Aiphone, the renowned international manufacturer of intercom and security communication products, has added the IXG-MK IP Video Guard Station to its robust portfolio of solutions in its IXG Series Multi-Tenant Video Intercom System. The IXG-MK provides visitors a convenient way to call a building’s concierge, receptionist, or security guard directly from the entrance station. This is helpful when visitors are unsure how to reach a tenant or if they are simply trying to deliver a package t...
Vanderbilt, a renowned provider of state-of-the-art video, access control and intrusion security systems, announced the introduction of Vanderbilt Mobile ACT ID, featuring zero-touch, cloud-issued credentials for seamless integration into its access control solutions. The result is the ability to easily issue new credentials, as well as instantly grant and restrict access for office buildings, government facilities, healthcare institutions, schools, residences and a growing variety of enterprise...
ReliaQuest, a pioneer in cybersecurity, announces its unique ‘Open XDR’ approach that solves modern enterprise cybersecurity challenges through its GreyMatter platform. Unlike other XDR tools that limit organizations to a single vendor tech stack, ReliaQuest’s vision centers on bringing flexibility and visibility to disparate data sets and technologies. This approach enables enterprises to gain security confidence through the centralized detection and remediation of threats ac...
Acronis, a global provider of cyber protection, released Acronis Cyber Infrastructure 4.0, a significant update to the company’s software-defined infrastructure solution. Featuring more than 350 new capabilities and enhancements, the update helps Acronis partners and end users improve the performance and manageability of their infrastructure while strengthening the security and availability of their data. With 31% of companies reporting daily cyber attacks and half (50%) being targeted at...
Branded as ‘The New DICE’, DICE Corporation is changing the perception of monitoring and providing the industry with a game-changing way of doing business. ‘The New DICE’ 'The New DICE' is part of the company’s future roadmap, kicking off a multi-million-dollar investment in new technologies, products and services that include IoT solutions, Artificial Intelligence, machine learning, analytics, integrated audio and video, and much more. Going beyond basic s...
Fugue, the company putting engineers in command of cloud security, announced next-generation cloud security posture management (CSPM) capabilities to help customers bring their cloud infrastructure into compliance and demonstrate that cloud environments adhere to enterprise security policies. The new features leverage Fugue’s cloud state machine, which captures every resource configuration over time in a cloud environment, and Fugue’s policy engine based on Open Policy Agent (OPA),...
Integrated security manufacturer TDSi is pleased to announce the appointment of Zara Taylor as Marketing Manager. Zara, who is based at the company’s global headquarters in Poole, Dorset, is overseeing the company’s ongoing and rapidly expanding digital and marketing strategies. TDSi’s Managing Director, John Davies commented, “We’re excited at the prospect of seeing Zara’s skills being put to work, as we take our marketing activity to the next level with a good dose of Millennial thinking and knowhow. Zara’s knowledge of the digital and social landscape will add fresh impetus to our marketing drive, as we bring new products out of our development pipeline and augment our sales channel strategies, both at home and abroad. I know that Zara will have a positive impact on our activities, and I’m delighted she’s now a part of the team.” Marketing industry experience Zara has worked in the marketing industry for three years for a variety of different industries Having graduated from the University of Northampton in 2017 with a First-Class BA in Fashion Marketing, Zara has worked in the marketing industry for three years for a variety of different industries including: hospitality, automotive, fashion, and now security. Commenting on her appointment, Zara stated, “I am very excited to be leading TDSi’s continued vanguard into the digital world, which is a vital part of the security industry’s continued growth and evolution. Security needs are universal across all industries and our customers and potential customers operate across all vertical sectors, so it is vital that we continue to deliver relevant and exciting messaging to all these audiences through all digital channels.” Embracing digital channels Zara adds, “We have many exciting developments taking place at TDSi which we will be unveiling over the coming months and into 2021, and I look forward to being a key part of this. As we all settle into the new normal, TDSi will be further embracing digital channels, as well as meeting our customers and partners at UK and International events, to showcase our solutions for an ever-evolving security world.” Alongside her marketing career, Zara likes to stay active and regularly plays netball (social distancing rules permitting!) and is currently training for a planned ultra-marathon in 2021. “It will be 100km, and I sometimes think I must be mad! But setting yourself exciting goals, working through any challenges, and achieving them, is just as important in your life as it is in your career. I am delighted to be part of the TDSi team, which shares this approach to being the best you can be.”
IT and security systems integrators across the Middle East and Africa can now deliver more efficient, off-the-shelf integration of complete corporate systems - including access control, visitor management, security and building management - following a distribution agreement between Quanika and NIT, an Ingram Micro Company. Quanika’s modular, ready-made approach is designed to make integration straightforward, even for the most complex, multi-site projects, enabling organizations to adapt their on-site operations quickly to meet rapidly changing circumstances, and run them efficiently from a single interface. A1001 and A1601 controllers The company works with systems integrators, consultants, and end-user enterprises globally to leverage seamless integration with Axis Communications’ A1001 and A1601 controllers for unlimited doors and users, network cameras and audio devices. Quanika also allows integrators to scale up AXIS Camera Station VMS to encompass more cameras and cover multiple sites as well as giving them the extensibility choice of Milestone’s powerful XProtect for video management. Quanika’s portfolio of solutions is designed to eliminate the inefficiencies of siloed solutions Quanika’s portfolio of solutions is designed to eliminate the inefficiencies of siloed solutions to enable more productive connections between people, physical infrastructure, and corporate systems. Quanika Compact is a practical and affordable choice for small-to-medium applications in healthcare, retail, manufacturing, logistics and similar locations, giving users the ability to tie together and flexibly manage multiple sites. Visitor management solution Quanika Enterprise is designed for larger scale facilities and corporate enterprises, including multi-purpose buildings, hotels, transportation hubs, hospitals, and universities, giving organizations complete control and situational awareness across their entire estates globally. The Quanika VisitorPoint visitor management solution streamlines and automates operations. Delivering a frictionless and contactless experience, Quanika VisitorPoint is becoming essential during the COVID-era to minimize interaction and risks to frontline staff and reduce contact with doors and surfaces, while acting as a force multiplier for the efficient management, control and tracking of visitors and contractors access and movements throughout facilities. Building management systems As well as providing new technology application routes for security systems integrators, the distribution agreement opens up extensive project options for NIT’s customer base of IT systems integrators, allowing them to deliver modular, commerical off-the-shelf (COTS) security and safety solutions with an extensive choice of third-party systems - everything from intruder alarms, fire, and building management systems to individual, operations-specific business management databases, systems, or devices. Welcoming the deal, Bassel Al Fakir, Managing Director NIT, an Ingram Micro Company, said that Quanika’s solutions are expected to make it easier for NIT customers to deliver solutions with a single, intuitive, security and safety management interface. Integrators and consultants Our customers will be able to use Quanika’s off-the-shelf solutions and 24/7 support to integrate best-in-class technologies" “NIT’s distribution agreement with Quanika will provide major opportunities for ICT integrators and consultants across the Middle East and Africa,” he said. “Our customers will be able to use Quanika’s off-the-shelf solutions and 24/7 support to integrate best-in-class technologies and deliver new levels of insight and control.” Quanika Managing Director, Leo Cook, said the agreement would also help integrators and their customers improve operational efficiency and meet the unprecedented challenges now facing them. Seamless operational efficiency “It’s never been more important for organizations to be able to manage their operations efficiently, and to let their people to work safely, flexibly and securely,” he said. “Quanika is already helping customers globally to meet today’s rapidly evolving challenges." "We are helping organizations to pivot their operations, including managing their people and networks more efficiently, and improving the way they use their buildings. We now look forward to working with NIT customers across the region to deliver seamless, advanced solutions here.”
Visitor management is the smartest way to welcome those who are permitted in a school and vet those who don't. Visitor Management is the school's first line of defense. The schools are the heart of a thriving community. It is more important now than ever that they can welcome everyone who belongs in the school - from staff and students to visitors, volunteers and vendors - while vetting those individuals who should not be allowed entry. What is a visitor management process missing? Discover how modern, smart visitor management technology increases security and empowers staff to manage the complexities of the front office while welcoming those who belong in the building. The company’s new eBook provides their customers with insights on how to ensure their visitor management: Integrates with the user’s school's full suite of emergency preparedness solutions Considers adaptability for future processes, visibility and scalability Maintains a safe and welcoming environment for staff and students
Navigate360 invites everyone to welcome P3 Global Intel to the Navigate360 team. As they continue to focus on extending value to their customers, P3 brings a wealth of expertise along with state-of-the-art tip acquisition and management technology. The P3 solution is the renowned choice of Crime Stoppers Programs, Law Enforcement Agencies, Campus Safety Programs, and Federal Agency Initiatives in the US. Its proven technology is used in over 35,000 schools and districts across the country, where it has helped school leadership bring mental health needs to light, avert tragedies and save lives. Threat assessment manager “When it comes to safety, solving problems before they arise through thoughtful prevention planning is undoubtedly the best way to keep schools and communities safe,” said JP Guilbault, CEO of Navigate360. “Our engagement with P3 Global represents another milestone for Navigate360 in our earnest and methodical approach to bring a complete set of safety solutions to communities nationwide.” P3 is unique because it allows students and school faculty to report tips and engage in a fully anonymous dialog through a cellphone app, a web browser, or the telephone. On its own, this technology is powerful and the synergy that the company’s customers will realize when paired with solutions such as Behavioral Threat Assessment Manager and BTA Training will be significant. It is a natural and critical extension of the work they are doing to help communities create cultures of safety. Build essential tools Anonymous reporting is especially critical for students who so often witness the struggles of their peers" The small, yet mighty team from P3 is joining the Navigate360 staff and will share their expertise, experience and deep insights. Having decades of combined experience in the public and private sectors, they will serve key roles in the assimilation of tip acquisition and management solutions into their holistic offerings. “Having spent close to 30 years working with the public and private sectors to build essential tools for critical communications, I’ve seen firsthand how a tip from a concerned student or parent can save a life,” said Kevin Anderson, Founder and Creator of P3. Safety solution plans “Anonymous reporting is especially critical for students who so often witness the struggles of their peers but are afraid to come forward. By coming together with Navigate360, we will make schools safer, as well as businesses, by enabling them to integrate our technology into their larger safety solution plans in a seamless, easy to use way.” Safety is a journey, not a destination. Navigate360’s goal is to support their customers’ journey with the tools, resources and expertise necessary to build safer tomorrows. Bringing this important technology to empower people to report concerns and prevent tragedies is another step in the right direction.
Integrated security manufacturer TDSi is proud to announce the launch of the new and enhanced version of its GARDiS security software, Version 2.0. Among the upgrades, GARDiS 2.0 features new Fire Door release and Site Lock Down functions, along with integration with ASSA ABLOY Aperio and SimonsVoss SmartIntego wireless locks. GARDiS 2.0 software TDSi’s Managing Director, John Davies commented, “We are excited to unveil the new version of our Software as a Service (SaaS) GARDiS software. GARDiS 2.0 software builds upon the foundations of the original version that was enhanced last year, but now features a single-installation web browser-based application that is fully modular and scalable.” “It is also simple to commission and use, with a highly intuitive GUI which reduces training, support and installation time, all of which make it perfect for the new normal world we now live in.” Compatible with TDSi controllers GARDiS 2.0 is designed for use when an end user is moving from a single site using individual GARDiS controllers GARDiS 2.0 is designed for use when an end user is moving from a single site using individual GARDiS controllers (with embedded Web Server software) to upgrade to a project of over 44 doors and/or for multiple sites. It is also fully compatible with all TDSi’s controllers (including the newest GARDiS controllers, along with MG and EX series), ensuring these hardware elements can be fully integrated after the software upgrade. Versions and licensing options There are two versions and licensing options for the GARDiS 2.0 software, Express and PRO. The Express option is free of charge and enables the inclusion of 20 doors at one site for one organization. The PRO option starts with the same basis as the Express version but enables the end user to add as many additional door licenses as required. Additional site and organization licenses are also available, along with an IP Lock Service license (then a license for each individual ASSA ABLOY Aperio or SimonsVoss SmartIntego lock/device). Fire Door Release and Door Lockdown features Additionally, GARDiS 2.0 PRO features two options designed to deal with emergencies. Fire Door Release enables the end user to configure an instant input to unlock configured doors, while Door Lockdown instantly locks selected doors to prevent entry (which is particularly useful in protecting people and property in schools, colleges and universities). For even greater flexibility, GARDiS 2.0 PRO also features a REST API (‘Fusion’) option and full Software Development Kit (SDK), enabling it to be fully integrated with a wide variety of Video Management (VMS), Time & Attendance or third party control systems. Flexibility of deployment and pricing John adds, “GARDiS 2.0 is a game-changer in terms of complete flexibility of deployment and pricing. End users can purchase fully integrated security for as big or small a project as they need, with rapid scaling to suit quickly evolving and changing circumstances.” He further stated, “It is also perfect for security integrators looking to offer their customers a highly bespoke solution with minimal installation time to do so. By taking a SaaS approach we are offering a complete choice of options, enabling security operators to buy exactly the solution they require, from single doors on one site, to hundreds or thousands of doors over multiple sites.”
Aqua Security, the pure-play cloud native security pioneer, announces that Aqua’s open source Trivy vulnerability scanner is now available as an Aqua Security Trivy GitHub Action. The action integrates with GitHub code scanning so developers can build container image scanning into their GitHub Actions workflow to find and eliminate vulnerabilities before they reach production. “Code scanning was purpose-built with extensibility in mind,” said John Leon, VP of Business Development at GitHub. “We continue to expand our security ecosystem with solutions like Aqua, so developers can work with the security scanning technologies they want, all within the GitHub-native experience they love. Together, we’re making security easier for everyone.” Actionable security reviews GitHub code scanning integrates with GitHub Actions or users’ existing CI/CD environments and scans code as it’s created, surfacing actionable security reviews within pull requests and other GitHub experiences. Developers must avoid deploying images that might harbor significant CVEs that attackers can exploit The Aqua Security Trivy Action integration finds vulnerabilities (CVEs) in the OS package dependencies and language libraries built into a container image. Developers must avoid deploying images that might harbor significant CVEs that attackers can exploit. The Trivy Action alerts developers to known CVEs via the GitHub user interface to quickly and easily update these dependencies and eliminate the risk. Ingesting security information The Trivy Action generates output in a format called SARIF that GitHub supports for ingesting security information. The output from an image scan appears right in the GitHub code scanning UI, specifically under a project repository’s Security tab. “Developers are moving more applications into production, so we’re focused on helping them build securely without slowing down innovation,” said Liz Rice, VP of Open Source Engineering at Aqua. “The new Aqua Security Trivy GitHub Action brings container security scanning right into the GitHub interface that developers know and love.” The new Aqua Security Trivy Action is available on the GitHub Marketplace now. Follow this link to view a sample workflow of building a container image from a Dockerfile in the repository and running the Aqua Security Trivy code scanning over it.
When we popped the champagne to celebrate the start of a new year in January, not many could predict that less than three months later, we’d be facing a global pandemic and the economic challenges that a worldwide lockdown would bring. In conversations over the last several weeks, reports from integrators have vacillated between being flush with work or fearful that projects were drying up — without a whole lot in the middle. But in these conversations, a central theme has emerged: diversification. My background was heavily rooted in security integration but in the last 10 years shifted to risk — both management and mitigation practices — and this emerged long before I began my career in security. It isn’t a new phenomenon for companies to be looking at the risk management strategies they had in place and rethinking their direction. This global pandemic, and the effects it has had on the workforce, has significantly altered what many organizations deem “normal” day-to-day operations, meaning that many organizations are asking one key question: “Can my business withstand this?” The challenge exists in ensuring asset security For many end users, the challenge exists in ensuring asset security in locations that are experiencing low occupancy as a result of work-from-home policies or in vacant facilities altogether. For integrators, there is a balance between continuing to install projects while keeping the health and well-being of technicians and employees top-of-mind. Considering these factors, business resiliency in times of crisis can be built by integrators implementing the following strategies: Diversify the portfolio As an industry, it’s safe to say that the winds of change are beginning to shift away from solely “per project” to more recurring monthly revenue (RMR) business models — and today’s crisis may be the catalyst for more of this change. Integrators that embraced this model in the early days, despite the hurdles that a transition like this brings, are seeing the benefits of this move. In economic downturns, RMR allows an organization to map out incoming revenue streams and ensures money will continue to come in despite restrictions on new products and investments from customers. Offer more service-based products Part of diversifying a portfolio involves engaging in a more service-based approach to business. Establishing a monitoring services department, integrating a cloud-based video and/or access control service into the mix, or bringing more system monitoring services in play can go a long way in offering more than hardware-driven sales. We’ve talked a lot in the last several years about so many organizations transitioning from large capital expenditures (CAPEX) to more operational expenditures (OPEX) and the opportunities this presents to integrators; now is the time for providers to harness this trend for the health of their business. Emphasize the management Through managed services, the value for the customer is that integrators take on the diagnostics, testing, remote monitoring and more — all via the cloud or hosted models, which means fewer “truck rolls” and costs associated. In the current environment, saving a visit to a site can help protect technicians. For new customers, the external management of a system can mean all the difference as there are a number of end users that don’t need a headache that legacy systems create as it relates to maintenance, updates and manpower oversight. Securing an integrator’s business can mean being able to serve customers by diagnosing and triaging issues quickly and highlighting the value provided in day-to-day management. Look at new vertical markets From a resilience perspective, critical infrastructure and government-related markets, such as water and energy, and local and municipal customers rarely see a reduction in spending amidst a downturn, which can make these markets a solid investment for integrators. While some of the regulatory requirements in place, such as adherence to the National Defense Authorization Act (NDAA) and GSA contract guidelines, may be daunting, the ability for firms to weather the storm by serving these markets can help integrators see continued success. Understand your books One of the first things that integrators must do before a crisis hits is to understand their balance sheet. So many integrator firms are built on the premise of being really exceptional at highly technical and complicated installations, which is why they are good at what they do. But the real challenge is the balance of this ability with the skills needed to grasp business continuity from a bookkeeping and planning perspective. Act as a consultant One of the biggest challenges for customers during a crisis is making quick decisions that can impact the rest of the organization both in the short- and long-term. In the security environment and the status of where the world is currently, the needs customers had a month ago are far different than now, so acting as a consultant and working with them to address their concerns through existing technology — or recommending new solutions — can mean all the difference in building a relationship with existing customers or in working with new ones. Offer services that leverage existing investments So many customers out there today have invested heavily in video surveillance equipment and hardware that they want to ensure will be around for the long haul. Investing in new equipment can be a real hindrance in normal circumstances, much less those we’re currently facing, so it’s critical that more open solutions are offered to customers. For example, cloud-based video offerings that leverage existing cameras and allow end users to configure them with the touch of a button are a value-added benefit that can favor integrators in the long run. Continue training your staff Right now, while many integrators see a slow down taking place, it’s critical that those with the means to do so offer more value to end users by incorporating continued education and training for technicians. This can go a long way in making the services offered more appealing to customers. Integrators who set aside resources to train staff and encourage certifications are building a foundation for success. There’s no way that integrators can address the demands placed on them without investing in the people within their organization. Integrators and security leaders are tasked now with the added complexity of navigating a worldwide crisis. While so many see the challenges ahead, there is opportunity within these challenges to take forward-thinking business practices and implement them on a broader scale. Doing so can have the potential to change the face of the industry as we know it.
How can security system integrators not just survive but thrive in today’s IT-led market? The key seems to be in training. As increasingly more clients look to integrate access control with IT environments, they want integrators with the specialist skills to achieve this. For integrators that don’t invest in training, the risk is being left behind. Because many security system integrators aren’t providing specialist IT support, manufacturers are now offering services to make implementations and integrations easier. This isn’t a scalable or desirable option for many manufacturers though, they don’t want to become integrators. The result? Manufacturers will be pushed into developing products that can be integrated with IT networks off the shelf. And this isn’t necessarily the best option for end user, manufacturer or integrator. With a growing number of cloud-based security solutions, integrators also face the threat of clients opting for installation-only services. How security system integrators can survive and thrive today It’s not all doom and gloom for security system integrators though. To avoid becoming redundant, or being downgraded to simple access control installers, there’s lots you can do to strengthen your position. Listen carefully Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience One of the first ways you can distinguish yourself from your competitors is by really listening to what your clients want and need. You can then translate this into a security or access control application tailored carefully to them. Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience and product knowledge. It’s far superior to carrying out a standard implementation, which can leave clients feeling they’ve not been listened to or given good value. Up your IT knowledge TCP/IP has become the standard for communication between devices and central server applications in access control and security in general. So every technician now needs to know how to connect IP devices to networks and configure them in the central application. This is only the tip of the iceberg though, there’s so much more that integrators now need to be proficient in when it comes to IT. From understanding a client’s WAN, LAN and VPN networks to back-up systems, encryption technologies, key management and transparent communication. It’s also important to know how to integrate applications at server level, whether you’re integrating two or more security systems or a HR database. Most integrators have begun to invest in one or two IT experts, but this usually isn’t enough to meet clients’ needs. To really stay ahead, it’s crucial to invest more heavily in IT training and expertise. Choose your portfolio carefully When considering your portfolio, ensure you check the background of each product’s manufacturer Ideally, your portfolio should be small but rich, which is more difficult than it sounds. Choosing products that will scale easily is complex, and you need to consider the potential for increased functionality or connectivity as well as scalability. When considering your portfolio, make sure you check the background and outlook of each product’s manufacturer. You don’t want to select items that are likely to be discontinued in the near future, which can often happen after a manufacturer is acquired, for example. Get in the cloud In the security market, the mid and low segments are already shifting to cloud-based solutions that need neither integration nor IT skills. This leaves you with opportunities for just installation and maintenance services, where profit opportunities are reduced. An alternative is to begin selling cloud-based security services yourself to help you attract and retain clients for the long-term. Give clients added commercial value As competition increases and budgets shrink, offering added value, to new and existing clients, is a vital way to differentiate your business. This will help you to not just defend against competitors but to grow your business and increase your profitability. Configuring access control reports for clients is just one example. It’s relatively straightforward to do but provides really valuable insight into visitor flow. This can then enable them to, for example, staff reception adequately and provide sufficient catering, which all improves the experience for visitors and employees. Providing this kind of consultative service, instantly pushes you up the value chain. Stay agile and well informed To survive and grow as a security system integrator today, the upshot is that it’s crucial to keep pace with the market’s ever-changing trends, technology and client needs. And, to make sure you’re ready to adapt and give clients the services they want, it’s vital to give your people the in-depth training they need.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Within days, a rule will take effect that bans from U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and Dahua. The Federal Acquisition Regulation (FAR) rule implements the “blacklist” (or “Part B”) provision of the National Defense Authorization Act (NDAA), which is understood in the security industry as prohibiting dealers and integrators that do business with the federal government from selling Chinese-made video products to any of their customers (even for non-government projects). The rule, which is officially still interim, states: “On or after August 13, 2020, [federal] agencies are prohibited from entering into a contract, or extending or renewing a contract, with an entity that uses any equipment, system, or service that uses covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system.” Federal rules Within days, a rule will take effect that bans U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and DahuaFederal agencies issuing the rule are the Department of Defense (DoD), the General Services Administration (GSA) and the National Aeronautics and Space Administration (NASA). GSA provides centralized procurement for the federal government. Because the COVID-13 crisis delayed issuance of the rule, the usual 60 days will not be allowed for public comment before the rule is implemented. However, public comments are welcome and will be addressed in subsequent rulemaking. “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giants. The rule also specifies that it applies to “certain video surveillance products or telecommunications equipment and services produced or provided by Hytera Communications Corp., Hangzhou Hikvision Digital Technology Company, or Dahua Technology Company (or any subsidiary or affiliate of those entities).” Hytera is a Chinese manufacturer of radio systems. Hikvision and Dahua are major international manufacturers of video surveillance equipment. Limits and prohibitions The rule states: “This prohibition applies to the use of … equipment or services, regardless of whether that use is in performance of work under a Federal contract.” In the industry, this clause is taken to mean that integrators that “use” any of the covered equipment are prohibited from selling to the government. “Use” presumably covers an integrator deploying the equipment in their own facilities and/or selling it to other customers. The rule also prohibits “service … related to item maintenance,” which in the case of a security integrator would include providing service contracts on previously installed systems. Security Industry Association (SIA) The Security Industry Association (SIA) comments: “Due to applicability [of the rule] to uses by entities with federal contracts even unrelated to their federal work, this broad interpretation is expected to have widespread impact on the contracting community across many sectors, as covered video surveillance equipment is some of the most commonly used in the commercial sector in the United States.” Security integrators that do business with the federal government have largely anticipated the new rule and already switched their Chinese camera lines for NDAA-compliant competitors. However, as SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. Easing compliance burdens The interim rule adopts a “reasonable inquiry” standard when an offeror (government contractor) represents whether it uses covered equipment. “A reasonable As SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. inquiry is an inquiry designed to uncover any information in the entity’s possession about the identity of the producer or provider of covered telecommunications equipment or services used by the entity. A reasonable inquiry need not include an internal or third-party audit.” SIA notes that this provision may be aimed at easing the compliance burden by suggesting that contractors only need to inquire based on what information they already possess. The 'blacklist' The new rule covers Paragraph (a)(1)(B), which has informally been referred to as the “blacklist” provision of the NDAA, the John S. McCain National Defense Authorization Act for fiscal year 2019. However, the “Chinese ban” provision [Paragraph (a)(1)(A)] already went into effect a year after the law was signed by President Trump (August 13, 2018). “Part A” covers use of Chinese-made products in fulfilling government contracts. A growing threat Seeking to justify the new restrictions, the FAR rule states: “Foreign intelligence actors are employing innovative combinations of traditional spying, economic espionage, and supply chain and cyber operations to gain access to critical infrastructure and steal sensitive information and industrial secrets. The exploitation of “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giantskey supply chains by foreign adversaries represents a complex and growing threat to strategically important U.S. economic sectors and critical infrastructure.” SIA has urged a delay in implementing the “Part B” provision, stating: “The federal government estimates that it will cost contractors well over $80 billion to fully implement this prohibition on the use of certain Chinese telecommunications and video surveillance equipment, yet endless delays in publishing the rule now mean that federal suppliers have just weeks to understand and comply with the new rule, which raises as many questions as it answers.” SIA continues: “Federal suppliers across a wide range of industries have increasingly concluded that Part B is unworkable without clarification of the scope and meaning of key terms in the provision, which the rule does not do enough to define. For example, Part B bans agencies from contracting with a provider that “uses” any covered equipment or service. This term is not clearly defined in law or regulation, yet contractors must certify compliance beginning Aug. 13, 2020.” The Part B rule, which only applies to prime contractors, enables agency heads to grant a one-time waiver on a case-by-case basis, expiring before Aug. 13, 2022.
Kurt Takahashi, the new CEO of Pelco, says he will provide collaborative leadership to help build the Pelco team, work together hand-in-hand with team members, remove barriers and lead the company forward. He brings industry experience and relationships to the new post that will translate into new opportunities. Takahashi joins Pelco from AMAG Technology, where he served as President for the last couple of years. Earlier, he had stints at ADT, Tyco and Quantum Secure, where he was Global Vice President of Sales and Marketing. “This was an opportunity to join a brand that has deep, rich and far-reaching history,” says Takahashi. “I couldn’t resist the opportunity to come into a company such as Pelco and be able to make a difference.” Improving the fundamentals Takahashi acknowledges that Pelco has slipped in the last 10 years from its position as a market-leading brand. To address the situation going forward, the company must “improve fundamental things,” he says. Those fundamentals include keeping the customer first, putting the right people in the right roles, and executing technical support well. Keeping the customer first, putting the right people in the right roles, and executing technical support well “We have to provide customer service from when we receive an order, to acknowledging it, to processing it and shipping the order,” says Takahashi. “Another piece is to deliver revisions to a product in a faster time period and introduce new products to the market in a timely way. In terms of market presence, we learn that people haven’t really heard from Pelco in a while. We have to get in front of integrators and consultants more aggressively than we have in the past.” “It’s up to us to prove that we belong and can sustain and support customers moving forward,” he adds. “We will get new opportunities, but we will need to execute them. If we do that, we will grow.” Brand optimism Takahashi sees more reasons for optimism. “In spite of the problems, we are a big company with thousands of customers, a massive footprint, 10 offices around the world and people in over 40 countries. We are a strong, known brand around the world. These are a great foundation to grow from; we just have to execute better.” These are a great foundation to grow from; we just have to execute better Pelco’s new parent company, Transcom Capital Group, was another reason Takahashi was attracted to the position. He says Transom is led by “amazing professionals” that specialize in “transformational culture and how to diffuse best practices in an organization.” At Pelco, Transom has already led surveys, workshops and focus groups throughout the organization to create a vision, mission and values covering how the company wants to present itself in the market. From those values will emanate new process and policy improvements to move the company in the right direction. New visions and missions The company’s new, collectively developed vision is “to make the world safer.” The mission is “to deliver distinctive video solutions and world-class customer experiences.” The company’s new, collectively developed vision is “to make the world safer.” The company’s culture is built on six values: innovation and excellence, customer focus, integrity, respect and recognition, collaboration, and ownership. “We believe this is what will help drive our culture moving forward, and it’s the mindset of all of us as one team with one goal that will give us something to be proud of,” says Takahashi. “As we move into the new era of Pelco, you will see excitement internally and externally,” he adds “Everybody’s really eager to see Pelco come back and be a significant player.” Three horizons to success The idea is to look inward and improve on the current, successful product lines Takahashi sees three horizons that summarize the company’s path to future success. The first horizon is to focus on the fundamentals of what the company does today. The idea is to look inward and improve on the current, successful product lines, such as the VideoXpert video system and on-board video analytics. The second horizon will be to look at ways to advance the current feature set, whether “to build, partner or buy.” Building partnerships will be part of that success, such as the partnerships they are already building with Briefcam and Anyvision. The third horizon will be to expand their innovation, based on feedback from end users, dealers and consultants. “I want to get very deeply connected with our customer base,” says Takahashi. “Are we on the right path? Should we explore other partner relationships? We need to bring those minds together to expand our vision.” The focus should be on solving three business problems – mitigating risk, ensuring compliance and saving money. Looking ahead to ISC West in the spring, Takahashi expects Pelco to emerge as a more proactive company that is eager to engage. “We have a lot of stories to communicate, and we have not been as active as we should,” he says.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organizations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organization’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetize the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organization. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organizations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organizations, not technology. If we truly understand the risks to the organization, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organizations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organizations.
Car theft is a huge risk for car sales offices, and this is especially an issue for the premium brands. Luxury car giant Eden Auto Premium BMW built a new site in Bordeaux, France, where they house and sell new and second-hand cars, as well as having a car park for customers. That amounts to a lot of cars that need protecting. They researched and compared different technologies and selected Hikvision products to meet their needs. These were then ably installed by reseller Faurie Telecom (Group Convergence), with Hikvision’s help, and the help of French distributor ITESA. The BMW reseller wanted a standalone system to streamline their security operation. Originally they used a night security agent, which was a costly solution. They needed to be able to integrate the security solution into a third party monitoring system, managed by Securitas, in order to reduce manpower costs. Perimeter protection systems The site posed a number of technical challenges. The team also needed to counter some crafty thinking from intruders, who were even resorting to hiding underneath cars during the day, when they can slip in unnoticed. They then could wander around the closed garage, avoiding detection by perimeter protection systems activated only at night. This meant the solution needed to focus on providing real-time, active image at night. With a lot of flags flying on the site, false alarms were a particular issue - these would set them off regularly With a lot of flags flying on the site, false alarms were a particular issue - these would set them off regularly. The complexity of the site also gave a lot of potential for false alarms, which needed to be minimised to reduce overall costs. The solution was made up from Hikvision products, providing a converged system, with seamless monitoring. Central to the system was Hikvision’s Security Radar (DS-PR1-60) for intrusion detection at night. Speed dome PTZ camera The Radar has a large coverage area, and performs excellently at night, whatever the weather. This means that false alarms are kept to a minimum. Radar has the added benefit that it can position humans and vehicles on a map, making it very useful for tracking purposes. This is where the DarkFighter IR Network Speed Dome PTZ camera (DS-2DF8225IX-AEL) comes in. The radar cameras are linked with this for auto tracking. If an event is detected, the control center automatically receives an alarm and can use the PTZ’s auto-tracking function to track any intruders. DarkFighter cameras are also designed to excel at night, so are ideal for this solution. Although radar has promising accuracy rates, the team needed to carefully configure it. The site environment proved a complex installation, with a lot of metal that can cause false alarms for the radar. Seamless security solution We were very satisfied with the innovative products and onsite service provided by the Hikvision team" The local team drafted in expertise from Hikvision HQ’s R&D and technical teams to complete the installation to a high quality and low false alarm rate. The system is coordinated using a AcuSensecamera (DS-2CD2686G2-IZS AcuSense 4K NVR (DS-7716NXI-I4) and a POE Switch (DS-3E0510P-E). Finally, HikCentral provides a user-friendly VMS experience, designed especially to integrate all the different Hikvision products, to make a seamless security solution. Christophe Chamand, from Faurie Telecom, says: “We were very satisfied with the innovative products and onsite service provided by the Hikvision team. From presales and order to technical support and aftersales service, Hikvision has been with us throughout the process, ensuring a successful installation and a happy customer.” With an innovative, converged security solution, BMW has been able to streamline its security, even at night. So intruders sneaking in and hiding during the day are out of luck.
The sailings may take as little as 22 minutes, but carrying almost 4.5 million holidaymakers and Islanders to and from the Isle of Wight every year is a huge challenge. It is perhaps not surprising therefore to discover that Wightlink has invested in the latest video security technology to help them do so safely and efficiently. The team at award-winning ferry operator Wightlink knows more than a thing or two about giving Islanders a frequent and punctual service to mainland Hampshire, as well as offering visitors an easy way to enjoy a taste of Island life. Providing ferry services Through its forerunners, Wightlink has been providing ferry services to and from the Isle of Wight for more than 160 years. As the cross-Solent ferry operator, Wightlink in a normal year would complete approximately 45,000 sailings over three routes with the help of a fleet of ships which includes six vehicle and passenger ferries and two passenger-only FastCats. Hanwha Techwin Europe’s Managing Director Bob (H.Y.) Hwang Ph.D., recently traveled to Portsmouth to see first-hand how Wisenet cameras are being used to assist Wightlink in almost every aspect of their day-to-day operations. Bob was accompanied by Jeff (Chae Won) Lee, the company’s Sales Director and Senior Strategic Sales Manager, Jon Hill. High definition images Wightlink’s crew are also making good use of the high definition images captured by the weather-proof cameras Over 260 Wisenet cameras have already been installed around Wightlink’s Portsmouth and Lymington facilities, as well as on three of the company’s ships. With safety of paramount importance, some of the cameras are being used to help verify any health & safety incidents which might occur in one of the terminals or onboard the ships. On the bridge, Wightlink’s crew are also making good use of the high definition images captured by the weather-proof cameras mounted at the bow and stern of the ships, which are assisting them with great precision to dock safely and efficiently. In addition, cameras supporting ANPR have also been deployed at various locations to ensure the smooth flow, identification and tracking of vehicles through every stage of their journey. IP network video surveillance The day was organized by Jim Kernahan, Managing Director of Trellisworks, a system integrator with extensive experience of designing, installing and maintaining IP network video surveillance, wireless and mobile network solutions. “The visit provided an excellent opportunity for Bob (H.Y.) Hwang and his colleagues to see how the Wisenet cameras were being put to good use,” said Jim. “However, our prime objective was to meet with members of the Wightlink team to explore how Trellisworks and Hanwha Techwin can continue to work in partnership to assist them in capitalizing on the latest advances in technology.” Hybrid energy ferry Stuart James, Wightlink’s Marketing and Innovation Director, who has the task of devising and driving the company’s strategy of continual improvement by wisely investing in new technologies and systems, provided a guided tour of the company’s Portsmouth harbor facilities and its newest and environmentally-friendly hybrid energy ferry, Victoria of Wight. We were able to generate a number of good ideas on how we can build on the success of the existing cameras" “I was pleased to host the visit and take the opportunity to express our appreciation and satisfaction with how well Trellisworks and Hanwha Techwin have been working together for our benefit,” said Stuart. “Most importantly, we were able to generate a number of good ideas on how we can build on the success of the existing cameras.” The discussions which followed on from the tour focused on how the latest technology might assist Wightlink to further enhance safety and security by supporting on shore staff and the ships’ crews, as well as ensuring every passenger has the best possible customer experience. Video security solutions Among the options considered were specialist video applications, such as passenger counting and queue management which can be run on-board Wisenet cameras and AI Deep Learning solutions. Commenting on the visit, Bob (H.Y.) Hwang said: “We are very grateful to Stuart for providing us with a great insight into Wightlink operational requirements and also to the company’s CEO, Keith Greenfield, who kindly took the time to greet us.” “We are understandably delighted that a prestigious and superbly well-run company such as Wightlink has placed its trust in Hanwha Techwin to provide effective and future proof video security solutions. We are looking forward to working ever more closely with Trellisworks, which is a member of our STEP partnership program, to ensure together we are always able to exceed Wightlink’s expectations.”
Union Wharf is a community of 249 apartments to rent, based on the banks of Deptford Creek in Greenwich. Completed in September 2019, it comprises two towers. The first is a 23-story tower designed for a varied community of renters. The second is a smaller 12-story tower that’s intended specifically for families. Across both buildings all residents benefit from free access to a variety of shared spaces as well as services such as a 24-hour on-site residents’ team. Essential Living was also keen to ensure the development encouraged a sustainable lifestyle, with features including bicycle storage facilities, gym, green areas and a roof terrace. Working with Comelit from initial specification, for each stylish apartment on site, a combination bespoke door entry and energy monitoring system was created, using its Icona Manager IP solution for each apartment. Reducing carbon footprint We have worked with Comelit on a number of developments and know them to be capable of fulfilling our mission" Says Juey Thanyakittikul, Senior Project Manager of Essential Living: “From the outset, sustainability, reducing carbon footprint and stylish living has been the foundation of our vision for Union Wharf. And with a focus on the rented community, we wanted to continue these key features right into the finishing details for all our residents to benefit. We have worked with Comelit on a number of developments and know them to be capable of fulfilling our mission when it comes to customized door entry." "The advantage of presenting smart credentials, including resident’s ability to answer video calls from a cellphone or tablet, only adds to the premium lifestyle on offer.” Fire and security system Richard Slee, Managing Director at Security Systems Design Limited, which completed the installation as part of the overall fire and security system works for Gloster MEP Limited added: “The integration of energy monitoring and door entry in Comelit’s stylish one Icona Manager IP receiver, presents as one multifunctional solution that sits on the building’s CAT6 structured wiring and LAN system, removing the need for separate cabling." "The slim line white Icona Manager finish adds to the aesthetics of each apartment, and reduces the number of control devices for residents, all without compromising on the smart technology enabled. For residents, it ultimately means door entry can be answered from the external systems, with video in their own home, or even via a cellphone or tablet from wherever they are.” Combined energy monitoring This trend is only likely to rise as we become more dependent on our homes for work and personal requirements" Comelit’s ViP system includes Comelit’s color Icona Manager Monitors fitted in each apartment, presenting the opportunity for video and audio communication with visitors at ground level, as well as two-way audio communication with the on-site residents’ team. The combined energy monitoring provides instant information and feedback for residents, to encourage more sustainable living. Dan Wood, Southern Sales Manager at Comelit UK concludes: “While the Code for Sustainable Homes is no longer mandatory, demand for more sustainable living is growing among consumers. This trend is only likely to rise as we become more dependent on our homes for work and personal requirements. Working closely with Essential Living right from the initial design phase of Union Wharf, enabled us to create a bespoke tailored solution using our stylish Icona Manager Monitors." Targeted renters market "The flexible nature of the systems presents ideally for the targeted renters market, which continues to put in a strong performance despite challenges in other parts of the property market. Developments such as this, only goes to support how the perception of the Build to Rent sector is changing for the better. We are already working on the next scheme for Essential Living due for installation in 2021.”
Dahua Technology – one of the pioneer video technology companies – has entered into a six-figure sponsorship deal with Celtic FC, supplying the club with state of the art video-based technology and equipment. Under the sponsorship deal, Dahua is supplying video walls for locations such as the Celtic Store and Media Center at Celtic Park, high-tech quad-rotor drones to help with player training and development, and electronic whiteboards to be used for staff training, as well as meetings and presentations for staff and visitors. Highly visible aspects As part of the new partnership, Dahua will be appearing across a range of Club assets, on LED pitch-side banners, and on the club’s website and match programs. The deal represents the first ever major sponsorship by Dahua Technology in the UK and Ireland. The deal represents the first ever major sponsorship by Dahua Technology in the UK and Ireland “We are thrilled about our sponsorship of Celtic FC,” said Michael Lawrence, Marketing Director at Dahua Technology UK & Ireland. “As well as the highly visible aspects of the sponsorship, this deal represents a real partnership between Celtic FC and Dahua, and is an example of our engagement with communities across the UK and Ireland.” High quality technology Commenting on the deal, Cheng Zeng, Business Development Manager for China and Asia at Celtic FC said: “We are delighted to launch this partnership today with Dahua Technology. Their expertise and high quality technology will enhance both fan experience in our stores and business operations as a whole. We hope to work with Dahua long into the future.” As well as the equipment supplied to Celtic FC, Dahua Technology manufactures a range of innovative and technically advanced video equipment. These include TiOC, a three-in-one camera that integrates 24/7 full-color monitoring, active deterrence and Artificial Intelligence into one smart unit; WizSense, a series of products and solutions that utilize Artificial Intelligence and deep learning algorithms; and its Starlight range of low-light video technology.
Václav Havel Airport Prague (PRG), with its prime location in the Center of Europe, is the largest and most important international airport in the Czech Republic. Prague Airport handled 17.8 million passengers in 2019 and received the Airport Service Quality Award 2019 awarded by ACI1 for the second time in a row. At Prague Airport, there are different types of areas restricted to authorized personnel. These are governed by an access control system fitted with approximately 1,000 readers and over 1,500 secured points (doors, locks, etc.). Mifare Desfire cards are predominantly in use for the time being. Among these, Security Restricted Areas (SRAs) are the highest security areas, with 60 access points of high importance. Contactless biometric technology Due to the critical nature of those areas, Prague Airport needed a very high level of security, and decided to implement a biometric solution, as the card itself (including with the use of a PIN code), would not be deemed as secure enough. The biometric system had to be able to cope with over 20,000 individuals, with the capability to increase to up to 30,000 users in the future. Prague Airport decided to keep the existing access cards but to add a biometric verification level for the SRAs. This means that the biometric solution would have to be used in combination with the existing cards through a two-step process. In order to avoid any physical contact with the devices, for user convenience as well as for hygienic considerations, it was decided to deploy a contactless biometric technology. Access control system The readers were installed at existing control points and are fully integrated into the airport access control system Prague Airport tested two technologies capable of connecting to its access control system, among which IDEMIA’s MorphoWave Compact contactless fingerprint terminal. After a thorough testing period, the choice was to go for IDEMIA’s technology for a number of reasons including: great user experience with an easy and quick hand gesture, as well as a strict GDPR compliance with users’ biometric information stored only in their cards. Prague Airport deployed more than 60 MorphoWave Compact in its SRAs. The readers were installed at existing control points and are fully integrated into the airport access control system. More than 20,000 users now have their biometric data in their access cards and the system is fully operational. Embedded card reader IDEMIA’s seamless biometric technology helps address health and safety issues. Employees appreciate the user experience provided by the solution deployed: it is easy to tap the access card onto the embedded card reader situated at the top of the reader and then to just wave the hand in a quick simple movement to get 4 fingerprint verified in less than 1 second, without the need to touch any part of the device. Airports is a key vertical among the many different ones served by IDEMIA. The biometric devices are used by 35+ of them throughout the world for staff access control, as here in Prague. The company’s biometric solutions are also used for border control and passenger flow facilitation, in more than 30 different airports.
Verkada, the provider in cloud-managed enterprise building security, announced the release of its environmental sensor product line and its initial product, the SV11. The announcement comes on the heels of Verkada’s recent Series C funding and successful launch of its access control line, further establishing the company as the provider of the operating system for modern, integrated buildings. Monitoring “Our customers are responsible for the systems that keep facilities online, and our mission is to give those administrators the best possible tools to do their jobs,” said Filip Kaliszan, CEO and co-founder of Verkada. “Whether it be monitoring the status of a server room, the temperature of a patient room in a hospital, or the air quality of a school, the SV11 gives facilities and staff unprecedented visibility and control over the sites they’re responsible for keeping safe and secure.” The SV11 is a simple-to-deploy, powerful sensing device that provides enhanced visibility into what is happening in a physical space. The cloud-managed device seamlessly integrates with Verkada’s enterprise video security solution, allowing organizations to review context and quickly associate sensor events with relevant video footage. Real-time insights and proactive alerts The interface delivers real-time insights and makes it easy to respond to proactive alerts or conduct investigations into past incidents. Customers across a range of industries, including healthcare, manufacturing, education, retail, and hospitality, have already deployed the SV11 to monitor: Air quality: Protect one's environment from invisible threats like gas and chemical leaks, or detect illicit activities like vaping and smoking. Temperature and humidity: Monitor changes in temperature and humidity that may damage expensive infrastructure, materials, or food and medical supplies. Motion and occupancy: Detect motion or occupancy in bathrooms, locker rooms, and other private areas where cameras are not appropriate. Noise levels: Detect activity or disturbances without violating privacy. Receive and manage alert notifications remotely “The ability to deploy Verkada's sensor in our network closets has provided us with complete visibility into what’s happening in those rooms,” said Rick Palandro, Security and Facilities Operations Engineer at Fox Rothschild LLP. “With Verkada, I'm now able to receive and manage alert notifications remotely the moment temperature rises above a specific threshold. I can instantly mobilize the team to respond to HVAC issues. We’ve shifted from a reactive approach that often resulted in damaged equipment to a proactive one that ensures our equipment is always operating properly.” Monitoring preventative and predictive maintenance Verkada’s SV11 has empowered us to take a data-driven approach to food manufacturing" “Verkada’s SV11 has empowered us to take a data-driven approach to food manufacturing that helps us stay ahead of the curve on environmental improvements across our plant facility,” said Frank McKinney, COO and Plant Manager of Carolina Ingredients. “By pinpointing where we can set up both preventative and predictive maintenance, we can closely monitor and optimize air quality, efficiency of our HVAC units, and behaviors in the plant, which enables us to more effectively manage the business and deliver quality ingredients and superior blending services that support our customers.” Integration with video monitoring solution "We installed the environmental sensor across campuses in areas like bathrooms that are difficult to properly monitor and are therefore likely places for inappropriate activity such as vaping," said Marty Oliver, Director of Technology at Godley Independent School District. "Paired with Verkada's video monitoring solution, the SV11 provides a new level of visibility into what's happening in those spaces without infringing on students' privacy, giving principals, superintendents, and office administrators a more holistic understanding of student activity in school." Environmental sensor The introduction of the environmental sensor follows accelerated business growth in Q2 2020, highlighted by: Sixty-five percent quarter-over-quarter revenue growth (compared to Q1 2020), including new deployments with Holiday Inn Express and Suites, Rubrik, NextGen America International expansion with new Sales operations in Sydney and Latin America and deployments with Heinemann Australia, Lifeview Residential Care, and Transportes Canales A projection to double headcount by year-end 2020 (compared to year-end 2019) Expansion of its global channel partner program to more than 1,500 resellers The launch of its Access Control solution, which oversold in the first quarter of general availability and surpassed projected sales by more than 400 percent The release of the Bullet Series of hybrid cloud cameras as well as new features as part of a COVID-19 Response Suite, including People Heatmaps, Person of Interest Notifications, and Crowd Notifications Smart buildings The launch of the SV11 is the next step towards Verkada delivering on its vision to power the modern, integrated building. With security cameras at its core, Verkada is expanding its product offering with new applications such as access control and sensors to deliver the infrastructure that runs safer, smarter buildings.
Round table discussion
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.
Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?
Temperature Solutions, PPE Detection and Remote Working: '5 Minutes With' Video Interview with Joe Young from G4S
Access Control and Security Solutions: '5 Minutes With' Video Interview with Tim Northwood from Inner Range