the ENGAGE IP Gateway is the result of requests for additional solutions by the end user. Networked Access Control It can leverage an existing IP infrastructure to enable networked access control to doors traditionally ignored. “What’s great about Open Option’s DNA Fusion software is that it offers a full-scale access control solution that can be tailored to fit each customer’s unique security needs,” said Dewey VanVoorhis, electronics product manager at Allegion. “This integration offers end users yet another solution to expand security and convenience to more of their doors.”
TrackTik Software’s mobile and web-friendly guard tour system uses automation to take the effectiveness and efficiency of an organization’s security management operations to the next level. This first-of-its-kind system provides security managers with a custom-tailored, holistic view of their operations and security personnel on tour with the support and safety of having ‘a coach in their back pocket.’ From scheduling and interacting with security staff to incident reporting, TrackTik’s software offers a complete suite of tools, including real-time checkpoint logging, incident reporting, GPS tracking, messaging, alerts and audio-video capabilities. Real-Time Picture With a variety of checkpoint options, together with GPS tracking, TrackTik’s automated guard tour system creates a real-time picture of an organization’s guard tour operations that improves transparency and accountability. The guard tour system establishes permitted and restricted zones, and can assign special protocols for specific locations. Offering immediate communication, modifications and transmission of data, TrackTik’s automated guard tour system also provides a live picture of the security environment in which security personnel are operating. The watch mode audio and video feed and recording feature informs of dangerous situations, which also helps support the health and safety of security personnel dealing with potentially high-risk situations, resulting in maximized security impact to help deliver a safer environment.
S.A.F.E., the Safety Alerts for Education Foundation, announced that it is donating the Safety Alerts for Education (S.A.F.E.) emergency mobile alerts platform to all schools, colleges and Universities across the US for free and in perpetuity. This is the exact same, fully featured system that has been in use by The Department of Homeland Security (DHS) and The Massachusetts Emergency Management Agency (MEMA) and other Federal, state and local agencies, and police departments across the country for the past seven years. S.A.F.E may save lives in situations where a few extra seconds of warning can be the difference between life and death. Ping4Alerts Emergency Communications Technology Ping4 invented and developed the Ping4Alerts emergency communications technology that the S.A.F.E. Foundation usesThe S.A.F.E. Foundation is a non-profit 501c3 organization founded by the principals of Ping4 Inc., of Nashua, NH. Ping4 invented and developed the Ping4Alerts emergency communications technology that the S.A.F.E. Foundation uses. This S.A.F.E. system is currently offered and being implemented in New Hampshire and Massachusetts Schools. This same system, developed by Ping4, was used during the Boston Marathon bomber manhunt and in the aftermath of Hurricane Sandy. At a New Hampshire launch press conference Governor Sununu lauded “the opportunity that schools now have to create a first class, world class, security and communications system for their students.” Ensuring Safety Of Students “The wellbeing of our students, and the safety of our schools, matter to all of us,” said Jim Bender, CEO of Ping4. “This issue of school safety goes well beyond making sure that our children make it home safely from school each day. It is also about creating a positive school environment which is more conducive to learning, and more conducive to teaching. We are excited to expand our New Hampshire S.A.F.E. initiative to Massachusetts. “The Columbine High School massacre was nearly 20 years ago and not much has changed since then. In the first five months of 2018, more people were killed in American public schools than in US military operations globally. This impactful step toward improving school safety can be implemented immediately, without getting held up in contentious debates over gun laws or mental health issues.” Precise And Real-Time Emergency Alerts S.A.F.E. provides real-time instructions to those inside school buildings to better protect themselves and get out of harm's way quickerS.A.F.E. enables schools to send geographically precise emergency alerts, anonymously, and in real-time, to nearly any smartphone in any school building or on any campus. A favorite of law enforcement agencies and first responders, S.A.F.E. provides real-time instructions to those inside school buildings to better protect themselves and get out of harm's way quicker. First responders outside can also receive valuable information in real-time from inside a building, even before they arrive on the scene, reducing response times and giving greater situational awareness of a shooter or other emergency. Smartphone Application For School Safety “We are pleased to be among one of the first educational institutions in the country to encourage usage of this important and meaningful smartphone application, in an effort to keep our schools safe,” said Frank Edelblut, commissioner of the New Hampshire Department of Education. “As more schools opt-in, everyone connected to the school community – educators, parents, and students – will be able to stay informed during an emergency.” “When we reviewed every after-action report of school shootings across the country, communication was always an issue,” said Perry Plummer, Director of the Division of Homeland Security and Emergency Management for the state of NH. “How do we let the people know what they should do to protect themselves and how do we let parents know that their child is safe and where to pick them up.” Administrative Alert Dashboard S.A.F.E. provides an administrative alert dashboard for school administrators to send secure life-saving alertsA free download for school students and staff on iOS or Android, S.A.F.E. provides an administrative alert dashboard for school administrators to send secure life-saving alerts. S.A.F.E. delivers 2-way rich media messages in real-time, with any combination of audio, video, pictures and text, which can be very helpful to police, school administrators, and first responders in assessing situations, saving lives, and solving crimes. S.A.F.E. is completely anonymous and collects no personal data from users of the app. Parents of children in the school can preset ‘watched locations’ on their own phone, so that they will receive all alerts sent to their children at school, as well as designated, safe child pick-up locations, regardless of where the parents are at the time. S.A.F.E. messages can originate either from the school administration itself, or from local law enforcement, or both. S.A.F.E. can be implemented locally within weeks. Each school or school system can customize, manage and send out their own alerts via an easy to use web-based portal. S.A.F.E. can isolate a school building or campus on a map and only those in the designated areas will receive the alerts. S.A.F.E.’s ability to pinpoint locations with geographic accuracy is second to none.
Johnson Controls updates its popular Illustra Pro camera family with the Illustra Pro Mini-Dome, featuring new Smart Wide Dynamic Range that optimizes video quality while minimizing configuration time. Available in a complete range of image resolutions and lens options, the Pro Mini-Dome is ideal for a wide variety of deployments in both medium and large-sized facilities. Smart Wide Dynamic Range available in the Pro Gen3 Mini-Dome reduces configuration time while greatly improving the quality of the video stream in varying lighting environments. By effectively reading the scene, the Mini-Dome can adjust contrasting and overall scene balance without operator intervention. Additional Labor Savings The Pro Gen3 Mini-Dome also automatically adjusts settings to the desired mount for ceiling or wall Setup times are also reduced with the addition of configuration profiles, such as retail, gaming and indoor/outdoor scenes, where camera settings are automatically adjusted based on the environment, with a simple click of a button. The Pro Gen3 Mini-Dome also automatically adjusts settings to the desired mount for ceiling or wall for additional labor savings. “The smart technology embedded in our latest generation of Illustra Pro cameras automates picture tuning and ensures that what you see is always dynamically optimized even in changing scenes and lighting conditions. We are aiming to reduce operator setup and management costs while always delivering a perfectly configured picture,” said Ric Wilton, director of product management for Illustra. Video Intelligence Analytics “Adding intelligent, automated capabilities to our solutions is core to our product design and the Illustra portfolio.” Building off the previous generation of cameras, the Mini-Dome improves on important features such as Wide Dynamic Range, Illustra IntelliZip bandwidth management, effective failover redundancy, cybersecurity and Video Intelligence Analytics. Mini-Domes are available in three and eight MP options as well in Wide Field of View and Narrow Field of View options, and are not impeded by physical barriers such as a bubble housing. Enhanced Security Mode Users can offload analytic streaming from network video recorders to the edge on Illustra cameras Users can offload analytic streaming from network video recorders to the edge on Illustra cameras, saving time and resources. This feature, Video Intelligence Analytics, provides real-time, user-customisable event alarms that allow for quick reaction to incidents. By gathering transformative data instantly, users can better allocate human resources elsewhere. As part of the Tyco Cyber Protection Product Security Program, the new generation of Illustra Pro cameras will also have enhanced safeguards against cyber attacks. With cyber-threat resilience in mind, the solution includes ‘secure boot’ which prompts the installer to change passwords upon installation. Additional safeguard controls include an enhanced security mode which forces the use of complex, non-default passwords and encrypted communications.
Across the country, law enforcement officers are finding it increasingly difficult to respond to the near overwhelming number of calls coming from security alarms. Police departments commonly define a false alarm as a call, which upon investigation, shows no evidence of criminal activity, such as broken windows, forced doors, items missing, or people injured. While false alarms bog down police, they can also negatively impact customers and integrators. End users can expect hefty fines for false alarm responses, and when these customers receive large bills from the city, many turn to installers, dealers, and even manufacturers expecting them to accept the responsibility and pay the check. What First Brought The Issue Of Alarm Verification To Your Attention? It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight I’ve been aware of the problem of false alarms for about 5 years. I believed audio capture, through microphone deployment, could be an active part of the solution when used as a second source for indicating ‘out of the norm’ activity and as an equal component with the video surveillance technology. In 2015, I found similarly minded security professionals when introduced to the Partnership for Priority Verified Alarm Response. After reading PPVAR’s paper on ‘Audio Verified Alarms Best Practices; [April 2015],’ I knew that the Partnership was on to something important. In our lives, two of the five senses we count on day-in and day-out are sight and sound. It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight. What Is The False Alarm Rate? In 2016, the International Association of Chiefs of Police reported that over 98 percent of all alarm calls in the United States were false. This number is obviously staggering, and something we need to work towards correcting. Why Did This Issue Resonate So Strongly With You? When I first investigated this issue, I was sure that the security industry would have already recognized this and was acting to ensure improved alarm verification, preferably through a combination of audio and video technologies. However, I quickly saw that this was not the case, or even close to the norm. I have questioned the rationale behind the lack of adoption and found the deployment of audio is often hindered by the concern of privacy. I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio As CEO of Louroe Electronics, I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio. I’ve had to reassure many security personnel and customers how the law supports the use of audio in public places as long as there is no expectation of privacy. By dispelling fears with facts around deploying and implementing audio sensors, customers can confidently include audio in their surveillance systems and gain a more effective security solution. Who Is Affected By This? Truth be told, everyone from the end user to the manufacturer is affected by this issue. Not to mention the strain this puts on law enforcement who are tired of ‘wasting time’ and effort out in the field on these nuisance alerts. When an end user receives a check for their false alarm, many of them will immediately blame the integrator and or the monitoring center for a faulty set up and management and expect the integrator to remedy the situation, including carry the burden of paying the fines. The integrator, on the other hand, will turn to the manufacturer, assuming faulty equipment and installation instructions; therefore, looking for reimbursement for the cost. What Is The Average False Alarm Fee? It depends on many factors, and especially your first responder assigned location for responseIt depends on many factors, and especially your first responder assigned location for response. According to the Urban Institute, fees generally range from $25-$100 for the first offense, rising as high as a few thousand dollars per false alarm if a location has a large number in a single year. What’s worse, in extreme cases, alarm systems may even be blacklisted by the police dispatch center if they have raised too many false alarms in the past. Why Do You Believe Audio Is The Ideal Technology For Secondary Source Verification? Video surveillance has been the main option for security monitoring and alarm validation for decades, however industry professionals are realising that video alone is not enough. Video only tells half of the story, by adding audio capture, the responsible party gains a turnkey solution with the ability to gather additional evidence to verify alerts and expand overall awareness. In reality, audio’s range is greater than the field of view for a camera. Sound pickup is 360 degrees, capturing voices, gunshots, breaking glass, sirens, or other important details that a fixed camera many not see. How Would A Secondary Source Verification System Work With Audio? Using a video monitoring solution equipped with audio, the microphone will pick up the sounds at the time a visual alert or alarm is triggered. If embedded with classification analytics, the microphone will send alerts for specific detected sounds. The captured audio, and any notifications are immediately sent to the monitoring station, where trained personnel can listen to the sound clip, along with live audio and video from their station. When law enforcement receives a validated alarm, they can better prioritise the response From here, an informed decision can then be made about the validity of the alarm, along with what the current threat is at the location. If the alarm is in fact valid, the information is then passed along to the law enforcement within minutes. When law enforcement receives a validated alarm, they can better prioritise the response. It also provides more information in a forensic evaluation. Are There Any Additional Resources You Would Suggest Looking Into? Yes, we would suggest looking into the following to see a few different perspectives on the matter: NSA Support For 2018 Model Ordinance For Alarm Management and False Alarm Reduction Partnership for Priority Verified Alarm Response Support for the Term “Verified Alarm” and Prioritising Verified Alarm Responses Urban Institute Opportunities for Police Cost Savings without Sacrificing Service Quality: Reducing False Alarms
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture Influences Door Solution Decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organization’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organization and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training Employees On Door Security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organization or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate Through The Decision-Making Process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New Security Entrance Installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule Group Meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure You Monitor Public Areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organization. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What Is The Ultimate Success Of The Installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile Credentials Are Not Secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organization more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organization deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All Smartcards Are Equally Secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organization vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organization if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic Locks Are More Vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorized access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be Prepared To Unlock Future Benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
Managed services provided through the cloud offer multiple advantages for system integrators. These Include: Increased Recurring Monthly Revenue: Managed services are a new business model that generates more stable and predictable income streams for integrators. Stickier Customers: Managed services foster a more involved relationship between integrators and their customers, which can help boost customer retention. High Gross Profit Margins: Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. They Are Easier To Provide: The cloud enables integrators to serve more sites without hiring additional technicians. Problems Can Be Fixed Proactively: When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue - possibly before the customer even notices a disruption in service. Increased Valuation Of Business: According to a study by Dell, companies that utilize cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Importance Of Cloud-Based Solutions The cloud also challenges integrators to educate customers on the value of the new approach The cloud also challenges integrators to educate customers on the value of the new approach. For example, the cloud changes the expense model of security systems. It allows customers to shift from a capital expenditure (CapEx) model, where large capital funding is required to purchase equipment, to an operational expenditure (OpEx) model, where the costs of the solution become an operating expense. Since the cameras, installation, storage, and software are packaged into the service, you don’t need a large capital outlay up front - you simply pay a predictable expense every month. Leveraging this difference opens new sales opportunities for integrators. The benefits of cloud services on how physical security equipment and software services can be monitored and maintained through a connected service is a particular benefit to integrators. Data Monitoring And Security “By having data describing the health of the system shared on the cloud, system integrators can observe data on demand and create proactive maintenance plans in coordination with the end user,” says Stuart Rawling, Director of Business Development, Pelco by Schneider Electri, and one of our Expert Panelists. A daily challenge for end users is balancing human resources used in the operation of a system “Such plans should result in increased system reliability and less downtime. If system performance data is aggregated and anonymized, it could also be used by manufacturers to analyze and form conclusions about maintenance schedules and system lifespan.” A benefit is happier customers. “A daily challenge for end users is balancing human resources used in the operation of a system and daily maintenance, with maintenance having shared responsibility with the system integrator,” says Rawling. The Cloud Software As A Service The SaaS model gives companies the resources to improve the deep learning model" The cloud also can help to make cutting edge technologies more affordable. Economies of scale provided by the Cloud (Software as a Service, or SaaS) are making the sophisticated capabilities of deep learning affordable to a wider audience. Meanwhile, deep learning augments cloud systems with capabilities that may not be available (or affordable) in on-premise systems, thus accelerating the broader move to cloud systems. “Having a SaaS model gives companies the resources to improve the deep learning model,” says Shawn Guan, CEO and co-founder of Umbo Computer Vision, a provider of deep learning video analytics. “We can make more accurate systems that scale better and faster. SaaS enables vendors to do something great with deep learning. You don’t have to redo it for everybody. One customer benefit from another customer and all the knowledge is aggregated together.”
Lack of cybersecurity of video systems made headlines in 2016. The Mirai cyberattack that year impacted Internet service on the East Coast of the United States and kept several high-profile websites offline. Cybersecurity attacks later in the day were more global in nature. The cyberattacks were carried out by a botnet, a network of bots, which are software applications (in this case, computer viruses) that communicate with each other and run tasks automatically over the Internet. IP-Enabled Cameras Bots can infiltrate unprotected computers and then use the computing power of their ‘hosts’ to carry out various kinds of cyber-attacks on other Internet targets. In the case of the Mirai attacks, a hidden army of bots worked together to bombard various websites with so many bogus requests that the sites became overwhelmed by the volume of traffic and could not respond to legitimate requests. It’s called a denial of service (DDS) attack. Many of the attacking bots were hosted by IP-enabled cameras and digital video recorders (DVRs). In other words, the bots used the computing power of our industry’s video products to launch the headline-grabbing cyberattack. Many of the attacking bots were hosted by IP-enabled cameras and digital video recorders Safeguarded Communication Since 2016, awareness of cybersecurity for video systems has grown. Today, it is understood that video solutions should be designed to safeguard communication between trusted devices, ensure that video in transit (streamed) or in storage remains encrypted, and any commands and configurations to control cameras and other devices are transmitted via a secure channel (HTTPS). Some basic best practices can go a long way to improving the cybersecurity of video systems. A small change is to remove default passwords from products and software, and to avoid using ‘guessable’ passwords. All firmware should be encrypted to reduce the possibility of it being downloaded from the manufacturer’s website and deconstructed. Use of a secure operating system that is regularly updated can protect against video tampering, altering, spoofing and snooping. Video Surveillance Systems Another precaution is to avoid remote login using Telnet or FTP, which are less secure. Finally, use of digital certificate provides assurance that data from a third party is true and not falsified. All data should be encrypted with digital certificates. Video manufacturers often provide ‘hardening guides’ to enable enterprises to protect their systems from potential cybersecurity threats. Video manufacturers often provide ‘hardening guides’ to enable enterprises to protect their systems from potential cybersecurity threats Free downloadable guides and other resources provide specific recommendations on hardening video surveillance systems by applying proven cybersecurity initiatives. For example, the OnSSI Hardening Guide for Networked Video Surveillance Systems includes guidance on password strength, how to avoid poor password practices, collaboration with IT and HR departments and how to apply software and firmware security updates. Hardware-Level Encryption It also includes standard, advanced and enterprise cybersecurity best practices for cameras, servers and workstations and networks. Another cybersecurity requirement is data-at-rest encryption to ensure that data, such as stored video, is secure right down to the storage medium in which it is held. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Despite the clear benefits, data-at-rest encryption lags other areas, such as network and endpoint security, in terms of the investment it currently receives. A Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security.
Simultaneous suicide bombings at several churches and hotels in Sri Lanka on April 21 were of a scale, sophistication and level of coordination that hasn’t been seen since 9/11. Nine suicide bombers targeted three churches and three hotels on Easter morning, and the resulting casualties numbered 359 dead, including 45 children, and about 500 injured. The complexity of the attacks suggests the bombers received help from an outside organization, likely the Islamic State (IS). Sadly, security warnings from Indian intelligence officials, which might have helped to prevent or minimize the attacks, were ignored by Sri Lanka security weeks earlier. In the wake of the massacre, two of Sri Lanka’s top security officials were asked to resign, and Sri Lanka’s president promised to completely restructure state security. Contradiction To The Terrorism Report The twin calamities provide a dramatic counterpoint to an observed global decrease in terrorist attacksA motivation for the Sri Lanka tragedy is thought to be the March 15 shootings at two mosques in Christchurch, New Zealand, where 50 people were killed and 50 more were injured. A 28-year-old Australian white supremacist was arrested and charged with murder. Taken together, the twin calamities provide a dramatic counterpoint to an observed global decrease in terrorist attacks, as documented in a recent report. The suicide bombers in Sri Lanka were eight men and one woman, most of them well-educated and coming from the middle or upper class. One was the leader of National Thowheeth Jamaath, the homegrown militant Islamist group the government has blamed with carrying out the attacks. There is also evidence to corroborate a claim of responsibility by IS. Some 60 people have been arrested in the investigation. Even days later, police continued to find explosives and said there was still danger. Multiple Attacks One explosion on Easter morning occurred at St. Sebastian’s Church in Negombo, 20 miles north of Colombo, where more than 100 were killed. Another bomb killed 28 people at the Zion Church in Batticaloa, and an unknown number died at St. Anthony’s Shrine, a Roman Catholic church in Colombo. The three hotels that were attacked were all in Colombo – the Shangri-La, the Cinnamon Grand and the Kingsbury The three hotels that were attacked were all in Colombo – the Shangri-La, the Cinnamon Grand and the Kingsbury. Two more explosions happened Sunday afternoon, one at a small guest house and another at the suspects’ safe house, where three officers were killed. Security at houses of worship has been a high-profile concern in the United States in recent years following incidents such as an attack at Emanuel African Methodist Episcopal (AME) Church in downtown Charleston in 2015 that killed nine people. Just last October, 11 people were killed and six others injured in a shooting at a synagogue in Pittsburgh. Hardening Security At Churches “It’s no longer enough to pray for a safe and secure environment,” commented Patrick Fiel of PVF Security Consulting in an Expert Panel Roundtable discussion. “Churches are soft targets. Clergy and parishioners will need to work closely with security consultants and local law enforcement to harden their facilities.” Access control, CCTV solutions and mass notification systems are all helpful and can be placed unobtrusively so as not to interfere with aesthetics of the church, Fiel adds. The scale and scope of the bombings in Sri Lanka provide a wakeup call to the global likelihood of terrorist attacksIt doesn’t appear technology would have made much difference in the case of the Sri Lanka attacks, although awareness and vigilance can have an impact. At Zion Church in Batticaloa, for example, a bomber was stopped by pastors from entering the congregation area where some 500 people gathered. Because of their suspicions, the bomb was instead detonated in a courtyard where children were eating breakfast; 28 people died. The scale and scope of the bombings in Sri Lanka provide a dramatic wakeup call to the continuing global likelihood of terrorist attacks. The last territory of the Islamic State in Syria fell in March, but IS and its ideology live on, and continue to be a global terrorism threat. And that’s just one among many possible sources of terrorism worldwide. Hopefully, the recent incidents do not foreshadow more attacks that are even more deadly.
Beijing Daxing Airport, due to open in September, will soon be the second in Beijing to secure daily operations with state-of-the-art technology by Airbus. Airbus will provide one Tetra DXTA server, and nine TB3 base stations with eight TTRX 32-channel receivers per base station for Bejing’s second international Airport communication structure. The system will be mutually backed up by the Beijing Capital International Airport to enhance the communication and management of the two airports. The whole network will be put in use before the 30th of September, the official opening date of the airport. This new airport will possess eight runways and serve around 100 million passengers annually, all of which will be secured with Airbus technology. Seamless communications Airbus Tetra system has played a vital role in securing tasks relating to passenger transportationTests carried out in April proved the interconnectivity between the digital trunk communication systems of both airports to be reliable, as stable and clear communications were recorded. The two Tetra systems provided by Airbus are fully interconnected; this will allow for Airport related entities such as Airlines and ground service companies to benefit from seamless communications between both airports. Beijing International Airport is also equipped with an Airbus Tetra system, which has provided highly stable, reliable, and flexible communication security for daily operations since its deployment in 2008. Over the past ten years, it has played a vital role in securing tasks relating to passenger transportation, as well as the logistics of high-scale world sports events. The current system serves over 10,000 subscribers. In 2018, the Beijing Capital International Airport saw over 100 million passengers for the first time, making it the second busiest airport in the world.
After a period of decline, the number of pupils being expelled from mainstream schools is increasing, placing more pressure on the need for Pupil Referral Units and the security at these premises, which is vital for managing student and staff safety. ASSA ABLOY High Security & Safety Group offers a range of locks and doors suited to the sensitive needs of Pupil Referral Units and pupils in care. Fire Resistance Integrity All doorsets in the Secure Education range are independently tested and certified The breadth of doorset solutions means the High Security & Safety Group can specify products for every area and need of a secure education environment. From classroom doors and personnel doors to circulation doors and high-performance doors. All doorsets in the Secure Education range are independently tested and certified to achieve 60minute fire resistance integrity and insulation to BS EN 1634 from both sides of the door. In addition, all doors within the offering are tested in line with the Department of Health’s environmental design guide attack test for secure services, as well as meeting with DD171 & BS EN 1192 severe duty performance and strength, and are tested to PAS 24 enhanced security performance requirements. Secure Educational Facilities This guaranteed and certified level of performance gives building owners and users the peace of mind that all doorsets are fit for purpose, as well as providing the added level of security and safety often needed in secure educational facilities. Mike Dunn, Commercial Director for ASSA ABLOY High Security & Safety Group, said: “A recent report by the think tank IPPR, found the total number of children being taught in ‘alternative provision’ for excluded children is far higher than the total number of reported exclusions. This will inevitably mean increasing pressure on facilities, such as Pupil Referral Units, and the safety of staff and pupils within those buildings.” Added Level Of Security Pupil Referral Units are first and foremost a place of education" “Pupil Referral Units are first and foremost a place of education and therefore doors and locks must allow for this, grant access, as well as restricting permissions. However, an added level of security and safety must be considered and handled sensitively within these premises.” “Our experience and wide product range means we can advise on and supply doors and locks for every aspect of a secure education environment, mitigating any risk and ensuring a smooth specification process.” Doors within the Secure Education range come in a variety of materials and finishes, giving specifiers improved design flexibility.
Evelina has had many different brands of door entry system, as is often the case with NHS Hospitals spread across the UK. Managers at Evelina wished to have a standardized system across the wards in order to improve operating efficiency and reduce maintenance costs. Upgrades needed to be quick problem free and cost-effective. Each independent ward utilizes a self-contained door entry system to control security critical access to their busy nursing area. The Maternity Ward provides a good example of a security critical area that requires an intuitive and cost-effective system to control access with the ability of a ward receptionist to permit entry and exit via an audio-video communication link. User-Friendly Features Fermax Area Manager Andy Saxton worked closely with Evelina’s nominated installation company to ensure that the Fermax system design using DUOX and VEO met the hospital’s needs. Based on 2 wires with aesthetically pleasing profiles and user-friendly features and functionality the Fermax DUOX system with VEO video monitors was a perfect match for the hospitals requirements. Purely digital in nature, the DUOX 2 wire system functions perfectly using most types of cable which meant that it could be retro-fitted onto the existing system infrastructure, thereby avoiding the excessive costs of re-cabling. Equipped with the Photocaller function which allows for the time and date stamping of visitors, the Fermax DUOX VEO monitor delivered the ideal solution.
The client is a prestigious purpose-built skin, laser and cosmetic surgery clinic based in central Birmingham. In 2018, they relocated to a Georgian building following an expansion of the practice to welcome new professional associates and provide a greater range of patient services. Their upgraded and refurbished building includes a larger operating room with dedicated recovery areas, treatments rooms, consultation rooms and waiting areas. At this clinic, plastic, reconstructive and aesthetic experts carry out surgical and non-surgical procedures for the face and body as well as cosmetic dentistry, IV nutritional therapy and advanced spa treatments. IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham As well as a team of renowned doctors and practitioners and their administration team, the new premise is also accessed by numerous patients and their families visiting the clinic for pre-treatment and post-treatment consultations, as well as for the procedures themselves. Access Control And Intruder Detection System In their new premises, the practice required an access control and intruder detection system that delivered: Hassle-free access for staff with various levels of authority, from surgeons to administrators, for e.g. restricted access to consultation/treatment rooms and post-procedure recovery areas Limited access to patient information, drugs, high value surgical equipment and other high-risk assets Simple and reliable off-site management by permitted personnel, at any time and via their own computer, tablet or smartphone A secure yet serene and private experience for patients and visitors, for e.g. easy entry and exit for visitors to/from the main reception area Safety Of Staff And Visitors IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham. With nearly 100 years of combined experience installing security systems, the IGNIS team delivers on its reputation for quality of service, knowledge, reliability and honesty. An integrated system gives the client reassurance, simplicity and ease of use IGNIS works with integrated access control and intruder detection manufacturer Inner Range to deliver a cost effective, reliable service every time, with safety of staff, customers and visitors of paramount importance. Inner Range provided Inception, the core access control and intruder detection system used by IGNIS Fire Protection Services on this site. Inception was the perfect choice for this customer because it hangs off the same infrastructure with a single user interface. An integrated system gives the client reassurance, simplicity and ease of use. Offers Smart Building Management A pioneer of integrated access control and intruder detection systems, Inner Range has been a pioneer in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Inner Range’s award-winning integrated security systems offer smart building management at local, national and global levels. Inception is Inner Range’s powerful yet affordable access control and intruder detection system, now featuring a range of extra reporting functions, anti-pass back protocols and interlocking doors. The system provides this dynamic clinic with the integrated access control they need to run their business with the utmost efficiency, safety and security. Key Features Available With Inception: A web-based interface that can be controlled by authorized staff using existing smartphones, tablets or computers Various entry points starting at 2 or 4 doors and 16 users and can be expanded if required up to 32 doors and 512 users Universal inputs and outputs that can be used independently of each other, to directly control door locks and powered sirens modules Secured alarm communication is using 128Bit AES encryption to ensure data privacy Interactive Commissioning Checklist IGNIS installed the Inception system using its interactive Commissioning Checklist that ensures no steps are missedIGNIS installed the Inception system using its industry-first interactive Commissioning Checklist that ensures no steps are missed. That process includes core programming, custom automation, changing default credentials, backing up the database and downloading commissioning reports. Inception’s wireless adaptability not only gives users flexibility, it means technicians don’t need to find an IP address or connect to the user’s local network. They can also use an adaptor as a service tool to perform maintenance on site. Benefits For Client: Peace of mind – 24/7/365 access and intruder detection solutions to keep patients, staff, visitors and assets safe and secure Convenience – the system can be controlled at all times via any mobile device No forgotten codes to interrupt the sensitive day to day running of the business or cause issues out of hours Value for money - no costly additional hardware and no need for a set on-site administrator or security guard Easy access and security means reception and support staff can focus on other responsibilities such as patient care
Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, announces that its SmartCode 888 Deadbolt Lock was chosen to become part of the new Home is Connected smart home system from D.R. Horton, Inc. The inclusion of Kwikset’s SmartCode 888 in the system was based on its value (great functionality at an entry-level price), reliability, and high degree of security. Incorporating the latest Z-Wave 500 chipset, the SmartCode 888 offers keyless entry through a convenient, easy-to-use touchpad. Kwikset’s patented Home Connect technology enables the lock to wirelessly communicate with other devices in the home through a third-party smart home controller, as well as to remotely check the door lock status, lock or unlock the door and receive notifications. Innovative Program D.R. Horton’s Home Is Connected system is included in the base price of each new home from the company’s family of brands D.R. Horton’s 'Home Is Connected' system is included in the base price of each new home from the company’s family of brands. The system includes a robust central hub by Qolsys that controls the smart home features, including a home alarm and automation platform by Alarm.com, Honeywell Home thermostat from Resideo, smart switches by Eaton Corporation, video doorbell by SkyBell and hands-free, voice-first experiences with Amazon Alexa. “We are pleased to be part of such an innovative program created by the nation’s largest volume homebuilder,” said Dave Seeman, Director of National Builder Accounts, Kwikset and Baldwin, Spectrum Brands, Inc. – Hardware & Home Improvement Division. Convenience Of Keyless Entry “We are confident that buyers of D.R. Horton homes will not only appreciate the security and convenience of keyless entry that our SmartCode 888 provides, but also the endless benefits of whole home automation. To be a part of a system that includes such well-known, reputable brands indicates to us the high level of trust D.R. Horton puts in our products.” Brad Conlon, Vice President of National Accounts for D.R. Horton, said, “We are pleased to work with Kwikset to provide this essential component to D.R. Horton’s new Home is Connected smart home system. We know our customers will appreciate the peace of mind that comes from Kwikset’s SmartCode 888 lock and the Home is Connected system overall.”
Mobile-device and application-security technology company Trustonic announces that Hyundai Motor America will demonstrate its new Digital Key app, secured by Trustonic Application Protection, at the New York International Auto Show 2019. The Digital Key will launch with the all-new 2020 Hyundai Sonata in the fall. Hyundai’s Digital Key is a downloadable smartphone app that can replace a traditional car key by leveraging Near Field Communication (NFC) to detect an authorized smartphone. An NFC antenna is located in the driver’s door handle for locking and unlocking while a second antenna for starting the engine is located in the wireless charging pad in the center console. Seamless Vehicle Sharing The Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication Once authorized, the Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication. A user can lock and unlock the vehicle, activate panic alert and start the engine within a range of about 30 feet of the car. The new Digital Key can be utilised by up to four authorized users, facilitating seamless vehicle sharing. Users’ preferred settings are also stored in the car, meaning that when a user is recognized, the vehicle automatically adjusts settings for side mirrors, radio presets, sound settings, and seat positioning. Hyundai is using Trustonic Application Protection (TAP) to secure the Digital Key. TAP ensures that Digital Key transfer requests are securely displayed to and approved by a real, authenticated user on a trusted device. Cybersecurity Approach TAP utilizes a multilayered industry-recognized security approach for communication to and from the customer’s phone. “Hyundai has been a leader in connected car technology for a long time now, with new features like Apple CarPlay, Android Auto, Smartwatch and Smart-speaker integration into our vehicles,” said Manish Mehrotra, director of digital business planning and connected operations, Hyundai Motor America. “Digital Key adds convenience for 2020 Sonata owners and allows us to be ready for future shifts in the mobility space, such as car sharing. We chose Trustonic because of their multilayered, industry recognized cybersecurity approach.” Vehicle-Function Permissions Hyundai’s Digital Key will enable easy car sharing and improved user experiences" Car owners have a deeper level of access than other authenticated users, enabling them to set vehicle-function permissions and the duration of access for each shared user. This enables uses beyond car sharing, such as enabling couriers to access the trunk within a pre-agreed window of time to deliver a package. Future uses that the app could enable include car rentals, triggering an alarm when a vehicle travels outside a designated area and remote control of features, such as autonomous parking. Ben Cade, CEO, Trustonic, adds, “Consumers expect to be able to manage their lives on their smartphones, and this includes their vehicles. Hyundai’s Digital Key will enable easy car sharing and improved user experiences for drivers—and as international leaders in app security, it’s up to us to ensure this can happen in a scalable and secure way.”
Round table discussion
Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: How is the rise in terrorism impacting the physical security market?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Even the most advanced and sophisticated security systems are limited in their effectiveness by a factor that is common to all systems – the human factor. How effectively integrators install systems and how productively users interface with their systems both depend largely on how well individual people are trained. We asked this week’s Expert Panel Roundtable: What is the changing role of training in the security and video surveillance market?