DigiCert, Inc., the provider of TLS/SSL, IoT and PKI solutions, announces that private equity firms Clearlake Capital Group, L.P. (‘Clearlake’) and TA Associates have completed their previously announced investment in DigiCert. Terms of the deal are not being disclosed. “DigiCert is excited to work with Clearlake and TA Associates as our new lead investors, and to continue our leadership in providing the best TLS/SSL products and solutions, focused on improving and automating...
Johnson Controls is introducing the Ethos line of multi-tech contactless access readers from WaveLynx Technologies. Ethos readers are equipped with a choice of credential technologies, enabling customers to choose migration paths to deploy secure credentials. WaveLynx Ethos multi-tech contactless access readers feature a modern aesthetic and state-of-the-art feature set. All Ethos readers are capable of reading legacy Proximity credentials, MIFARE DESFire® smart card credentials, LEAF enabl...
The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to...
The Security Industry Association (SIA) announces the 2019 keynote and featured speakers for Securing New Ground (SNG), the security industry’s annual executive conference taking place at the Grand Hyatt New York in Manhattan October 29-30. SNG 2019 will feature keynote remarks from Dr. Steven T. Hunt, chief expert for work and technology at SAP; George Oliver, chairman and CEO of Johnson Controls; and Gary Shapiro, president and CEO of the Consumer Technology Association (CTA). Signific...
In the wake of recent allegations that ATM locks worldwide are vulnerable to new side-channel attacks, Sargent and Greenleaf (S&G), a manufacturer of high-quality electronic ATM locks, recently conducted vulnerability testing to provide insight and identify ways ATM owners and operators can protect their machines against side-channel attacks. Side-channel attacks, which can exploit internal components of electronic locks, first emerged in 2015 and continue to plague electronic lock users to...
The retail industry is constantly evolving, with a fast-paced environment that requires retailers to quickly respond to changes in the market, while delivering a consistent service that inspires customer loyalty – all in a bid to maintain healthy margins and revenue in what is an increasingly competitive landscape. Helping retailers to drive efficiency and capitalize on new labeling innovations, Checkpoint Systems’ source tagging program, which celebrates more than 25 years since it...
PSA, the consortium of professional systems integrators, announces the addition of Seagate Recovery Services to the partners in its Managed Security Service Provider (MSSP) program. The MSSP program is designed to help systems integrators diversify their service offerings and realize the full potential and benefits of a managed services business model. Data recovery services “Seagate Recovery Services is a wonderful addition to our vendor line up as the Seagate Rescue product accounts for the data recovery services that are so necessary to the success of any managed services program,” said Dan Dunkel, managing director of PSA’s MSSP program. “The reality is, twenty-five percent of PC users lose data annually, so Rescue is a product everyone needs to help avoid negative ramifications.” With Seagate Rescue, businesses get their critical data back as soon as possible without having to recreate it. The user simply sends the hard drive to Seagate Recovery Services and their team performs data recovery services on the drive in a secure, clean lab. Cloud-Based cybersecurity solutions The recovered data is then encrypted on a new drive and sent back to the user. “PSA customers understand the value of what they store on their systems. We are excited that Rescue Data Recovery Service Plans will offer an extra level of protection for their data,” said Paul Steele, general manager of Seagate Recovery Services. PSA’s MSSP program will hinge on uniting partners in cybersecurity and cloud-based security solutions, offering training and certification opportunities and financing options with assistance from PSA.
Cobalt Iron Inc., a provider of SaaS-based enterprise data protection, announces Cobalt Iron Compass™, the new name for its flagship SaaS-based enterprise data protection platform. The new name signifies the immediate insights and guidance the company delivers to its customers. With the renaming, Cobalt Iron kicks off a new phase of growth for the company and a new level of innovation for the platform. Previously known as Adaptive Data Protection, Compass is the full software stack of Cobalt Iron technologies that allows enterprise data managers to save time and money while increasing their data protection and performance. Analytics-Driven data management capabilities Cobalt Iron has delivered significant improvements to the platform, grown its high-performing team With this proven platform, data custodians can implement the right solution to fit their unique business needs, and they have access to a range of analytics-driven data management capabilities through a unified web user experience. Renaming its flagship platform is the first step in a series of updates from Cobalt Iron as the company continues expanding its capabilities. In the past 12 months, Cobalt Iron has delivered significant improvements to the platform, grown its high-performing team, and taken on strategic partnerships that have allowed it to deliver increased value to the enterprise data protection market. The components of the platform remain the same. Today, Compass includes four product components: Commander, Analytics Engine, Accelerators, and Accelerator Operating System. Enhanced cloud platform and application protection In the next 12 months, Cobalt Iron will roll out version enhancements and accelerate company growth to meet market demands and exceed customer expectations. The next version of Compass will contain new capabilities such as enterprise search, which will enable users to perform centralized searches and identify where objects exist across the enterprise. These enhancements will deliver improved technology features for VMware, Hyper-V, and cloud providers This new release will also have enhanced virtual environment support as well as enhanced cloud platform and application protection. These enhancements will deliver improved technology features for VMware, Hyper-V, and cloud providers. Cobalt Iron will also expand the Compass technology integrations with a wider portfolio of data protection features and functions to help customers make better use of their investments. Simplified migration experience Finally, users will see a simplified migration experience that reduces the timeline and complexity of data migration and fully enables them to decommission their legacy backup systems and infrastructure. "Cobalt Iron provides Compass as the way to navigate through the complexity of data backup and recovery while meeting all the business outcomes the enterprise requires," said Andy Hurt, chief marketing officer of Cobalt Iron. "Defining our platform with the name 'Compass' marks a milestone for us as a company and as a technology leader in the industry. The name reflects our commitment to empowering companies to improve their data protection outcomes. What is more empowering than a tool that points you in the right direction?"
Allied Universal, a security and facility services company in North America, announces the appointment of Caress Kennedy as a member of The Committee of 200 (C200) - a prestigious network of top-level women entrepreneurs and corporate innovators. “We are delighted that Caress Kennedy was selected to be a member of the elite C200,” said Steve Jones, CEO, Allied Universal. "Caress is an extraordinary leader who brings valuable hands-on experience and innovative ideas for the security services sector." Invitation-Only membership organization Established in 1982, The Committee of 200 (C200) is an invitation-only membership organization of the world’s most successful businesswomen. The organization includes more than 500 of the world’s top women leaders, ranging from the C-suite of the world’s best-known companies to trailblazing entrepreneurs. “I am very excited to be appointed as a member of C200 and look forward to working with fellow members to further C200’s mission to celebrate, foster and advance women’s leadership in business,” said Caress Kennedy, Regional President, Northeast Region, Allied Universal.
Luxriot Video Management System (VMS) software was introduced to the market in 2005. To get its market share Luxriot used various critical USPs; something that is not offered or claimed by any other competitive products. Quality, stability and set of features can't be called USPs, as these are mandatory and market driven aspects of any product. What is so unique about this Enterprise Edition? Even though customers only pay the standard fixed fees, they can obtain a license that sets no software limitations on the number of channels they could use on the server (of course, hardware limitations apply). Complete surveillance ecosystem solution One might say – everyone claims superior support! How is Luxriot’s different? It's easy to explain. Luxriot’s technical support is easy to reach and swift in response, where its availability is not related to the package purchased. Luxriot provides detailed support to all its partners and provides top level business relation flexibility. All customers are always VIP for Luxriot. The Unlimited Edition holds the same advantages found in the Luxriot VMS Enterprise Luxriot Evo S offers the modern and feature-packed analog of the Luxriot VMS. The Unlimited Edition holds the same advantages found in the Luxriot VMS Enterprise. Armed with 64-bit performance, the software maximizes hardware utilization at full specs. And the Luxriot Evo Global, an enterprise-level version of the software, offers a complete surveillance ecosystem solution with an intelligent central server governance hierarchy for organizations of any scale, even when distributed across multiple sites. Stand-Alone server solution Luxriot’s stand-alone server solution still offers Enterprise Edition with no software limitations on number of channels per server. But what is more important, is that they hold on to their motto: video surveillance solution is not only about top performing product, but also about superior customer service. As market share of Luxriot in Asia is constantly growing, it is critical for them to be able to maintain the same level of service that helped them to succeed. Due to this, they are proud to announce the launch of Luxriot's new office in Shenzhen, China; that will be responsible for APAC region. Ensuring their worldwide customers and partners will be able to enjoy the same superior customer support that Luxriot is proud to provide.
Interlogix, a division of UTC Climate, Controls & Security, announces a plan to dismantle its businesses in the United States and Canada by the end of the year. Here is a statement from the company: “After a thorough portfolio review of our security business, we have communicated our plans to wind down our Interlogix U.S. and Canada businesses. This decision will allow us to focus on the significant growth opportunities for our other fire and security businesses, including LenelS2.” Fire detection and life safety Dealers can continue to purchase, install, register, and service Interlogix products with complete confidence" Interlogix products will be manufactured and orders fulfilled through 2019 and will be available for purchase from distributors and dealers during ‘a well-coordinated transition period,’ according to the company. “We will continue to provide customer support related to product technical services, timely fulfillment and comprehensive product warranty into 2020 and beyond,” says the company statement “Dealers can continue to purchase, install, register, and service Interlogix products with complete confidence.” Interlogix represents a full product line including intrusion detection, video surveillance, fire detection and life safety, access control and security/fire data transmission products. Enhanced video streaming capabilities Interlogix was created in the merger in 2000 of ITI Technologies and SLC Technologies. It was purchased by General Electric in 2002 and later renamed GE Security. United Technologies Corp. (UTC) bought the security business of General Electric in 2010 and reverted back to using the Interlogix brand. Last year, Interlogix introduced TruVision Navigator version 8.0 of its unified security software Last year, Interlogix introduced TruVision Navigator version 8.0 of its popular unified security software, including enhanced video streaming capabilities, integration with the Interlogix UltraSync Modular Hub systems and tighter integration with IFS networking switches. Voice-Controlled digital devices Early this year, Interlogix reinvested in its UL-listed, professional-grade, security panel lineup and added two touchscreen controls. In addition, it began providing access to more device integrations – such as sensors, lights, locks, thermostats and garage door controls, video doorbell cameras and voice-controlled digital devices, among others. In the spring, the company re-launched its Interlogix Security Pro program, a national channel partner program offering Interlogix dealers an array of resources and incentives designed to help them successfully grow their businesses.
Cobalt Iron Inc., a provider of SaaS-based enterprise data protection, announces the appointment of Rodney Foreman to the newly created position of chief revenue officer. In this role, Foreman will be responsible for all sales initiatives for the company, including direct and indirect sales channels. "Cobalt Iron has an outstanding reputation in the market for providing customer solutions that deliver exceptional ROI and performance. We added the chief revenue officer position so we can become more agile and better leverage the channel and top industry partners to extend our market reach, which means we can solve data protection challenges for more customers," said Richard Spurlock, CEO and founder of Cobalt Iron. Creating high-Performance sales organizations "Rodney is known in the software industry as a leader that drives transformation within software companies in order to deliver results, capture market share, and win new customers. He develops growth strategies and operational processes and empowers people to drive the business and grow revenue with a focus on customer success," Spurlock continued. Foreman has a global software sales and product management background "His remarkable track record and reputation for creating high-performance sales organizations and innovative channel programs will serve us well as we expand our sales organization." Foreman has a global software sales and product management background. He spent 16 years as an executive at IBM, where he drew on his extensive experience and success in the data management and data protection markets. Automated and intelligent solution After that, he led the design, development, and implementation of channel and midmarket sales programs as senior vice president at Informatica, and then he built a multitier global channel program as vice president of global channel sales at Nutanix. "I am thrilled to join Cobalt Iron at this exciting time. Cobalt Iron has a clear strategy and solid momentum and is challenging the industry to think differently about data protection," Foreman said. "I look forward to working with our teams globally to advance Cobalt Iron's mission of transforming how businesses manage their data with an automated and intelligent solution. We will enhance our customers' experiences as we deliver value and drive business outcomes with our trusted partners." Foreman will report to Spurlock.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasize to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government center or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organization can move their line of defense away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalize their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organizations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organizations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using Smartphone Apps To Open Doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognize people and use deep learning analytics to customize their office environment, the workplace is undergoing dramatic change. Improved Fingerprint Solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defense and other public section use cases where higher security is needed. Flexible Subscription Models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimization solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating Valuable Insights With Machine Learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focused on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organizations incorporate this type of analytics engine into their access control systems, they will improve security and personalize the user experience while driving better business decisions.
Hikvision and Dahua have been added to a U.S. government list of entities “reasonably believed to be involved, or to pose significant risk of being or becoming involved, in activities contrary to the national security or foreign policy interests of the United States.” In effect, inclusion on the list restricts the export of equipment to the two companies because of their alleged involvement in “human rights violations and abuses” related to a Chinese government campaign of repression, mass arbitrary detention, and high-technology surveillance against minority groups. Equipment from the two companies is used to provide video surveillance capabilities in the Xinjiang Uighur Autonomous Region (XUAR) of China. The minority groups targeted are Uighurs, Kazakhs and other Muslim minorities. Equipment from the two companies is used to provide video surveillance capabilities in the Xinjiang Uighur Autonomous Region (XUAR) of China The decision to add Hikvision and Dahua, among 26 other “entities,” to the list was made by the United States End-User Review Committee (ERC), composed of representatives of the Departments of Commerce, State, Defense, Energy and (where appropriate) Treasury. A majority vote of the panel is required to add an entity to the list, and a unanimous vote is required to remove or modify an entity. The 26 other entities include the Chinese government’s bureau in XUAR, 18 subordinate municipal and county public security bureaus and one other subordinate institute. Specific licenses (government approval) are required for any transaction in which items are exported, reexported, or transferred (in country) to any of the entities on the list; or in which the entities act as purchaser, consignee or end user. Loosely speaking, inclusion on the list prevents Hikvision and/or Dahua from buying any component parts from U.S. manufacturers. Indirectly and more broadly speaking, the measure affords a new downside to the Dahua and Hikvision brands in the U.S. market. Anyone concerned about human rights abuses might hesitate to buy from the two companies, although the entity list does nothing to prohibit sales of the company’s products. Dahua and Hikvision statements In a company statement, Dahua has “express[ed] strong protest to such decision, which lacks any factual basis, and call[ed] on the U.S. government to reconsider on it.”’ Indirectly and more broadly speaking, the measure affords a new downside to the Dahua and Hikvision brands in the U.S. marketThe Dahua statement continues: “As a global business entity, Dahua adheres to the business code of conduct, and follows market rules as well as international rules. Dahua is actively working to ensure our investment and business operations around the world comply with all applicable laws and regulations. Regarding the decision of U.S. government, we have actively taken various measures, and we will continue providing outstanding products and services to our customers.” Hikvision has released the following statement: “Hikvision strongly opposes [the] decision by the U.S. Government and it will hamper efforts by global companies to improve human rights around the world. Hikvision, as the security industry’s global leader, respects human rights and takes our responsibility to protect people in the U.S. and the world seriously. Anyone concerned about human rights abuses might hesitate to buy from the two companies "Hikvision has been engaging with Administration officials over the past 12 months to clarify misunderstandings about the company and address their concerns. In January 2019, Hikvision retained human rights expert and former U.S. Ambassador Pierre-Richard Prosper to advise the company on human rights compliance. Punishing Hikvision, despite these engagements, will deter global companies from communicating with the U.S. Government, hurt Hikvision’s U.S. businesses partners and negatively impact the U.S. economy.” “The U.S. Government and Department of Commerce cannot and will not tolerate the brutal suppression of ethnic minorities within China,” said Secretary of Commerce Wilbur Ross in making the announcement. “This action will ensure that our technologies, fostered in an environment of individual liberty and free enterprise, are not used to repress defenseless minority populations.”
ADT Commercial has grown organically in double digits since 2016, in addition to growing through 15 acquisitions completed since the merger of ADT and Protection One. Acquisition of integrator companies such as Red Hawk Fire and Security and Aronson Security Group has expanded ADT Commercial’s presence geographically to more areas of the country. Most of the employees of the acquired companies have stayed with ADT and “helped to create a corporate culture and a good place for employees to work,” says Dan Bresingham, Executive Vice President of ADT Commercial. Happy employees ensure good customer service. Enterprise resource planning Bresingham will lead ADT Commercial as it becomes a separate business unit in 2020 “We adapt to where our clients want us to be,” adds Joe Sanchez, Senior Vice President of Customer Operations of ADT Commercial National Accounts. “We take a strategic approach as we determine how adaptive our customers are going to be to the new technology.” I caught up with ADT Commercial at the GSX trade show in Chicago. Bresingham tells me ADT Commercial has benefitted from the caliber and breadth of leadership talent that have come along with the various acquisitions, including Mike McWilliams of Red Hawk, Bob Dale of Protection One, and Phil Aronson of Aronson Security. The transitioning of internal systems such as enterprise resource planning (ERP), billing and customer repair software will further steamline the ADT Commercial operation in the next several months. Bresingham will lead ADT Commercial as it becomes a separate business unit in 2020. We caught up with ADT at the GSX trade show in Chicago Providing new opportunities for regional integrators Additional acquisitions are also likely; in fact, growth is likely to accelerate. ADT Commercial offers a national footprint that can provide new opportunities for regional integrators it brings into the fold. New acquisitions will continue to fill out ADT’s skillset requirements in specific geographic areas where more expertise is needed. Security directors have a small staff and we help them know what they should be looking at in terms of data"“The industry doesn’t change a lot,” says Bresingham. “The technology just gets better, faster, and cheaper. As a service provider we take the best technology and combine it to provide the best solutions. We’re product-agnostic. Most of our jobs are down-and-dirty, doing the same things, but we’re pushing ourselves to be the best every day at the basics.” An emphasis at ADT is to provide customers ‘actionable’ data compiled from their various security systems. “We have a range of customers,” says Sanchez. Managing networks and video remotely “From small businesses to large data centers, there is no electronic system we cannot do. We are adaptable, from providing basic intrusion all the way to more sophisticated elements. Security directors have a small staff and we help them know what they should be looking at in terms of data.” “Our customers are our ‘true north’,” says Sanchez. A strong relationship with clients forms the basis for ADT Commercial’s success. Helping customers track data utilizes ADT Commercial’s eSuite account management system, homegrown software that compiles and analyses various customer data inputs. It also allows the ability to manage networks and video remotely. “We built it from scratch for customers. It’s a web-based system that helps them manage their business,” says Bresingham. “We hold ourselves accountable. We don’t hide from data, we encourage it.” Monitoring refrigeration units The solution is different in every case, just as every customer is uniqueIn addition to data from customer systems, eSuite can compile local weather information, crime statistics and other information that can help provide trending information to guide a customer’s business. The system’s flexibility enables ADT to provide the data each customer needs. ADT helps customers manage their business beyond the security department, too. “We do a lot of things in environmental control, monitoring refrigeration units and making sure humidity and temperature readings are correct,” says Sanchez. Leaving a door open could cause product loss at a pharmaceutical company, for example. In the food industry, a freezer malfunction could cause huge losses. In either case, an alarm can draw attention to the problem in a timely manner. Other customers face regulatory requirements that demand an audit trail of compliance, which ADT’s systems can provide. At the end of the day, ADT asks customers ‘What’s your security need?’ The company then adapts and assembles its solutions using internal resources and outside vendors, to meet that need. The solution is different in every case, just as every customer is unique.
For the security market, the ‘fine ranging’ capabilities of ultra-wideband (UWB) technology opens up a range of new uses based on the ability to determine the relative position and distance of two UWB-equipped devices with pinpoint accuracy – within centimeters. UWB is more accurate and secure, even in challenging environments full of interference, compared to narrow band wireless technologies. UWB technology transmits a large amount of data over short distances using a small amount of energy. It will be used in seamless access control, location-based services, and device-to-device services across industries including smart homes, cities, retail services, and healthcare. Increasing the accuracy of ranging measurements UWB technology will support any application that benefits from knowing the precise location of a connected deviceUltra-wideband is a mature radio technology that transmits information spread over a large bandwidth, as described by the IEEE 802.154 standard. A new, enhanced amendment to the standard – IEEE 802.15.4z – focuses on improvements to existing modulations to increase the integrity and accuracy of ranging measurements. Moving forward, UWB technology will support any application that benefits from knowing the precise location or presence of a connected device or object. This reflects a move from data communication to secure sensing. New capabilities of UWB are largely unfamiliar to the market, but a new Consortium – the FiRa Consortium – has a mission to educate the market, provide use cases, and promote UWB technology. Delivering interoperability across devices “With a consortium, we can better deliver interoperability across devices, software, and chipsets,” says Ramesh Songukrishnasamy, Director and Treasurer of the FiRa Consortium, and SVP & CTO of HID Global. “This creates a frictionless experience for the user, which is vitally important with a new technology. People are more likely to adopt emerging technology when it runs smoothly without interruptions or errors.” The FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive" An industry consortium can create a UWB ecosystem of interoperable technologies instead of individual companies launching products that consumers struggle to make work together, says Songukrishnasamy. “Simply, the FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive.” Founding members of the FiRa consortium ASSA ABLOY and HID Global, pioneers in secure access and identity solutions, are founding members of the consortium. Their technology manages access to physical and digital places, things, and identities. Another founding consortium member, NXP Semiconductors, is a pioneer in secure connectivity solutions for embedded applications. Other founding members are Samsung, which creates top-of-the-line TVs, smartphones, wearables, and other connected devices; and the Bosch Group, a global supplier of technology and services that is at the forefront of IoT innovations. Sony Imaging Products & Solutions Inc., LitePoint and the Telecommunications Technology Association (TTA) are the first companies to join the newly formed organization. Immune to radio frequency interference UWB is also immune to radio frequency interference, so it functions in high traffic settingsUWB introduces higher levels of accuracy in positioning capabilities and increased security for ranging data exchange compared to existing technologies. Fine ranging with UWB technology can localize devices and objects to 10 centimeters of accuracy with or without line of sight. UWB is also immune to radio frequency interference, so it functions in high traffic settings. These capabilities will enable a variety of use cases like secure, hands-free access control in hospitals, location-based services for ride sharing, and targeted marketing for retailers. FiRa will demonstrate UWB technology at upcoming trade shows. The FiRa Consortium aims to build on IEEE’s work with an interoperable high rate physical layer (HRP) standard, including defining an application layer that discovers UWB devices and services and configures them in an interoperable manner. The consortium also plans to develop service-specific protocols for multiple verticals and define necessary parameters for applications including physical access control, location-based services and device-to-device services. Promoting the adoption of UWB solutions As a consortium, FiRa is not just setting standards but actively championing use cases for UWB technology. Creating the consortium addresses the need to develop interoperability and implementation standards; brings key players together to create a rich UWB ecosystem; allows for the sharing of intellectual property; and promotes the adoption of UWB solutions. The FiRa Consortium is committed to educating and promoting new use cases" “Since UWB is a mature technology with new potential uses, there is a general lack of awareness of potential applications that take advantage of the technology,” says Songukrishnasamy. “The FiRa Consortium is committed to educating and promoting new use cases.” The FiRa name comes from Fine Ranging to highlight UWB technology’s use cases and distinction from older UWB technologies and solutions. Enhanced security in challenging environments Fine ranging powered by UWB can outperform other technologies in terms of accuracy, power consumption, robustness in wireless connectivity, and security, especially in challenging, high density environments. UWB previously served as a technology for high data rate communication and as such was in direct competition with Wi-Fi. Since then, UWB has undergone several transformations: UWB has evolved from an OFDM-based data communication to an impulse radio technology specified in IEEE 802.15.4a (2ns pulses with Time of Flight); and A security extension being specified in IEEE 802.15.4z (at PHY/MAC level) makes it a unique secure fine ranging technology. Moving from data communication to secure ranging allows ‘spatial context capability’ to be utilized by a variety of applications: seamless access control, location-based services, and device-to-device (peer-to-peer) services. Information is available at firaconsortium.org.
Bolloré Logistics is one of the top ten transport and logistics companies in the world. Its warehousing and logistics facility near Auckland Airport, New Zealand, has seen significant growth in recent years and often handles in excess of 2,000 items in a day. As a customs bonded warehouse, the location is subject to strict security requirements. All movements and processing in the warehouse must therefore be monitored closely, as the consequences of damage to facilities or loss of stock could be catastrophic. A combination of c25, v25 and i25 hemispheric cameras, along with several MOBOTIX Dual D15 cameras, provides complete coverage of the 6,600-square-meter site. The new system provides full visibility of the warehouse aisles to protect both employees and customers should an incident occur. Tool for risk management A security system that enables monitoring of business processes and guarantees the availability of historical footage can help companies avoid facing expensive compensation claims. As such, the MOBOTIX system is an invaluable tool for risk management, compliance enforcement and dispute resolution. The stream of metadata generated alongside the video feed cannot be manipulated, which ensures that the images will hold up in a court of law. Moreover, this kind of security system even helps save money: Some insurance companies reduce their premiums when this kind of system has been installed.
When you’re securing premises in Iceland, you need a reliable system that can cope with both plummeting temperatures and low-light levels. Hikvision cameras were used in such a solution – chosen by Securitas Iceland to secure a harbor for customer Samskip in Reykjavik. Global logistics company Samskip is one of the larger transport companies in Europe with offices in 24 countries in Europe, North and South America, Asia and Australia. They operate an extensive network of container services to and from Iceland, along with refrigerated cargo logistics and international forwarding around the world. Special kind of surveillance system One of their locations is a harbor in Reykjavik, which includes warehouses. Operating in sub-zero temperatures and with low-light even in daytime for some of the year, Samskip needs a special kind of surveillance system. When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely. These are also the temperatures where maintenance is more challenging – these are not ideal environments for technicians to be working outside. The biggest snow depth ever recorded in Iceland was 279cm in North Iceland in March 1995, for example. Although this was the worst winter ever recorded, it gives an idea of the potential extremes. There are also snow storms and the high wind chill factor to contend with. Providing clear images in failing light Low light in the winter months means that solutions in Iceland need to be better able to provide clear images in failing light. During winter, Iceland’s high latitude means shorter days - the longest day in the middle of December has only 5 hours of light, for example, with the sunrise at around 11am and sunset between 3 and 4pm. Despite these unique conditions, Samskip needed to have a good overview over all that is happening around the harbor complex, both inside and outside. Specifically, they needed to be able to trace products and goods in the warehouse. Iceland’s security provider, Securitas, rose to the challenge, providing a solution using more than 150 Hikvision products, including PanoVu and DarkFighter® cameras. All these cameras can operate to a temperature of -30˚C. Identifying potential issues The PanoVu cameras provide excellent wide angle surveillance to cover as much of the area as possible. DarkFighter technology is a popular choice in Iceland because it gives clear, useful images even in the lowest of light scenarios. The smart function on the cameras means that operators are able to identify potential issues by analyzing people's behavior. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications They can also trace a product between locations and see its condition at receipt and delivery, enhancing both security and business efficiency. To complement the Hikvision solutions, Securitas chose Seagate as their preferred storage vendor with their Skyhawk. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications. Providing reliable security Skyhawk surveillance drives are equipped with enhanced ImagePerfect™ firmware to deliver ultimate reliability and zero dropped frames, and SkyHawk Health Management, a software designed for prevention, intervention and recovery. Bergvin Þórðarson, Samskip’s Security Manager, says: “The cameras meet the requirements for analysis of people and merchandise. We are confident with both Hikvision and Securitas – in both their product and people. We know that they will fix any issues and react quickly if there’s a problem.” Securing large areas can be a challenge all on its own, but the addition of potentially crippling weather conditions means a security solution needs to be robust. Hikvision cameras were up to the challenge and provided reliable security for the entire operation.
Carlisle Support Services are pleased to announce that they have been awarded a 3 year contract to provide Manned Security and Stewarding services to the All England Lawn Tennis Club (Championships) Limited (AELTC). The AELTC is one of the world’s oldest and most prestigious private members’ tennis clubs and the home of The Championships, Wimbledon, one of the sporting events. Building a good working relationship In addition to the 24-7/365 Site Security, Carlisle will also be providing in excess of 350 event staff during the two weeks of The Championships. Adrian White, Operations Director at Carlisle, said: “We are delighted and honored to be working with this Iconic venue.” “Already we have built a good working relationship with the AELTC Security Team and we understand the culture of the venue and the goals they are looking to achieve. Wimbledon is a unique event and location, for 50 weeks of the year it is a tennis club and for 2 weeks of the year it takes centre stage in the sporting calendar.” Understanding the contrasting needs of the service “Our experiences with other major sporting venues that have similar calendars, such as Ascot and Lords, meant we understood the contrasting needs of the service. We are really looking forward to a positive working relationship” Stephen Grainger, AELTC Head of Security, said “We are delighted to have selected Carlisle Support Services to deliver an important component of our security provision for both our year-round operations and The Championships and we look forward to working with them and our other providers.”
Following a competitive tender process Corps Security has been awarded a three-year contract to provide security services to Registers of Scotland at Meadowbank House, in Edinburgh. A team of 10 officers will provide guarding services with a focus on front-of-house, customer service, CCTV monitoring and patrols. Like-Minded organization Registers of Scotland is the public body responsible for compiling and maintaining registers relating to property and other legal documents in Scotland. Mike Bullock, Chief Executive of Corps Security, said: “We are delighted to be working with such a like-minded organization. Corps Security is a trust which was set up to provide employment for ex-servicemen returning from the Crimea. We share values with Registers of Scotland and look forward to working closely together.”
With 15,000 visitors per day, and a watch list of about 3,000 people, the casino faced an impossible task to recognize persons of interest in real time. Surveillance staff manually detected only 5–7 known persons per week and was looking for an automated face recognition system to support two separate requirements: Detecting voluntarily excluded patrons to promote responsible gambling and to avoid compliance fines associated with allowing these people to play Detecting banned persons or people on the lookout list for loss prevention and security. Fully managed services At peak times, the system sees 20 persons per second in front of all cameras Cognitec offers the Face VACS-VideoScan Enterprise Solution as a fully managed service that allows the casino to benefit from the technology at affordable cost and with low implementation effort. The system for this casino includes the software, installed on three redundant servers, and 29 Cognitec C5 cameras at various entrances and in walkways. Some cameras have been installed to blend into the wall design, and not disrupt the overall casino decorum. At peak times, the system sees 20 persons per second in front of all cameras. The software stores the appearances of all persons for 30 days, collecting an average of 1 million faces. After this time window, all images, videos and biometric templates are deleted. Taking optimal photos with a hand-held camera When the surveillance team receives an alert, they verify the facial match, and send the person details to the database administrator. The security team receives the confirmed alert on a mobile device to discreetly find and approach the person on the floor. For new enrolments, staff have been instructed on taking optimal photos with a hand-held camera For new enrolments, staff have been instructed on taking optimal photos with a hand-held camera. The technology has been optimized to generate a high rate of true alerts while generating the lowest possible count of false alerts. The surveillance team evaluates the image pairs in an alert within seconds, and discards the alerts with questionable match results. face recognition services The system currently generates up to 30 correct alerts per day. Self-excluded problem gamblers are now detected at a much higher rate, resulting in a significant reduction in fine payments compared to the past with traditional detection methods. Observing such reliable system performance has convinced the client to add more cameras to the system and implement the technology at additional locations. The casino also considers to use the technology for underage detection and VIP recognition. Furthermore, the casino has the option to report visitor demographics and statistics that help planning for staff resources and casino capacities. While Cognitec continues to provide reliable, fully-managed face recognition services, the casino continuously reaps the benefits: a secure environment for customers and staff, a profitable business, and support from the community.
Leon Medical Centers is a privately-owned healthcare organization with seven state-of-the-art facilities serving over 46,000 elderly and Medicare patients in Miami and neighboring communities in Dade County, Florida. Established in 1996 by Benjamin Leon Jr., Leon Medical Centers is one of the largest and most prestigious primary healthcare organizations in the state. However, what really sets it apart is its rigorously enforced service philosophy of ‘personal attention at all times’ and its commitment to treating its patients with the ‘dignity, respect, compassion and human kindness that they deserve.’ Mobile video recorders Leon Medical Centers began deploying previous-generation March Networks mobile video recorders in 2011 In keeping with its commitment to exceptional service, Leon Medical Centers operates a fleet of 230 buses that pick up patients, take them to their appointments and return them home. To ensure their safety in transit and monitor compliance with its service philosophy, it relies on an integrated March Networks® RideSafe™ video surveillance solution. Leon Medical Centers began deploying previous-generation March Networks mobile video recorders in 2011. “We had another vendor’s equipment up to that point, but the system couldn’t support IP video,” said Erick Martinez, Leon Medical Centers’ Security Systems Manager. “At the time, we were using analog cameras and wanted to upgrade to higher definition video. We were also experiencing a lot of issues with hard drive failures.” Hybrid network video recorders In 2014, Martinez began upgrading to RideSafe GT Series Hybrid Network Video Recorders (NVRs), and now has 120 of the new mobile recorders in addition to almost 200 older March Networks mobile DVRs. The RideSafe GT Series recorders are available in 8, 12, 16 or 20-channel models with hybrid capability allowing end users to migrate from 100 percent analog to 100 percent IP video. An embedded Linux-based operating system, ruggedized design offering protection against shock, vibration, dust and moisture, solid state electronics, and internal battery backup make the RideSafe GT Series recorders ideal for reliable operation in punishing mobile conditions. A hard drive mirroring capability ensures redundancy and storage flexibility, while health monitoring proactively alerts system administrators to hard drive failures, irregular temperatures or synching issues with cameras. Safety of our passengers Our patients are elderly, so if there’s a slip and fall incident, we want to have evidence of what happened" Each Leon Medical Centers bus is equipped with six March Networks cameras. Five of the cameras are mounted to capture interior views and the last is used externally to capture video of passenger entry and exit points. “Our focus is on the safety of our passengers,” said Martinez. “Our patients are elderly, so if there’s a slip and fall incident, we want to have evidence of what happened. We also use the system to confirm compliance with our service standards. Our drivers are the first and last points of interaction with our patients, so if there’s an issue, we want to be able to review and rectify it.” In the event of an incident in transit, the driver is able to push a button on the dashboard to tag the associated video. Diagnostic imaging services When the bus arrives at one of the clinics, the tagged video automatically down-loads through a Wi-Fi hotspot to a server for immediate review by Leon Medical Centers risk management personnel. While in range of a Wi-Fi hotspot, the system also downloads health alerts and can also upload any scheduled software updates or new device settings. For routine video downloads, there’s hardly ever a need for Martinez’s staff to board a bus. “Wireless downloading saves us a lot of time,” he said. “It makes incident reporting much more efficient when we need to have an issue resolved. It helps a lot.” The seven Leon Medical Centers are one-stop-shop facilities with onsite labs, pharmacies, diagnostic imaging services and dental clinics. Traveling to multiple locations Leon Medical Centers operates four Healthy Living Centers with modern gyms, exercise and yoga classes This convenient service model enables patients to see their family doctor or a specialist, have blood work done, get an X-ray and fill prescriptions without having to spend time traveling to multiple locations. Each center has a café, where patients can have a coffee and socialize. And to help patients stay fit, Leon Medical Centers operates four Healthy Living Centers with modern gyms, exercise and yoga classes, seminars and other programs. Patients who require surgery or a hospital procedure are picked up and delivered by Leon Medical’s bus transportation service. On arrival, they’re greeted and escorted to their destination by staff from Leon Medical’s Hospital Service Centers, which are located within all of the major Miami-Dade County hospitals. Aside from the seven centers and four Healthy Living Centers, Leon Medical operates a fleet maintenance garage and a 300,000 square-foot corporate headquarters. Video management software Martinez says that the fixed facilities are also being equipped with March Networks 8000 Series Hybrid NVRs, which are managed using the same March Networks Command video management software powering the mobile recorders. Having a single software solution to access and manage video - regardless of whether it’s recorded on a bus or in one of the medical centers - means that Leon Medical Centers doesn’t have to train staff on multiple software systems. It also provides the organization with complete oversight of its clients and operations. Once again, it’s all about patient safety and service excellence. “If a patient loses a purse or a wallet, for example, we’ll be able to find it for them on one of our buses or in a clinic. Or if they have an issue with an employee, we’ll be able to review the video and take care of it,” said Martinez. Video surveillance infrastructure Martinez and his staff are trained to take full advantage of all the Command software functionality A Microsoft certified engineer, Martinez heads up a department solely focused on overseeing Leon Medical’s video surveillance infrastructure. “This department didn’t exist four years ago,” he said. “I was part of the IT department responsible for PC support. Mobile security was handled by transportation at the time. I thought it would be a good idea to create a separate department with IT expertise to look after mobile security, and senior management agreed.” Martinez and his staff are trained to take full advantage of all the Command software functionality. For example, they’re able to manage video viewing privileges to ensure users have access only to those cameras corresponding to their roles or responsibilities. They’re also able to take advantage of Command’s support for Microsoft Active Directory integration, which collects established user account information from Leon Medical’s corporate network directory. Patient safety and service excellence This allows them to select users from the company directory, assign a profile and customize their user interface to display the tools needed for their role. Looking ahead, Martinez and his team will be busy this year, as Leon Medical Centers continues to expand. We have four construction build-outs planned, including a four-story, 80,000 square-foot building" “We have four construction build-outs planned, including a four-story, 80,000 square-foot building and two parking garages - one six-floor and one seven-floor garage - so there will be opportunities for additional fixed video surveillance systems. Because we lease our buses for three years, we’re also always adding to our transportation fleet, so we’ll continue swapping out our 5308 recorders in favor of the newer GT Series.” “March Networks has served us well,” said Martinez. “Without a high-quality, reliable video surveillance system, we would have a much more difficult time fulfilling our commitment to patient safety and service excellence. It’s that simple.”
Round table discussion
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
Security service: Manufacturers & Suppliers
- Bolide Security service
- Dedicated Micros Security service
- Dahua Technology Security service
- VIVOTEK Security service
- Seagate Security service
- Hanwha Techwin Security service
- ITI Security service
- Vigilant Vision Security service
- Vanderbilt Security service
- OT Systems Security service
- Messoa Security service
- HID Security service
- Panasonic Security service
- Tamron Security service
- Nedap AEOS Security service
- LILIN Security service
- AMAG Security service
- Parabit Security service
- Pelco Security service
- Videotec Security service