Pivot3, a provider of intelligent infrastructure solutions, has completed an advanced certification of its hyperconverged infrastructure with Genetec Security Center software. The combination of Pivot3 and the Genetec unified security platform delivers a robust integrated security and IoT solution designed to support the complex requirements of video-intensive, mission-critical environments. Additionally, Pivot3’s certified intelligent infrastructure provides three times the performance ov...
The oil and gas market is driven by a number of technology trends, political issues, waves of supply and demand, and regulations. At times, it seems like the market is in a constant state of ebb and flow, with business affected by traditional drivers, such as government mandates and operational efficiencies, and other non-traditional markers, like challenging weather conditions (consider the 2017 hurricane season as an example). Additionally, the global economy continues to grow, propelling incr...
According to the reports of not-for-profit organization Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organizations in the US, the count of over 300 incidents per...
Maxxess Systems continues to drive the virtualization of the physical security industry with the development and implementation of the industry’s most advanced enterprise level situational awareness and response coordination solutions. Enhancing Maxxess Systems’ momentum is the recent introduction of Maxxess InSite Awareness and Response Coordination System which meshes ‘system intelligence’ and ‘human intelligence’ to deliver an entirely new category of physi...
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
Data Management, Inc., owner of Visitor Pass Solutions, launches with a new name and confirmed focus, further planting their flag in the security industry. The company will now go by the name ‘THRESHOLD,’ a term evocative of their expertise in visitor management systems. With the new tagline, ‘the gateway to stronger security,’ the company emphasises its function as the first line of defense for their clients, as they manage the traffic entering and leaving their clients...
ASSA ABLOY has signed an agreement to acquire KEYper Systems, a supplier of electronic and mechanical key management systems in the US, with a strong presence in the automotive segment. KEYper was established in 1993, and operates from its HQ in Harrisburg, NC. KEYper Systems will become a separate business unit of Traka, which is a pioneer in key and asset management, and an operating unit of ASSA ABLOY Global Solutions. Ric Stone, President of KEYper will report to Justin Sasse, Managing Director of Traka. Expanding Traka’s Product Range Globally This acquisition will allow us to leverage Traka’s technology to further develop KEYper’s offering to its existing customers"“KEYper’s product range and expertise, especially in the US automotive and property management market segments, will complement Traka’s extensive product range and specialist solutions in key and asset management solutions globally. This acquisition will allow us to leverage Traka’s technology to further develop KEYper’s offering to its existing customers, and widen the product range globally for Traka in all of our market segments,” says Justin Sasse, MD of Traka. "This transaction provides us the opportunity to further strengthen our position in the industry, while advancing Traka’s strategy to increase its presence in core markets globally," says Danny Garrido, President of Traka Americas. "Traka and KEYper are an excellent strategic fit. We have highly complementary product and service offerings, strong sales and marketing organizations and a shared dedication to quality customer service - we expect this combination to result in an even more effective and successful Traka." Accelerating Product And Market Development “I am very pleased to be joining Traka and ASSA ABLOY. KEYper will be able to accelerate its product and market development and is looking forward to engaging with the wider Traka and ASSA ABLOY organization to share knowledge and expertise,” Ric Stone, CEO KEYper Systems. The acquisition is conditional upon satisfaction of customary legal conditions and is expected to complete during the first quarter of 2019.
With the need for security guard services growing worldwide, Montreal-based tech startup TrackTik Software Inc., an integrated security workforce management cloud-based software solutions provider, has announced US$ 45 million in financing from Toronto-based Georgian Partners and Montreal-based Caisse de dépôt et placement du Québec (la Caisse). Disruptive AI And Machine Learning Funds will be used to drive new product development — including disruptive artificial intelligence (AI) and machine learning (ML) technologies Funds will be used to drive new product development — including disruptive artificial intelligence (AI) and machine learning (ML) technologies — that will enable security guard firms or in-house security teams to simplify their operations and maximize profitability. TrackTik will also nearly double its staff of 120 in the next year to help bring to market the new state-of-the-art tools and increase support and provide best practices for customers as the company expands its operations internationally. “This investment is in effect good news for the security workforce management industry as a whole as it is enabling us to reimagine every aspect of the industry, helping users of our technology to perform at unprecedented levels of intelligence and efficiency as they obtain their key business objectives,” said TrackTik Founder and CEO Simon Ferragne in making the announcement. “These unique tools will not only add value to our users but will in turn enable our clients to add value to their own customers,” he said, revealing that the new products are planned to start rolling out in early 2019. TrackTik Security Workforce Management Software Applauding the investors for their vision, Ferragne explained that both Georgian Partners and la Caisse are aligned with TrackTik’s commitment to transform the security workforce management market. In particular, Georgian Partners — a firm that invests in growth stage companies using AI and ML to solve real business problems, with a roster that includes players such as Shopify, Cority, Flashpoint and True Fit — has dedicated a group of technical experts to help TrackTik accelerate the development of its new products. “TrackTik's unique end-to-end security workforce management software is advancing the security industry to improve services and make smarter, data-driven decisions,” said Steve Leightell, Partner at Georgian Partners. “They've built a powerful solution that is solving their customers’ greatest business needs and are truly leading the industry. We are thrilled to be working with the TrackTik team to develop their software’s cutting-edge artificial intelligence capabilities. Georgian’s core philosophy is that businesses utilizing applied AI will enable superior service levels in terms of capability, delivery, availability, accuracy and convenience, and so we look forward to be a part of this phase of their growth.”TrackTik's unique end-to-end security workforce management software is advancing the security industry to improve services and make smarter, data-driven decisions" Applied Artificial Intelligence Citing a good cultural fit between the two companies, Leightell added that the timing was right to engage with TrackTik because there is a strong market pull for TrackTik’s first-of-its-kind, all-in-one enterprise software solution that delivers all of the mission-critical components required to run a professional security service firm on a single integrated platform, including real-time guard management and incident reporting, back office administrative functions, and business intelligence. In addition to Applied AI, Georgian Partners’ thesis-led approach to investing also focuses on Conversational AI – including the use of text-based messaging, chatbots and voice assistants – and Digital Security, two areas that TrackTik is well positioned to capitalize on, he added. Based on TrackTik’s substantial growth in 2018, Thomas Birch, Managing Director Venture Capital and Technologies at la Caisse stated that “this new investment will enable TrackTik to continue its international development and reaffirms la Caisse’s support for technology companies, which represent a promising sector of Québec’s economy. One of the fastest growing technology companies in Canada, TrackTik will use the proceeds of this transaction to pursue its strategic expansion plan, which includes developing more machine learning technology.” Automated Scheduling This is an exciting time for the security guard workforce management space as the industry grows and evolves" Among some of the advanced AI capabilities to be featured in TrackTik’s new software are an automated scheduling tool that uses predictive analysis and ML to streamline the scheduling of large, diverse and mobile security workforces, reducing the number of human interactions and simplifying day-to-day business, Ferragne said. TrackTik’s innovations have helped propel the company’s exponential growth since its inception in 2013, with the company receiving multiple recognitions for its solutions. Last year alone, TrackTik ranked No. 11 on the Deloitte Technology Fast 50 list, was included on the LinkedIn list of Top 25 Startups in Canada, placed 36th on the Canadian Business 2018 Startup 50 ranking of Canada’s Top New Growth Companies, and received a 2018 SaaS Award for Customer Success by San Diego-based APPEALIE. “This is an exciting time for the security guard workforce management space as the industry grows and evolves,” Ferragne said. “We at TrackTik are proud to support its advancement by providing the best products possible in the hopes of helping those in the industry propel their business forward. We want to thank both Georgian Partners and la Caisse for believing in our vision and mission, and we look forward to working together on achieving our goals.”
DW, the provider of digital recorders, surveillance cameras and related management software, announces the upcoming release of our 4MP MEGApix video analytics cameras. The new cameras — including fixed and varifocal lens turrets (DWC-MTT4WiA, DWC-MTT4Wi28, DWC-MTT4Wi36 and DWC-MTT4Wi6), vandal domes with fixed varifocal lens (DWC-MVT4WiA, DWC-MVT4Wi28, DWC-MVT4Wi36 and DWC-MVT4Wi6), and fixed lens bullet (DWC-MBT4Wi28 and DWC-MBT4Wi36) — offer a vast array of analytical solutions. All the MEGApix video analytics cameras can be controlled and managed via DW Spectrum IPVMS. Image Enhancement Features These MEGApix IP cameras provide 4MP resolution at real-time 30fps with multiple analytics features that elevate the camera to the next level. Added intelligence includes line crossing, perimeter intrusion and video tampering detection. All cameras offer image enhancement features such as True WDR, 65-100ft range IR and Smart DNR 3D digital noise reduction, all in IP66-rated turret, vandal dome and bullet housing options. The varifocal vandal dome offers additional features such as two-way audio, alarm input and relay output, in an IK10 impact resistant housing The varifocal vandal dome (DWC-MVT4WiA) offers additional features such as two-way audio, alarm input and relay output, in an IK10 impact resistant housing. “DW continues to build the MEGApix line of camera’s reputation as a technology leader with crystal-clear high resolution imaging and intelligence on the cameras,” said Mark Espenschied, Director of Marketing, DW. “These new models provide cutting-edge features in a variety of housings to meet the needs of any application.” Video Tampering Some of the features of 4MP MEGApix video analytics camera include: 4MP 1/3” image sensor at real-time 30fps 2.8mm, 3.6mm and 6.0mm fixed lens options 3.3~12mm motorized zoom auto-focus lens True Wide Dynamic Range (WDR) Multiple codecs (H.265, H.264, MJPEG) with simultaneous dual-stream 65ft-100ft range IR Line crossing video analytics Perimeter intrusion video analytics Video tampering with scene change detection video analytics Video tampering with video blur detection video analytics Video tampering with abnormal color detection video analytics Smart DNR 3D digital noise reduction True day/night with mechanical IR cut filter Programmable privacy zones Auto gain control (AGC) Backlight compensation (BLC) Auto white balance (AWB) Motion detection Audio input Two-way audio TF card slot (card not included) (DWC-MVT4WiA models) Alarm sensor input (DWC-MVT4WiA models) Relay output (DWC-MVT4WiA models) Web server built-in PoE class 2 and DC12V Waterproof cabling ONVIF conformant, profile S IP66 certified weather and tamper resistant IK10-rated impact-resistant (vandal dome models only) 5 year warranty
DW Complete Surveillance Solutions, the provider of digital recorders, surveillance cameras and related management software, announces the launch of our new 2U Blackjack X-Rack server. The DW-BJX2U is the latest addition to our Blackjack family, offering a high-end, high-capacity solution for enterprise scale applications. The Blackjack X-Rack comes with DW Spectrum IPVMS server installed for setup and configuration, and is recommended as a complete solution with one or more Blackjack NAS devices for recording and Blackjack Client for monitoring. Like all of DW’s Blackjack appliances, the X-Rack is designed and commissioned in the U.S.A. Equivalent Capacity “The combination of DW Spectrum IPVMS and Blackjack hardware has distinguished DW in the video surveillance industry,” said Mark Espenschied, Director of Marketing, DW. “Moving the recording capability to a Blackjack NAS elevates the X-Rack server to a new level of high performance.” Blackjack X-Rack servers are designed to connect up to 4 Blackjack NAS devices, providing up to 560TB for recording and backup Blackjack X-Rack servers can manage single and multi-sensor IP cameras of any resolution, with an equivalent capacity of up to 200 2.1MP cameras at 30fps and a maximum of 1200Mbps throughput. By moving local storage to a dedicated NAS unit, the server can outperform any competing model. Standard features include an Intel Xeon Processor, Windows Server 2016 OS, 2 x 10Gb NIC cards and removable hot swappable SSD. Blackjack X-Rack servers are designed to connect up to 4 Blackjack NAS devices, providing up to 560TB for recording and backup. It comes with our 5 year warranty. Redundant Power Supply Some of the features of Blackjack X-Rack servers include: Supports all ONVIF conformant IP cameras Storage options with Blackjack NAS Rack with up to 560TB Storage OS on hot swappable SSD bays with lock, RAID1 Redundant power supply Record and manage single and multi-sensor IP cameras of any resolution up to 200 2.1MP cameras at 30fps and a maximum of 1200Mbps throughput (recording on NAS device) Dual 10GB network ports Windows Server 2016 OS on mirrored SSD drives USB interface Hosting DW Spectrum for setup, configuration, monitoring and recording Two (2) 4-channel licenses included for a total of 8 recording channels (DW-SPECTRUMLSC004), fully transferable between cameras and encoders No annual maintenance fees Simple enterprise scalability Auto device discovery Dual stream recording Rail kit included USB mouse and keyboard included Designed, assembled and tested in the U.S.A. 5 Years warranty
The American National Standards Institute (ANSI) has appointed Susan Carioti, the vice president of certification, standards and guidelines at ASIS International, to a three-year term as a director-at-large on the ANSI board of directors. Standards And Conformance-Based Solutions As a director-at-large, Carioti will work with members of the board to determine and approve the policies and direction of ANSI’s strategic vision, and in close collaboration with stakeholders from industry and government, to identify and develop standards and conformance-based solutions to national, international and global priorities. “The role at ANSI is quite an honor and recognizes ASIS’s commitment and grit as both an accredited standards development organization and certification body,” said Carioti. “I look forward to continuing this important work and raising the bar with ASIS members and the security community.” ASIS National Standards Development Program Carioti joined ASIS more than a decade ago, and as an ANSI-accredited standards developer, established ASIS’s credible national standards development program. In addition to overseeing the ASIS standards program internationally by way of ISO security, risk and resilience activities, she provides strategic direction and management in advancing ASIS certification programs in conformance with ISO 17024 Personnel Certification accreditation requirements. An active participant in numerous ANSI groups for more than twenty years, Carioti currently serves on the ANSI appeals board and served many years on the ANSI executive standards council. “Sue’s experience and expertise are a valuable addition to the ANSI Board,” said Fran Schrotter, Sr. VP & COO, ANSI. “She has demonstrated tremendous commitment and drive for excellence in ANSI standards and conformity assessment activities. We more than welcome her ideas and contributions.”
Pulse Secure, the provider of secure access solutions to both enterprises and service providers, announced a Technical Alliance Partnership with BNTPRO to jointly sell and support a solution that offers SecTrail, an Identity Control and Management Platform developed by BNTPRO, as part of an integrated solution with Pulse Secure Connect Secure VPN appliances. The agreement will ensure that joint customers benefit from seamless compatibility, enhanced features and simplified support and upgrades. The SecTrail suite includes a One-Time-Password (OTP) and Two-Factor-Authentication (2FA) solution with support for mobile devices, sending single use passwords by SMS and email along with captcha support. In addition, the SecTrail HotSpot module provides ID verification necessary for wired and wireless network guest access with full audit trail to comply with Turkish legal requirements under Law #5651. Most Widely Used OTP And 2FA Solution SecTrail is the most widely used OTP and 2FA solution across Turkey and our customers include the 40 largest banks and financial institutions"“SecTrail is the most widely used OTP and 2FA solution across Turkey and our customers include the 40 largest banks and financial institutions along with other regional customers,” explains Kenan Bilgiç, corporate communications and marketing specialist for BNTPRO. BNTPRO, a Pulse Secure Premier partner and winner of support partner of the year in 2017, has built a reputation across Turkey for its technical expertise and deep understanding of security best practice. Local customers include HSBC, Finansbank, Borusan Telekom, Turkcell and IBM amongst a growing list of national and international clients. “We have worked closely, first with Juniper Networks, and then Pulse Secure for over a decade and are now the single largest partner for Pulse Secure across Turkey,” says Bilgiç. “With this new Technical Alliance Partnership, we strengthen our relationship so our development teams can work closely together to deliver the highest levels of compatibility between our products, ensuring security and ongoing support for customers of our jointly marketed solution.” Authentication Support For SAML 2.0 Pulse Connect Secure is available as both hardware and virtualized appliances and includes key features such as clientless accessPulse Secure Connect Secure is a pioneer in the VPN space and is used by 40 of the Fortune 50 companies with over 18 million endpoints secured. Pulse Connect Secure is available as both hardware and virtualized appliances and includes key features such as clientless access, group policy for seamless integration with directory services and strong authentication support for SAML 2.0, PKI, IAM and digital certificates. “Pulse Secure and BNTPRO have enjoyed a successful long-term relationship along with many joint customers across the region,” says Paul Donovan, VP EMEA for Pulse Secure. “At a technical level, we continue to jointly test and certify our products with each other and there is constant communication between our respective developers to ensure that our combined solutions provide the reliability and features that our customers expect. With this new agreement, we will ensure that this partnership continues to grow to serve Turkey and new customers across the region.” Pulse Secure and BNTPRO will be running several joint marketing initiatives including events and seminars during Q1 of 2019 to educate customers about the benefits of the combined solution.
With the coming of a New Year, we know these things to be certain: death, taxes, and… security breaches. No doubt, some of you are making personal resolutions to improve your physical and financial health. But what about your organization’s web and mobile application security? Any set of New Year’s resolutions is incomplete without plans for protecting some of the most important customer touch points you have — web and mobile apps. Every year, data breaches grow in scope and impact. Security professionals have largely accepted the inevitability of a breach and are shifting their defense-in-depth strategy by including a goal to reduce their time-to-detect and time-to-respond to an attack. Despite these efforts, we haven’t seen the end of headline-grabbing data breaches like recent ones affecting brands such as Marriott, Air Canada, British Airways and Ticketmaster. App-Level Threats The apps that control or drive these new innovations have become today’s endpoint The truth of the matter is that the complexity of an organization’s IT environment is dynamic and growing. As new technologies and products go from production into the real world, there will invariably be some areas that are less protected than others. The apps that control or drive these new innovations have become today’s endpoint — they are the first customer touch point for many organizations. Bad actors have realized that apps contain a treasure trove of information, and because they are often left unprotected, offer attackers easier access to data directly from the app or via attacks directed at back office systems. That’s why it’s imperative that security organizations protect their apps and ensure they are capable of detecting and responding to app-level threats as quickly as they arise. It’s imperative that security organizations protect their apps and ensure they are capable of detecting and responding to app-level threats as quickly as they arise In-Progress Attack Detection Unfortunately, the capability to detect in-progress attacks at the app level is an area that IT and security teams have yet to address. This became painfully obvious in light of the recent Magecart attacks leveraged against British Airways and Ticketmaster, among others. Thanks to research by RiskIQ and Volexity, we know that the Magecart attacks target the web app client-side. During a Magecart attack, the transaction processes are otherwise undisturbed Attackers gained write access to app code, either by compromising or using stolen credentials, and then inserted a digital card skimmer into the web app. When customers visited the infected web sites and completed a payment form, the digital card skimmer was activated where it intercepted payment card data and transmitted it to the attacker(s). Data Exfiltration Detection During a Magecart attack, the transaction processes are otherwise undisturbed. The target companies receive payment, and customers receive the services or goods they purchased. As a result, no one is wise to a breach — until some 380,000 customers are impacted, as in the case of the attack against British Airways. The target companies’ web application firewalls and data loss prevention systems didn’t detect the data exfiltration because those controls don’t monitor or protect front-end code. Instead, they watch traffic going to and from servers. In the case of the Magecart attacks, the organization was compromised and data was stolen before it even got to the network or servers. Today’s proven obfuscation techniques can help prevent application reverse engineering, deter tampering, and protect personal identifiable information and API communications Best Practice Resolutions The Magecart attacks highlight the need to apply the same vigilance and best practices to web and mobile application source code that organizations apply to their networks—which brings us to this year’s New Year’s resolutions for protecting your app source code in 2019: Alert The key to success is quickly understanding when and how an app is being attacked First, organizations must obtain real-time visibility into their application threat landscape given they are operating in a zero-trust environment. Similar to how your organization monitors the network and the systems connected to it, you must be able to monitor your apps. This will allow you to see what users are doing with your code so that you can customize protection to counter attacks your app faces. Throughout the app’s lifecycle, you can respond to malicious behavior early, quarantine suspicious accounts, and make continuous code modifications to stay a step ahead of new attacks. Protect Next, informed by threat analytics, adapt your application source code protection. Deter attackers from analyzing or reverse engineering application code through obfuscation. Today’s proven obfuscation techniques can help prevent application reverse engineering, deter tampering, and protect personal identifiable information and API communications. If an attacker tries to understand app operation though the use of a debugger or in the unlikely event an attacker manages to get past obfuscation, threat analytics will alert you to the malicious activity while your app begins to self-repair attacked source code or disable portions of the affected web app. The key to success is quickly understanding when and how an app is being attacked and taking rapid action to limit the risk of data theft and exfiltration. Protecting encryption keys is often overlooked but should be considered a best practice as you forge into the new year with a renewed commitment to app security to ensure your organization’s health and well-being in 2019 Encrypt Finally, access to local digital content and data, as well as communications with back office systems, should be protected by encryption as a second line of defense, after implementing app protection to guard against piracy and theft. However, the single point of failure remains the instance at which the decryption key is used. Effective encryption requires a sophisticated implementation of White-Box Cryptography This point is easily identifiable through signature patterns and cryptographic routines. Once found, an attacker can easily navigate to where the keys are constructed in memory and exploit them. Effective encryption requires a sophisticated implementation of White-Box Cryptography. One that combines a mathematical algorithm with data and code obfuscation techniques transforming cryptographic keys and related operations into indecipherable text strings. Protecting encryption keys is often overlooked but should be considered a best practice as you forge into the new year with a renewed commitment to app security to ensure your organization’s health and well-being in 2019. Protecting Applications Against Data Breach According to the most recent Cost of a Data Breach Study by the Ponemon Institute, a single breach costs an average of $3.86 million, not to mention the disruption to productivity across the organization. In 2019, we can count on seeing more breaches and ever-escalating costs. It seems that setting—and fulfilling—New Year’s resolutions to protect your applications has the potential to impact more than just your risk of a data breach. It can protect your company’s financial and corporate health as well. So, what are you waiting for?
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organizations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains. User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anything like the 5.4 billion user IDs on haveibeenpwned.com, their login has already been compromised. If it's not listed, it could be soon. Recent estimates state that 8 million more credentials are compromised every day. Ensuring Safe Access Data breaches, ransomware and phishing campaigns are increasingly easy to pull off. Cyber criminals can easily find the tools they need on Google with little to no technical knowledge. Breached passwords are readily available to cyber criminals on the internet. Those that haven’t been breached can also be guessed, phished or cracked using one of the many “brute-force” tools available on the internet. It's becoming clear that login credentials are no longer enough to secure your users' accounts. Meanwhile, organizations have a responsibility and an ever-stricter legal obligation to protect their users’ sensitive data. This makes ensuring safe access to the services they need challenging, particularly when trying to provide a user experience that won’t cause frustration – or worse, lose your customers’ interest. After GDPR was implemented across the European Union, organizations could face a fine of up to €20 million, or 4% annual global turnover Importance Of Data Protection So how can businesses ensure their users can safely and simply access the services they need while keeping intruders out, and why is it so important to strike that balance? After GDPR was implemented across the European Union, organizations could face a fine of up to €20 million, or 4% annual global turnover – whichever is higher, should they seriously fail to comply with their data protection obligations. This alone was enough to prompt many organizations to get serious about their user’s security. Still, not every business followed suit. Cloud Security Risks Breaches were most commonly identified in organizations using cloud computing or where staff use personal devices According to a recent survey conducted at Infosecurity Europe, more than a quarter of organizations did not feel ready to comply with GDPR in August 2018 – three months after the compliance deadline. Meanwhile, according to the UK Government’s 2018 Cyber Security Breaches survey, 45% of businesses reported breaches or attacks in the last 12 months. According to the report, logins are less secure when accessing services in the cloud where they aren't protected by enterprise firewalls and security systems. Moreover, breaches were most commonly identified in organizations using cloud computing or where staff use personal devices (known as BYOD). According to the survey, 61% of UK organizations use cloud-based services. The figure is higher in banking and finance (74%), IT and communications (81%) and education (75%). Additionally, 45% of businesses have BYOD. This indicates a precarious situation. The majority of businesses hold personal data on users electronically and may be placing users at risk if their IT environments are not adequately protected. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine Hacking Methodology In a recent exposé on LifeHacker, Internet standards expert John Pozadzides revealed multiple methods hackers use to bypass even the most secure passwords. According to John’s revelations, 20% of passwords are simple enough to guess using easily accessible information. But that doesn’t leave the remaining 80% safe. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine. Brute force attacks are one of the easiest methods, but criminals also use increasingly sophisticated phishing campaigns to fool users into handing over their passwords. Users expect organizations to protect their passwords and keep intruders out of their accounts Once a threat actor has access to one password, they can easily gain access to multiple accounts. This is because, according to Mashable, 87% of users aged 18-30 and 81% of users aged 31+ reuse the same passwords across multiple accounts. It’s becoming clear that passwords are no longer enough to keep online accounts secure. Securing Data With Simplicity Users expect organizations to protect their passwords and keep intruders out of their accounts. As a result of a data breach, companies will of course suffer financial losses through fines and remediation costs. Beyond the immediate financial repercussions, however, the reputational damage can be seriously costly. A recent Gemalto study showed that 44% of consumers would leave their bank in the event of a security breach, and 38% would switch to a competitor offering a better service. Simplicity is equally important, however. For example, if it’s not delivered in ecommerce, one in three customers will abandon their purchase – as a recent report by Magnetic North revealed. If a login process is confusing, staff may be tempted to help themselves access the information they need by slipping out of secure habits. They may write their passwords down, share them with other members of staff, and may be more susceptible to social engineering attacks. So how do organizations strike the right balance? For many, Identity and Access Management solutions help to deliver secure access across the entire estate. It’s important though that these enable simplicity for the organization, as well as users. Organizations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so Flexible IAM While IAM is highly recommended, organizations should seek solutions that offer the flexibility to define their own balance between a seamless end-user journey and the need for a high level of identity assurance. organizations’ identity management requirements will change over time. So too will their IT environments. organizations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so. Importantly, the best solutions will be those that enable this flexibility without spending significant time and resource each time adaptations need to be made. Those that do will provide the best return on investment for organizations looking to keep intruders at bay, while enabling users to log in safely and simply.
The Security Industry Association (SIA) looks forward to 2019, and it is apparent that physical security is moving into its most formative years. Changes presented by emerging technology, open systems and growing connectivity among devices and sensors will make a big difference for manufacturers, systems integrators/dealers and end users. With a more open, connected environment come cyber risk and data privacy concerns – which is why, in SIA’s 2019 Security Megatrends, cybersecurity’s impact on the physical security industry ranks number one on the list. Cybersecurity is affecting all areas of the industry landscape, from security implementation to attracting top talent to the workforce. Digital Transformation The digital transformation we are experiencing impacts many other parts of the security industry as well, bringing opportunities like evolving identity management and collecting and delivering big data to customers. At this critical point in the industry’s development, it is important to embrace change, leverage disruptive technology in ways that give companies a competitive advantage. To determine this year’s Megatrends, SIA surveyed hundreds of executives from member companies To determine this year’s Megatrends, SIA surveyed hundreds of executives from member companies, along with current and recent Securing New Ground speakers and attendees, to identify which previous trends were still relevant, which trends were no longer as impactful and which broad trends should be added to our report. This Year’s Security Megatrends 1. Cybersecurity’s Impact on Physical Security: It is important to prioritise cybersecurity for your business, your customers’ business and the vendors with which you work. This trend calls for continual process improvement and investment. 2. Internet of Things (IoT) and the Big Data Effect: The security industry makes use of IoT, analytics, artificial intelligence (AI), robotics and more, and data is coming from everywhere. The industry now faces the challenge of effectively managing and segmenting this information to be pertinent to the user. 3. Cloud Computing: Cloud platforms and applications are becoming prevalent across security solutions. This technology helps security integrators provide managed services and the advantages of off-site systems and services to customers. 4. Workforce Development: With historically low unemployment, finding skilled employees is a challenge to the whole security industry. Security stakeholders need talent with IT, cybersecurity, AI and even privacy expertise, presenting a need to grow students’ interest in the industry. 5. AI: Research firm Gartner predicts a new “democratisation of AI” that will impact more organisations than ever before. Companies are now testing this technology before offering it to customers and exploring how AI data can be used to improve security threat assessment and response. 6. Emphasis on Data Privacy: Growing connectivity brings new concerns over data privacy. Finding the balance between security and convenience is a dilemma the industry must now address. 7. Move to Service Models: The newest home security technologies are strongly impacting installing companies. Systems integrators must find ways to focus on services customers want and need and move to managed service models to make up revenues. 8. Security Integrated in Smart Environments: As everything becomes connected, smart environments will begin to proliferate. Buildings and cities are becoming more conscious, with connected systems now able to automatically respond to and even anticipate the needs of facility users and citizens. We must continue to find ways to make these environments smarter and safer. 9. Identity of the Future: With facial and voice recognition and biometrics growing in popularity and appeal, how will we enter buildings and access networks tomorrow? The industry will anticipate and adapt to constant technological change in identity and visitor management. 10. Impact of Consumer Electronics Companies: The influx of consumer electronics companies and DIY systems means changing rules and players in the security industry. This disruption presents both challenges and opportunities for security companies.
Open Options, based in Addison, Texas, provides a truly open access control architecture that will strengthen the ACRE portfolio and increase the breadth of solutions offered by the global provider of security systems. The acquisition of Open Options is also an opportunity for ACRE to focus on growth opportunities in North America and “balance the scales a bit,” says Joe Grillo, CEO of ACRE, which significantly grew its reach in Europe, the Middle East and Africa with the acquisition of Siemens Security Products in 2015. “Open Options is also a company that's growing, is profitable and fits seamlessly into our vision for the access control space in which we operate,” says Grillo. Independent Operations The strength of Open Options in the Southwest provides significant additional coverage for ACRE in that region of the United States The Open Options brand will continue to operate independently under the ACRE umbrella. Open Options CEO and Founder Steve Fisher will continue in his role as leader of the company, says Grillo. “There is a strong and competent management team in place that will continue to provide leadership going forward.” Open Options’ open-architecture access control solutions will add value to the solutions ACRE already offers under the Vanderbilt brand. In a market that has traditionally been proprietary, the open-platform solution offered by Open Options helps deliver more opportunity to offer customers a full-scale solution based on their needs, says Grillo. In addition, due to its origin as a Texas-based company, the strength of Open Options in the Southwest provides significant additional coverage for ACRE in that region of the United States. Technical And Financial Resources On the other hand, ACRE provides a greater level of technical and financial resources that Open Options can utilize to help them grow even faster. These resources were not as available to the company if it remained independent, Grillo notes. ACRE’s divestiture of Mercury Security in 2017 facilitated this investment. As discussions began earlier this year, ACRE realized the potential of adding to its access control portfolio in the North American market, says Grillo. Open Options and Mercury have been "partners" for 20 years; Mercury provides hardware panels for Open Options systems. Each company will manage and make decisions about their reseller channels independently “The Mercury brand continues to be a strong one, so we're interested in continuing to nurture that relationship, and in fact we have become a larger and stronger partner to Mercury as ACRE,” says Grillo. “After owning Mercury for a number of years, we had the understanding of the company, the product portfolio and the partner relationships that defined it, so we were confident that the deal would be a positive one for the ACRE brand.” Meeting Customer Needs “Open Options and Vanderbilt share some customers already and we can leverage that by gaining more share of their business while providing them with a portfolio that will meet a broader set of customer needs,” says Grillo. “Where possible, we can look for synergies in channel partners that are not currently shared to provide access to both brands. This will be a benefit to Open Options, Vanderbilt and our customer base. However, importantly, each company will manage and make decisions about their reseller channels independently.” Are there more acquisitions on the horizon for ACRE? “We're always looking for opportunities that fit into the nature of our business,” says Grillo. “Companies that have growth potential and share similar go-to-market strategies and visions for the future are of particular interest to ACRE. "We're still operating in a highly fragmented market, so we're going to see continued consolidation in both access control and beyond, which means ACRE will be looking for the right opportunities to follow along that path.”
GSX 2018 is both a new event for the security industry and the continuation of a 63-year tradition. Global Security Exchange (GSX) is the new branding for ASIS International’s annual seminar and exhibits, which have been held since 1955. In recent years, the ASIS event has joined forces with other organizations to expand its scope and to appeal to a broader audience. Partners include ISSA (Information Systems Security Association) and Infragard, a public-private partnership between U.S. businesses and the Federal Bureau of Investigation (FBI). The expansion is continuing this year with the addition of 30 supporting organizations representing industry verticals and reflecting ASIS’s intent to unite the full spectrum of security. Improving The State Of Cyber Security The Cyber Security Summit will co-locate with GSX, offering cyber security programming at a time when it is needed the most Held September 23-27 at the Las Vegas convention Center, GSX 2018 seeks to attract more than 20,000 operational and cyber security professionals and 550 exhibitors. Other elements will further expand the 2018 event’s scope. The Cyber Security Summit will co-locate with GSX, offering cyber security programming at a time when it is needed the most. Top government, industry and academic thought leaders will engage in a dialog to improve the state of cyber security. The 2018 Security Cares Program will address school violence prevention and response in a free education program. Topics will include pre-violence indicators, target hardening, and best practices to involve the entire community of school administrators, law enforcement, security professionals and mental health providers. Experts To Deliver Keynote Speeches Keynote speakers including CNN host Fareed Zakaria will bestow celebrity appeal. Air Force Major General Bradley D. Spacy will share details about the new AFWERX innovation and tech hub in Las Vegas and how the U.S. Air Force is collaborating with the private sector to bring new security product ideas to market. Spacy’s keynote on Sept. 26 will kick off Military and Law Enforcement Appreciation Day. Also, K.T. McFarland, former Trump Administration Deputy National Security Advisor, will share an insider’s perspective on critical foreign policy and defense industries. Attendees to ASIS International’s annual gathering typically list networking and education as big benefits of the event. Historically, the trade show aspect has existed separately from the educational program, and foot traffic to the exhibits has sometimes suffered from the competition. Beginning last year, and continuing in 2018, ASIS International has pursued innovative approaches to integrate the trade show more closely into the overall attendee experience. “The integration of programming and exhibits is truly seamless,” says one observer of the new approach. Held Sept. 23-27 at the Las Vegas convention Center, GSX 2018 seeks to attract more than 20,000 operational and cyber security professionals and 550 exhibitors X Learning Theatres GSX has sought to transform the exhibit hall into a ‘learning lab environment’ that features thousands of security products, technologies and service solutions (provided by the exhibitors), in addition to ‘immersive learning opportunities to connect the current and emerging threat landscape with solutions available in the marketplace’. There are several ‘X Learning Theatres’, including one (‘X-Stage’) focused on leading-edge technologies such as blockchain, cryptocurrencies, AI, drones, and robotics. There is also an ‘Xcelerated Exchange Stage’ to facilitate discussions among security practitioners and solution providers. The ‘Xperience Stage’ showcases case studies and best practices. Also attracting more attendees to the Exhibit Hall will be ‘Career HQ’, a free career fair and enhanced career center. ‘D3 Xperience’ (Drones, Droids Defense) will focus on unmanned systems with education and demos. The ‘Innovative Product Awards (IPAs) Showcase’ will highlight winners of an awards program. Focusing On Security Practices GSX is not as much about sales leads as about making connections and contributing to a larger conversation about how to protect people, facilities and assets ASIS International (now GSX 2018) is often compared to ISC West, the U.S. industry’s largest show held in Las Vegas in the spring. GSX 2018 this year may face even more scrutiny based on the changes, rebranding, and location (also in Las Vegas). However, GSX is a completely different show than ISC West, which focuses on the business of security. In contrast, GSX is much more about the practice of security than business. The international network of ASIS International members attend the yearly conference to make new connections, to learn and to benefit from the experiences of other security professionals around the world. The successful trade show exhibitors are the ones that approach the show with that understanding. GSX is not as much about sales leads as about making connections and contributing to a larger conversation about how to protect people, facilities and assets. ASIS International deserves credit for their efforts to integrate the trade show element into the larger goal of the event. Hopefully their new approach will enhance the overall experience for both attendees and exhibitors – and help to make the world a safer place as a consequence.
When an active assailant strikes, it’s over fast, and most of the damage happens before help arrives. Responding appropriately can save lives, and it takes training and practice to know what to do as a tragedy unfolds: Where can I hide? Can I get out? Where do I run? If you hear shots or see someone with a knife, your training empowers the best response, and thorough and repetitive training avoids being paralyzed by panic. Standards On Workplace Violence ASIS International is a member of ANSI and an accredited standards developer ASIS International has been working for more than a year on a document to enable security professionals to develop an effective approach for prevention, intervention, response and recovery to an active assailant, whether he or she is acting alone or as part of a group. The Active Assailant Supplement is an annex to the ANSI Standard on Workplace Violence and Intervention; it is being developed as part of the current revision to the standard. ASIS International is a member of ANSI (American National Standards Institute) and an accredited standards developer. Security practitioners use the ANSI standard to develop their own processes, procedures and documentation related to workplace violence. The ANSI standard on workplace violence was created 10 years ago and already has been revised once. In that time, the standard has been quoted extensively and adopted and utilized by many corporations and security practitioners. Leading creation of the Active Assailant Supplement is Michael Crane, Security Consultant and Attorney at Securisks, and chair of the ASIS International Active Assailant Working Group. There are 17 individuals on the drafting committee on active assailants, each with their own specific areas of expertise, from big corporations, to psychologists, to the government. The committee will create a draft, which will be submitted to the technical committee (150 or so people) for review and comment. The ANSI standard on workplace violence has been quoted extensively and adopted and utilised by many corporations and security practitioners Active Assailant Supplement Elements Prevention - A key to preventing active assailant incidents is awareness, such as identifying behaviors that suggest a potential for violence. In addition to recognizing troubled behaviors, companies should have policies and procedures in place to report concerns to supervisors, and then policies to follow up. Intervention - Training equips companies to react effectively in the case of an active assailant attack. Repetition and practice ensure an appropriate reaction, and inform decisions about where to hide, the nearest exits, etc. Employees might hide in a washroom or a conference room that locks, or they might use furniture to block the door. Response - It also takes training for employees to understand what happens when first responders arrive. Private security and employees have specific roles when first responders show up. Recovery - After the incident, other issues include cleanup, providing a gathering place for employees and family members, and counseling. Addressing School Violence The workplace violence prevention plans in the Federal government are right in sync with private industry"Crane was an assistant state’s attorney in Chicago before going into private practice. He has also served as general counsel and vice president for security companies and combines law and security expertise to protect companies from liability. Crane has written and provided training on the topic of workplace violence prevention for many years for ASIS International and was among the first members of the Standards and Guidelines Commission in 2000. Although school violence is not addressed specifically in the Active Assailant Supplement, the protocols covered in the document apply to schools as well as other sites such as governments. “The workplace violence prevention plans in the Federal government are right in sync with private industry,” says Crane. “They are almost identical.” Workplace Violence At GSX 2018 Workplace violence, including active assailants, will be among the issues addressed at the upcoming GSX 2018 in Las Vegas. Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show, attended by more than 22,000 security professionals from 100-plus countries. There will be sessions addressing workplace violence and interest group discussions on a range of topics.
Integrity Security Group is using SmartTask’s SmartForms to gain added visibility and dramatically cut down on its administrative burden. Having adopted the employee scheduling and mobile workforce management software last year for the provision of proof of attendance, control room management and staff rostering, the company is now using its electronic data capture functionality to streamline a range of operational processes. Initially, SmartForms are being used for vacant property and mobile patrol inspections as well as daily vehicle checks, already saving more than 15 hours of admin a month. SmartTask SmartForms The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team “We are now using the SmartTask SmartForms to help reduce administration, capture critical work data and enforce health and safety procedures,” explains James Chittil, General Manager at Integrity Security Group. “We are constantly looking at clever ways to take advantage of the software’s rich functionality, so we can continue to simplify and enhance the way we operate.” The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team. All reporting for vacant property and mobile patrol inspections – for both scheduled patrols and alarm activations – are now completed using a SmartTask-enabled smartphone. By electronically capturing all relevant information, including photo evidence, Integrity can quickly provide customers with a status update and details of all undertaken work as well as respond to any identified issues. Vehicle Checks And Fleet Management Meanwhile, daily vehicle checks for Integrity’s fleet of vans are now completed using a specially-developed SmartForm, so the company can instantly see if drivers are complying with this health and safety procedure. Any vehicle-related problems or damage can be raised by the driver and actioned immediately by the admin team to mitigate fleet risk. Mileage data is also captured through the software, enabling maintenance requirements to be tracked and scheduled at appropriate intervals. “The SmartForms are enabling us to dramatically reduce paperwork and remove manual processes. This is making it much simpler for both our security officers in the field and our office-based admin team to capture, collate and communicate essential operational data. This is not only helping us make better use of our valuable resources, but also enhance the service we are providing to customers,” added James Chittil. Paul Ridden, CEO of SmartTask commented: “Our experience within the security sector means we are continually developing new functionality that overcome real-world problems for our customers. This is the reason we are working in partnership with a growing number of security businesses who recognize the value they can gain and the benefits they can achieve from using the SmartTask software.” Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff Lone Worker Protection Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff as part of its commitment to lone worker protection. The company is also using the intelligent rostering functionality to streamline internal planning processes, while the interactive dashboard supported the launch of a dedicated, out-of-hours control room operation by providing a live view of all scheduled shifts and expected or missed check calls. SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
Following the recent successful installation of 360 Vision Technology’s new Invictus ruggedized PTZ camera by a north London borough, the same borough has now rolled-out over 100 Invictus cameras across seven Greater London towns. With an early success in prosecuting serious crime following the deployment of Invictus, its highly effective night-time HD quality color video footage proved to be just one of the useful attributes of the UK manufactured camera, when a recent significant impact by a vehicle to a camera column tested its suitability for roadside deployment. The Invictus camera took the high-speed impact in its stride and showcased its ‘Attack Detect’ feature, automatically resetting to the last viewing position prior to being forcibly moved from its previous viewing direction, and with no damage to the camera or its direct drive PTZ mechanism. Based on our experience, 360 Vision’s Invictus camera was the obvious choice for us to recommend to this important Local Authority customer" Importance Of Ruggedized Cameras Commenting on the broader roll-out of Invictus cameras, DSSL Group’s Works Director, Aaron Stephens, who specified the 360 Vision Technology cameras confirmed: “The importance of selecting a product that is ‘fit for purpose’ when being deployed roadside in a town center is often overlooked by some companies, who deploy non-ruggedized cameras purely on the basis of cost. If a PTZ camera were to fall from height following an impact, which is a real risk, there would be a substantial public health and safety incident. “At DSSL, we take a holistic view to consider the surveillance needs at each individual location, to ensure that all aspects of camera deployment are taken in to consideration. Based on our experience, 360 Vision’s Invictus camera was the obvious choice for us to recommend to this important Local Authority customer.” The expanded installation takes the total number of Invictus cameras to over 100; and allied to wireless links forming a major part of the system’s infrastructure, comment has been made regarding the superb quality of the Invictus camera video over wireless infrastructure. Simplified Surveillance Operation Our close technical partnership with 360 Vision Technology has enabled deep systems integration and control of the Invictus cameras"In a market often dominated by imported Far East products, the integration of Genetec Security Center and high-performance Invictus PTZ cameras has proven the effectiveness of two Commonwealth technology providers. Commenting on the camera/control technology collaboration, Genetec Country Manager, Paul Dodds said: “Our close technical partnership with 360 Vision Technology has enabled deep systems integration and control of the Invictus cameras. Genetec Security Center unified platform and Omnicast video surveillance has been used to seamlessly blend full Invictus camera menu control, within a single intuitive interface. 360 Vision cameras are a Genetec certified product on our supported device list. This successful deep integration has simplified the London borough’s surveillance operation and effective management. We value all of our technology partnerships, and especially with manufacturers such as 360 Vision Technology, who offer reliability with their Invictus PTZ cameras, as illustrated here across seven north London towns.” Reducing Carbon Footprint With a focus on reducing carbon footprint, we are continually working towards reductions in camera power consumption"Adrian Kirk, Strategic Account Director at 360 Vision commented on the green credentials of Invictus, which was a factor in the overall decision by DSSL to specify the camera: “With a focus on reducing carbon footprint, we are continually working towards reductions in camera power consumption. “On larger projects like this, the savings on energy and reduction in associated pollution offers significant advantages over Far East camera alternatives, helping Local Authority end-user system operators to meet their carbon footprint reduction goals. “With a host of performance and user centric operational benefits, Invictus is well placed to feature extensively in future Local Authority upgrades, as customers look at total cost of ownership and the need to ensure CCTV equipment deployed road side is fit for purpose.”
Comprising a large tertiary and secondary hospital, along with three rural hospitals, Waikato DHB is a substantial healthcare operator which employs approximately 6,000 staff throughout the region. With security needs that include protecting staff from verbal and physical abuse, safely securing high-dependency patients in dementia wards, restricting unauthorized access to medication and medical equipment, and protecting high-risk facilities such as newborn intensive care units, Waikato DHB required security systems that could be applied to both high and low security areas and found the solution in Gallagher’s range of innovative security products. Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. Controlling Access Areas Within Hospital Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly"Gallagher’s access control system and Command Centre central management platform provide Waikato DHB with control over access in and out of areas within the hospital. With access profiles that change on a daily basis, as medical staff – predominantly nurses – move between different departments on different days, it’s vital that the system can be updated simply and efficiently. “Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly, ensuring that staff can approach doors with the confidence that they can enter or leave areas as necessary,” said David Wilson, Manager of Security and Parking for Waikato DHB. The safe and secure storage of medication and medical equipment, ranging from syringes and surgical tools, to large expensive machinery, is a legal requirement of all hospitals in New Zealand. Single Access Card System Gallagher’s access control solution forms a part of the security system that delivers this for Waikato DHB facilities. Utilizing a single accesscard system where permissions can be set to allow different access ensures the efficient movement of staff, reduces the risks associated with handling keys, and provides a comprehensive audit trail that identifies access movements by employee. Utilizing a single access card system where permissions can be set to allow different access ensures the efficient movement of staff Waikato DHB is proud to put people at the center of what they do, and strives to ensure staff and patient safety at all times. A number of Waikato DHB’s wards require high-level security either for the protection of the patients – as in the case of dementia facilities – or staff. Duress buttons located throughout the hospital and its high-risk areas automatically notify security staff of the exact location where a duress alarm has been activated. Lock-Down System Gallagher’s Command Centre Mobile application delivers these duress notifications directly to a guard’s mobile device – speeding up the delivery of urgent information directly to security personnel. The ability to lock-down areas of the hospital for safety reasons is paramount. “Command Centre gives us the ability to isolate areas and restrict access. This is a critical requirement for us and the reliability of that lock-down system is hugely important,” said Wilson. With so many visitors and staff coming and going from the hospital, carpark management is an important aspect of facilities administration for Waikato DHB. In choosing a solution, the DHB selected Gallagher’s Carkpark Management system - an optional license feature. Streamlined Parking Processes Through an integration with Gallagher’s Command Centre security management software, staff are able to badge their access card at one of the many staff and public carparks on site, and have their parking fee deducted from their pre-paid account. The program has in-built intelligence including the ability for staff to exit and re-enter during a set period without being rechargedThe program has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged. This system has streamlined parking processes, particularly for part-time and shift-work staff who have irregular parking requirements. According to Wilson, “One of the real strengths of this system is the reporting. By managing the pre-paid carpark system through Command Centre and linking it to staff access cards, we are able to effortlessly extract detailed reports.” Electronic Tag Boards Waikato DHB’s facilities are continually expanding and this means a large number of contractors may be present on site within a 24 hour period. By utilizing another Gallagher license feature - electronic Tag Boards - contractors can easily sign on and off of the site. A key driver for this was health and safety, “It’s really important for us to know who is on site in case of an emergency,” said Wilson. “Making this process as simple as possible for contractors is the best way to ensure it is used.” A number of other system integrations appear across the site, including CCTV. Waikato DHB’s largest hospital facility, Waikato Hospital, has over 250 CCTV cameras connected to Gallagher’s Command Centre platform. As Waikato DHB’s requirements continue to evolve, Gallagher’s systems expand alongside them. Security Ward Standard The Security Ward Standard details the minimum security equipment required for new buildings, including access control, duress alarms, and camerasTo remain at the forefront of technology, Waikato DHB has a software maintenance agreement with Gallagher, to ensure they operate the very latest software available. “Any advancement in technology will make life easier, that’s a straightforward investment for us,” said Wilson. Through Waikato DHB’s experience with Gallagher products, the team developed a ‘Security Ward Standard’. This standard details the minimum security equipment required for new buildings, including access control, duress alarms, and cameras. The Security Ward Standard has greatly reduced the time involved by Waikato DHB staff in producing specification documents and gathering approvals. “Gallagher gives us a complete and total security package that is expandable and easy to manage,” said Wilson. “We are confident that a high-standard of security is being consistently applied across our sites for the safety of our staff, patients, and visitors.”
Technology company Nedap has provided physical access control and long-range readers for vehicle identification at the new AZ Zeno medical care center in Knokke-Heist (Belgium). AZ Zeno, which opened in April 2018, consists of a hospital with rehabilitation center, an outpatient clinic, auditoria, public event space and a heliport. Nedap Identification System and Nedap Security Management have worked together on this extensive project. It is AZ Zeno’s highest priority to guarantee the security of patients and employees. With Nedap’s TRANSIT long-range identification readers, emergency vehicles get swift access to the hospital’s premises. Physical Access Control AZ Zeno combines functionality and sustainability and respects the rural character of the local landscapeWith AEOS, Nedap provides the medical care center with a complete solution for physical access control, and the system will also be used to manage staff lockers. By combining Nedap’s solutions, AZ Zeno is able to offer both patients and employees the best possible security and accessibility. AZ Zeno combines functionality and sustainability and respects the rural character of the local landscape. The link between inside and outside and between medical facilities and public spaces is almost seamless. And the center’s sustainable design focusses on its surroundings, ecological energy and the use of reclaimed materials. Better Accessibility Nedap-CEO Ruben Wegman: “We are proud that two of our business units contribute to the security of this exceptional and innovative center and to a better accessibility for its users. The simultaneous implementation of AEOS and TRANSIT is a great example of the complementary character of Nedap’s products.” To implement the system, Nedap collaborated with partner Electro Enterprise Gullegem.
Maxxess eFusion technology is being used to provide seamless integration and easy management of security, safety and site management systems at Bluewaters Island, Dubai. Maxxess eFusion Technology The region’s newest tourism hotspot, Bluewaters opened in November 2018 and is expected to attract more than 3 million visitors every year. The US$ 1.6bn project was completed by Meraas Holdings over five years and comprises four luxury residential complexes, a landmark Caesars Palace hotel, a shopping mall and the world’s largest observation wheel, Ain Dubai, as its centerpiece. Security And Safety Integration Bluewaters’ management wanted to find the most efficient way to integrate all security, safety and building management functions into one easy operating system Bluewaters’ management wanted to find the most efficient way to integrate all security, safety and building management functions into one easy operating system, with particular emphasis on a solution that would be efficient to use, inexpensive to maintain and robust going forwards Following a sector comparison, Maxxess eFusion technology was identified as providing the best fit. Security Management Platform The eFusion security management platform was chosen instead of a more costly or complex conventional PSIM solution, because it uses versatile, open-technology software. Omnix International, one of the leading integrators brought in for the project, says eFusion proved particularly straightforward to work with, offering the advantages of a modular, building block approach and allowing maximum freedom to integrate, customize and adapt to future needs. “Thanks to its compatibility with leading surveillance, intruder, access and fire detection systems, eFusion proved to be a highly efficient integration technology for the Bluewater project,” says Mr. Henry Azoury, Senior Security Design and Engineering Manager at Omnix International. ASSA ABLOY Hospitality System The eFusion platform at Bluewaters includes full integration with an ASSA ABLOY Hospitality system The eFusion platform at Bluewaters includes full integration with an ASSA ABLOY Hospitality system. It allows a unified system approach, with a single enrolment protocol for both front- and back-of-house access. The solution enables centralized management of room safes, mini-bars and cupboards, and for control of all alarm transactions. eFusion integration with the Zenitel Stantaphone IP Intercom System ensures that video and transaction data is called-up automatically in the Bluewaters control room as soon as any user press a call button. For maximum efficiency, the system allows the operator to unlock doors and communicate with the user remotely, with full activity logs kept for audit. With easy integration to the SeeTec Video Management System, eFusion also allows seamless control of all cameras. In addition, cameras are linked to the door access system, with video pop-up triggered by pre-defined events. The solution also gives the operators complete PTZ control, playback and video functionality. ID badging Integration ID badging and building management systems are also fully integrated, allowing easy operation and control of a wide range of functions including heating, ventilation and air conditioning. The eFusion platform is based on technology that delivers robust, reliable performance" “For maximum efficiency there is no need to switch between different management systems and the eFusion platform is easy to work with, allowing full benefit from integration with individual systems,” says Lee Copland, Managing Director EMEA, Maxxess. eFusion At Intersec 2019 “The eFusion platform is based on technology that delivers robust, reliable performance, as well as being fully scalable as needs change the future. We look forward to our continued work with Omnix International, which is providing the world-class specialist engineering services combined with local, customized support that customers value.” To see Maxxess solutions in action come to Intersec 2019 on stand SA-H12.
The University of Birmingham educates over 30,000 students, with more than 6,000 doors providing access to student accommodation. Gallagher’s integrated access control solution is responsible for providing operational continuity and creating a safe and secure environment for students. Access Management System The University recently completed its new state-of-the-art student accommodation development, Chamberlain, which consists of a 19-storey tower and three low-rise blocks. An essential requirement was an integrated access control system, reducing the need for keys. Timothy Owen, General Manager of Student Accommodation at the University says, “We wanted to move away from using keys as students are prone to losing them and trying to manage thousands of locks and associated keys was a constant administration and financial drain.” We need to maintain control over access to our buildings, while ensuring a duty of care to our residents and staff" In order to minimise the complexity of managing a new system, the University required a solution that integrated with, or was an extension of, their existing campus access control and accommodation management systems. “We need to maintain control over access to our buildings, while ensuring a duty of care to our residents and staff so that they can go about their business as required,” says Timothy. “Fundamentally, we needed a system that gives both us and our resident’s confidence in the security of the accommodation.” Adaptable Access Solutions A large and complex estate with buildings of different construction and age, the University needed a solution that was flexible enough to accommodate their unique requirements. Gallagher Command Centre, together with the Aperio® wireless locking technology by ASSA ABLOY Access Control, was selected as the University’s preferred choice, meeting their security needs in a cost-effective way while still delivering to the overall specification. Timothy says, “The completion of our new state of the art Chamberlain development was extremely close to the date of the first student arrival, so the team had to be dedicated and work flexibly to ensure it was ready in time – which it was.” Improved Student Experience The Gallagher Command Centre integration allows for the access key and student ID to be combined in to one card, offering a number of benefits to both students and staff. The student ID and accommodation key is encoded on to one card, so it can be posted out in advance and access to the room automatically granted" Previously the accommodation arrival process required students to arrive at the University with their contracts and queue up so that a member of staff could sign them in manually and hand them the keys to their accommodation. From there students could head to their room. “Arrivals is always a busy time but with the help of the Gallagher solution we’ve not only improved the student experience but also the administration process,” says Timothy. “Now the student ID and accommodation key is encoded on to one card, so it can be posted out in advance and access to the room automatically granted via the accommodation management system. Students no longer need to queue for keys, can get to their rooms instantly, and spend more time enjoying their arrival experience.” Monitoring Access Cards The simple act of swiping an access card automatically checks the student in and a report can be generated to show who has arrived and who hasn’t, allowing staff to follow up accordingly. If the room is no longer required it can be quickly and easily re-allocated to another student, resulting in improved occupancy rates. Using Gallagher Command Centre together with the University’s accommodation management system allows staff to check on the well-being of students by monitoring the use of their access card. The University also houses students under the age of 18, and one of the safeguarding requirements is that the University can monitor their whereabouts on a daily basis. Timothy adds, “This can be difficult to achieve with many students to track, but Gallagher Command Centre can easily confirm the time and location of our resident’s last door access, providing peace of mind that students who may be uncontactable are in fact on site.” Replacing keys with a combined access and student ID card has reduced our operational costs" Creating Business Value University staff are also seeing positive improvements since the installation of the new system – particularly at the start of the year. The arrivals process is now less congested and more relaxed. The team have far fewer issues than with physical keys, enabling them to spend more time on the overall student experience. Since the installation of the first 800 bedrooms at Chamberlain, the University has already extended the system by a further 900 at Mason, with plans in place for an additional 1500 bedrooms this summer. Enduring Partnerships “Replacing keys with a combined access and student ID card has reduced our operational costs as we now have far fewer keys to purchase and store,” explains Timothy. “The student experience has improved, and staff are now free to deal with urgent matters and offer a more personal service. We can easily create reports to help us audit access and have generally provided a much more modern and secure place to live and work.” “The University has worked with 2020 Vision Systems for some time on CCTV and access control systems, so when they won the tender to provide and install the Gallagher and Aperio® systems we had every confidence that they would be able to deliver. The completion of our new state of the art Chamberlain development was extremely close to the date of the first student occupation and so the team had to be dedicated and work flexibly to ensure it was ready in time – which it was.”