LifeSafety Power Inc. understands the challenges of today’s security integrator and end user. It knows that labor savings, standardization and being able to generate real-time data and status on the health and viability of locks, access control, batteries and other connected components is critical to system reliability and resiliency. Minimize Errors During Installation With those principals as its guide, LifeSafety Power will feature its award-winning networked power management solution...
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each o...
Constantly optimizing deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting Existing Hardware Today, low-co...
AMG Systems is proud to announce that it has partnered with Juniper Networks, a provider of automated, scalable and secure networks, to offer its clients a single-source, enterprise-level, total networking solution. Customers will now be able to take advantage of both AMG’s specialized edge of network transmission systems for video security and other devices and Juniper’s core Layer 3 backbone networks, all provided by a single-source supplier. AMG Systems is the only UK-based IP an...
LENSEC is adding to their regional management team around the globe. Below are a few of the professionals covering relationships with partners and manufacturer reps. LENSEC's staff is comprised of physical security experts who interface with partners and their customers. They bring solid expertise in security deployment solutions using Perspective VMS. Integrated Security And Asset Protection Bob has extensive experience in building channel partners for security and asset protection hardware an...
Cobalt Iron Inc., a provider of enterprise data protection SaaS, launches the Cobalt Iron Partner Portal, an online portal where the company's partners can access collateral, register deals, request sales support, and find answers to frequently asked questions. Providing the most current sales enablement tools and resources, the new partner portal will be a one-stop shop for all Cobalt Iron channel partners: resellers, value-added resellers and distributors, and service providers that resell Sa...
ExtraHop, provider of enterprise cyber analytics from the inside out, announces new capabilities designed to help Security Operations Center (SOC) and Network Operations Center (NOC) teams identify and safeguard critical assets, rapidly detect late-stage and insider threats, and transform security analysts into threat experts with streamlined investigation workflows. Demand for business agility and uptime have accelerated the rapid modernization of IT, which is now highly dynamic and distributed - from the data center, to cloud infrastructure and SaaS, to remote sites and device edges. Advanced Detections These changes introduce complexity and expand the attack surface, contributing to high rates of false positives and obscuring true threats. Analysts constantly waste time, through no fault of their own, working to validate the constant flow of alerts to determine if investigation is warranted. Senior analysts get timely detail on users and devices to support rogue device detection, insider threat investigations, threat hunting, and forensics The Winter 2019 release of ExtraHop Reveal(x) improves SOC and NOC analyst productivity through contextual discovery of the enterprise attack surface, full-spectrum detection, and one-click guided investigation for incident response. Advanced detections incorporate device and user context to identify known and unknown threats using an array of machine learning, rule-based, and custom techniques. Detections incorporate suggested next steps and are made actionable through clear evidence, enabling front-line analysts to validate, close, or escalate prioritized events with confidence. Senior analysts get timely detail on users and devices to support rogue device detection, insider threat investigations, threat hunting, and forensics. Better Prioritize Monitoring Significant features of the Winter 2019 release include: User-to-Device Mapping: Easy correlation between users and devices allows analysts to investigate quickly, expediting validation without the need to cross-reference with other tools. OS Auto-discovery: Operating system (OS) auto-discovery confirms and compares the OS each device is using with known behaviours of those systems to identify spoofing. Enhanced Role Classification: Expanded role auto-classification uses behavior to automatically infer more device types (e.g., mobile device, DHCP server, domain controller or DNS server), and then maintains groupings to keep analysts focused on what matters most. Dynamic Device Grouping: Sophisticated device grouping permits users to define complex rules for extensive attributes and behavior to better prioritize monitoring, detection, and triage. Advanced Rules Engine: The advanced rules engine immediately detects known threats, policy violations, and risk-based detections. Guided Investigation Workflows: One-click guided investigations link each detection to the right next steps, as well as the most relevant device's transaction and behavior details, for instant validation of threats and faster MTTR. Expanded Integrations: ExtraHop now integrates with ServiceNow CMDB, QRadar SIEM, and Palo Alto Networks firewalls. Contextual workflow With ExtraHop, security and IT teams can detect threats up to 95 percent faster, reduce resolution time by nearly 60 percent “Forcing analysts to switch between tools or manually pull together disparate data for an investigation increases cognitive load, delay, and the chance of missing a critical piece of evidence,” said Jesse Rothstein, CTO and Co-Founder, ExtraHop. “Our focus in this release is to bring authoritative data about every device's communications, OS, users, and network behavior into a contextual workflow that guides analysts to the right answer immediately.” With ExtraHop, security and IT teams can detect threats up to 95 percent faster, reduce resolution time by nearly 60 percent, and decrease unplanned downtime by as much as 86 percent. The innovative ExtraHop approach has been recognized by numerous organizations including Credit Suisse, JMP Securities, and independent analyst firms including Enterprise Management Associates.
Maxxess Systems continues to drive the virtualization of the physical security industry with the development and implementation of the industry’s most advanced enterprise level situational awareness and response coordination solutions. Enhancing Maxxess Systems’ momentum is the recent introduction of Maxxess InSite Awareness and Response Coordination System which meshes ‘system intelligence’ and ‘human intelligence’ to deliver an entirely new category of physical security and communications solution on a unified, easy to operate platform. Maxxess InSite joins the company’s highly touted eFusion Security Management Software and Ambit Communications Software, which are presently installed in thousands of facilities around the globe by many of the world’s leading brands. Developing Sophisticated Software Solutions The solutions aren’t just evolutionary in nature, they’re revolutionary with new benchmarks in situational awareness, communications and personnel coordination"“Over the last decade, our focus has been on developing highly intuitive, integrated solutions for high-profile clients,” said Nancy Islas, President of Maxxess Systems, Inc. “This has allowed us to develop highly sophisticated software solutions based on the needs of high-profile users around the world. The resulting solutions we’ve developed aren’t just evolutionary in nature, they’re revolutionary with new benchmarks in situational awareness, communications and personnel coordination.” High-profile users of Maxxess Systems’ solutions include: the Alshaya Group, an international franchise operator with over 90 globally recognized brands; CAE, the pioneer in training for the aviation, defense, security and healthcare industries; Meraas, a developer of residential and commercial space in Dubai; Banco Central de Reserva del Peru, which mints and issues metal and paper money in Peru. Coppel, one of the largest retailers of clothing and household goods across Mexico; Regus, one of the world’s largest providers of flexible workspace; UDR, a real estate investment trust company in the US; the highly prestigious London School of Economics, and more than 50 companies in the renowned Emirates Group, among many others. Core Software Platforms Maxxess InSite combines ‘system intelligence’ and ‘human intelligence’ to detect and respond to unfolding events in real-timeThe Maxxess Systems portfolio is built on the following core software platforms: Maxxess InSite Awareness and Response Coordination System combines ‘system intelligence’ and ‘human intelligence’ to detect and respond to unfolding events in real-time – all of which is queued, organized and displayed on a highly-intuitive user interface. In doing so, Maxxess InSite truly enables early action, allowing IT, Operational Technology and Physical Security departments within organizations to correlate data, improve response coordination, and deal with issues when they’re small – before they become large and costly. Maxxess InSite features an open-architecture framework to accommodate virtually any security or business intelligence application with comprehensive functionality. Over 50 different leading manufacturers are already integrated into Maxxess InSite, providing more combined capabilities and functionality than any other cross-platform solution available. This allows Maxxess InSite to be configured for virtually all applications, employing any combination of software modules and hardware to deliver each user with a highly-customized solution and unparalleled efficiency. eFusion provides video and access system management and control capabilities along with alarm monitoringeFusion Security Management Software is a ‘system intelligence’ solution that integrates and correlates data from surveillance, access control and various other physical security related inputs onto a comprehensive monitoring and reporting dashboard. eFusion provides video and access system management and control capabilities along with alarm monitoring, access credentials tracking/authorization/de-authorization remotely, door status and more. eFusion can be deployed as a stand-alone control platform, or as a core component of Maxxess InSite. Ambit Communications Software is a ‘human intelligence’ solution that provides security managers communication and location knowledge for remote personnel through their personal devices for alerts, notifications, status assessment and access management. Ambit can be deployed as a stand-alone communications platform, or as a core component of Maxxess InSite. “The recent release of Maxxess InSite is the result of many years of software development and is based on the proven performance of our security and communications solutions,” continued Ms. Islas. “With the introduction of InSite, Maxxess Systems is bringing a completely new and unparalleled security and communications enterprise solution to the security marketplace.”
Honeywell announced the launch of Pro-Watch 4.5, the latest iteration of its flagship connected security platform for enterprise and critical infrastructure markets, is available beginning January 2019. Incorporating new features as well as program updates, Pro-Watch 4.5 meets the latest industry compliance requirements, reduces total cost of ownership and increases operator productivity with improved flexibility and scalability from single site to global deployment. Pro-Watch 4.5 Security Platform It comes with latest key features, such as: Web-Based Alarm and Event Handling: Improves operator efficiency, enhances user experience and reduces installation costs through an easily deployable thin client; Access and Vendor Management Portals: Provides functionality unavailable from other physical access control systems and allows operators to accomplish more with fewer dollars by reducing workloads by 20 percent or more; and New Enterprise Tools: Simplifies setup and maintenance of Pro-Watch Enterprise deployments to further reduce operating costs. Pro-Watch 4.5 also includes program updates to its current vendor and access management portals, installation process and overall performance. Connected Ecosystem Pro-Watch 4.5 serves as the center of a connected ecosystem that integrates both Honeywell and third-party solutions to provide a comprehensive connected security platform that meets the unique security needs of each user. Its unmatched compliance offers regulated industries the tools needed to adhere to the most stringent requirements for any industry. It is well suited for enterprise and critical infrastructure environments across a variety of industries including education, pharmaceutical, utilities and financial.
Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announces the launch of a new Community Edition of its powerful software-based virtual Application Delivery Controller (vADC) to help application developers create innovative application solutions with dramatically lower costs and time to market. Pulse vADC Community Edition integrates easily with common DevOps tools for automated provisioning and orchestration, such as Kubernetes, Terraform, Puppet and Chef, making it easy to start building secure and scalable applications from day one. Launching New Applications Pulse Secure is setting the benchmark for try before you buy that competitors will have to follow" “Pulse Secure vADC Community Edition is a free, full-featured application delivery controller that can be used in production scenarios which allows developers and enterprises to accelerate cloud application deployment by removing the hurdle of procurement and tooling. Pulse Secure is setting the benchmark for try before you buy that competitors will have to follow,” said Mike Fratto, senior analyst at 451 Research. Developers can use the Community Edition for commercial applications up to a limit of 10 Mbps, and up to four nodes can be clustered together for high availability, for a maximum aggregate bandwidth of 40 Mbps. The Community Edition is ideal for building and launching new applications, and offers easy in-line upgrades for 24x7 support options and higher throughput to support global-scale applications. Powerful Graphical Analytics In addition, customers can upgrade seamlessly to Pulse Services Director for flexible capacity-based licensing, and centralized enterprise management features, including powerful graphical analytics with actionable insights, to help understand application behavior and to diagnose application problems on the network. “Our new Pulse Secure vADC Community Edition is a free-to-download, free-to-use, full-featured virtual application delivery controller (vADC) solution, which developers can use immediately to build smarter applications,” says Prakash Mana, vice president of product management for Pulse Secure. “Customers starting with the Community Edition can then upgrade to Pulse Services Director for enterprise management tools, flexible licensing, technical support and graphical analytics for on-demand applications.” Fully-Supported Platform Pulse Secure vADC Community Edition offers all the capabilities of the full product with the only limitations being those of scale and support" “Unlike other platforms that have a restriction on certain features within the ‘Free Edition’ – Pulse Secure vADC Community Edition offers all the capabilities of the full product with the only limitations being those of scale and support. Community Edition users still benefit from access to full documentation via the Pulse Community, and the option to migrate to a fully-supported platform or to scale up to higher throughput without the need for downtime,” Prakash adds. Pulse Secure vADC Community Edition is available in three ways. For container deployments, the software can be installed from the Docker Hub without a need to register, giving frictionless access for container and microservices deployment. Transparent Pricing Models Developers can use one-click access to the Community Edition via cloud marketplaces, such as Amazon AWS, Google Cloud and Microsoft Azure. Alternatively, downloads of the Community Edition are available from the Pulse Secure website, which offers the latest virtual appliance software images and access to full documentation. Our approach is to offer a low-friction option that is truly cloud-portable, allowing customers to migrate policies across multiple virtual and cloud platforms" “Our approach is to offer a low-friction option that is truly cloud-portable, allowing customers to migrate policies across multiple virtual and cloud platforms, so they are no longer tied to a specific cloud architecture,” says Prakash. “And unlike open source or other entry-level solutions, the Pulse vADC Community Edition includes full enterprise-grade capabilities such as an easy-to-use graphical user interface, global load balancing and web application firewall as an integrated part of the solution, with transparent pricing models for upgrades and flexible licensing.” Orchestration Platforms Also highlighting the benefits for Pulse Secure partners, Prakash commented: “Our Community Edition makes it easier for our channel to offer new types of solutions to application developers that can combine with additional tools and orchestration platforms such as Terraform and Kubernetes to streamline proof of concept projects which can move seamlessly to full scale production deployments.” “As online applications become more complex, more distributed and more virtualized, organizations need a broader set of tools to solve performance problems for their web-based services. With Pulse Secure vADC Community Edition, organizations have a simpler way to explore the potential of the software without compromising on the critical features that have become an important part of modern application platform development processes,” Prakash concludes.
Suprema, a global leader in biometrics and ID solutions, announces that the company has entered into a commercial software license and distribution agreement with Qualcomm Technologies, Inc., a subsidiary of Qualcomm Incorporated, for the licensing of Suprema's BioSign, its under-display fingerprint recognition algorithm. Suprema has entered the smartphone segment with the Samsung Galaxy J5 in its fingerprint solution for smartphones last year. In February 2018, the company launched BioSign 3.0 at Mobile World Congress (MWC) and has actively pursued the development of integrated solutions with several fingerprint sensor companies. Fingerprint Recognition Function In December, Qualcomm Technologies launched the Qualcomm(R) 3D Sonic Sensor, a high performance ultrasonic fingerprint sensor The previous version, BioSign 2.0, is a fingerprint recognition algorithm technology specialized in ultra-small touch type fingerprint sensor. It provides excellent authentication performance and speed for 4x3.2mm fingerprint sensor, which is essential for applying fingerprint recognition function in mid-range smartphones. Lately, under-display fingerprint recognition technology, which integrates fingerprint sensors under the display, has been actively developed and introduced with the trend that full-screen display is rapidly applied to smartphones. This year, premium and mid-range smartphones from major brands are expected to be loaded with under-display sensors. There are ultrasonic and optical sensors for under-display type fingerprint sensors. In December, Qualcomm Technologies launched the Qualcomm(R) 3D Sonic Sensor, a high performance ultrasonic fingerprint sensor. Provide Superior Performance Qualcomm 3D Sonic Sensor is designed to provide superior performance and security over other fingerprint sensor technologies such as optical and capacitive sensors. The ultrasonic sensor is also ultra-thin and optically isolated from the display allowing for sleek industrial designs and virtually no impact to display aging The ultrasonic sensor is also ultra-thin and optically isolated from the display allowing for sleek industrial designs and virtually no impact to display aging (image burn). In the case of the under-display type fingerprint recognition technology, a new recognition algorithm should be optimized for the sensor due to the complicated sensing structure and image characteristics different from the conventional touch type fingerprint sensors. This requires the technical barrier of the algorithm to be very high. Fingerprint Sensor Algorithms Suprema's BioSign 3.0 is optimized for the characteristics of the image obtained from the under-display fingerprint sensor, providing a high level of recognition performance and speed. BioSign 3.0 has been developed based on Suprema's 20 years expertise in fingerprint image processing technologies. "We are proud to be working with Qualcomm Technologies, a leader in under-display fingerprint sensor technology. This well reflects Suprema's strong industry presence as well as how BioSign is one of the preferred solutions among the global smartphone industry. This will be a major step forward in securing leadership in the smartphone segment by expanding cooperation with customers in the future," said Brian Song, CEO at Suprema. "We will further enhance our mobile development solution capabilities to provide our customers and users with the best possible satisfaction, and we will aggressively develop next-generation core technologies such as large-area fingerprint sensor algorithms and 3D face recognition solutions," Song added.
MedixSafe, a pioneer in the access control cabinet market, is pleased to introduce its new GS1 Gun Safe. Initially custom-built to accommodate a request from a police department looking to secure firearms, the GS1 electronically controlled cabinet is an access control solution that law enforcement, airport security staff and private gun owners alike can count on to restrict access to their firearms. Easy to manage from any computer, the MedixSafe GS1 is equipped with a stand-alone networkable TCP/IP based controller. It’s designed to require both an individual PIN and/or Proximity Card to gain access. All PIN/Card activity is recorded in the PIN/Card reader memory, providing a reliable log of who has accessed the gun safe. The GS1 can store up to 30,000 users and a 50,000 event activity log. Embedded Help Screen It features a USB-host port for offline data management/access; audio-visual indicators via an internal speaker; bi-color LED operation indicator; two separate compartments; a large LCD screen; and, MedixSafe Audit software. The software comes with an interactive embedded help screen, intuitive icons; descriptive, easy-to-understand information, and a well-organized menu and programming for quick setup. The only hardware users need is their existing PC or laptop. "MedixSafe is dedicated to providing the very best in access and key control," says Jim Turner, President, MedixSafe. "Our new GS1 Gun Safe allows law enforcement, airport security staff and private gun owners alike to properly secure their firearms with a trusted access control solution.” Made of heavy-duty 10 gauge steel, it features two mechanical locking mechanisms and a key override. The GS1 is available in a black, powder coated finish. Dimensions: 63” High x 36” Wide x 30” Deep. Voltage: 12 Volt DC current draw 80mA idle 500mA active.
Edward Snowden’s name entered the cultural lexicon in 2013, after he leaked thousands of classified National Security Agency documents to journalists. He’s been variously called a traitor, a patriot, a revolutionary, a dissident and a whistleblower, but however you personally feel about him, there’s one way to categorize him that no one can dispute: He’s a thief. There’s no doubt about it: Snowden’s information didn’t belong to him, and the scary truth is that he is neither the first nor the last employee to attempt to smuggle secrets out of a building – and we need to learn from his success to try to prevent it from happening again. Since the dawn of the digital age, we’ve fought cyber pirates with tools like firewalls, encryption, strong passwords, antivirus software and white-hat hackers. But with so much attention on protecting against cyber risks, we sometimes forget about the other side of the coin: the risk that data will be physically removed from the building. Douglas Miorandi, director of federal programs, counter-terrorism and physical data security for Metrasens, recently discussed the major risks to physical data security with SecurityInformed.com. Q: What Do You Believe Are The Main Physical Threats To Data? The biggest threats I have seen in the physical data security space have varied over the years, but there are four specific risks that remain the same across the board for any organization, which are: Every organization is at risk of having data walk out the building with that employee The Insider Threat The Outsider Threat The Seemingly Innocent Personal Item Poor or Nonexistent Screening To beginning with, every company or government agency has at least one disgruntled employee working for them, whether they know it or not, and that means every organization is at risk of having data walk out the building with that employee. That is what security experts call the insider threat. Q: What Do You Think Influences Employees To Steal Data From Their Own Organization? People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially – meaning they don’t even need to be disgruntled; they might just want a quick way to make a buck. Financial data, too, is attractive, both for insider trading and selling to the competition. People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially This can happen to both private companies as well as government agencies. Take Natalie Mayflower Sours Edwards for example, a Treasury Department employee who was caught in the act just last month, when she disclosed sensitive government information about figures connected to the Russia investigation to a reporter. She didn’t hack the system, she simply used a flash drive. And let’s not forget that Snowden was a contractor working for the NSA. Q: Many Of Us Think Of Security Threats Coming From An Outsider, Do Companies Still Face These Type Of Threats? Yes. Unfortunately, organizations do not only need to worry about their own employees – companies and government agencies need to be wary of threats from outsiders. COTS devices include SD cards, external hard drives, audio recorders and even smart phones They can come in the form of the corporate spy – someone specifically hired to pose as a legitimate employee or private contractor in order to extract information – or the opportunistic thief – a contractor hired to work on a server or in sensitive areas who sees an opening and seizes it. Either one is equally damaging to sensitive data because of the physical access they have. Q: Whether It Be An Insider Threat Or An Outsider Threat, What Are Ways These Individuals Can Steal Sensitive Data? There are two types of personal items that can be used to steal data: the commercially available off-the-shelf (COTS) variety, and the intentionally disguised variety. This is considered risk number three – the seemingly innocent personal item. COTS devices include SD cards, external hard drives, audio recorders and even smart phones, any of which can be used to transport audio, video and computer data in and out of a building. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom Q: What Is The Difference Between COTS And Disguised Devices? The difference between COTS and disguised devices is that if someone gets caught with a COTS device, security will know what it is and can confiscate it. The disguised device looks like a security-approved item anyone could be carrying into the workplace, making it especially devious. Sometimes these devices don’t just function to bring information out of a building; they are used to damage a server or hard drive once it’s plugged in to a computer or the network. Some are both – a recording device that extracts data and then destroys the hard drive. Companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening peopleQ: With These Types Of Discrete Items, Can Security Personnel Still Catch Individuals In The Act? For Example, Through Security Screenings? Poor or nonexistent screening is the most substantial security threat to any organization when it comes to sensitive data. Whether it’s an employee, an outside contractor or a device, the physical security risks are real, and everyone and everything entering and leaving a building needs to be screened. Unfortunately, screening often isn’t occurring at all, or is ineffective or inconsistent when it does occur. Even companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening people and stopping them from stealing data through recording devices. Q: It’s Surprising That So Many Organizations Would Neglect Physical Security When Protecting Their Data. It’s a huge mistake, and the consequences can be dire. They range from loss of customer trust, exorbitant lawsuits and tanking stock prices in the private sector; and risks to national security in the public sector. Costs and resource allocation increase as well during efforts to reactively fix or mitigate the effects of physically stolen data. For both the private and public sectors, the risk for data to be physically removed from a building has never been greater. Years ago, it was much harder for the average Joe to figure out where they could sell stolen data. Now, with the Deep Web, anyone with Tor can access forums requesting specific information from competing spy agencies, with instructions on how to deliver it, greatly reducing the risk of getting caught – and increasing the likelihood people will try it. Although it’s getting easier to sell data, the good news is that all of these threats are avoidable with the right measures. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack Q: So How Can An Organization Protect Against These Risks? There are a number of ways – and the first one requires a change of mindset. Not long ago, the building/physical security department and the IT/cybersecurity department were considered two different entities within an organization, with little overlap or communication. organizations now are realizing that, because of the level of risk they face from both internal and external threats, they must take a holistic approach to data security. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack. Q: How Can Companies And Government Agencies Combine Both Physical Data Security And Cybersecurity Initiatives? Physical security managers can advise cybersecurity managers on ways to reinforce their protocols – perhaps by implementing the newest surveillance cameras in sensitive areas, or removing ports on servers so that external drives cannot be used. Organizations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try In turn, the cybersecurity team can let the physical security team know that they have outside contractors coming in to work on the server, and the physical security team can escort the contractors in and stand guard as they work. Constant communication and a symbiotic relationship between the two departments are crucial to creating an effective holistic security protocol and, once you’ve got the momentum going, don’t let it slow down. Sometimes efforts start off strong and then peter out if priorities change. When guards are down, it’s an excellent time for a malicious actor to strike. organizations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try. It’s not just about the mentality, though. Using the right technology is just as important. Q: What Type Of Technology Can You Use To Protect Physical Data? Many problems can be avoided by simply using the right technology to detect devices that bring threats in and carry proprietary information out. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them. Using a ferromagnetic detection system (FMDS) as people enter and exit a building or restricted area means that anything down to a small microSD card triggers an alert, allowing confiscation or further action as needed. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them Q: How Does FMDS Work? In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects the magnetic signature, down to a millionth of the earth’s magnetic field. FMDS is the most reliable method of finding small electronics items and should be part of the “trust, but verify” model Although it is a passive technology, it is more effective and reliable than using hand wands or the walk-through metal detectors typically seen in an airport, which cannot detect very small ferrous metal objects. FMDS can see through body tissue and liquids, so items cannot be concealed anywhere on a person or with their belongings. Whether or not the items are turned on doesn’t matter; FMDS doesn’t work by detecting a signal, but rather by spotting the magnetic signature that electronics contain. This is ideal, because most recording devices do not emit any signal whatsoever. In my experience, FMDS is the most reliable method of finding small electronics items (as well as other ferrous metal objects, like weapons), and should be part of the “trust, but verify” model, in which companies assume the best of their employees and anyone else entering the building, but still take necessary precautions. Q: What Are The Key Takeaways For Organizations Looking To Enhance Data Security? The toughest challenge in the security sector – whether it’s cyber or physical – is remembering that the bad guys are constantly looking for ways to slip in through the cracks, and security departments need to stay one step ahead to ward off both internal and external threats. Recognizing the existing threats, putting together a holistic security strategy, and using the right technology to detect illicit devices comprises an effective three-pronged approach to protecting an organization’s data. Organizations cannot afford to be passive about security and assume employees won’t steal data and spies won’t sneak in. Strong countermeasures are necessary because data loss can come from both inside and outside, in both private and public sectors, from places not everyone thinks of – and with technology like FMDS acting as a backup to the human element, organizations can lock down their data and keep the wolves in sheep’s clothing from getting through the door.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban On Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes A Splash With Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact Of Data-Driven Smart Cities On Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyze data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing The Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends For 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How To Prevent ATM Jackpotting With Physical And Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need To Look Beyond Technology For Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organization. 10. The Evolution Of Facial Recognition From Body-Cams To Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
Building Information Modelling (BIM) can be described as the ‘use of shared digital representation of a built object (including buildings, bridges, roads, process plants, critical infrastructures, etc.) to facilitate design, construction and operation processes to form a reliable basis for decisions’. The National Institute of Building Sciences (NIBS) defines it simply as the “digital representation of the physical and functional characteristics of an object”. Understanding BIM Construct BIM is neither a product nor software but rather is a “cache of building information” to which graphic data (such as drawings) and certain technical attributes (such as technical data sheets and associated characteristics) that are also related to the foreseen life cycle can be added. BIM represents a collaborative planning method as it allows for the integration of useful information for every phase of planning in a single model What BIM represents therefore is a collaborative planning method as it allows for the integration of useful information for every phase of planning – architectural, structural, plant design and installation, energy, management – into a single model. Project Functionality And Performance While CAD allows a project to be designed with 2D or 3D drawings, BIM also specifies the functionality and performance of each BIM object in the project or in the entire building process. A BIM object can hold any information pertaining to the building as a whole, or its parts. The most common information collected in a BIM is geographic location, structure, the properties of the materials/components/systems and technical elements, construction phases and maintenance procedures. Fields Of Application Building Information Modelling is used both in the construction sector, for design and installation (architecture, engineering, technical installations…) as well as in facility management. BIM supports the general improvement of a project along the entire life cycle of the construction process The role of BIM within the construction industry (by means of participants such as architects, engineers, surveyors, experts, builders, consultants and clients) is to support communication, cooperation, simulation and the general improvement of a project along the entire life cycle of the construction process. Advantages Of BIM Technology BIM technology offers a great number of advantages, such as greater efficiency and productivity, fewer errors, less downtime, reduced costs, greater interoperability, maximum information sharing, and more accurate and consistent control over a project. Generally, a BIM object is saved in .ifc (Industry Foundation Class) format. These IFC files are classed as 3D image files that also contain other technical information and are compatible with any software that works with BIM technology. Standard Process And Regulation BIM will become the standard process for all buildings and is currently being integrated into public contracts legislation across Europe. With Directive 2014/24/EU, the European Union has introduced a few guidelines to member countries on using the BIM system in the design and construction of public works. The BIM system is therefore strongly supported as a means of increasing the effectiveness and transparency of procurement procedures. Comparable BIM tools are necessary in order to allow the various softwares to ‘read’ the relevant data to manage all different parts of the construction sector Mandatory Use Of BIM Process In Public Works In terms of the BIM process spreading to European operators (planners and companies), the leading nations are the Netherlands followed by the United Kingdom, whose government is bringing in a plan to make the use of BIM mandatory for public works. Even in Northern Europe and the United States, BIM technology has been used since 2000. Since the construction sector varies so widely (plants, structures, energy), it has become evident that no software exists that can manage all these different parts. Instead, comparable BIM tools are necessary in order to allow the various softwares to “read” the relevant data. BIM technology makes it possible to ascertain exactly how the cameras will fit into a building’s layout, reducing the risk of unexpected blind spots BIM And Video Surveillance Security has now become an integral part of the design process of any new large building. To provide the highest levels of security and avoid any blind spots that might constitute a security breach, the video surveillance system has to be planned in conjunction with other essential services, such as the electrics and hydraulics. BIM allows security system designers to interactively understand camera coverage, making it easier to identify the required models and to optimize the system layout. Reducing Camera Installation Risks In actual fact, the technology makes it possible to ascertain exactly how the cameras will fit into a building’s layout (both internally and externally) and to determine whether the view of any camera is blocked by columns, lighting posts, trees, etc. This reduces the risk of unexpected blind spots. It is therefore possible to see how the cameras will be configured before they are installed, and which areas will be covered by the surveillance system after installation.
A rapid string of merger and acquisition (M&A) transactions as 2018 passed into 2019 suggests the physical security industry may be on the verge of a busy year of companies buying other companies. Observers have noted a large amount of investment capital currently available to be invested in security M&A, and plenty of entrepreneurial companies are looking to be acquired. Joe Grillo, CEO of ACRE, previously hinted at upcoming M&A activity for his company by the end of 2018, foreshadowing ACRE’s late-year announcement to acquire access control company Open Options, Addison, Texas.The VaaS cloud-based image capture platform includes fixed and mobile license plate reader cameras driven by machine learning Just days later, in the midst of the holiday season, Qognify announced its plan to acquire On-Net Surveillance Systems Inc. (OnSSI) and sister company SeeTec GmbH. Then came an even larger announcement: Motorola has acquired VaaS International Holdings Inc., a data and image analytics company for $445 million. The VaaS cloud-based image capture and analysis platform includes fixed and mobile license plate reader cameras driven by machine learning and artificial intelligence. Most recently, ADT announced yet another acquisition, Advanced Cabling Systems, a technology integration company in the South, thus continuing consolidation on the integration side of the business. There are likely to be further mergers and acquisitions in the video surveillance supply base in 2019 Continuation Of The Trend In the case of the Qognify and Motorola deals, Jon Cropley, Principal Analyst, Video Surveillance & Security Services, IHS Global Limited, sees them as the next chapter in an M&A trend going back several years. “I think this is a continuation of what we have been seeing in recent years of video surveillance software vendors being acquired,” he says.In the face of intense price competition, vendors have found it increasingly difficult to compete based on hardware features" “In the face of intense price competition, vendors have found it increasingly difficult to compete based on hardware features and are looking at software to offer unique competitive advantages.” In short, he sees it as a continuation of a trend that previously saw Canon acquiring Milestone Systems and Briefcam, Panasonic acquiring Video Insight and Tyco acquiring Exacq. “There are likely to be further mergers and acquisitions in the video surveillance supply base in 2019,” adds Cropley. “However, a spree of large-scale mergers and acquisitions is not expected.” Memoori, another market research firm, forecasts that the value of acquisitions could actually decline marginally in 2019 in value terms but increase in number. This observation is based on Memoori’s charting of physical security deals over the last 18 years. Jim McHale, Managing Director of Memoori, says there have been four cycles of increase and decline in activity, often exaggerated by billion dollar deals in one year such as the merger of Johnson Controls and Tyco of $165Bn in 2016. Access control when combined with identity management is punching well above its weight, and this trend has continued Access Control To Open Systems Only time will tell whether the new year pattern of M&A activity is a coincidence or a harbinger of a busy M&A year ahead“It may be too early to make judgements on the future based on the last four weeks, but there are some interesting points that can be made when compared with our 2018 analysis,” says McHale. “Access control when combined with identity management is punching well above its weight, and this trend has continued. "Acre has been a major contributor and has completed some 10 acquisitions. In general, the access control business has been slow to move to open systems, and hopefully we can expect this trend toward openness to continue as it will give additional growth to the business.” For more commentary from Memoori, see their report “Major Trends in the Global Access Control Market 2018”. Only time will tell whether the new year pattern of M&A activity is a coincidence or a harbinger of a busy M&A year ahead. While past trends may provide a glimpse of what’s coming, there are always new variables. It’s a sure bet the overall trend toward consolidation will continue but predicting the pace and timing of individual transactions is almost impossible. In any case, it will be interesting to watch how 2019 unfolds on the M&A front, among other factors in a changing industry.
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no searching in a bag or purse for the card). And there’s no personal identification number (PIN) code to remember; no “intrusive” biometric element that can concern some users. James Segil, President and Co-Founder of Openpath, says the simplified process “uses fewer thought cycles.” Reliability of the system comes from Openpath’s SurePath triple-connect technology “We wanted to make mobile access control that people want to use and can use safely and with ease,” he says. “We wanted to make using a smart phone for access control easier and more reliable than using a keycard.” Simplified User Operation In the simplified scenario, the mobile credential resides on a smart phone that can remain tucked away in the user’s purse or pocket. The credential remains active without the user needing to open an app. The wave of the hand signals intent, which causes the button to light up, activate and the door is ready to open. Segil says the simplicity of operation has contributed to the system seeing an unheard-of 94% adoption rate among users. Reliability of the system comes from Openpath’s SurePath triple-connect technology. The smart phone credential is delivered using Bluetooth, WiFi or LTE (cellular) – whichever signal reaches the reader first enables the door to be opened. So even if a company’s WiFi is down or Bluetooth proves unreliable, there is still a third option. Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems Seamless Cloud Integration Segil is a serial entrepreneur who has had experiences as a frustrated user, dealing with many different offices, people and access control deployments over the years – subletting office space, changing PIN codes, dealing with 10 different offices using 10 different cards. Based on that experience, Openpath’s founders saw a need for a more user-centric approach to access control, and a chance to improve the office experience to be more aligned with employees’ experiences in their smart homes. Segil says he also saw “significant lethargy” among incumbent players in the access control space, and a market in which mobile and cloud technologies had still not taken hold. In addition to a simplified user experience built around mobile credentialing, Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems. The “elegant” readers, including a flush-mounted version, fit in well with high-end office environments. The company launched in May 2018. Openpath has been signing up national and regional channel partners all across the U.S. Openpath is focused on the commercial real estate market, where they have already seen significant adoptions, especially among mid-sized companies. Larger deployments as part of new construction are in the pipeline. National System Integration In the past six months since its launch, Openpath has been signing up national and regional channel partners all across the U.S. and now has a nationwide footprint and is able to service customers all over the U.S. They are not yet disclosing any specifics about the number of partners they have signed up and who they are. “I can share that we have a number of large national system integration and security brands on board as channel partners and many more regional and local system integrators,” says Segil. They are looking for additional integrator partners. “There is a cohort of folks out there who say ‘I get it,’ and I want to offer it to my customers,” says Segil. The cloud element of the system can provide recurring monthly revenue (RMR). Openpath’s system offers flexibility in terms of meeting each customer’s security needs. In addition to the “super convenient” scenario described above, the system can also be configured to be “super secure,” using two-factor authentication and other measures, says Segil. There are multiple “flavors” between the two extremes. It can also be integrated with elevators to enable the buttons on allowed floors. Integration With Existing Systems Cloud software simplifies operation for both tenants and landlords. The system is backwards-compatible to existing systems and can be used to retrofit and mobile-enable a legacy system, providing the benefits of mobile features and cloud operation to multiple sites. The software can interface with enterprise applications such as Active Directory, and an application programming interface (API) facilitates integration with other systems and building components. It operates with marketing automation platforms such as Flack and visitor management systems such as Envoy. The system is backwards-compatible, providing the benefits of mobile features and cloud operation to multiple sites Open standards make the system easy to install in new or existing buildings using RS485, or Cat 5 or Cat 6 wiring, whatever is in place. Retrofit installations can use existing panels, servers, software, etc., or they can be replaced. The Openpath panel is installed right next to an existing panel in a retrofit and preserves all legacy integrations of the previous system. Access Credentials Compatibility In its simplest configuration, the Openpath system consists of single or four-door panels wired using standard ports, Wiegand ports and REX ports, each connected to software in the cloud. Each panel works offline if the internet connection is down. Various key fobs, cards and other credentials are available in addition to mobile credentials. Openpath was one of the new exhibitors at last fall’s GSX show in Las Vegas, occupying a large-sized booth for a startup company. The “beautiful” hardware drew a lot of attention, says Segil. “The channel loves us, and we signed a lot of people,” he adds. “We were excited by the response.”
One of the biggest recent security divestitures in the news was the sale of Mercury Security to HID Global, which occurred around a year ago. The seller in that transaction was ACRE (Access Control Related Enterprises), also the parent company of Vanderbilt and ComNet. We recently spoke to founder and CEO Joe Grillo, a 30-year industry veteran, about the mergers and acquisitions (M&A) market, ACRE’s future, and new opportunities opened up by the Mercury sale. Q: What’s new with ACRE? Grillo: We have an opportunity to have organic growth and to have some scale on a global basis to be a decent size player" ACRE is a company I founded in 2012, and since then we have had six acquisitions and one divestiture. We’ll never focus on ACRE as a brand, but we currently have more visibility of ACRE as a parent company with our two strong brands, ComNet and Vanderbilt. Last year was a very busy year [with the sale of Mercury Security to HID Global] because it takes as long to sell a brand as to buy one, maybe more so. Q: What’s next? Grillo: What you are seeing from us this year is that we are again in a buying mode. No announcement yet, but we expect one by the end of the year. We are well-funded, have great partners, and see an opportunity to continue to grow acquisitively as our highly fragmented space of access control continues to consolidate. From the standpoint of ACRE, with the ComNet and Vanderbilt brands, we are also doing more integration on the backside – not what the customer sees. We will continue to grow toward a $200 million business. We were there when we owned Mercury, and we will get there again. We have an opportunity to have organic growth and to have some scale on a global basis to be a decent size player. Because ACRE are owned by a private equity company, we are brought into every opportunity: ComNet is a good example" Q: Do you see the M&A market being more competitive – more companies looking to acquire? Grillo: There’s a lot of money chasing not-so-many deals, so evaluations can get expanded. But as interest rates creep up, it is definitely a challenge to find the right valuation, the right financing and the right strategic fit. It is a very strategic market. Q: There have been some big acquisitions lately. Were you guys involved at all in evaluating those opportunities? Grillo: Because we are owned by a private equity company, we are brought into every opportunity. An example of that was ComNet. I would not have been aware that the founder passed away two years ago and that there was this opportunity to own the business. So we look at everything; anything that’s out there we look at. The biggest recent announcement in our world was S2 (being sold to UTC/Lenel), and, yeah, we looked at that. It didn’t fit our profile – it was too expensive. Great business, and it’ll be interesting to see how it fits into the UTC environment. There was also Isonas [which was recently sold to Allegion], but the size didn’t add enough scale, but I like the technology. ComNet sells communication networking solutions and products, which is more attractive than video systems for ACRE Q: So what are you looking for in an acquisition? Grillo: It’s hard for us to find something that moves the needle, and you have to find that right balance. Is it something we can digest and have the financing for, and also is there room on the back end? We are private equity-owned, so we know there will be an exit for our investors, too. So we have to find the right balance, good valuations, the right size and digestible. If you look at our acquisitions, we have done two “carve outs.” The Vanderbilt name didn’t exist until we bought the business from Ingersoll Rand, and then we bought the [intruder] business from Siemens. That’s how Vanderbilt came about. You get a lot of value when you carve out a business, but there’s a lot of work. In the case of Mercury or Access Control Technology (ACT) that we acquired; they were growing and profitable but they stretch your finances a lot more. So you have to find the right mix in there. Q: Does video interest ACRE at all? Grillo: We have to find the right balance, good valuations, the right size and digestible"ComNet is our video play. ComNet sells communication networking solutions and products, and 70 to 80 percent of that is used for video systems. But unlike cameras, which don’t interest us, it’s actually good margins, highly specialized repeat business and with good channel partners. So where are we going to play? Cameras – no (because of commoditization). We have some recorder technology (from the Siemens acquisition) and we have the communication networking technology (with ComNet). On the software side, we have looked at a lot of the VMS companies, and a lot of them have been on the market. But the valuation expectations can be high because they are software companies. And we really believe in partnering as a good thing, too. If we integrate to Milestone or Salient or some of these companies, we will never lose an access control client because they chose a particular VMS. Q: ACRE is also looking to grow organically, isn’t it? Grillo: From a technology perspective, we are a product company and we are continuing to bring new products to the market with the ComNet communication networking business and the access control business. And in Europe, we have a third leg of the stool, which is the very successful intrusion and burgular alarm business we acquired from Siemens (SPC products now sold under the Vanderbilt brand). That business continues to do well and is now one of the highest performing segments in our portfolio.The intrusion and burgular alarm continues to do well and is now one of the highest performing segments in our portfolio" Q: But you don’t have to own a company to make it part of your solution. Grillo: An important word is integration. We have to integrate to all the wireless locks. We have to integrate to the VMS systems. But we don’t have to own them. Q: How has the Mercury Security divestiture impacted the rest of your business? Grillo: It has opened up the opportunity for us to look at Mercury partners as possible acquisition targets without worrying about conflicts with the very good business of Mercury. We have more flexibility now compared to the Mercury era. Q: How will the economic cycle impact the security market? Grillo: Interest rates are a much bigger issue than the overall economic cycle. We talk a lot about it with our owners – clearly interest rates are tightening up. If you go out to do acquisitions or to borrow money to do something with your business, it will be tougher than it was two years ago, and it may get worse in the next two years. Security is less impacted by the economic cycle than some industries.
Integrity Security Group is using SmartTask’s SmartForms to gain added visibility and dramatically cut down on its administrative burden. Having adopted the employee scheduling and mobile workforce management software last year for the provision of proof of attendance, control room management and staff rostering, the company is now using its electronic data capture functionality to streamline a range of operational processes. Initially, SmartForms are being used for vacant property and mobile patrol inspections as well as daily vehicle checks, already saving more than 15 hours of admin a month. SmartTask SmartForms The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team “We are now using the SmartTask SmartForms to help reduce administration, capture critical work data and enforce health and safety procedures,” explains James Chittil, General Manager at Integrity Security Group. “We are constantly looking at clever ways to take advantage of the software’s rich functionality, so we can continue to simplify and enhance the way we operate.” The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team. All reporting for vacant property and mobile patrol inspections – for both scheduled patrols and alarm activations – are now completed using a SmartTask-enabled smartphone. By electronically capturing all relevant information, including photo evidence, Integrity can quickly provide customers with a status update and details of all undertaken work as well as respond to any identified issues. Vehicle Checks And Fleet Management Meanwhile, daily vehicle checks for Integrity’s fleet of vans are now completed using a specially-developed SmartForm, so the company can instantly see if drivers are complying with this health and safety procedure. Any vehicle-related problems or damage can be raised by the driver and actioned immediately by the admin team to mitigate fleet risk. Mileage data is also captured through the software, enabling maintenance requirements to be tracked and scheduled at appropriate intervals. “The SmartForms are enabling us to dramatically reduce paperwork and remove manual processes. This is making it much simpler for both our security officers in the field and our office-based admin team to capture, collate and communicate essential operational data. This is not only helping us make better use of our valuable resources, but also enhance the service we are providing to customers,” added James Chittil. Paul Ridden, CEO of SmartTask commented: “Our experience within the security sector means we are continually developing new functionality that overcome real-world problems for our customers. This is the reason we are working in partnership with a growing number of security businesses who recognize the value they can gain and the benefits they can achieve from using the SmartTask software.” Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff Lone Worker Protection Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff as part of its commitment to lone worker protection. The company is also using the intelligent rostering functionality to streamline internal planning processes, while the interactive dashboard supported the launch of a dedicated, out-of-hours control room operation by providing a live view of all scheduled shifts and expected or missed check calls. SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
Following the recent successful installation of 360 Vision Technology’s new Invictus ruggedized PTZ camera by a north London borough, the same borough has now rolled-out over 100 Invictus cameras across seven Greater London towns. With an early success in prosecuting serious crime following the deployment of Invictus, its highly effective night-time HD quality color video footage proved to be just one of the useful attributes of the UK manufactured camera, when a recent significant impact by a vehicle to a camera column tested its suitability for roadside deployment. The Invictus camera took the high-speed impact in its stride and showcased its ‘Attack Detect’ feature, automatically resetting to the last viewing position prior to being forcibly moved from its previous viewing direction, and with no damage to the camera or its direct drive PTZ mechanism. Based on our experience, 360 Vision’s Invictus camera was the obvious choice for us to recommend to this important Local Authority customer" Importance Of Ruggedized Cameras Commenting on the broader roll-out of Invictus cameras, DSSL Group’s Works Director, Aaron Stephens, who specified the 360 Vision Technology cameras confirmed: “The importance of selecting a product that is ‘fit for purpose’ when being deployed roadside in a town center is often overlooked by some companies, who deploy non-ruggedized cameras purely on the basis of cost. If a PTZ camera were to fall from height following an impact, which is a real risk, there would be a substantial public health and safety incident. “At DSSL, we take a holistic view to consider the surveillance needs at each individual location, to ensure that all aspects of camera deployment are taken in to consideration. Based on our experience, 360 Vision’s Invictus camera was the obvious choice for us to recommend to this important Local Authority customer.” The expanded installation takes the total number of Invictus cameras to over 100; and allied to wireless links forming a major part of the system’s infrastructure, comment has been made regarding the superb quality of the Invictus camera video over wireless infrastructure. Simplified Surveillance Operation Our close technical partnership with 360 Vision Technology has enabled deep systems integration and control of the Invictus cameras"In a market often dominated by imported Far East products, the integration of Genetec Security Center and high-performance Invictus PTZ cameras has proven the effectiveness of two Commonwealth technology providers. Commenting on the camera/control technology collaboration, Genetec Country Manager, Paul Dodds said: “Our close technical partnership with 360 Vision Technology has enabled deep systems integration and control of the Invictus cameras. Genetec Security Center unified platform and Omnicast video surveillance has been used to seamlessly blend full Invictus camera menu control, within a single intuitive interface. 360 Vision cameras are a Genetec certified product on our supported device list. This successful deep integration has simplified the London borough’s surveillance operation and effective management. We value all of our technology partnerships, and especially with manufacturers such as 360 Vision Technology, who offer reliability with their Invictus PTZ cameras, as illustrated here across seven north London towns.” Reducing Carbon Footprint With a focus on reducing carbon footprint, we are continually working towards reductions in camera power consumption"Adrian Kirk, Strategic Account Director at 360 Vision commented on the green credentials of Invictus, which was a factor in the overall decision by DSSL to specify the camera: “With a focus on reducing carbon footprint, we are continually working towards reductions in camera power consumption. “On larger projects like this, the savings on energy and reduction in associated pollution offers significant advantages over Far East camera alternatives, helping Local Authority end-user system operators to meet their carbon footprint reduction goals. “With a host of performance and user centric operational benefits, Invictus is well placed to feature extensively in future Local Authority upgrades, as customers look at total cost of ownership and the need to ensure CCTV equipment deployed road side is fit for purpose.”
MARSS NiDAR system has been selected to secure and protect a critical national infrastructure (CNI) site in the form of a major dam facility. The NiDAR command and control (C2) system has been selected to integrate a thermal camera and a sonar system to protect the dam from potential underwater and surface approaches. NiDAR is an advanced long-range surveillance system designed to protect maritime and land-based critical infrastructure from air, surface and underwater approaches. Tracking Objects In Real Time NiDAR is sensor agnostic, enabling it to integrate with any existing hardware or systems, and due to its modular design, not only does it meet the current contract needs, but it also offers the flexibility to meet any future expansions or requirements. NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time, of over 1000 known and unknown, air, surface and underwater objects thanks to the software algorithms. It can intelligently analyze and rank unknown objects to determine potential threat levels and automatically trigger the appropriate alert. When the user determined warning and alarm zones are breached the system can automatically or manual deploy integrated countermeasures to deter potential approaches and de-escalate threats. Enhanced Awareness Picture The intuitive C2 interface provides an enhanced awareness picture, in real-time, through a touchscreen user interface and multi touch control. Rob Balloch, Sales Director of MARSS said, “NiDAR was chosen for this critical national infrastructure as it is robust and suited to all environments, however challenging. Its high availability and reliability, low maintenance and cost effectiveness makes it the perfect choice for any future growth, or change of requirements, with minimum disruption.”
Maxxess eFusion technology is being used to provide seamless integration and easy management of security, safety and site management systems at Bluewaters Island, Dubai. Maxxess eFusion Technology The region’s newest tourism hotspot, Bluewaters opened in November 2018 and is expected to attract more than 3 million visitors every year. The US$ 1.6bn project was completed by Meraas Holdings over five years and comprises four luxury residential complexes, a landmark Caesars Palace hotel, a shopping mall and the world’s largest observation wheel, Ain Dubai, as its centerpiece. Security And Safety Integration Bluewaters’ management wanted to find the most efficient way to integrate all security, safety and building management functions into one easy operating system Bluewaters’ management wanted to find the most efficient way to integrate all security, safety and building management functions into one easy operating system, with particular emphasis on a solution that would be efficient to use, inexpensive to maintain and robust going forwards Following a sector comparison, Maxxess eFusion technology was identified as providing the best fit. Security Management Platform The eFusion security management platform was chosen instead of a more costly or complex conventional PSIM solution, because it uses versatile, open-technology software. Omnix International, one of the leading integrators brought in for the project, says eFusion proved particularly straightforward to work with, offering the advantages of a modular, building block approach and allowing maximum freedom to integrate, customize and adapt to future needs. “Thanks to its compatibility with leading surveillance, intruder, access and fire detection systems, eFusion proved to be a highly efficient integration technology for the Bluewater project,” says Mr. Henry Azoury, Senior Security Design and Engineering Manager at Omnix International. ASSA ABLOY Hospitality System The eFusion platform at Bluewaters includes full integration with an ASSA ABLOY Hospitality system The eFusion platform at Bluewaters includes full integration with an ASSA ABLOY Hospitality system. It allows a unified system approach, with a single enrolment protocol for both front- and back-of-house access. The solution enables centralized management of room safes, mini-bars and cupboards, and for control of all alarm transactions. eFusion integration with the Zenitel Stantaphone IP Intercom System ensures that video and transaction data is called-up automatically in the Bluewaters control room as soon as any user press a call button. For maximum efficiency, the system allows the operator to unlock doors and communicate with the user remotely, with full activity logs kept for audit. With easy integration to the SeeTec Video Management System, eFusion also allows seamless control of all cameras. In addition, cameras are linked to the door access system, with video pop-up triggered by pre-defined events. The solution also gives the operators complete PTZ control, playback and video functionality. ID badging Integration ID badging and building management systems are also fully integrated, allowing easy operation and control of a wide range of functions including heating, ventilation and air conditioning. The eFusion platform is based on technology that delivers robust, reliable performance" “For maximum efficiency there is no need to switch between different management systems and the eFusion platform is easy to work with, allowing full benefit from integration with individual systems,” says Lee Copland, Managing Director EMEA, Maxxess. eFusion At Intersec 2019 “The eFusion platform is based on technology that delivers robust, reliable performance, as well as being fully scalable as needs change the future. We look forward to our continued work with Omnix International, which is providing the world-class specialist engineering services combined with local, customized support that customers value.” To see Maxxess solutions in action come to Intersec 2019 on stand SA-H12.
The Eurofighter will be equipped with a new generation of radar which will enhance the aircraft’s capabilities and survivability. In the Euroradar consortium, the sensor solutions provider HENSOLDT is pressing ahead with the development of the Eurofighter’s new Captor-E radar system. Following the successful acceptance test, HENSOLDT has now delivered the second antenna ready for series production to Leonardo UK in Edinburgh. This means that the production of the so-called e-scan antenna can commence at the HENSOLDT site in Ulm/Germany according to plan. This paves the way for the delivery of the first radar systems as of mid-2019. Resource Management As early as spring 2018, the radar has successfully completed two flight campaigns at British Aerospace Systems (BAES) in Warton and at Airbus Defense and Space in Manching and met the requirements of the Critical Design Review (CDR) exactly on schedule. The Captor-E radar is based on AESA (Active Electronically Scanned Array) technology and will significantly enhance the performance of the Eurofighter The Captor-E radar is based on AESA (Active Electronically Scanned Array) technology and will significantly enhance the performance of the Eurofighter. Electronic beam scanning combined with flexible radar resource management provide outstanding detection performance and ensure simultaneous multi-target tracking, missile guidance and perception of the situation. The Eurofighter’s nose is larger than that of all the comparable fighters, which means that the antenna is much larger and consequently more powerful than that of competing aircraft. Radio-Frequency Components This, together with the ability to mechanically rotate the antenna with a larger angle of view, increases both the detection area and the field of regard in comparison with the AESA radar systems used by the competitors. The further development of radar technology is one of the main focal points of the sensor specialist HENSOLDT. For this reason, HENSOLDT operates one of the largest cleanroom production lines for radio-frequency components in Europe. HENSOLDT’s radar systems are deployed worldwide by armed forces, including the US and German Navy, as well as at the bases of the Canadian, Australian and German Air Force. The Eurofighter radar is being developed by the Euroradar consortium comprising Leonardo (Great Britain, Italy), Indra (Spain) and HENSOLDT (Germany). The consortium has already developed and produced more than 400 Captor radars.
Globally-renowned Pay on Foot parking systems manufacturer, DESIGNA, has worked with the White Rose shopping center in Rhyl, North Wales, to update its car parking system to the company’s advanced ABACUS software and equipment. Contactless Card Payment The installation included new state-of-the-art entrance and exit terminals accepting tap in/tap out contactless card payment technology After many successful installations abroad, the shopping center is the first DESIGNA site in the UK to have installed its new tap in/tap out contactless credit card technology. The installation included new state-of-the-art entrance and exit terminals accepting tap in/tap out contactless card payment technology. There are also three full pay stations, a DBS server, manual pay station and intercom. All of this helps to improve the efficiency and security of the car park, which is popular with shoppers due to its seafront location. As the first part of the shopping experience, the convenience and availability of a car park is crucial to the overall service and satisfaction of a customer. DESIGNA recognized this and developed ABACUS, an advanced car park access system that intelligently integrates various elements to create the ultimate system that is highly reliable and requires less maintenance. It can also cope with large volumes of traffic while providing the highest level of monitoring to ensure a secure parking environment. ABACUS Car Park Access System The parking system is barrier controlled and makes use of DESIGNA barcode ticket technology. In addition to the standard ticket technology, the car park offers the facility to tap in/tap out using a contactless credit card. This operates with a unique identifier from the credit/debit card as a substitute for a ticket for the duration of the stay at the car park. When the customer presents a contactless card on entry, it recognizes them and by tapping again at the exit it automatically calculates the tariff and allows payment to take place at the exit. The system has three pay on foot machines which accept coins, notes and credit cards. With more than 30 stores, White Rose shopping center, Rhyl’s number one shopping destination, has a wide range of quality stores. Located in the center of the town, White Rose is a short walk from Rhyl’s seafront, railway station and sea aquarium, and has direct access car parking for 300 vehicles. The center previously had a chip coin solution installed on site. Advanced Ticket Machines The biggest advantage of having the DESIGNA system in place is the easy payment method" Sue Nash, Center Manager at the White Rose commented, “The biggest advantage of having the DESIGNA system in place is the easy payment method. The advanced ticket machines make it possible to pay using several means, therefore reducing the problem of queuing at the pay machines and having to pay with change. Another payment option we now have is the facility to pay through mobile devices and via contactless cards.” She continued, “The majority of people move around with credit cards rather than cash and having a versatile payment option in the car park makes for a painless process. The maintenance of the system at our local level was extremely important to avoid costly and timely engineer callouts. Simple things like ticket and coin jams, system resets are now extremely easy to resolve as is the exchange of entry tickets when required. I would certainly recommend the DESIGNA system to others and we are extremely pleased with the results.” Car Parking Ease And Convenience Specifier Andrew Bailey, of Parking Ideas, commented, “Parking Ideas is a complete car parking and transportation consultancy that helps institutions, property owners, landlords and managing agents develop and optimize their assets. I have worked with the White Rose shopping center for a number of years and following a competitive tender found that DESIGNA’s systems best suited the client’s requirements.” He continued, “The ABACUS system is good value, commercially viable and ticked all the right boxes for the White Rose. It is very important to have the facility to pay by card, so the payment terminals having this feature are vital to the center and have made all the difference to the running of the car park. Parking Ideas has been in the parking industry for more than 15 years, so we have worked with DESIGNA before and are very happy with the end result.” DESIGNA Ticket Terminals The car park’s entrance and exit are installed with DESIGNA In+ and Out+ ticket terminals so that using the site is fast and easy The car park’s entrance and exit are installed with DESIGNA In+ and Out+ ticket terminals so that using the site is fast and easy. The advanced terminals operate on the lowest energy consumption of their class with the ability to hold more tickets than before, with the bin adapting itself to the fill quantity. Customers are greeted with excellent user-friendliness due to the simplicity of the equipment and illuminated display with clear instructions. The four-way barcode readers also ensure visitors can insert their ticket any way round into any of the pay stations around the site. DESIGNA Pay On Foot Machines For payment, three of DESIGNA’s new Pay on Foot machines are in place in the car park. This allows customers to pay for their visit before returning to their car and exit the car park more quickly. The pay station is deliberately designed to allow disabled customers to pay freely without assistance. Each of the pay stations is installed with an interactive monitor that makes it easy to pay and offers several different languages. Shopping center management has full control of the ABACUS system through the DBS server, with a manual pay station (MPS) to allow them to create or override payments. The control room also links with the ticket and payment terminals via a DESIGNA VoIP Intercom to assist customers if required. Global Implementation DESIGNA has more than 15,000 systems installed globally across a wide range of car park situations DESIGNA’s parking systems are used in a number of impressive shopping centers around the world. These include the Dundrum shopping center in Dublin, the Mid Valley Megamall in Malaysia and the Mall of Emirates in Dubai. In the UK the Belfry shopping center in Redhill, the Woolshops shopping center in Halifax and the Wellgate center in Dundee have also benefited from the ABACUS system. Recognized worldwide for its high quality and intelligent systems, DESIGNA has more than 15,000 systems installed globally across a wide range of car park situations, including shopping centers, airports and hospitals. ABACUS is one of the company’s innovations and demonstrates the endless possibilities available to car park operators. The future-proof technology allows for expansions of premises or new property acquisitions by allowing additional systems to be added to the network. In its many global applications, ABACUS has proved to be an effortless system for both operators and users and is a great investment for companies looking to the future.