Patriot One Technologies Inc., is pleased to announce a development partnership with ecoMine Technologies Corporation (ecoMine) to advance ecoMine’s innovative, low-cost, on-the-spot pathogen screening technology, ecoScreen. ecoScreen screening technology ecoMine’s technology platform, ecoScreen has significant potential in this current pandemic, (especially when it comes to enabling the safe return to work across multiples sectors of the economy) as well as a broad range of other...
Genetec Inc., a renowned provider of unified systems for enhanced security, operations and intelligence, has announced a new series of expert webinars designed of help end users and system integrators to navigate these testing times. The sessions outline ways customers from various industries are repurposing their existing physical security systems to solve specific pandemic related issues. In addition, they cover ways Genetec is evolving its solutions to address critical new requirements. The...
Genetec Inc., a renowned technology provider of unified security, public safety, operations, and business intelligence solutions, announced the latest deep integration to result from its enduring partnership with Bosch Security Systems (“Bosch”). Users of the widely deployed Bosch MAP 5000 intrusion alarm panels can now directly connect to Genetec Security Center through the Intrusion Manager, combining intrusion, video and access control into one intuitive interface. Facility and s...
Renowned temperature monitoring expert, AMETEK Land, has launched a new human body temperature screening system to help prevent the spread of infectious diseases like COVID-19. Developed over 10 years by AMETEK Land experts, the VIRALERT 3 provides real-time infrared thermal imaging from a safe social distance, scanning for elevated temperatures that could indicate infection. The VIRALERT 3 is the first of its kind, providing a camera and a temperature-controlled reference source on a single mo...
Exabeam, the Smarter SIEM company, and Armis, a provider of agentless enterprise IoT security, announced a partnership that will enable IT cybersecurity teams to identify unmanaged and IoT devices and to monitor their behavior for malicious activity from a single platform. Attackers increasingly target unmanaged, connected devices to gain access to an organization’s corporate network. The integration of Exabeam and Armis solutions classifies managed, unmanaged, and IoT devices connecting...
Artificial Intelligence Technology Solutions, Inc., announces that its wholly owned subsidiary Robotic Assistance Devices (RAD) enhances its autonomous security and property management devices with a new advanced mask detection feature. This feature supports building owners and property managers with an autonomous tool to identify face mask usage, create automatic alerts, and generate ongoing face compliance scores. This enhancement is integrated into RAD’s Health Screening system and can...
Dahua Technology, a globally renowned video-centric smart IoT solution and service provider, unveiled its latest intelligent building products in an online video streaming with the theme "Intelligent Access, Convenient Life". The online launch attracted industry representatives and experts from all over the world to witness Dahua Technology’s latest series of smart access control and video intercom products. It also allowed them to have an in-depth discussion of the future development trends in the field of intelligent building. The Product Manager of Intelligent Building at Dahua Technology showed two AI-enabled smart products in his presentation: the Face Recognition Access Control & Time Attendance Terminal, and the Fingerprint Access Control Terminal, which offers larger face image capacity and enhanced recognition speed. Face Recognition Access Control Dahua Technology’s fourth-generation Face Recognition Access Control & Time Attendance Terminal are available in both horizontal (three models) and vertical (two models) designs, offering face recognition and fingerprint recognition for different access control and time attendance needs. Equipped with 4.3" capacitive touch screen and binocular camera, the vertical model supports up to 6,000 face image capacity. It can also detect real human targets, making it impossible to deceive it using photos or videos" “The recognition takes only 0.3 seconds, enabling uninterrupted rapid passage. More importantly, it can also detect real human targets, making it impossible to deceive it using photos or videos," the Product Manager emphasized. Featuring a small-sized design, both products support wall-mounted installation, and provide two different angle installation methods based on the general height of people. Fingerprint Access Control Terminal In order to meet the needs of different customers, these devices can also be installed on desktops in reception areas, enabling quick time attendance and access for employees. The latest Fingerprint Access Control Terminal from Dahua Technology combines access control and time attendance functions, with a capacity to record up to 3,000 fingerprints. It supports Wi-Fi connection and OSDP. Users can manage the device in three ways – through its touchscreen display, a mobile phone, or via PC Web, allowing flexible and convenient operation and management. In his subsequent demonstration, the Product Manager introduced the newly released Wi-Fi Villa Kit, 7-inch Android Indoor Monitor, and PoE Kit for smart home security. Wi-Fi Villa Kit This kit offers a new door station, a 7-inch indoor monitor with high-resolution screen, power supply and all related accessories. The entire system is Wi-Fi enabled and users only need to supply power to the device, eliminating wiring hassle and making it ideal for villa users. 7-inch Android Indoor Monitor With a simple and exquisite design, the 7-inch Android Indoor Monitor is available in two colors: black and white. The user interface of the device combines traditional Android and smart home styles, enabling a smooth operation. Compared with many Android 5.1 products, the Android V8.1 product supports separate management of specific users, which is more secure for user privacy. In addition to wired connection, the device also supports Wi-Fi connection. PoE Kit This highly cost-effective PoE Kit includes a door station with rain-proof eaves, a 7-inch high-resolution screen with home-style design, as well as a PoE switch. The built-in 8 GB SD memory card supports massive storage. Both door station and indoor monitor support PoE power supply, eliminating the need for additional power adapters. The latest configuration program allows easy and convenient deployment. Users can independently complete the entire installation process in just 2-3 minutes. Enabling safer society Building facilities are an essential part of everyone’s work and daily life. In the intelligence era, people demand intelligent access and convenient life, and that’s what Dahua Technology is devoted to – to bring more highly competitive and smart products to customers and users, enabling a safer society and smarter living.
PSA, the consortium of professional systems integrators, announces the addition of the STEPS program to its network to assist in bringing people back to work during the COVID-19 Pandemic. STEPS, powered by bSMART® Entry Assessment, produces a straightforward plan that can be operationally effective in two to 30 days. Mitigating business liability “COVID-19 halted business as we know it earlier this year and many integrators are struggling to get their teams back to work as well as support their end users in securing their facilities,” said Tim Brooks, PSA’s vice president of sales and vendor management. “The STEPS program takes the guesswork out of these challenges by providing a customized and detailed roadmap on how to safely get back to work.” The bSMART® Entry Assessment program is designed to provide businesses confidence that they are meeting the needs of staff and customers while simultaneously mitigating business liability. It also supplies businesses and facilities managers with a tactical plan of action to implement the STEPS program at their facilities. This is contracted directly through the systems integrator. Extensive assessment covering “We live in a world of risk and how we respond to risk as a society will determine the lives we live in the future,” said Benjamin Butchko, president of Butchko, Inc. “Entry assessments are a tool to help businesses manage COVID-19 risk while keeping staff safe in the process. The program goal is to find practical ways to meet the challenge head-on.” The STEPS program has an extensive assessment covering everything from value proposition and areas of application, integrator training, equipment acquisition, information gathering, visualization image capture and more. Ultimately a report is delivered with recommendations, references, budget, etc.
Applied Motion Products Inc. (AMP), the USA based motion control innovator, has released a new application note for programmers using Python, the popular computer programming language. Available from Mclennan, AMP’s European distribution partner, the application note includes sample Python scripts and resource information for establishing RS-232/RS-485 or Ethernet communications, along with streaming commands and handling replies for single- and/or multi-axis drive set-ups using AMP’s ‘SCL Mode’ – which is one of many control options available across its comprehensive range of intelligent stepper and servomotor drives and integrated drives. Motion control command scripts The simple and intuitive text-based SCL command set includes motion related moves for absolute and relative position with velocity and acceleration as well as jog and homing routines. SCL also includes I/O control commands for sequencing other machine functions as well as drive status and alarm interrogation. Python programmers can simplify their automation and machine control projects by combining AMP’s SCL motion control command scripts to sequence one or more motor axes. AMP’s diverse range of stepper and servomotor based intelligent drives include panel mount and motor-integrated alternatives which are characterized by ease-of-use, dynamic performance and a highly flexible functionality that is easily adapted to a wide variety of applications. Intelligent drive indexer programming The sophisticated ‘Q’ programming language can be used to write complex sequences of multi-tasked motion AMP’s unique StepSERVO technology includes integrated one-component solutions that bring together a microstepping motor and drive with position feedback and a sophisticated controller in a single package for high-performance closed-loop control that offers exceptional throughput and precision for applications such as packaging and labeling, automated test, automated parts handling, life sciences, and linear/rotary positioning stages. In addition to the SCL streaming mode and various configuration, set-up and tuning tools, AMP’s control options include stand-alone intelligent drive indexer programming with a point-and-click graphical user interface option. For maximum flexibility, the sophisticated ‘Q’ programming language can be used to write complex sequences of multi-tasked motion, math functions and machine control code. Comprehensive technical support Furthermore, industrial network interfacing is available across the range including EtherCAT, Ethernet/IP, CANopen, Modbus RTU and TCP. The Python software application note is part of an extensive library of resource information covering a diverse range of installation and use related subjects associated with AMP’s broad range of motion components. Ranging from setup with third-party manufacturers’ motion controllers, fieldbus and HMI interfacing, drive configuration and general programming guides, the information is freely available along with comprehensive technical support from Mclennan.
Custom Consoles announces a new addition to its range of technical control furniture. Developed in response to the coronavirus pandemic, the Operator Safety Screen reduces the risk of airborne infection or direct physical contact between control room personnel without restricting their forward or side view of video monitor displays. "We designed the Operator Safety Screen following discussions with some of our largest customers," says Custom Consoles Managing Director Neil Reed. "Most technical control rooms and edit suites are well air-conditioned but Covid-19 has raised health and safety concerns to a significantly higher level. We responded promptly to the challenge with a space-efficient screen which can be installed quickly and easily wherever control room staff are working in close proximity." Rigid low-profile floor supports "The Operator Safety Screen is designed to fit our Module-R series of technical furniture but fits all other desks in our product portfolio and those manufactured by other furniture companies. The Operator Safety Screen has already generated orders totaling several hundred from broadcasters such as Al Jazeera, Amazon, BBC Studio Works, IMG, QVC, STV and Timeline as well as many others," adds Sales Manager Gary Fuller. "This makes it one of the fastest selling new products in Custom Consoles' history. Each screen comprises a strongly built birch plywood main frame with rigid low-profile floor supports. A transparent polycarbonate panel bonded into the upper section of each frame gives operators a clear view of all equipment and colleagues to support their normal workflow. Handgrips are integrated into each frame for easy relocation." Custom Consoles' Operator Safety Screens are available now.
Sensor system supplier HENSOLDT has been awarded a contract by Airbus Defense and Space to develop and produce a new AESA (Active Electronic Scanning Array) radar for the German and Spanish Eurofighter fleets. The project is jointly financed by the Eurofighter partner nations Spain and Germany, who will also be the first users of the radar in their fleets. Following budget approval by the Spanish government and most recently by the German Bundestag in mid-June, the contracts worth over 1.5 billion euros have now been signed. "The fact that Germany and Spain are taking a pioneering role in the modernization of the Eurofighter is a signal of confidence in European defense cooperation," said HENSOLDT CEO Thomas Müller. "This decision ensures that our armed forces will continue to be able to fulfil their mission in the future while being protected in the best possible way." Eurofighter digital multi-channel receiver and transmitter The contracts cover the German-Spanish new development of core components of the Eurofighter radar - including a digital multi-channel receiver and transmitter/receiver modules of the antenna - and the equipping of approximately 130 Eurofighter aircraft of tranches two and three. The development is being carried out by a Spanish-German industrial consortium under German leadership with the support of the Eurofighter nations Great Britain and Italy. HENSOLDT has already been involved in the development and production of the Eurofighter sensor technology currently in use. At its radar center in Ulm, HENSOLDT currently employs 2,200 people, and in the Eurofighter radar sector alone, the company expects to create 400 highly qualified jobs over the entire program period. The sensor specialist is also investing around 15 million euros in the necessary capacity expansion, primarily at the Ulm site.
The DoorBird app has been awarded the ‘Software Made in Germany’ and ‘Software Hosted in Germany’ quality seals. The German Association of Medium-Sized Enterprises in the IT Industry (Bundesverband IT-Mittelstand e.V.) awards the seals to German companies whose software meets particularly strict data security and quality criteria. The app is the central control tool for DoorBird IP video intercoms developed and manufactured by Bird Home Automation in Berlin. With the DoorBird app, all functions of the DoorBird IP intercoms can be accessed and configured from any location. Connected smart locks The app enables users to see on their smartphones and tablets who is ringing at the front door and talk to visitors. If someone presses the call button or a motion is detected, the door station sends automatic push notifications to the resident’s smart device. Electric door openers and connected smart locks can be unlocked comfortably from the app. Access rights, visitor history and action schedules are also configured via the app. The DoorBird app is available free of charge for iOS and Android devices. The ‘Software Made in Germany’ Initiative is under the patronage of the Federal Ministry for Economic Affairs and Energy. The ‘Software Made in Germany’ seal is awarded to companies that develop their software in Germany, offer expert service and multilingual user interface and documentation. The ‘Software Hosted in Germany’ seal confirms that the software data is hosted in a computer center in Germany, and that the hosting contract underlies the German data protection law.
When we popped the champagne to celebrate the start of a new year in January, not many could predict that less than three months later, we’d be facing a global pandemic and the economic challenges that a worldwide lockdown would bring. In conversations over the last several weeks, reports from integrators have vacillated between being flush with work or fearful that projects were drying up — without a whole lot in the middle. But in these conversations, a central theme has emerged: diversification. My background was heavily rooted in security integration but in the last 10 years shifted to risk — both management and mitigation practices — and this emerged long before I began my career in security. It isn’t a new phenomenon for companies to be looking at the risk management strategies they had in place and rethinking their direction. This global pandemic, and the effects it has had on the workforce, has significantly altered what many organizations deem “normal” day-to-day operations, meaning that many organizations are asking one key question: “Can my business withstand this?” The challenge exists in ensuring asset security For many end users, the challenge exists in ensuring asset security in locations that are experiencing low occupancy as a result of work-from-home policies or in vacant facilities altogether. For integrators, there is a balance between continuing to install projects while keeping the health and well-being of technicians and employees top-of-mind. Considering these factors, business resiliency in times of crisis can be built by integrators implementing the following strategies: Diversify the portfolio As an industry, it’s safe to say that the winds of change are beginning to shift away from solely “per project” to more recurring monthly revenue (RMR) business models — and today’s crisis may be the catalyst for more of this change. Integrators that embraced this model in the early days, despite the hurdles that a transition like this brings, are seeing the benefits of this move. In economic downturns, RMR allows an organization to map out incoming revenue streams and ensures money will continue to come in despite restrictions on new products and investments from customers. Offer more service-based products Part of diversifying a portfolio involves engaging in a more service-based approach to business. Establishing a monitoring services department, integrating a cloud-based video and/or access control service into the mix, or bringing more system monitoring services in play can go a long way in offering more than hardware-driven sales. We’ve talked a lot in the last several years about so many organizations transitioning from large capital expenditures (CAPEX) to more operational expenditures (OPEX) and the opportunities this presents to integrators; now is the time for providers to harness this trend for the health of their business. Emphasize the management Through managed services, the value for the customer is that integrators take on the diagnostics, testing, remote monitoring and more — all via the cloud or hosted models, which means fewer “truck rolls” and costs associated. In the current environment, saving a visit to a site can help protect technicians. For new customers, the external management of a system can mean all the difference as there are a number of end users that don’t need a headache that legacy systems create as it relates to maintenance, updates and manpower oversight. Securing an integrator’s business can mean being able to serve customers by diagnosing and triaging issues quickly and highlighting the value provided in day-to-day management. Look at new vertical markets From a resilience perspective, critical infrastructure and government-related markets, such as water and energy, and local and municipal customers rarely see a reduction in spending amidst a downturn, which can make these markets a solid investment for integrators. While some of the regulatory requirements in place, such as adherence to the National Defense Authorization Act (NDAA) and GSA contract guidelines, may be daunting, the ability for firms to weather the storm by serving these markets can help integrators see continued success. Understand your books One of the first things that integrators must do before a crisis hits is to understand their balance sheet. So many integrator firms are built on the premise of being really exceptional at highly technical and complicated installations, which is why they are good at what they do. But the real challenge is the balance of this ability with the skills needed to grasp business continuity from a bookkeeping and planning perspective. Act as a consultant One of the biggest challenges for customers during a crisis is making quick decisions that can impact the rest of the organization both in the short- and long-term. In the security environment and the status of where the world is currently, the needs customers had a month ago are far different than now, so acting as a consultant and working with them to address their concerns through existing technology — or recommending new solutions — can mean all the difference in building a relationship with existing customers or in working with new ones. Offer services that leverage existing investments So many customers out there today have invested heavily in video surveillance equipment and hardware that they want to ensure will be around for the long haul. Investing in new equipment can be a real hindrance in normal circumstances, much less those we’re currently facing, so it’s critical that more open solutions are offered to customers. For example, cloud-based video offerings that leverage existing cameras and allow end users to configure them with the touch of a button are a value-added benefit that can favor integrators in the long run. Continue training your staff Right now, while many integrators see a slow down taking place, it’s critical that those with the means to do so offer more value to end users by incorporating continued education and training for technicians. This can go a long way in making the services offered more appealing to customers. Integrators who set aside resources to train staff and encourage certifications are building a foundation for success. There’s no way that integrators can address the demands placed on them without investing in the people within their organization. Integrators and security leaders are tasked now with the added complexity of navigating a worldwide crisis. While so many see the challenges ahead, there is opportunity within these challenges to take forward-thinking business practices and implement them on a broader scale. Doing so can have the potential to change the face of the industry as we know it.
How can security system integrators not just survive but thrive in today’s IT-led market? The key seems to be in training. As increasingly more clients look to integrate access control with IT environments, they want integrators with the specialist skills to achieve this. For integrators that don’t invest in training, the risk is being left behind. Because many security system integrators aren’t providing specialist IT support, manufacturers are now offering services to make implementations and integrations easier. This isn’t a scalable or desirable option for many manufacturers though, they don’t want to become integrators. The result? Manufacturers will be pushed into developing products that can be integrated with IT networks off the shelf. And this isn’t necessarily the best option for end user, manufacturer or integrator. With a growing number of cloud-based security solutions, integrators also face the threat of clients opting for installation-only services. How security system integrators can survive and thrive today It’s not all doom and gloom for security system integrators though. To avoid becoming redundant, or being downgraded to simple access control installers, there’s lots you can do to strengthen your position. Listen carefully Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience One of the first ways you can distinguish yourself from your competitors is by really listening to what your clients want and need. You can then translate this into a security or access control application tailored carefully to them. Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience and product knowledge. It’s far superior to carrying out a standard implementation, which can leave clients feeling they’ve not been listened to or given good value. Up your IT knowledge TCP/IP has become the standard for communication between devices and central server applications in access control and security in general. So every technician now needs to know how to connect IP devices to networks and configure them in the central application. This is only the tip of the iceberg though, there’s so much more that integrators now need to be proficient in when it comes to IT. From understanding a client’s WAN, LAN and VPN networks to back-up systems, encryption technologies, key management and transparent communication. It’s also important to know how to integrate applications at server level, whether you’re integrating two or more security systems or a HR database. Most integrators have begun to invest in one or two IT experts, but this usually isn’t enough to meet clients’ needs. To really stay ahead, it’s crucial to invest more heavily in IT training and expertise. Choose your portfolio carefully When considering your portfolio, ensure you check the background of each product’s manufacturer Ideally, your portfolio should be small but rich, which is more difficult than it sounds. Choosing products that will scale easily is complex, and you need to consider the potential for increased functionality or connectivity as well as scalability. When considering your portfolio, make sure you check the background and outlook of each product’s manufacturer. You don’t want to select items that are likely to be discontinued in the near future, which can often happen after a manufacturer is acquired, for example. Get in the cloud In the security market, the mid and low segments are already shifting to cloud-based solutions that need neither integration nor IT skills. This leaves you with opportunities for just installation and maintenance services, where profit opportunities are reduced. An alternative is to begin selling cloud-based security services yourself to help you attract and retain clients for the long-term. Give clients added commercial value As competition increases and budgets shrink, offering added value, to new and existing clients, is a vital way to differentiate your business. This will help you to not just defend against competitors but to grow your business and increase your profitability. Configuring access control reports for clients is just one example. It’s relatively straightforward to do but provides really valuable insight into visitor flow. This can then enable them to, for example, staff reception adequately and provide sufficient catering, which all improves the experience for visitors and employees. Providing this kind of consultative service, instantly pushes you up the value chain. Stay agile and well informed To survive and grow as a security system integrator today, the upshot is that it’s crucial to keep pace with the market’s ever-changing trends, technology and client needs. And, to make sure you’re ready to adapt and give clients the services they want, it’s vital to give your people the in-depth training they need.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Kurt Takahashi, the new CEO of Pelco, says he will provide collaborative leadership to help build the Pelco team, work together hand-in-hand with team members, remove barriers and lead the company forward. He brings industry experience and relationships to the new post that will translate into new opportunities. Takahashi joins Pelco from AMAG Technology, where he served as President for the last couple of years. Earlier, he had stints at ADT, Tyco and Quantum Secure, where he was Global Vice President of Sales and Marketing. “This was an opportunity to join a brand that has deep, rich and far-reaching history,” says Takahashi. “I couldn’t resist the opportunity to come into a company such as Pelco and be able to make a difference.” Improving the fundamentals Takahashi acknowledges that Pelco has slipped in the last 10 years from its position as a market-leading brand. To address the situation going forward, the company must “improve fundamental things,” he says. Those fundamentals include keeping the customer first, putting the right people in the right roles, and executing technical support well. Keeping the customer first, putting the right people in the right roles, and executing technical support well “We have to provide customer service from when we receive an order, to acknowledging it, to processing it and shipping the order,” says Takahashi. “Another piece is to deliver revisions to a product in a faster time period and introduce new products to the market in a timely way. In terms of market presence, we learn that people haven’t really heard from Pelco in a while. We have to get in front of integrators and consultants more aggressively than we have in the past.” “It’s up to us to prove that we belong and can sustain and support customers moving forward,” he adds. “We will get new opportunities, but we will need to execute them. If we do that, we will grow.” Brand optimism Takahashi sees more reasons for optimism. “In spite of the problems, we are a big company with thousands of customers, a massive footprint, 10 offices around the world and people in over 40 countries. We are a strong, known brand around the world. These are a great foundation to grow from; we just have to execute better.” These are a great foundation to grow from; we just have to execute better Pelco’s new parent company, Transcom Capital Group, was another reason Takahashi was attracted to the position. He says Transom is led by “amazing professionals” that specialize in “transformational culture and how to diffuse best practices in an organization.” At Pelco, Transom has already led surveys, workshops and focus groups throughout the organization to create a vision, mission and values covering how the company wants to present itself in the market. From those values will emanate new process and policy improvements to move the company in the right direction. New visions and missions The company’s new, collectively developed vision is “to make the world safer.” The mission is “to deliver distinctive video solutions and world-class customer experiences.” The company’s new, collectively developed vision is “to make the world safer.” The company’s culture is built on six values: innovation and excellence, customer focus, integrity, respect and recognition, collaboration, and ownership. “We believe this is what will help drive our culture moving forward, and it’s the mindset of all of us as one team with one goal that will give us something to be proud of,” says Takahashi. “As we move into the new era of Pelco, you will see excitement internally and externally,” he adds “Everybody’s really eager to see Pelco come back and be a significant player.” Three horizons to success The idea is to look inward and improve on the current, successful product lines Takahashi sees three horizons that summarize the company’s path to future success. The first horizon is to focus on the fundamentals of what the company does today. The idea is to look inward and improve on the current, successful product lines, such as the VideoXpert video system and on-board video analytics. The second horizon will be to look at ways to advance the current feature set, whether “to build, partner or buy.” Building partnerships will be part of that success, such as the partnerships they are already building with Briefcam and Anyvision. The third horizon will be to expand their innovation, based on feedback from end users, dealers and consultants. “I want to get very deeply connected with our customer base,” says Takahashi. “Are we on the right path? Should we explore other partner relationships? We need to bring those minds together to expand our vision.” The focus should be on solving three business problems – mitigating risk, ensuring compliance and saving money. Looking ahead to ISC West in the spring, Takahashi expects Pelco to emerge as a more proactive company that is eager to engage. “We have a lot of stories to communicate, and we have not been as active as we should,” he says.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organizations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organization’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetize the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organization. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organizations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organizations, not technology. If we truly understand the risks to the organization, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organizations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organizations.
In addition to providing the Northeast’s largest security trade show, ISC East will include free conference sessions and keynote speeches right on the show floor and several paid workshops. The Nov. 20-21 event at New York’s Javits Center will also include vendor solution sessions from Axis Communications, Hikvision and NAPCO. Wide variety of paid workshops An advantage of the International Security Conference & Exposition in New York is that much of the programming is complimentary to registered attendees, and location of the sessions on the show floor means attendees don’t have to leave the exhibition to take in a session. The paid workshops include technology sessions about cyber terminology for physical security integratorsThe paid workshops include an Active Shooter Workshop and technology sessions about cyber terminology for physical security integrators; and basic installation and configuration of video surveillance solutions. An OSDP (Open Supervised Device Protocol) Boot Camp Short Course will also be offered. As a smaller show, the topics of ISC East conference sessions are broader and of more general interest, rather than organized into focused “tracks” as at ISC West. Attendance at sessions can provide continuing education (CE) credits with organizations that partner with ISC East – one credit for each hour-long session. Attendees can use their Certificate of Attendance from any session to self-report their education hours to relevant industry bodies: ALOA (AEU education credits), ASIS (CPE continuing professional education credits) and NICET (CPD Continuing Professional Development points). An advantage of the International Security Conference & Exposition in New York is that much of the programming is complimentary to registered attendees Keynote sessions at the Main Stage The Main Stage will be the venue for keynote sessions delivered by Deanne Criswell, Commissioner, New York City Emergency Management (on Day 1 – Nov. 20); and Angela Stubblefield, Chief of Staff at the Federal Aviation Administration (FAA) (on Day 2 – Nov. 21). The two SIA Education@ISC East educational theaters on the show floor will be booked up both days with a variety of interesting topics. A new session covers penetration testing for physical security, presented by Michael Glasser of Glasser Security Group. A session on LiDAR (Light Detection and Ranging) sensors will be presented by Frank Bertini, UAV and Robotics Business Manager, Velodyne LiDAR. Another popular topic is Safe Cities, and FLIR will present a session on moving from secured to smart cities with intelligent, connected systems. New addition is Active Shooter Workshop The Active Shooter Workshop is a new addition to the ISC East program. It has been a popular session at ISC West for three years now. At ISC East, presenters of the workshop will be David LaRose, System Director Public Health, Lee Health; and Ben Scaglione, Director of Healthcare and Security Programming, Lowers and Associates. At the end of the workshop, an additional hour of programming will be the “Stop the Bleed/Save a Life” session presented by Jerry Wilkins, Co-Owner of Active Risk Survival. The Main Stage will be the venue for keynote sessions delivered by Deanne Criswell, Commissioner, New York City Emergency Management, and Angela Stubblefield, Chief of Staff at the Federal Aviation Administration Woman in Security event A Women in Security Forum breakfast event will be held on Nov. 21 (Thursday). It’s the second annual event and this year will focus on diversity and inclusiveness in the workplace of the future. Valerie Anderson, President of Boon Edam, will lead a discussion on “Diversity 2.0: Next Steps for Creating an Empowered Workforce”Moderator Valerie Anderson, President of Boon Edam, will lead a discussion on “Diversity 2.0: Next Steps for Creating an Empowered Workforce.” Panelists are Lisa Terry of Allied Universal, Andrew Lanning of Integrated Security Technologies, Elaine Palome of Axis Communications and Dawne Hanks of Milestone. The Women in Security event is likely to attract up to 100 attendees. SIA’s Women in Security is an active organization, with monthly meetings and a newsletter that recognizes prominent women in the security industry. “It’s really a group for both men and women,” says Mary Beth Shaughnessy, Event Director, ISC Events at Reed Exhibitions. “There are many programmes, recruiting efforts, and professional and networking opportunities. They are a robust group of people who are active in making a difference. It’s important to support women in the security industry, which is 95% male, and to develop a new generation of women to be a part of the industry’s future.” The keynote addresses at ISC East will also highlight two high-profile women.
When overseeing the installation of video surveillance in a refinery, it is necessary to understand that there are a number of complex issues that must be resolved. The infrastructure is, generally, very large and presents a series of extremely dangerous environments and processes that must be closely monitored in order to ensure that the numerous manufacturing operations taking place are carried out safely. Monitor large complex One of the customers in Mexico has asked for a system that enables them to monitor these complex operations in real time, so that precautionary action can be taken, if necessary. The system has to show the work that PEMEX staff and all suppliers within the processes area are undertaking in order to avoid risky situations and ensure that all jobs are performed in accordance with safety standards. In addition, the system needs to be able to show various parts of infrastructure, such as instruments, valves, pipes, etc. and detect any malfunctioning production equipment. In some places, production processes must be monitored as they occur in zones made hazardous by the presence of flammable substances. The customer’s top priority is being certain that the installed cameras themselves are not a possible ignition source for flammable products in the surrounding areas. Explosion-proof PTZ IP cameras The integrator REX ENTERPRISE S.A. de C.V. carried out two projects with these characteristics in Mexico: one in Coatzacoalcos, Veracruz and the other in Poza Rica, Veracruz. In Poza Rica, Milestone software manages the system’s 51 devices, including IP cameras for internal monitoring, analog cameras from a previous system and 22 explosion-proof PTZ IP cameras. Milestone has been chosen due to its ability to integrate a number of alarm systems, analytic systems, etc. in the future, as it wasn’t possible to fund and use the complete system at the time of installation. ONVIF protocol Videotec's explosion-proof PTZ cameras were selected for their unlimited lifespan, with three-year warranty, their corrosion-resistant construction and their conformation with all the applicable standards for explosion-proof devices. The integration of Videotec products and Milestone is guaranteed by the ONVIF protocol. ONVIF is a worldwide industry standard that offers standardized interfaces and promotes effective interoperability of physical safety products.
It has been a long time coming, but the Bexar County Metro 911 Emergency Operations Center (EOC) is up and running, and the security systems implemented to protect the facility are among the best of the best. The regional operations center unifies emergency operations into one cutting-edge facility. A New Home Built in San Antonio, Texas, the EOC provides a new home for the Bexar County Sheriff’s communications operations and is an alternate site for the San Antonio police and San Antonio fire and EMS operations. The facility is a joint operations center not only for Bexar County but also for Comal (New Braunfels) and Guadalupe (Sequin) counties. Tight security system All three counties touch dividing lines and are considered part of the San Antonio metro area. Bexar Metro 911 Executive Director Bill Buchholtz said building the facility has stayed on budget of $40 million, “give or take a couple of million.” The electrical system meets Tier IV data center standards for maintaining operations regardless of any unplanned activity, and the mechanical system meets Tier III standards. Because the building is under a tight security system inside and out, it was also important that redundant systems were in place, as well as uninterrupted power. Employees based at the monitors on the main floor are given breaks every so often to decompress, relax and interact. Early stages of planning Alterman staff was fortunate to work with the general contractor in the early stages of planning security Alterman Technologies was hired to provide, install and direct the security solutions effort for general contractor Whiting-Turner, who directed construction on the 81,500 square foot facility located on 11 acres of land. Alterman Technologies’ staff was fortunate to work with the general contractor in the early stages of planning security for this facility. According to James Carmen, Alterman’s Project Engineer, being able to make early and consistent contact allowed for the integrator to help specify the types of security that they felt would most satisfy the end user. It also allowed the installation crew to be able to meet their integration deadline of 8 months, long before the overall construction of the facility was complete. Enterprise access control systems “We were able to evaluate all components of the security solution when we saw the demonstrations of the Lenel, Axis and Salient products,” Carmen said. “We’re pleased with the decisions we made to deploy this security equipment.” To keep the facility secure, Alterman Technologies installed 170 IP cameras inside and out to enforce perimeter security. Now that the facility has been formally dedicated and is fully in use, if a person doesn’t have a reason to be on property, they aren’t getting inside. The facility is secure. Alterman Technologies installed 120 door enterprise access control systems, including iClass biometric readers. Video management systems To monitor both the outside perimeter and inside the building itself, 110 5 MP Axis Communications IP cameras were paired with Salient Enterprise video management systems integrated with the Lenel access control solution. Inside the operations center, the facility is outfitted with 100 55-inch video control systems side by side, all of which are integrated with video and audio control solutions. During Hurricane Harvey, operators inside are able to coordinate any and all emergency and rescue operations Inside the facility, there is a first-floor, open room for 104 operator desk consoles, where operators can keep tabs on all three counties. Operators sit in a 13,878-squarefoot Public Safety Answering Point (PSAP) to handle all 911 calls, formerly managed at 25 different locations. In fact, during the recent Hurricane Harvey, operators inside are able to coordinate any and all emergency and rescue operations. Getting behind the power “The ability to have multiple supervisor control stations is a key feature, providing access to sources and allowing supervisors to manipulate the wall and change presets as needed,” said Art Salinas, Project Manager for Alterman Technologies. “It’s a great system with no real limitations. I believe the client has been pleased with the capability to control and preview content before it goes on the wall. They currently have about 30 preset displays.” With the number of cameras and the video streaming to the facility, Salinas had to be certain the equipment he was recommending and the software that would power the system would work without a hitch, 24 hours a day, seven days a week. “Our work to determine the right kind of solution was very involved, and we evaluated all the systems,” Salinas said. “When it came right down to it, we selected Lenel’s OnGuard for access control, Axis Communications IP cameras and Salient’s VMS and its PowerUltra servers. All of this is securely stored in an enclosed network so there is no worry of outside hacking.” Perimeter security system With three counties and multiple agencies using this facility, the security solutions have to be dependable" Salient Regional Sales Representative Paul Fisher said the choice of VMS was truly an important decision because it had to be strong enough to stop any breaches but also be able to provide the ability to run the perimeter security system and the internal security. “Our VMS solution is able to take the lead with all the streaming video and push it wherever it is directed,” Fisher said. “With three counties and multiple agencies using this facility, the security solutions have to be dependable, yet easy to use. We were invited in to demonstrate the system, and we were able to show numerous details that would benefit the end user. We are able to provide reliability and scalability, and we’re a local company, so that worked to our benefit as well,” Fisher said. Law enforcement officials The facility is designed to provide uninterrupted 911 services during various emergencies, including terrorist attacks and natural disasters. There also is an onsite helipad for access by law enforcement officials, should area roadways be closed or congested, and for staging for media during a public emergency. The building is constructed to withstand an EF3 tornado strike and to operate without any public utilities for an extended period of time. “The mission of the facility is to provide that emergency response when a caller is quite possibly going through the worst experience of their life,” said James Hasslocher, Bexar Metro 911 Network District Chairman.
Optex installs intrusion detectors at a gated, luxury motor coach resort community in the desert area of Southern California. The property features a clubhouse, fitness room, community pool, and 141 "Casitas": 1200 sq ft. custom-built living spaces with waterfront motor coach pad. Because most owners were on site only a portion of the year, the property faced an increasing issue with trespassers in the off- season months. The increase in trespassing also lead to an increase in vandalism and theft cases. The large perimeter, combined with the desert heat, required a robust, long distance solution that would stand up to the elements. Detection range of 650 feet The integrator worked directly with OPTEX to plan out a perimeter system that would overcome the challenges faced on the site. Because power was readily available and a long distance solution was required, hardwired AX-650TF beams with a detection range of 650ft. were selected. After discussing possible mounting options with the OPTEX sales representative, the integrator decided on the AX-TW200 photobeam tower. Because the customer provided a site plan, OPTEX was able to pre-build the towers and mount the beams in them at no additional charge. Once installed, the tower and beam solution provided full perimeter protection by activating strobes and notifying an on-site guard to the location of an intrusion. The result was a huge decrease in the amount of unknown trespassers, thus greatly reducing reports of theft and vandalism.
From simple thefts of copper wire from light fixtures, to substantial damage to rooftop HVAC systems, copper continues to be stolen from everywhere that it is readily available. When a church in Georgia began feeling the effects of copper theft, the integrator associated with the property's interior security once again turned to OPTEX for help. The church utilized both rooftop and ground level HVAC systems, with easy access to each. Changing security needs Because of labor and cost associated with wiring, along with the difficulty bringing power to the rooftops, the Regional Sales Director for OPTEX recommended the iSeries line of battery-powered, wireless PIR's. The iSeries detectors offered spot and curtain protection for all HVAC units while also securing all access points to each. For future consideration, the addition of the wireless feature also allows the integrator to relocate and easily adjust the detectors based on changing security needs. With the system in place, copper and other related thefts have been eliminated and the end user can now respond quickly before any damage is done. All of the battery-powered, wireless detectors from OPTEX come with an empty backbox and work with most manufacturers' wireless transmitters. Narrow detection areas OPTEX will pre-install the batteries and an Inovonics EN1941 wireless transmitter When one selects the iSeries version, OPTEX will pre-install the batteries and an Inovonics EN1941 wireless transmitter. One less time consuming step to do for the installer! The iSeries HX-80NRAMi is an 80' x 6' high mount, battery-powered, outdoor passive infrared detector with Anti-Masking. The iSeries version comes with an Inovonics EN1941 transmitter and batteries pre-installed. The iSeries BX-80NRi is a 3' x 80' low mount, battery-powered, outdoor passive infrared detector with Pet Tolerance. The iSeries version comes with an Inovonics EN1941 transmitter and batteries pre-installed. With it's long, narrow detection areas that extend from both sides, the battery-powered BX-80NRi is specifically designed to be wall-mounted centrally on a building or HVAC unit. Passive infrared detector The iSeries VX-402Ri is a 40' x 40' low mount, battery-powered, outdoor passive infrared detector with Pet Tolerance. The iSeries version comes with an Inovonics EN1941 transmitter and batteries pre-installed, and the dual PIR's create two detection areas (upper and lower) that must be compromised simultaneously in order to go into alarm. OPTEX has addressed and met the need for a line of easy to install, stable outdoor detectors that will deter and ultimately prevent copper theft.
Gated aviation fuel farm adjacent to operation building. Client wanted to create a multi-purpose IP solution to detect intrusion from asset theft activating CCTV cameras and create an access control system for a 24-hour operation. Following a thorough site survey, the integrator was able to create a solution that achieved all of its client’s goals. Using 4 Redscan laser detectors in horizontal mode, the integrator was able to secure the fenced perimeter using CCTV surveillance into an IP network that is monitored by the end user. Using unique rules available through VMS, the integrator used a vertically mounted Redscan laser detector to activate/deactivate the intrusion system when a fuel truck would enter and leave the gated fuel farm.
Siqura and TKH Security realized a fully integrated surveillance and access control system in the Sheikh Khalifa Central Hospital. This new hospital is located at the eastern edge of the emirate of Fujairah and will provide better 24/7 health services to citizens on the Eastern coast. The hospital consists of 11 specialized departments, a 32-bed emergency ward, a 3-story rehabilitation building and more than 700 parking spots. Integration of multiple systems This hospital required a complete surveillance solution integrated with healthcare applications. The project combined access control and video management from TKH Security with cameras from Siqura. "We worked closely with our partners to comply with the solution which conforms to the new guidelines in Fujairah” says Tariq Anwer, Sales Director – Middle East & West Asia with Siqura. “The video surveillance component consists of around 700 different Siqura cameras, working with VDG Sense video management software and storage from TKH Security. The iProtect access control system, also from TKH Security manages around 400 doors with card and pin authentication. iProtect security management system is able to flawlessly fulfill the set of complex requirements demanded by this client.” Security management system healthcare facility For Siqura Middle East & West Asia and TKH Security, Sheikh Khalifa Central Hospital in Fujairah is a prestigious project in the healthcare segment. The integration of multiple systems under one roof combined with the integration of healthcare applications provided an extra challenge. Tariq Anwer: “The scope of the project involved an integrated security management system consisting of Siqura cameras, VDG Sense VMS and iProtect access control." "These are all managed at an upper level by iProtect security management system. Among others, some of the following features are implemented: managing visitors on-site and mustering system for emergency evacuation. This is in addition to the integration option with third party systems, for example baby-monitoring.”
Round table discussion
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.
Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload