Luxul, global innovator of IP networking solutions for AV integrators, has announced its technology line-up for the NAHB International Builders' Show (IBS), taking place February 19-21, 2019 in Las Vegas. In the Legrand booth SU614, the company will exhibit a wide range of solutions for home builders that deliver reliable, high-performance networks in smart homes, including Gigabit switches; the next generation of wireless controller technology; indoor and outdoor wireless access points (APs); wired and wireless routers; intelligent network power distribution units (PDU); and the Wi-Fi Assurance Program exclusively for builders. "Every aspect of the smart home is powered by the network, so rock-solid reliability and exceptional performance from all components — from routers and switches to wireless APs — are absolutely critical to delivering the seamless experience users expect," said Mike Grubb, vice president of marketing at Luxul. "At IBS 2019, we'll be showcasing a full line-up of solutions that not only meet these standards but offer advanced capabilities that simplify installations and allow integrators to remotely monitor and support their clients' systems to lower costs and increase customer satisfaction." PoE Devices And Wireless Controllers Highlighted Luxul managed switches at IBS 2019 will include the 12-port/8 PoE+ XMS-1208P Highlighted Luxul managed switches at IBS 2019 will include the 12-port/8 PoE+ XMS-1208P, which features port Auto-Recovery and Power Scheduling to ensure system reliability and uptime. Auto-Recovery allows the switch to power cycle unresponsive PoE devices, and Power Scheduling allows switch PoE ports to be turned on or off on a schedule. Enabling simple network expansion, the XMS-1208P features two Gigabit RJ-45 uplink ports and two SFP ports. Luxul will also be showcasing its 8-port XGS-1008 and 5-port XGS-1005 Gigabit desktop switches. Luxul's XWC-1000 wireless controller will be on display, with support for up to 16 APs, allowing each AP to be configured for a designated wireless channel in addition to supporting individual wireless transmit power adjustment. Newly deployed APs are now automatically added for plug-and-play installation. Luxul's Roam Assist technology built into the wireless controller ensures that mobile devices are always connected to the best AP for the highest performance. Wireless AP Solutions Featured indoor wireless AP solutions include the Apex line of access points: XAP-810, XAP-1510, and XAP-1610. For smaller networks, the cost-effective XAP-810 offers 802.11ac 2x2 dual-band technology and 5GHz beamforming for data rates up to 1200Mbps. The XAP-1510 features 802.11ac 3x3 dual-band technology and 2.4 and 5GHz beamforming for data rates up to 1900Mbps. The XAP-1610 AC3100 dual-band wireless AP features advanced 4x4 MU-MIMO (802.11ac Wave 2) technology and 2.4 and 5GHz beamforming for data rates up to 3167Mbps. The AP is designed to enhance transmission and reception performance, producing higher throughput when experiencing medium to weak signals within the effective range. For superior wireless coverage outside, Luxul's outdoor APs feature rugged IP-65-rated designs, pole or wall mounting options, and simple set-up and installation. On display at IBS 2019 will be the 300N XAP-1240 featuring multi-stream 802.11n wireless technology; the dual-band AC1200 XAP-1440 featuring multi-stream 802.11ac technology for data rates up to 1200Mbps; and the dual-band AC1200 XWO-BAP1 bridging AP to deliver connectivity to remote locations such as outbuildings and guest houses. Remote Wireless Security And Management For ultra-fast streaming and bandwidth-intensive applications, Luxul's wired Gigabit dual-WAN Epic 5 router will be on display For ultra-fast streaming and bandwidth-intensive applications, Luxul's wired Gigabit dual-WAN Epic 5 router will be on display. The router combines Gigabit WAN-to-LAN speeds with built-in Domotz remote management and Router Limits content management technologies to lower operation costs and put homeowners in control of their internet experience. Highlighted wireless routers will include the XWR-1200 dual-band AC1200 Gigabit router, which features high performance 802.11ac 2x2 MIMO technology for data rates up to 1200Mbps. Fast and easy to set up, the Luxul PDU-2 on display allows for the local monitoring and rebooting of unresponsive devices, while its self-healing function performs reboots automatically to avoid costly truck rolls and service calls for integrators. Power management features for the PDU-2 include MOV surge and spike protection for connected equipment in addition to remote sequencing for controlled startup and shutdown. Wi-Fi Assurance Program Finally, Luxul will highlight its Wi-Fi Assurance Program for home builders. With the initiative, the company is providing dealers and builders with certified wired and wireless network designs — complete with tech support — that are guaranteed to meet their customers' reliability and performance requirements.
DigiCert, Inc., global provider of TLS/SSL, IoT and PKI solutions; Utimaco, one of the world’s top three Hardware Security Module providers; and Microsoft Research, a provider of quantum-safe cryptography, announced a successful test implementation of the “Picnic” algorithm, with digital certificates used to encrypt, authenticate and provide integrity for connected devices commonly referred to as the Internet of Things (IoT). This proof of concept provides a path toward a full solution, currently in development, that will protect IoT devices from future threats that quantum computing could pose to today’s widely used cryptographic algorithms. IoT Devices With RSA And ECC Cryptography Currently, most IoT devices use RSA and ECC to protect confidentiality, integrity and authenticity for device identities and communication Currently, most IoT devices use RSA and ECC to protect confidentiality, integrity and authenticity for device identities and communication. Experts from the security community, including Dr. Brian LaMacchia from Microsoft Research, predict that large-scale quantum computers capable of breaking RSA and ECC public key cryptography will exist within the next 10 to 15 years. Although this might seem like a long time away, many devices such as connected cars, smart homes, connected cities, connected medical devices and other critical infrastructures will either live longer than this or will take longer to update. “DigiCert, Microsoft Research and Utimaco are collaborating today to solve tomorrow’s problem of defending connected devices and their networks against the new security threats that the implementation of quantum computers will unleash,” said Avesta Hojjati, Head of DigiCert Labs, the company’s R&D unit. “Together, we are leading the market with development of hybrid certificates that inject quantum-resistant algorithms alongside RSA and ECC to ensure long-term protection.” DigiCert Uses Utimaco Hardware Security Module The certificates are issued by DigiCert using the Picnic quantum-safe digital signature algorithm developed by Microsoft Research. To implement this algorithm and issue certificates, DigiCert has used an Utimaco Hardware Security Module. The full solution, in development, would provide quantum-safe digital certificate issuance and secure key management, helping companies future-proof their IoT deployments. The cooperation between DigiCert, Microsoft Research and Utimaco will help organizations implement secure and future-proof IoT products" “The cooperation between DigiCert, Microsoft Research and Utimaco will help organizations implement secure and future-proof IoT products that are protected against the potential security threats of quantum computing,” said DigiCert CTO. Dan Timpson. Enterprises will be able to cost-effectively deploy these solutions at any scale. Further, these companies will provide solutions and tools to manufacturers of IoT devices to remain prepared for quantum threats. The goal is to keep the sensitive information and high-value assets safe. Implementation Of Quantum-Safe Solutions “DigiCert, Utimaco and Microsoft’s successful test implementation provides a fundamental building block for the implementation of quantum-safe solutions,” said Dr. Thorsten Grötker, CTO at Utimaco. “Using these solutions, IoT manufacturers and other large organizations can innovate and develop products that are well prepared against coming quantum threats.” Brian LaMacchia, Distinguished Engineer and Head of the Security and Cryptography Group at Microsoft Research, said, “The work that Microsoft Research is doing with DigiCert and Utimaco is important to develop quantum-secure cryptographic algorithms, protocols and solutions today so that in the near future enterprises will be able to transition to and deploy quantum-safe cryptography. Working to ensure that their solutions are cryptographically agile will help companies avoid expensive and unscalable security practices to protect their IoT devices against future security threats.”
BeHome247 and NoiseAware have partnered to advance smart home automation to include noise monitoring alerts and management. This joint effort fully integrates noise monitoring into the BeHome247 Enterprise Property Control platform. Concurrently, in response to market demand, NoiseAware has just announced the newest generation of their privacy-safe noise monitoring service that covers both indoor and outdoor spaces on any property as well as a new mobile app and enhanced dashboard. Providing 24x7 Intelligence To Monitor Properties This new enhanced integration provides property managers with the ‘24x7’ intelligence to monitor their properties in today's challenging environment. It is a testament of the combined commitment to the market that NoiseAware's notification protocol is now seamlessly integrated into the BeHome247 Enterprise Property Control platform providing users an easy to adopt solution. "The BeHome247 mission is to bring all aspects of day-to-day operations and smart home technology onto a single dashboard and NoiseAware fills the growing need for noise monitoring. Whether it's housekeeping, inspections, maintenance, guest communications, or services, BeHome247 manages the workflow across the enterprise. We are excited to bring NoiseAware into the BeHome247 technology ecosystem." - BeHome247. Managing Properties Remotely BeHome247 is a hardware agnostic ‘cloud based’ software provider and allow property managers to have a choice of hundreds of affordable smart home devices with cutting edge functionality. Thousands of properties are monitored by NoiseAware, so bringing it all together inside the BeHome247 platform will help mutual customers manage their properties remotely as they provide their owners protection in the ever-changing noise regulation environment. "We would not have been able to grow as quickly as we have without NoiseAware and BeHome247. I'm thrilled that their partnership will make it even easier to automate our properties and streamline our operations. The technology is solid but their customer service is what sets them apart," says Will Lucas, Founder of Mint House.
GJD has hit the ground running in 2019 with the appointment of Jason Hill as the company’s Commercial Director. Mark Tibbenham, Managing Director of GJD has big plans for the British manufacturer of external motion detectors and LED illuminators, and has recruited Jason Hill to help deliver on his aspirations. GJD Expands In The US Commenting on the new appointment, Mark said: “Even though we were 2017 recipients of the Queens Award for Enterprise, International Trade there are a significant number of markets where we have no representation and Jason can help us identify suitable distributors and partners globally. We are also expanding in the US after opening an office in Los Angeles last year and focusing on the Home Automation market there, Jason is extremely well connected with that sector in North America.” Most importantly GJD has ambitious new product development plans and we need to communicate those effectively to a large potential market" Mark continued to say: “Most importantly GJD has ambitious new product development plans and we need to communicate those effectively to a large potential market. Having worked with Jason over the last few years on a number of projects and partnerships, I felt he was the man we needed to take our business to the next phase.” Home Automation Platforms Jason Hill commented: “It is very satisfying to be working for a British security manufacturer after all these years in the industry. GJD is growing fast and is already recognized as a UK export success story, but there is still so much more potential. I will be busy traveling the world to meet new partners and supporting the US operation as it expands. Mark has already done the hard work of enabling support of GJD products into home automation platforms, so I need to work on market awareness. Reliable human detection in external applications is in huge demand from end users and we have the technology to deliver that, I have also seen the product roadmap for the next two years and there are some great projects on the horizon.” Jason joins GJD from Taiwanese surveillance manufacturer LILIN, where he was UK MD for 20 years and latterly Group Vice President. He has worked in the Security industry since 1990 predominantly with Manufacturers. Founded in 1983, GJD is the UK’s renowned manufacturer, designer and supplier of professional external detector equipment, as well as Infra-Red and White-Light LED illuminators. GJD’s Head Office is based in Heywood, Greater Manchester, UK.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile Credentials Are Not Secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organization more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organization deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All Smartcards Are Equally Secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organization vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organization if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic Locks Are More Vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorized access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be Prepared To Unlock Future Benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
Users of security systems have long been willing to sacrifice certain aspects of security in favour of convenience and ease of use. The tide seems to be turning, however, with the industry at large showing significant concerns over cyber security. End user sentiments also seem to be following that trend, becoming more cautious when it comes to having their security systems connected to the internet. While it has become the norm for security systems to be accessible online, still it presents security threats that unconnected systems would not face. In 2018, we saw a notable shift from the convenience of a connected system to the less convenient, but more secure, standalone system. Consumers are willingly making the choice to trade convenience for security, and companies are responding. While cyber security concerns will continue to be a big topic of discussion, connected platforms will probably be the trend of 2019This in turn is driving an increase in more IoT-like deployments. Rather than the traditional client that is connected to a device to retrieve information, more often we are seeing more active devices, capable of reporting their presence and transmitting information on a scheduled basis, without the need for a client. Preventing Security Systems From Outside Threats This changes the dynamic of the network and alleviates many threats associated with traditional systems because there is no opportunity for outside threats to access your system since the device is transmitting information out vs requiring a connection to the outside world. With IoT deployments, when the device is active and sending messages out of the network segment, it is not vulnerable in the same way that the traditional systems are. While cyber security concerns will continue to be a big topic of discussion, connected platforms will probably be the trend of 2019. In 2018, we saw an increased acceptance in the residential market for smart home applications. While this has been an area of discussion for the past ten years, it is now gaining real traction. With artificial intelligent capabilities in tow, smart home deployments are more common than ever and the video analytics that accompany them are quite impressive. Cloud Security For The Commercial Sector If consumers are trusting their home security systems with this, it only makes sense that they will begin trusting Google to provide security for their offices as wellIn addition to the residential market, connected platforms will likely start to impact the commercial space as well. The border between consumer and commercial user will become a little more blurred. Companies such as Google that cater primarily to home services have cloud capabilities beyond the means of many competitors, in turn giving them a favourable advantage to provide security for the cloud. If consumers are trusting their home security systems with this, it only makes sense that they will begin trusting Google to provide security for their offices as well. As far as ONVIF is concerned, we are excited to see how the market will adopt the newly released Profile T for advanced video streaming in the coming year. We are also excited to explore our relationship with the International Electrotechnical Commission (IEC), by continuing our work on giving devices the ability to communicate upwards and proactively. It is clear that the market is open to adopting models in the quest for more efficiency without sacrificing security.
Market dynamics are changing the U.S. residential security market, creating new business models that better appeal to the approximately 70% of households without a security system. Smart home adjacencies have helped revitalize the traditional security industry, and alternative approaches to systems and monitoring for the security industry are emerging, including a new batch of DIY systems. Growth in the residential security market and its position as the channel for smart home solutions have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras, and other products suffice for their security. Increasingly Competitive Landscape Smart home services can provide additional revenue streams for the security industry For instance, IP cameras are a highly popular smart home device rooted in security, and Parks Associates estimates 7.7 million standalone and all-in-one networked/IP cameras will be sold in the U.S. in 2018, with $889M in revenues. Product owners may feel their security needs are fulfilled with this single purchase, as such dealers and service providers are under increasing pressure to communicate their value proposition to consumers. Categorically, each type of player is facing competition uniquely—national, regional, and local dealers all have a different strategy for overcoming the increasingly competitive landscape. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. While white-label devices are acceptable in some instances, dealers need to integrate with hero products whenever possible when those exist for a category. For dealers who have added smart home devices and services are all potential benefits and good for business Improved Customer Engagement That 2017 survey also revealed 36% of security dealers that offer interactive services report security system sales with a networked camera and 16% report sales with a smart thermostat. For dealers who have added smart home devices and services, enhanced system utility, increased daily value, and improved customer engagement with the system are all potential benefits and good for business. Security has served as the most productive channel for smart home solutions, mainly because the products create natural extensions of a security system’s functions and benefits, but as smart home devices, subsystems, and controllers expand their functionality, availability, and DIY capabilities, many standalone devices constitute competition to classical security. Particularly viable substitute devices include IP cameras, smart door locks, smart garage doors, or a combination of these devices. Products that are self-installed offer both convenience and cost savings, and these drivers are significant among DIY consumers—among the 6% of broadband households that installed a security system themselves, 39% did it to save money. Enhance Traditional Security Self-installable smart home devices may resonate with a segment of the market who want security While many security dealers believe substitute offerings are a threat, some dealers do not find such devices an existential threat but instead view them as another path to consumer awareness. They argue that the difference between smart product substitutes and traditional security is that of a solution that provides knowledge versus a system that gives one the ability to act on that knowledge. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household. For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market who want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Smart home devices and features, while posing a threat to some security companies, are a potential way forward to increased market growth Increased Market Growth A key counterstrategy for security dealers and companies is to leverage their current, powerful role as the prime channel for smart home devices. Many security dealers now include smart home devices with their security systems to complement their offerings and increase system engagement. For example, as of Q4 2017, nearly 70% of U.S. broadband households that were very likely to purchase a security system in the next 12 months reported that they want a camera to be included as part of their security system purchase. In response, many security system providers now offer IP cameras as optional enhancements for their systems. Smart home devices and features, while posing a threat to some security companies, are a potential way forward to increased market growth. Security dealers have an opportunity to become more than a security provider but a smart home solutions provider rooted in safety. Provide Status Updates Comcast has entered both the professionally monitored security market and the market for smart home services The alternative is to position as a provider of basic security with low price as the key differentiator. Comcast has entered both the professionally monitored security market and the market for smart home services independent of security. It has discovered that monetizing smart home value propositions through recurring revenue becomes increasingly challenging as the value extends further away from life safety. Since the security industry remains the main channel for smart home services, security dealers are in a unique position to leverage that strength. Value propositions must shift from the traditional arming and disarming of a system to peace-of-mind experiences that builds off the benefits of smart devices in the home to provide status updates (e.g., if the kids arrived home safely) and monitoring at will (e.g., checking home status at any time to see a pet or monitor a package delivery). These types of clear value propositions and compelling use cases, which resonate with consumer and motivate them to expand beyond standalone products, will help expand the home security market.
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no searching in a bag or purse for the card). And there’s no personal identification number (PIN) code to remember; no “intrusive” biometric element that can concern some users. James Segil, President and Co-Founder of Openpath, says the simplified process “uses fewer thought cycles.” Reliability of the system comes from Openpath’s SurePath triple-connect technology “We wanted to make mobile access control that people want to use and can use safely and with ease,” he says. “We wanted to make using a smart phone for access control easier and more reliable than using a keycard.” Simplified User Operation In the simplified scenario, the mobile credential resides on a smart phone that can remain tucked away in the user’s purse or pocket. The credential remains active without the user needing to open an app. The wave of the hand signals intent, which causes the button to light up, activate and the door is ready to open. Segil says the simplicity of operation has contributed to the system seeing an unheard-of 94% adoption rate among users. Reliability of the system comes from Openpath’s SurePath triple-connect technology. The smart phone credential is delivered using Bluetooth, WiFi or LTE (cellular) – whichever signal reaches the reader first enables the door to be opened. So even if a company’s WiFi is down or Bluetooth proves unreliable, there is still a third option. Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems Seamless Cloud Integration Segil is a serial entrepreneur who has had experiences as a frustrated user, dealing with many different offices, people and access control deployments over the years – subletting office space, changing PIN codes, dealing with 10 different offices using 10 different cards. Based on that experience, Openpath’s founders saw a need for a more user-centric approach to access control, and a chance to improve the office experience to be more aligned with employees’ experiences in their smart homes. Segil says he also saw “significant lethargy” among incumbent players in the access control space, and a market in which mobile and cloud technologies had still not taken hold. In addition to a simplified user experience built around mobile credentialing, Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems. The “elegant” readers, including a flush-mounted version, fit in well with high-end office environments. The company launched in May 2018. Openpath has been signing up national and regional channel partners all across the U.S. Openpath is focused on the commercial real estate market, where they have already seen significant adoptions, especially among mid-sized companies. Larger deployments as part of new construction are in the pipeline. National System Integration In the past six months since its launch, Openpath has been signing up national and regional channel partners all across the U.S. and now has a nationwide footprint and is able to service customers all over the U.S. They are not yet disclosing any specifics about the number of partners they have signed up and who they are. “I can share that we have a number of large national system integration and security brands on board as channel partners and many more regional and local system integrators,” says Segil. They are looking for additional integrator partners. “There is a cohort of folks out there who say ‘I get it,’ and I want to offer it to my customers,” says Segil. The cloud element of the system can provide recurring monthly revenue (RMR). Openpath’s system offers flexibility in terms of meeting each customer’s security needs. In addition to the “super convenient” scenario described above, the system can also be configured to be “super secure,” using two-factor authentication and other measures, says Segil. There are multiple “flavors” between the two extremes. It can also be integrated with elevators to enable the buttons on allowed floors. Integration With Existing Systems Cloud software simplifies operation for both tenants and landlords. The system is backwards-compatible to existing systems and can be used to retrofit and mobile-enable a legacy system, providing the benefits of mobile features and cloud operation to multiple sites. The software can interface with enterprise applications such as Active Directory, and an application programming interface (API) facilitates integration with other systems and building components. It operates with marketing automation platforms such as Flack and visitor management systems such as Envoy. The system is backwards-compatible, providing the benefits of mobile features and cloud operation to multiple sites Open standards make the system easy to install in new or existing buildings using RS485, or Cat 5 or Cat 6 wiring, whatever is in place. Retrofit installations can use existing panels, servers, software, etc., or they can be replaced. The Openpath panel is installed right next to an existing panel in a retrofit and preserves all legacy integrations of the previous system. Access Credentials Compatibility In its simplest configuration, the Openpath system consists of single or four-door panels wired using standard ports, Wiegand ports and REX ports, each connected to software in the cloud. Each panel works offline if the internet connection is down. Various key fobs, cards and other credentials are available in addition to mobile credentials. Openpath was one of the new exhibitors at last fall’s GSX show in Las Vegas, occupying a large-sized booth for a startup company. The “beautiful” hardware drew a lot of attention, says Segil. “The channel loves us, and we signed a lot of people,” he adds. “We were excited by the response.”
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality, smart homes, smart cities, and machine intelligence. Video is an important element at CES. This year, the focus is on intelligent video. For example, Eyecloud.ai, Santa Clara, Calif., is displaying a home security camera with on-device face recognition that uses AI. Powered by a 12-core Intel Movidius VPU (video processing unit), the camera combines AI-on-the-edge with easy setup and wirefree operation for up to six months per battery charge. On-Device Artificial Intelligence On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation SimCam, an Intel partner, demonstrates how the Intel Movidius VPU can turn a security camera into ‘the ultimate vision-based sensor’. On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation. A variety of other residential video systems are also on display at CES. For example, Swann Security is displaying 4K wired security systems featuring Google integration, a wireless smart security camera with True Detect heat-based PIR (photo infrared) motion detection, a video doorbell and chime with two-way talk, and indoor and outdoor wi-fi cameras with Alexa integrations. Intelligent Automotive Solutions Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES. It combines advanced image processing, high-resolution video encoding and CVflow computer vision (video analytics) processing in a single, extremely low-power design. The CVflow architecture provides Deep Neural Network (DNN) processing required for a new generation of affordable and intelligent home monitoring, professional surveillance and aftermarket automotive solutions. CV25 offers half the performance of Ambarella’s previously released CV22 chip, but the new chip’s lower cost will bring intelligent cameras to a price point desirable for home systems. All Ambarella’s chips have hardware-based cybersecurity. A suite of advanced cybersecurity features protects against hacking, including secure boot, TrustZone, and I/O virtualization. Based on 10nm ultra-low power processing technology, the CV25 chip is optimized for wirefree cameras applications that require long battery life and small form factors. Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES Virtual Security Guards Elsewhere, the Deep Sentinel home security system applies video and AI to predict residential break-ins ‘before they happen’. The Pleasanton, Calif.-based tech startup uses ‘AI-infused security cameras’ to keep an eye on your home. Three wireless 1080p full HD cameras provide night vision and PIR motion sensing, connected by a smart hub. Using proprietary artificial intelligence, the cameras act as virtual guards, watching activity around a house and providing alerts to situations that may lead to burglaries, break-ins, package thefts and other dangers. My Safe Patrol is an AI-driven platform that analyses data aggregated from security personnel, citizen alert systems and IoT smart devices, and responds with geolocated alerts in real-time. My Safe Patrol effectively supports the security/safety ecosystem of a building, a campus, a city or a district through a dynamic dashboard that helps command and control operations manage and deploy security plans. AI-Integrated Devices Showcased solutions include Smart Living integration of video surveillance applications to enable real-time two-way audio and video streaming simultaneously MicroVision, Redmond, Wash., showcases an interactive display engine for AI-connected devices, providing an integrated solution for projected display and interactivity through multi-point touch and air gestures. MicroVision’s new consumer 3D LiDAR engine provides high-fidelity spatial awareness to smart home hubs, for input to smart devices such as lighting, security, entertainment, and thermostats. The Internet of Things (IoT) is another big topic at CES, and ThroughTek Co., Ltd., Taiwan, demonstrates IoT developments to transmit voice, video and data over both wide- and narrow-band channels in smart home applications. Showcased solutions include Smart Living integration of video surveillance applications combined with voice assistant to companion robots, wireless doorbells, and battery cameras to enable real-time two-way audio and video streaming simultaneously. Advanced Capacitive Touchscreen Decayeux Group, a European manufacturer of mailboxes and high security doors, is displaying MyColisBox, a secure and connected parcel box delivery system designed to provide online shoppers a secure pickup point accessible by a PIN code sent via SMS message to a smartphone. Walter is the new mobile app for MyColisBox. Kwikset, a division of Spectrum Brands, showcases its smart lock portfolio – including three new smart locks – in the CES Smart Home Marketplace. Kwikset is showing the SmartCode 888, Kwikset Convert, Obsidian, and new designs of the SmartCode 914 and SmartCode 916, as well as a new wi-fi lock. Baldwin, Kwikset’s ‘luxury lock’ sister company, is offering a preview of its new TouchScreen Collection, launching this summer, available in five styles and featuring Advanced Capacitive Touchscreen technology. The Internet of Things (IoT) is another big topic at CES, with many companies demonstrating IoT developments Cyber Security Standards Privacy is increasingly a concern in the consumer space, and Private Discuss, from PIMAN Security, is a premium, secure, white label communication solution. Their active AI-powered defense architecture provides encrypted audio and video calls, messaging and file sharing. It renders a confidential, secure messaging platform that adheres to the highest standards of cybersecurity. FLIR provides virtual reality demonstrations at their CES booth, allowing attendees to put on a virtual fire helmet and try out a FLIR camera in a real-world residential fire response scenario. Participants may also use a FLIR optical gas imaging camera virtually to stop fugitive emissions in a natural gas refinery. Booth visitors may also take “thermal selfies” to post on social media.
ISC East is making a name for itself as a must-attend regional conference and trade show in New York City that brings together the large community of law enforcement and private sector security professionals from the Tri-State area. ISC East, being held Nov. 14-15 at New York’s Javits Center, is emerging from the long shadow of its sister show – ISC West in Las Vegas in the spring – and making its own mark on the industry. ISC East is 20% larger than last year, and exhibitors have swelled from 230 to more than 300. Familiar names at ISC East this year (who were absent in 2017) include Allegion, Arecont Vision Costar, Bosch Security Systems, and Seagate Technology. In all, there are 115 new exhibitors compared to 2017.Familiar names at ISC East this year (who were absent in 2017) include Allegion, Arecont Vision Costar and Bosch Security Systems “We purposefully make sure we reflect the region we are in,” says Will Wise, Group Vice President, Security Portfolio, Reed Exhibitions. “It’s not a mistake that both our keynote speakers have New York-centric backgrounds and have topics to reach a larger market. We want to tap into the strengths of the region.” ISC East (International Security Conference & Exposition) has come a long way in the last five years. In 2014, the show was a mere 28,000 square feet, and this year it has grown to 44,000 square feet of exhibit space. One factor driving growth has been improvements in the educational session, powered largely by show partner Security Industry Association (SIA). The two-day event is characterized by “good energy” on both days, says Wise. There is less than 10% duplication of attendance with ISC West. Liability Issues Of Event Security A big topic for New York and surrounding areas is event security, and one session covers “Confined Space Protection & Risk Mitigation for Today’s Industry Leaders.” The session will focus on safeguarding event organizers’ brands, protecting them from liability, and balancing the need for security that doesn’t negatively impact the “guest experience.” One factor driving growth has been improvements in the educational session, powered largely by show partner Security Industry Association (SIA) Liability issues of event security are especially timely now, given MGM Resorts' recent lawsuit asking the courts to protect it from legal liability in the wake of the Las Vegas massacre last October. “Event security is integration of physical security with smart technology and not being overzealous,” says James DeMeo, Founder, President and CEO of Unified Sports & Entertainment Security Consulting LLC. DeMeo’s presentation on event security is one of the “back by popular demand” sessions at ISC East – there was a big turnout for his previous sessions at last year’s ISC East and at ISC West. “A big part of event security is integrating technology, but we also need the human element,” says DeMeo. “Good guest security and harmonious relationships require a level of training that includes escalation, behavioral analysis, and communicating more harmoniously.” ISC East is 20% larger than last year, and exhibitors have swelled from 230 to more than 300 Holistic Approach And Technology Integrations From the session, DeMeo hopes attendees will take away awareness of the need for responsible social media monitoring, integration of technology, threat behavior analysis and early attack indicators, proactive risk mitigation, and staff training. The emphasis is on a holistic approach “from the top down and the bottom up,” says DeMeo. “It’s a sophisticated niche based on potential liability, and we must do everything possible to protect fans and patrons.” Crowd security is another ISC East topic that is tailor-made to the New York location of the show Crowd security is another ISC East topic that is tailor-made to the New York location of the show. A session on installation of safety and security barriers to protect pedestrians and crowds is another session that is “back by popular demand.” Rob Reiter, co-founder of the Storefront Safety Council, will present the session on protecting urban environments. Another return session is about drone security and regulations. It will provide an overview of current policy and regulatory framework and provide understanding of how to get involved in the discussion to enable drone use in security applications. Converged Security And Smart Cities A new session at ISC East this year will be “Smart Cities, Smart Buildings and the Evolution of the Converged Security Approach.” Pierre Bourgeix, president of ESI Convergent, will help attendees understand converged security and how it relates to the smart cities and smart buildings movement. Located on the ISC East exhibit floor, Unmanned Security Expo will include exhibits and demos of UAVs, UGVs and autonomous systems SIA and ASIS International will present findings from a study on how successful individuals can gain experience and skills they need to advance their security careers. Co-locating with ISC East will be the Unmanned Security Expo, which focuses on Unmanned Aerial Vehicles (UAVs), Unmanned Ground Robotics & Vehicles (UGVs), counter-drone solutions and software applications to support them. Located on the ISC East exhibit floor, Unmanned Security Expo will include exhibits and demos of UAVs, UGVs and autonomous systems. Also co-locating with ISC East will be Infosecurity North America, which includes a conference program with well-respected industry speakers, an expo floor and networking opportunities.
Wilson James has appointed SmartTask as preferred technology partner and awarded it a deal for the supply of a mobile patrol and electronic smart form solution for a new security contract with National Museums. Under the agreement, the company will now roll out the SmartTask workforce management software to 10 sites including the Natural History Museum, V&A and Science & Industry Museum. This follows a successful trial that achieved significant time savings by removing paperwork and streamlining operational processes. The new partnership between Wilson James and SmartTask will replace an incumbent supplier agreement that no longer met the business and operational requirements of the security, construction logistics and business services provider. Identify Potential Benefits In particular, the retender process for the security contract with Natural Museums required a single provider of a highly-configurable mobile patrol and electronic smart form solution. An initial trial at the Natural History Museum focused on use of electronic forms via SmartTask-enabled smartphones to reduce administration and increase productivity of operational staff. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms It was designed to identify potential benefits based on the precise requirements of the customer as well as create a suite of seven SmartForms and reports that could deliver standardized data capture and analysis. This included confiscated items and vehicle check SmartForms, scenario testing and incident reporting. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms. Required Monthly Reports Confiscated items, following bag searches carried out at point of entry, historically required between 10-15 minutes to complete and during that time the security officer was away from the floor resulting in lost productivity. Following the adoption of SmartTask, reports can now be created automatically using highly-accurate data, while paper usage and printing requirements have been dramatically reduced. The time savings achieved at the National History Museum by the Wilson James team have led to higher productivity, greater capacity to carry out bag searches and increased visibility of security staff. Management time saving have also been realised in production of required monthly reports, as well as administration savings of 12-hours per week for the Security Duty Managers. Ease Of Deployment Don McCann, Technology Systems Consultant at Wilson James commented: “SmartTask provided significant support throughout the contract bid and contributed to the successful re-signing for a further five years.” SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system" “The solution is now fully operational at five locations – Natural History Museum, National Science & Media Museum, National Railway Museum, Science & Industry Museum and a Wandsworth storage site – with the Science Museum and V&A to follow shortly. SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system, ease of deployment and its suitability for the security sector.” Enhance Customer Satisfaction Paul Ridden, CEO of SmartTask said: “This latest agreement demonstrates our ability to work closely with our customers to develop advanced workforce management solutions that support business development, customer retention and quality service delivery. We are now partner of choice for a growing number of security organizations based on our proven track record helping to tackle some of the most common and difficult operational challenges they face.” SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
iLOQ has signed an agreement with leading residental developer Bonava Finland Oy. Under the agreement, the majority of new buildings developed by Bonava will be equipped with iLOQ’s unique digital locking and access control solutions. The agreement is initially valid until the end of 2020. iLOQ will supply unique self-powered locking and access management solutions to buildings developed by Bonava“We are happy about the upcoming collaboration. The new agreement with Bonava shows that digital access control has made its way into new construction. Digital access management will replace mechanical locking in the future, and this is a change where iLOQ is at the very forefront. The agreement is also a strong indication of us reaching a point in our growth where we are more strongly present in the production of new buildings,” says Heikki Hiltunen, President & CEO of iLOQ. iLOQ will supply unique self-powered locking and access management solutions to buildings developed by Bonava. The agreement aims to increase collaboration between iLOQ and Bonava and makes iLOQ’s self-powered locking and access management solutions available to an increasing number of tenants. Digital Locking System For Tenants’ Security With iLOQ’s locking system, the tenant can move around the neighbourhood using a single key with access rights that can be modified"“This is a fine step for Bonava and provides a good starting point for future living solutions. Bonava wants tenants to be able to move around in their neighborhood easily and safely, which is possible with a digital locking system. With iLOQ’s locking system, the tenant can, for example, move around the neighborhood using a single key with access rights that can be modified. New lock series are not necessary if the key is lost and using the key also leaves a mark that makes it easy to track possible misuses,” says Kaisu Nousiainen, Head of Design and R&D at Bonava. “Digital locking and access management are strongly linked with the living of the future, and we are a pioneer in the digitalisation of the locking industry. People are interested in smart home technology. Digital development makes the everyday lives of tenants and other users significantly easier. Due to the collaboration, an increasing number of tenants are able to enjoy the security digital access management brings,” states Toni Päivinen, Head of Sales Finland at iLOQ.
Sonitrol, the provider of verified electronic security, announces the successful implementation of a Sonitrol TotalGuard system for 4EverReady Home Care, located in Cincinnati and Dayton, Ohio. TotalGuard, innovated by 3xLOGIC, has alarm verification capabilities that detected an incident outside the premises, which led to a successful resolution of a potential false alarm situation. 4EverReady Home Care is a privately-owned home care agency based in Dayton, Ohio. The organization is committed to providing clients with the highest quality care possible, while allowing them to maintain both freedom and independence in the comfort of their homes. Incident Triggered Alarm 4EverReady has two locations, in Cincinnati and Dayton. Late on a recent evening, surveillance video from inside the Cincinnati location showed a person standing outside the office when suddenly a car drove by the intersection. The person in the video made a hasty retreat from the building and crossed the street. What had happened? “We recognized the man in the video, he’s often in the neighborhood and because our offices are all glass looking out to the street, we can observe him and others walking up and down the nearby sidewalks,” recounted Lisa Roberts-Rosser, Executive Consultant for 4EverReady. “Because this incident triggered an alarm from our system, Sonitrol of SW Ohio brought the video to my attention, I was the first person called. I knew the man in the video, and I’d never seen him move that fast.” Sonitrol operator was able to quickly determine that the offices were not in danger of a break-in, therefore, this was not an active alarmArea Under Protection The Sonitrol operator was able to play the video with the related audio to figure out that the passing car had actually fired (turned out later) a paintball gun at the man in front of 4EverReady’s offices, causing him to flee. More importantly, the Sonitrol operator was able to quickly determine that the offices were not in danger of a break-in. This incident occurred outside the area under protection; therefore, this was not an active alarm so no further action was necessary. “We installed the Sonitrol TotalGuard system back in April and our system’s two cameras give us all the visibility we need. Our office is essentially one big room and the cameras give views in the office and through the windows into the immediate neighborhood,” Roberts-Rosser explained. Motion Detection Technologies In addition to video surveillance with video and audio alarm verification, the TotalGuard system includes glass break detection and motion detection technologies. 4EverReady has also installed a Sonitrol Cloud Access, which provides key fob entry through the office main entrance. Roberts-Rosser and any other staff with privileges can remotely arm and disarm the TotalGuard system with a smartphone through the available Sonitrol mobile app. “TotalGuard provides us complete alarm verification capability, and the mobile app definitely works well for us,” she explained. “If there is a time that someone has forgotten to arm the system upon exiting at the end of the day, I can arm the system from home or wherever I am.” Legitimate Alarm Situation 4EverReady has a consultant that uses the office space for meetings after hours, to prevent any interruption of the normal daily work flow. Roberts-Rosser can program the TotalGuard system from anywhere, at anytime, to grant the consultant access when it is needed. The sensitivity of our system is impressive, when it was first installed it was alarming because of loud music outside, cars backfiring, and other loud noisesIn addition to TotalGuard picking up an incident outside the area of protection, Roberts-Rosser said there has been a process to calibrate the system to be as effective as possible. “The sensitivity of our system is impressive, when it was first installed it was alarming because of loud music outside, cars backfiring, and other loud noises. Once a neighborhood child pulled on the door while horseplaying around and that definitely caused an alarm. Working with Sonitrol, we’re able to verify all of these incidents to make sure we are only contacting the police when it’s a legitimate alarm situation.” Highly-Effective System As is becoming abundantly clear in recent years, police forces are not unlimited resources. Sonitrol TotalGuard has proven to be a highly-effective system in cutting costly, even dangerous, false alarms. “TotalGuard is a technology package no other company is offering security customers, it is a genuine game changer, and this incident proves the technology goes above and beyond in protecting customer’s property, even if the action is well outside the area under surveillance,” said Alison Shiver, Marketing Manager, Sonitrol of SW Ohio.
ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, and Dwelo LLC, a provider of smart-home solutions purpose-built for apartment owners, managers and residents, has announced a partnership that is seamlessly integrating PDK’s cloud access control technology into the Dwelo smart apartment platform. Dwelo’s web and mobile software, which currently offers apartment dwellers the ability to control smart devices such as light switches, thermostats and door deadbolts for their individual units, has added features to manage access to common areas of their building or community, such as entry gates, clubhouse, gym and laundry facilities. These spaces can now be secured by PDK’s cloud access control solution, pdk.io, providing apartment property managers and owners with valuable operational efficiencies. The administrative software interface, not visible to residents, enables management to easily establish and enforce authorized hours of use for common facilities. An audit trail reports all traffic into the property, including any one-time credentials issued by residents, which can be used to assist in investigations in cases of theft or vandalism. When residents move out, their access to unit, common, and perimeter access is immediately deactivated, eliminating the risks that accompany traditional keys that would otherwise remain in circulation. The system is subscription based, with property managers able to recoup the cost in both efficiencies and enhanced revenue Scalable And Affordable Security Solutions Beyond operational efficiencies, residents can unlock perimeter and common doors or gates using the same mobile app they use to control their apartments. In addition, they have the ability to use their phones or computers to generate temporary, one-time credentials that allow visitors, delivery and service people to gain access as needed. These features add to the conveniences afforded to residents living in Dwelo-enabled smart apartments. Both Dwelo and PDK have built successful businesses by leveraging the power of cloud technology to create scalable, affordable solutions that offer unprecedented ease of installation for contractors and simple usability for customers. With their combined areas of expertise in home automation and security, together they see an opportunity to serve a large and generally neglected market sector – apartment renters who desire the same smart home technological conveniences as today’s home owners and seek out communities that offer those smart home solutions. The Dwelo/PDK solution is available for both new construction and retrofits. After an initial per-unit installation charge, the system is subscription based, with property managers able to recoup the cost in both efficiencies and enhanced revenue. Enhanced Apartment Living “Dwelo is thrilled to be partnering with such an innovative company as PDK. PDK is a technology leader in the electronic access control space, and Dwelo and its customers are already benefitting from their forward-thinking approach to access." Our partnership will bring tangible benefits to all stakeholders involved within the multi-family residential market sector" "The consolidation of smart home control and perimeter and common area access control, in one platform, is a powerful marriage for multifamily property owners. We look forward, with PDK, to crafting more solutions that address the specific needs of these customers,” says Mike Rovito, CEO of Dwelo, LLC. “PDKs solution has been embraced by customers in the commercial sector for its simple ease of use and platform flexibility. Our wireless and PoE options allow for cost-effective takeover of legacy equipment, while supporting new construction projects with all the benefits derived from leveraging the network." "Our mantra, simplicity without compromise, dovetails perfectly with Dwelo’s corporate mission to enhance apartment living through easily accessible IoT technology. Our partnership will bring tangible benefits to all stakeholders involved within the multi-family residential market sector,” says Evan Tree, CEO of ProdataKey.