Switches
The global pandemic has triggered considerable innovation and change in the video surveillance sector. Last year, organizations around the globe embraced video surveillance technologies to manage social distancing, monitor occupancy levels in internal and external settings, and enhance their return-to-work processes. Forced to reimagine nearly every facet of their operations for a new post-COVID reality, companies were quick to seize on the possibilities offered by today’s next-generation...
HID Global, a trusted identity Solutions Company announced that Mail.Ru has chosen its HID Mobile Access solution for secure and convenient access control using smartphones and other cellphone devices. Need for access control Mail.Ru reaches over 91% of all Russian internet users via its mail platform and social networks. The company has more than 7,000 employees and a high volume of visitors to its Moscow offices, necessitating an access control solution that provides best-in-class secur...
Foremost security solutions developer, designer, and provider, Videcon, have unveiled their latest Concept Pro camera – the X. A revolutionary piece of software, it allows camera operators to virtually remove someone’s clothing in order to identify if they are carrying weapons or have distinguishing marks/tattoos that will help identify perpetrators of crimes. Each camera operates as a standard CCTV camera but once a person of interest is identified, the software has added function...
Suprema, a pioneer in access control, biometrics, and time & attendance solutions, announces that it has integrated its latest facial recognition devices into Nedap's access control system, AEOS. This will enable organizations around the world to manage access control by making use of Suprema’s latest facial recognition technology. “The COVID-19 pandemic has shaken up the security and building management industry, resulting in a surge of interest in contactless access control. T...
Dortronics Systems Inc., a company involved in off-the-shelf and customized door control solutions, can help facilities implement fast and highly cost-effective solutions to help combat the spread of infection with two of its latest products – the 5278 Touchless Proximity Switch and the 6612 Request to Exit Motion Sensing Door Release. “Door surfaces’, including handles, bars, and knobs are vulnerable areas for disease transmission,” said Bryan Sanderford, National Sales...
Camden Door Controls offers an extensive range of wireless no-touch switch solutions. The SureWave™ line includes a stand-alone battery-operated wireless switch (CM-330), as well as the option to add a plug-in wireless transmitter to a 1 relay (CM-331) or 2 relays (CM-332) line powered switch, or a hybrid battery-powered no-touch switch with relay output (CM-333). This range of wireless no-touch switch models gives installers the ability to select the exact switch configuration that will...
News
‘Communication is the key’ - probably, to a lot of things, including the efficient and productive growth at a firm. If managed accurately, it is the dart that can single-handedly target most of the business pain areas. Each time one blinks, a crisp development occurs that aims to revolutionize the corporate world. A vital victim of this phenomenon is communication, regardless of scale, sector or industry. SOHO industry issues with tech advancements The SOHO (Small Office Home Office) industry is observed to be majorly affected by the turmoil of being burdened with keeping up with these technological advancements. Such enterprises depend largely on strong communication, as it is one of the selling factors. The business outlook of a SOHO can be impacted through its communication to the market it survives in The business outlook of a SOHO can be impacted through its communication to the market it survives in. Different markets require different tools for conveyance. It could be a cumbersome job to manually switch between such tools and networks while maintaining methods to keep it low cost and reliable. To rescue the SOHO sphere from these obstacles, while complementing it with a disciplined work ambience, Matrix presents ETERNITY NENXIP50 - The Complete IP PBX Solution for a minimal enterprise. ETERNITY NENXIP50 IP PBX solution ETERNITY NENXIP50 is a tailor-made IP-PBX for the SOHO market segment. It is a small yet powerful integration supportive IP-PBX, with seamless mobility that provides all business class telephony features to be productive, look professional and enhances customer services. It is a true convergence of communication technologies with integrated interfaces for FXO (CO), GSM/3G and VoIP networks. ETERNITY NENXIP50 intelligently selects the most cost-effective route to place local, mobile, or long-distance calls and reduces telephony costs. Software-hardware solution with VoIP capabilities This exclusive variant of the NENX range, allows customers to access features that are now built-in, along with offering IP users up to 50. If elaborated in 3 easy points, it is: Software-hardware solution package equipped with VoIP facilities IP-PBX gives privacy and control over workspace conveyance One-stop tool for network management, security and transparency Key features of ETERNITY NENXIP50 include: Built-In 50 IP Users and Mobile/Desktop IP Users Built-In VoIP Channels and 4 Channel Voice Mail Built-In 4 CO Ports and 2 SLT Ports Built-In CTI Interface Support Built-In SMS Server and Gateway Support On-Board IP User Support LDAP Client Support Support of 4G VoLTE ports COSEC Door Integration Auto Sign-in for Softphones Screen and Application sharing through VARTA WIN200 Intuitive and Easy Web GUI Scheduled Backup of Voice Messages/Recordings
SALTO Systems, front-runners in wire-free networked, wireless, cloud, and smartphone-based access control solutions; announce that the SALTO Neo electronic cylinder is their latest product to gain the coveted BSI Enhanced Level IoT Kitemark™ for access control systems. Designed for doors where fitting an electronic escutcheon is not possible or required, the compact SALTO Neo Cylinder can be installed on standard doors, server racks, gates, cabinets, electric switches, sliding doors, and more. It’s also available in an extensive range of models, including a new tough next-generation electronic padlock, and is suitable for use on almost any kind of door from Europe to ASIA to the Americas. IoT security IoT is a network of smart devices and systems when connected, enables the exchange of data to provide services, efficiency, and innovation BSI (British Standards Institution) has been part of this collaborative work to give clarity on best practices for IoT security, subsequently developing a scheme to assess connected/IoT devices. The scheme determines whether a product has the appropriate security controls for its intended use and is suitably supported throughout its intended life. This cyber/physical security scheme forms the security element of the BSI Kitemark for IoT/Connected products. The IoT is typically a network of smart devices and systems that can be connected, enabling data to be exchanged to provide services, efficiency, and innovation. Its technology can positively enhance lives and businesses, but the complexity of IoT also means that those of criminal intent may attempt to access it to steal data, hack cameras, enter buildings or otherwise breach security. Advanced security testing Like the already approved XS4 One electronics locks product family and BLUEnet wireless peripherals, SALTO controllers, and readers, to achieve certification the SALTO Neo family of electronic cylinders had to undergo advanced security testing for vulnerabilities and security flaws in BSI’s state of the art IoT laboratory enduring BSI’s most in-depth and exacting testing and analysis. The SALTO Neo Cylinder provides an effective and convenient way of securing a building or assets. The clutch system is energy efficient, dropping power consumption to impressively low levels resulting in 100,000 / 130,000 operations from just one set of batteries. Standby power consumption is also reduced, further extending battery life. IP66-rated and certified Now IP66-rated, the SALTO Neo Cylinder is weather-resistant, making it especially suitable for outdoor use, even in the harshest of environments. Inside the tough SALTO Neo Cylinder exterior is the latest in electronic lock technology. Certified to the highest security standards, and incorporating ever-higher quality and reliability, the SALTO Neo Cylinder offers value far beyond security, however. It also provides greater control over the door by offering users access to audit trails, reports, alerts, and much more. SALTO Systems Limited MD Ramesh Gurdev said, “We’re proud that our SALTO Neo cylinder family now holds both ‘Secured by Design’ accreditation and IoT Kitemark™ status as both are increasingly important in the specification of access control systems. The award means we now exceed the market standard for a number of security products across our access range which provides SALTO customers with confidence that they are buying one of the most secure products available on the market today.”
Antaira Technologies is a developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its 802.3bt industrial PoE switch family with the introduction of the LMP-C602G-SFP-bt(-T)-V2 and LMX-C602G-SFP(-T)-V2 series. Antaira Technologies fulfills the need for high-power 802.3bt PoE++ connectivity solutions for industrial applications with these new 6-port managed Ethernet switches. Managed Ethernet switches The LMP-C602G-SFP-bt-V2 industrial Ethernet switch is rugged, reliable, and perfect for applications that require up to 90 Watts of PoE power. The LMP-C602G-SFP-bt series are light layer 3 industrial managed Ethernet switches, with a 48 to 55 VDC high voltage power input (LMP-C602G-SFP-bt-V2) and a 12 to 48VDC wide voltage power input (LMX-C602G-SFP-V2). Each industrial switch is designed with four gigabit Ethernet ports and two dual rate SFP slots Each industrial switch is designed with four gigabit Ethernet ports and two dual rate SFP slots. The LMP-C602G-SFP-bt-V2 is IEEE 802.3bt compliant (PSE: 90W/port) and has a built-in PoE DIP switch with which one can control certain Ethernet ports to enable or disable the PoE function. Power redundancy feature This industrial switch series provides high EFT surge (2,000VDC) and ESD (6,000VDC) protection to prevent any unregulated voltage and can support the power redundancy feature using a dual-power input design with reverse polarity protection. There is also a built-in relay warning function to alert maintenance when power failures occur. Also, with the compact size, all connections input, including power input and grounding screw facing the front side, this makes it easy to install and view connections in a confined space.
Researchers at cyber-security specialist Check Point Research have identified a security vulnerability in TikTok’s ‘Find Friends’ feature. If left unpatched, the vulnerability would have enabled an attacker to access a user's profile details and the phone number associated with their account, making it possible to build a database of users and their related phone numbers for use in malicious activity. Certain profile settings Profile details that were accessible via the vulnerability include the user’s phone number, TikTok nickname, profile and avatar pictures, unique user IDs, as well as certain profile settings, such as whether a user is a follower or if a user’s profile is hidden. Profile details that were accessible via the vulnerability include the user’s phone number Researchers found the TikTok app enabled ‘contacts syncing’, meaning that a user can sync their contacts on their phone to easily find people they may know on TikTok. This makes it possible to connect users’ profile details to their phone numbers, if those users have linked a phone number with their account or logged in with a phone number. Registering physical devices With those phone numbers and profile details, attackers could potentially access further information related to users, obtained outside of TikTok such as searching for other accounts or data available. The process is as follows: Step 1 – Creating a list of devices (registering physical devices) – each time it is launched, the TikTok app performs a process of device registration to make sure that users are not switching between devices. Step 2 – Creating a list of session tokens which do not expire for 60 days – during the SMS login process from a mobile device, TikTok servers validate the data by generating a token and session cookies. Researchers found that the session cookies and the token values expire after 60 days which meant they could use the same cookies to login for weeks. Step 3 - Bypassing TikTok’s HTTP Message Signing – researchers found that a threat actor can successfully manipulate the sign-in process by bypassing TikTok’s HTTP Message signing, thereby automating the process of uploading and syncing contacts at scale, which would eventually build a database of users and their connected phone numbers for the threat actor to potentially target. Private user data Check Point research responsibly disclosed its findings to ByteDance, the maker of TikTok. A solution was responsibly deployed to ensure TikTok users can continue using the application safely. Oded Vanunu, Head of Products Vulnerabilities Research at Check Point said: “Our primary motivation was to explore the privacy of TikTok. We were curious to see if the TikTok platform could be used to gain access to private user data.” An attacker with that degree of sensitive information could perform a range of malicious activities" “We were able to bypass multiple protection mechanisms of TikTok, that led to privacy violation. The vulnerability could have allowed an attacker to build a database of user details and their respective phone numbers. An attacker with that degree of sensitive information could perform a range of malicious activities, such as spear phishing or other criminal actions. Our message to TikTok users is to share the bare minimum, when it comes to your personal data, and to update your phone’s operating system and applications to the latest versions.” Identifying potential issues TikTok statement: “The security and privacy of the TikTok community is our highest priority, and we appreciate the work of trusted partners like Check Point in identifying potential issues so that we can resolve them before they affect users. We continue to strengthen our defenses, both by constantly upgrading our internal capabilities such as investing in automation defenses, and also by working with third parties." CPR has now twice found security flaws in TikTok. On January 8, 2020, CPR published a paper on a set of vulnerabilities that could have allowed a threat actor to access personal information saved in a users' accounts, manipulate users' account details, or take actions on behalf of a user without their consent. Mobile data and analytics TikTok is reportedly adding 100M users monthly, and has surpassed 2 billion downloads globally, meaning it has nearly tripled in size since 2018. In 2021, mobile data and analytics firm App Annie expects TikTok to not only join the 1 billion monthly active user (MAU) club alongside Facebook, Instagram, Messenger, WhatsApp, YouTube and WeChat; it also predicts TikTok will sail past the 1 billion MAU milestone to reach 1.2 billion average monthly active users.
Technological Innovations Group (TIG), the technology sales agency in the EMEA region offering integrated automation and control solutions for smart spaces, is pleased to announce that it is now able to offer Power Distribution Units (PDU) from GUDE that integrate with Crestron Home systems. This means users can now remotely control and monitor smart space devices in residential settings. As an official partner of Crestron, GUDE has developed and now offers drivers that allow their IP power strips to be integrated into Crestron Home, an advanced operating system for managing smart home systems. Remote power switch GUDE has worked with certified Crestron Master programmers at Ultamation Inc to develop the Crestron Home compatible drivers for their PDUs, which offer seamless and simple controls to manage one or multiple rooms, remotely or on the premises. They can also easily see the current status of the connected devices, receive automatic alerts in case of irregularities In practice this means that the owner of a remote power switch from GUDE can use Crestron Home on their mobile device in order to switch on, switch off or reboot devices such as media players, satellite boxes or routers. They can also easily see the current status of the connected devices, receive automatic alerts in case of irregularities and check and control their energy consumption. Energy saving strategies Once in operation, the advantages of Crestron Home in conjunction with a GUDE remote power switch are multiple, including fail-safe power cycling of connected devices that helps applications to get back on their feet when they have hung up. This is either automatically via watchdog monitoring or by remote access via Crestron Home. Additionally, it's possible to add sensors to the PDU to monitor temperature, humidity and air pressure. This allows critical conditions to be avoided in advance, through preventive measures. Integrated energy meters in the IP power switches also allow for precise measurement of power consumption and enable energy saving strategies to be included in the integration.
A new range of Wisenet Public View Monitors (PVMs) equipped with a built-in SSL connected 2-megapixel camera have been introduced to help retailers deter fraudsters and shoplifters. Offering a choice of 10”, 27”, and 32” monitors, the 3 new PVMs are designed to be located at store entrances, shopping aisles, till points, or self-checkout pay points. With an SD/SDHC/SDXC slot that can facilitate up to 512GB of data storage, the PVMs provide store management with the opportunity to display a slide show which can include supplier adverts, own-brand product promotions, and special offers. A default blinking recording in progress message is superimposed over the displayed graphics to let would be thieves know they are on camera, with operators having the option to customize the message and configure its size, color, opaqueness and positioning on the monitor. Face detection Face and motion detection feature can be configured to switch the display to live view to make people aware they are being watched Supported by the Wisenet WAVE and SSM video management platforms as well as Wisenet NVRs, the ONVIF Conformant PVMs can be programmed so that images captured by the cameras are either continuously recorded or when prompted to do so by built-in face or motion detection video analytics. The face and motion detection feature can also be configured to switch the display to live view to make people aware they are being watched, as they will be able to see themselves on the monitor as they enter a store or walk down a shopping aisle. The display reverts to the slide show after a specified number of seconds. The PVMs, which can be integrated with tagging (EAS) systems to record images of people who might be leaving the store with stolen items, also provide support for the AI-Masking, AI-Bio, AI-Face-Detect, and AI-Occupancy video analytics applications, developed by Hanwha Techwin’s technology partner, A.I. Tech. Video evidence Regardless of whether they are displaying live images or a slide show, or the monitor has been turned off by someone using a remote control, the PVMs will continuously stream images to a control room where they can be viewed via video management software (VMS), as well as continue to be recorded on an on-site or remotely located NVR. The ultra-low light capabilities of the new PVMs, together with Wide Dynamic Range (WDR) technology performing at up to 150dB, enables the built-in camera to capture clear, sharp images in strongly contrasting light conditions at, for example, store entrances where strong sunlight may be streaming in. Power over Ethernet All three PVMs can be powered by 12V DC, with the Wisenet SMT-1030PV also offering the option to utilize Power over Ethernet (PoE+) if there isn’t an existing power supply close to where the PVM is being installed. A single cable of up to 100m is all that is needed to provide both powers to the SMT-1030PV and for network communications. The three new Wisenet PVMs, which can be mounted by using standard VESA brackets, are as follows: SMT-1030PV: 10” monitor with LED backlight and 1024 x 600 display resolution. SMT-2730PV: 27” monitor with LED backlight, HDMI input, and Full HD display. SMT-3230PV: 32” monitor with LED backlight, HDMI input, and Full HD display. Loss prevention strategy “With retailers increasingly relying on PVMs to play an important role within their strategic approach to loss prevention, we have designed our new models to make it quick and easy, as well as cost-effective, to deploy them across a large number of stores,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “As the only PVMs available which, for cyber security and data protection purposes, are supplied with a complete built-in SSL connected camera, they eliminate the need for system integrators to install and connect a separate supporting camera, which some other manufacturers’ PVMs require." "By building in an intuitive user interface, we have also made it extremely easy for busy store managers to take full advantage of the PVM’s functionality, including the ability to utilize the monitor for advertisement and signage using the slide show mode.”


Expert commentary
Once upon a time, providers had end-to-end control when deploying a physical security platform, which is not the case anymore when we consider the modernization to IP. When considering the move to IP physical security, the provider needs to ensure the customer has a robust PoE backbone to connect the IP security device back to the application. Network readiness requirements have complicated IP security deployments, making it challenging for current providers while opening the door to new competitors. Competition is increasing Network providers see the move to IP as an opportunity to expand their wallet share. As the trusted advisors to IT teams, network providers leverage their position to win over the physical security business. As the time, cost, and complexity increases to move a customer to IP; providers need to expand their offering, considering the decline in endpoint revenue margins (the "race to the bottom"). Unfortunately, PoE networks are becoming increasingly complex as IoT endpoints are continually introduced to the network. Before the IP/IoT deployment can occur, the network provider (now your competition as well) will have the opportunity to edge you out and offer an IP/IoT solution with the network. The traditional approach is outdated They have standardized this cookie-cutter solution that may work for some, but not for all While we accept that we are collectively relying on our networks to support an increasing number of devices and applications, many have not considered the local area network's evolution. Organizations no longer only connect data terminals and printers to the network - they connect all manner of intelligent devices, including Wi-Fi access points, cameras, phones, access control, lighting, intercoms, and more. Many traditionalists will recommend the rip-and-replace of existing infrastructure while layering all IoT devices on the same network. They have standardized this cookie-cutter solution that may work for some, but not for all. What if there was a better way? Create the best outcome for you and your customer Let's start by thinking about the customer's desired outcome. The customer wants new capabilities within an acceptable ROI. Given the complications surrounding COVID-19, these organizations may require solutions very quickly to operate safely and within governmental guidelines. However, these organizations first need to establish a LAN framework without high costs, disruption to business, or complexity. They do not want to compromise network security or their business. They do not want network requirements to account for the majority of their budget as there is no ROI in infrastructure. The infrastructure supports the ROI gained from the devices and applications it enables. How do we provide a network solution that addresses both the customer and the provider's needs? Customers need a network that: Eliminates competitive pressures, giving providers end-to-end control over the network and the entire digital transformation experience. Shorten sales and deployment cycles to simplify network readiness and reduce the budget allocation towards infrastructure. Focus on device and application implementation and adoption to improve the customer's ROI. Build a physically separate PoE backbone for IP/IoT applications to maximize network security and performance while simplifying ongoing management. Eliminate the dependency on other providers. Advice from Albert Einstein We cannot solve a problem using the same kind of thinking we used when we created it" To help achieve these outcomes, I encourage you to accept some advice from Albert Einstein. Einstein once said, "The only thing that interferes with my learning is my education." Sometimes we are unwilling to accept new ideas because of preconceived notions about how things "ought to be done." We must embrace innovation and challenge our best practices that are based on past education. Einstein also said, "We cannot solve a problem using the same kind of thinking we used when we created it." Sometimes we must challenge ourselves to think differently by using innovations to create better outcomes for our businesses and customers. Consider this for a second: are you focused on the problem rather than finding a unique alternative solution? Einstein defined insanity as "doing the same thing over and over and expecting different results." Your customers are all unique with different digital transformation challenges and objectives. The cookie-cutter, rip-and-replace method has not worked for all. If it did, every organization would have all the IP and IoT solutions they need. It's time to consider a fresh new approach that may challenge your education. Don't let our education get in the way of your learning! Looking to innovation and modern solutions The idea of The Modern LAN, introduced by Frost & Sullivan, aims to present a paradigm shift in LAN design for IP and the IoT. The whitepaper, available for free using the link above, offers an enhancement to traditional LAN design to address IP and IoT devices' specific needs. Today, we connect more than just data terminals, and we must design our networks accordingly. Instead of starting with the network, Modern LAN design suggests starting with the endpoint requirements and building a network to address these considerations. One of the foundations of Modern LAN design is to consider all networking innovations available. NVT Phybridge PoE innovations allow you to leverage different cable types, including coax, single-pair UTP, and multi-pair UTP cabling, to enable IoT devices at much greater distances than traditional switches. Aligned with Modern LAN design, you can transform the existing network into a robust and secure PoE backbone instead of removing and replacing the reliable infrastructure. PoE switch solutions PoE switch solutions leverage different core technology that vary in capability and effectiveness I know what you may be thinking: Am I compromising on network performance by leveraging these innovations? The answer is: it depends on the technology. PoE switch solutions leverage different core technology (Homeplug, VDSL, ADSL, Ethernet, etc.) that vary in capability and effectiveness. For more than 15 years, NVT Phybridge has been a global pioneer in long-reach PoE technology. We were the first company to develop a switch that delivered Ethernet and PoE over a single pair of UTP wire with up to 1,200ft (365m) reach, which is four times the reach of standard switches. We have spent the last 15 years surprising the industry with our capabilities and satisfying customers with our technology. Performance is paramount We understand that innovation is met with scrutiny and skepticism. We also know that some companies make claims that they cannot back up, which can sometimes shed a negative light on an entire industry or product category. However, our enterprise-grade networking solutions have helped thousands of customers modernize to the next generation of intelligent devices without high costs, complexity, or disruption to their business. For example, our CLEER24 switch is a 24-port Ethernet over Coax innovation that delivers Ethernet and PoE+ over a single coax cable with up to 6,000ft (1,830m) reach, which is 18-times the reach of a standard switch. Transform network readiness requirements into an opportunity to grow your business! Be a thought leader, leverage Modern LAN design, and introduce NVT Phybridge PoE innovations to your customers. It's time to change the conversation around LAN design and improve the outcome for you and your customers.
Once upon a time, providers had end-to-end control when deploying a physical security platform, which is not the case anymore when we consider the modernization to IP. When considering the move to IP physical security, the provider needs to ensure the customer has a robust PoE backbone to connect the IP security device back to the application. Network readiness requirements have complicated IP security deployments, making it challenging for current providers while opening the door to new competitors. Competition is increasing Network providers see the move to IP as an opportunity to expand their wallet share. As the trusted advisors to IT teams, network providers leverage their position to win over the physical security business. As the time, cost, and complexity increases to move a customer to IP; providers need to expand their offering, considering the decline in endpoint revenue margins (the "race to the bottom"). Unfortunately, PoE networks are becoming increasingly complex as IoT endpoints are continually introduced to the network. Before the IP/IoT deployment can occur, the network provider (now your competition as well) will have the opportunity to edge you out and offer an IP/IoT solution with the network. The traditional approach is outdated They have standardized this cookie-cutter solution that may work for some, but not for all While we accept that we are collectively relying on our networks to support an increasing number of devices and applications, many have not considered the local area network's evolution. Organizations no longer only connect data terminals and printers to the network - they connect all manner of intelligent devices, including Wi-Fi access points, cameras, phones, access control, lighting, intercoms, and more. Many traditionalists will recommend the rip-and-replace of existing infrastructure while layering all IoT devices on the same network. They have standardized this cookie-cutter solution that may work for some, but not for all. What if there was a better way? Create the best outcome for you and your customer Let's start by thinking about the customer's desired outcome. The customer wants new capabilities within an acceptable ROI. Given the complications surrounding COVID-19, these organizations may require solutions very quickly to operate safely and within governmental guidelines. However, these organizations first need to establish a LAN framework without high costs, disruption to business, or complexity. They do not want to compromise network security or their business. They do not want network requirements to account for the majority of their budget as there is no ROI in infrastructure. The infrastructure supports the ROI gained from the devices and applications it enables. How do we provide a network solution that addresses both the customer and the provider's needs? Customers need a network that: Eliminates competitive pressures, giving providers end-to-end control over the network and the entire digital transformation experience. Shorten sales and deployment cycles to simplify network readiness and reduce the budget allocation towards infrastructure. Focus on device and application implementation and adoption to improve the customer's ROI. Build a physically separate PoE backbone for IP/IoT applications to maximize network security and performance while simplifying ongoing management. Eliminate the dependency on other providers. Advice from Albert Einstein We cannot solve a problem using the same kind of thinking we used when we created it" To help achieve these outcomes, I encourage you to accept some advice from Albert Einstein. Einstein once said, "The only thing that interferes with my learning is my education." Sometimes we are unwilling to accept new ideas because of preconceived notions about how things "ought to be done." We must embrace innovation and challenge our best practices that are based on past education. Einstein also said, "We cannot solve a problem using the same kind of thinking we used when we created it." Sometimes we must challenge ourselves to think differently by using innovations to create better outcomes for our businesses and customers. Consider this for a second: are you focused on the problem rather than finding a unique alternative solution? Einstein defined insanity as "doing the same thing over and over and expecting different results." Your customers are all unique with different digital transformation challenges and objectives. The cookie-cutter, rip-and-replace method has not worked for all. If it did, every organization would have all the IP and IoT solutions they need. It's time to consider a fresh new approach that may challenge your education. Don't let our education get in the way of your learning! Looking to innovation and modern solutions The idea of The Modern LAN, introduced by Frost & Sullivan, aims to present a paradigm shift in LAN design for IP and the IoT. The whitepaper, available for free using the link above, offers an enhancement to traditional LAN design to address IP and IoT devices' specific needs. Today, we connect more than just data terminals, and we must design our networks accordingly. Instead of starting with the network, Modern LAN design suggests starting with the endpoint requirements and building a network to address these considerations. One of the foundations of Modern LAN design is to consider all networking innovations available. NVT Phybridge PoE innovations allow you to leverage different cable types, including coax, single-pair UTP, and multi-pair UTP cabling, to enable IoT devices at much greater distances than traditional switches. Aligned with Modern LAN design, you can transform the existing network into a robust and secure PoE backbone instead of removing and replacing the reliable infrastructure. PoE switch solutions PoE switch solutions leverage different core technology that vary in capability and effectiveness I know what you may be thinking: Am I compromising on network performance by leveraging these innovations? The answer is: it depends on the technology. PoE switch solutions leverage different core technology (Homeplug, VDSL, ADSL, Ethernet, etc.) that vary in capability and effectiveness. For more than 15 years, NVT Phybridge has been a global pioneer in long-reach PoE technology. We were the first company to develop a switch that delivered Ethernet and PoE over a single pair of UTP wire with up to 1,200ft (365m) reach, which is four times the reach of standard switches. We have spent the last 15 years surprising the industry with our capabilities and satisfying customers with our technology. Performance is paramount We understand that innovation is met with scrutiny and skepticism. We also know that some companies make claims that they cannot back up, which can sometimes shed a negative light on an entire industry or product category. However, our enterprise-grade networking solutions have helped thousands of customers modernize to the next generation of intelligent devices without high costs, complexity, or disruption to their business. For example, our CLEER24 switch is a 24-port Ethernet over Coax innovation that delivers Ethernet and PoE+ over a single coax cable with up to 6,000ft (1,830m) reach, which is 18-times the reach of a standard switch. Transform network readiness requirements into an opportunity to grow your business! Be a thought leader, leverage Modern LAN design, and introduce NVT Phybridge PoE innovations to your customers. It's time to change the conversation around LAN design and improve the outcome for you and your customers.
COVID-19 has been a thorn in the side of countless companies within the security industry and far beyond. Here, we speak with Richard Huison, Regional General Manager for the UK and Europe at Gallagher Security, who summises his personal experience from these recent months and how Gallagher has adapted in the face of pandemic-induced adversity. How has the COVID-19 crisis impacted Gallagher on a day-to-day basis? Gallagher was actually well placed as a result of work already in progress with a number of visionaries and innovators within our business, such as our CIO Neville Richardson. They are determined to put the business on the front foot, making it more digital and proactive in delivering high speed change and we had already been migrating to Microsoft Teams before COVID-19 first reared its ugly head. It’s part of our philosophy to make our business and the solutions we create as stable, reliable and resilient as possible. Gallagher has adapted to the new way of operating fairly seamlessly, while still working alongside the evolving guidance from governments around the world It means Gallagher has adapted to the new way of operating fairly seamlessly, while still working alongside the evolving guidance from governments around the world. When lockdown was imposed, we set about prioritising our clients’ needs and delivering on our commitments as a critical supplier. The Gallagher leadership team quickly rolled out the means to stay connected, positive and safe as each region went into isolation. Effective communication, both internally and externally, has always been a critical success factor for our business. That hasn’t changed with the more remote and virtual nature of our communication now and, if anything, it’s even more important both for business continuity and for the personal wellbeing of each and every one of our colleagues. We’ve quickly adapted to this new way of working and have even become quite adept at recognizing people’s contributions and acknowledging a job well done in new ways, such as using the emojis on Microsoft Teams. Perhaps the most striking example of this is our new European marketing manager Bethan Thompson, who joined Gallagher on 1 April, little over a week after lockdown was imposed in the UK. She has enjoyed the richest and most comprehensive introduction to the business from the safety of her own home armed with just a laptop and Teams. What can be the benefits of having employees working from home? There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and traveling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working. We’ve quickly adapted to this new way of working and have even become quite adept at recognizing people’s contributions and acknowledging a job well done To be honest, before COVID, we didn’t disconnect enough, close the laptop, switch off our technology and allow ourselves NOT to respond instantly. But trust is an integral part of our culture at Gallagher and we can easily and effectively continue to champion the right balance and support for the team moving forward. How can employees ensure they keep a healthy work/life balance? Working from home can require some personal discipline around taking regular breaks and disconnecting from technology. I encourage all my colleagues to stay active and get regular exercise during the day. Taking time out allows you to process ideas with greater clarity, to be more creative, to plan your day and use your time more effectively – all of which is part of achieving that balance. And it’s important that we do switch off and close our laptop at the end of the day, which requires some discipline when you work for a business headquartered in New Zealand, where they are 11 hours ahead. It’s good to cultivate hobbies and welcome distractions that you are passionate about, to switch off from work more effectively. Personally, I love to be outside on a long dog walk with no technology. It’s liberating. Are you seeing that businesses are already beginning to think differently about their security? We have to remember why security is important. We all have a different view on how we should maintain business continuity. Yes, properties need a reliable detection and defense solution to resist the opportunist. With the mass migration to work remotely, business leaders are concerned that their IT systems are vulnerable to attack and we read daily about the growth in cyber-attacks. It’s common sense to protect your business with a suitable access control and intrusion detection system and the pandemic has proven to business the value of being truly resilient and able to still operate whatever circumstances ensue. What will be the biggest security challenges facing businesses over the next six months? In that timeframe, I don’t see us returning to how things were prior to the pandemic, so businesses will have to adapt to a new normal. We will have to adopt a more holistic view of security, encompassing safety, security and wellbeing, with our teams at the heart of that. In the new world, how can we maintain our teams’ safety at home, or limit them to certain floor space or introduce rotas for office attendance and keep surfaces virus free while they’re there? We need to be alert to where the next threat will come from and mitigate risk against both cyber and biological threat as we’ve seen a virus in either domain can be devastating. How is Gallagher meeting the evolving demands of the market? To be honest, Gallagher has always been ahead of the curve. We’ve been talking about competencies, compliance and resilience for decades, long before cyber became the buzzword. Everything we do is related to business resilience and continuity and security is baked in to our products and solutions at source, providing confidence and reliability for all of our customers.
Security beat
At an Oldsmar, Fla., water treatment facility on Feb. 5, an operator watched a computer screen as someone remotely accessed the system monitoring the water supply and increased the amount of sodium hydroxide from 100 parts per million to 11,100 parts per million. The chemical, also known as lye, is used in small concentrations to control acidity in the water. In larger concentrations, the compound is poisonous – the same corrosive chemical used to eat away at clogged drains. The impact of cybersecurity attacks The incident is the latest example of how cybersecurity attacks can translate into real-world, physical security consequences – even deadly ones.Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. The computer system was set up to allow remote access only to authorized users. The source of the unauthorized access is unknown. However, the attacker was only in the system for 3 to 5 minutes, and an operator corrected the concentration back to 100 parts per million soon after. It would have taken a day or more for contaminated water to enter the system. In the end, the city’s water supply was not affected. There were other safeguards in place that would have prevented contaminated water from entering the city’s water supply, which serves around 15,000 residents. The remote access used for the attack was disabled pending an investigation by the FBI, Secret Service and Pinellas County Sheriff’s Office. On Feb. 2, a compilation of breached usernames and passwords, known as COMB for “Compilation of Many Breaches,” was leaked online. COMB contains 3.2 billion unique email/password pairs. It was later discovered that the breach included the credentials for the Oldsmar water plant. Water plant attacks feared for years Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. Florida’s Sen. Marco Rubio tweeted that the attempt to poison the water supply should be treated as a “matter of national security.” “The incident at the Oldsmar water treatment plant is a reminder that our nation’s critical infrastructure is continually at risk; not only from nation-state attackers, but also from malicious actors with unknown motives and goals,” comments Mieng Lim, VP of Product Management at Digital Defense Inc., a provider of vulnerability management and threat assessment solutions.The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online “Our dependency on critical infrastructure – power grids, utilities, water supplies, communications, financial services, emergency services, etc. – on a daily basis emphasizes the need to ensure the systems are defended against any adversary,” Mieng Lim adds. “Proactive security measures are crucial to safeguard critical infrastructure systems when perimeter defenses have been compromised or circumvented. We have to get back to the basics – re-evaluate and rebuild security protections from the ground up.” "This event reinforces the increasing need to authenticate not only users, but the devices and machine identities that are authorized to connect to an organization's network,” adds Chris Hickman, Chief Security Officer at digital identity security vendor Keyfactor. “If your only line of protection is user authentication, it will be compromised. It's not necessarily about who connects to the system, but what that user can access once they're inside. "If the network could have authenticated the validity of the device connecting to the network, the connection would have failed because hackers rarely have possession of authorized devices. This and other cases of hijacked user credentials can be limited or mitigated if devices are issued strong, crypto-derived, unique credentials like a digital certificate. In this case, it looks like the network had trust in the user credential but not in the validity of the device itself. Unfortunately, this kind of scenario is what can happen when zero trust is your end state, not your beginning point." “The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online for the first time as part of digital transformation projects,” says Gareth Williams, Vice President - Secure Communications & Information Systems, Thales UK. “While the move towards greater automation and connected switches and control systems brings unprecedented opportunities, it is not without risk, as anything that is brought online immediately becomes a target to be hacked.” Operational technology to mitigate attacks Williams advises organizations to approach Operational Technology as its own entity and put in place procedures that mitigate against the impact of an attack that could ultimately cost lives. This means understanding what is connected, who has access to it and what else might be at risk should that system be compromised, he says. “Once that is established, they can secure access through protocols like access management and fail-safe systems.” “The cyberattack against the water supply in Oldsmar should come as a wakeup call,” says Saryu Nayyar, CEO, Gurucul. “Cybersecurity professionals have been talking about infrastructure vulnerabilities for years, detailing the potential for attacks like this, and this is a near perfect example of what we have been warning about,” she says. Although this attack was not successful, there is little doubt a skilled attacker could execute a similar infrastructure attack with more destructive results, says Nayyar. Organizations tasked with operating and protecting critical public infrastructure must assume the worst and take more serious measures to protect their environments, she advises. Fortunately, there were backup systems in place in Oldsmar. What could have been a tragedy instead became a cautionary tale. Both physical security and cybersecurity professionals should pay attention.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
An area of technology that is shifting how we interact with our cities is the Internet of Things (IoT). The IoT already accounts for swathes of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes critical. The decisions that this critical data is attached to must be made quickly. A living, breathing city must constantly be monitoring, assessing and utilizing data in order to ensure it keeps people safe and mobile. Delivering exciting opportunities Much like the arrival of Uber and Airbnb, the Internet of Things will deliver exciting opportunitiesThe search for an answer to the challenges of growing human urbanization is believed to exist in the smarter application of new technologies. Where once, electricity and the arrival of the elevator gave us vertical cities, today, we have the promise of the Internet of Things, Artificial Intelligence (AI), Big Data, micro-controllers (MEMS) and new materials to help manage a very crowded future. Data capture form to appear here! We are confronted with a perfect storm of risk factors and potential vulnerabilities as each of these connection points is potentially a source for a security breach. Much like the arrival of Uber and Airbnb, the Internet of Things will deliver exciting opportunities and new kinds of services, many of which we have yet to imagine. Priority control solutions However, there will be equally unimagined and unintended consequences, if only because, in highly complex systems with many connected and tightly linked elements, accidents are inevitable. “The journey to a smart city is incremental—you can’t flip a switch or force it. It requires complex integration and relentless innovation,” says Global Traffic Technologies (GTT) product manager Chad Mack. GTT provides priority control solutions that use analytics GTT provides priority control solutions that use analytics, cloud-based computing to link connected devices to improve mobility, public safety and transportation in cities around the world. GTT’s Opticom Priority Control mobility solution allows transit and public safety vehicles to request a green light at intersections, dramatically reducing the potential for intersection crashes and improving travel times and reliability. Increased connectivity “These intelligent priority management systems allow users to oversee and control the movement of vehicles that operate on a city’s streets,” Mack explained. The rise of urban centers and ‘Smart City’ initiatives enabled by big data, network of sensors and the Internet of Things bring a new set of challenges to future policing. There is now a growing consensus that technology transformation must be part of the overall solution While digital technologies have helped compress the reaction time of police all over the world, the increased connectivity can similarly be leveraged by criminals to carry out increasingly sophisticated crimes. There is now a growing consensus that technology transformation must be part of the overall solution. To keep cities and citizens safe, law enforcement must be armed with the right technology, tools, and processes to solve – or even prevent – the toughest crimes at faster rates. Proven criminal theories Many law enforcement agencies such as LAPD, Seattle and Florida Police Departments are using cutting-edge cloud-based crime prediction software to predict drug crime, gang crime, anti-social behavior and gun violence. Such crime prediction software works by analyzing data through a sophisticated algorithm that applies proven criminal theories to predict the top 10 to 20 spots where crime is most likely to occur over the next few hours. To do so, it leverages on a variety of factors, such as historical and recent crime data, real-time activity, weather forecasts, locations and other information. Once these ‘hot spots’ are identified, police officers can adapt their patrol schedule and frequency at these locations, making their presence felt in the area and thereby prevent crime from taking place. Read parts one and two of our Smart Cities miniseries.
Case studies
DHL Express is a global company in international shipping and courier delivery services and has a major market share of express logistics in the Middle East with a strong customer base in Saudi Arabia. Protecting a key market DHL Express has facilities at all the major airports and in most of the cities in Saudi Arabia and the fastest clearance in KSA when compared to its competition. Saudi Arabia is one of DHL’s key markets and the delivery firm strives to be close to its customers here. With facilities spread across the Kingdom, DHL faced issues in securing its critical assets. Particularly in terms of preventing unauthorized access to critical operational sites; unauthorized access for employees and contractors outside working hours; and unauthorized vehicle access to its warehouse facilities and receiving and responding to critical alarms. Implementing AEOS access system AEOS is based on an open architecture and offers flexible integration One of DHL’s main aims was to switch to a new security system that would support all the latest access control and intrusion detection features, meet its business requirements and use its existing investments effectively. Nedap’s AEOS access control and intrusion detection system, integrated with the Milestone VMS system, was selected as the ideal solution. AEOS is based on an open architecture and offers flexible integration. DHL was able to quickly implement its new access control and security system while retaining the investments it had made in existing readers and cards. Extending the system across the Kingdom After using Nedap’s AEOS access control and intrusion detection system in one of the airport facilities, DHL decided to extend its use across the Kingdom. This set a roadmap for unifying all its facilities under the same access control and intrusion system. And ultimately, gave DHL the opportunity and flexibility to use the same cards across all its facilities. Improved convenience and security Through AEOS, Nedap was able to provide secure, convenient access for DHL’s people and vehicles using RFID identifiers. With the intrusion alarm system activated to restrict access during non-operational hours, unauthorized access to DHL’s operational sites has been prevented. And integrating AEOS with Milestone’s CCTV Video Management system has enabled DHL to receive graphical alarms on video walls. It’s also allowed it to view all related video footage associated with each alarm or event. SecuTronic, based in the Kingdom of Saudi Arabia, implemented the project successfully and efficiently. Central control AEOS access control and intrusion detection protects DHL’s 60 sites across Saudi Arabia from one centralized location AEOS, a secured and flexible access control platform has helped DHL Saudi Arabia to protect all its facilities, with access control and intrusion alarms, from one centralized control room. All the service points are equipped with a burglar alarm system and an enterprise-level access control platform that connects all its sites across the country. Growing business potential AEOS has helped DHL to address all the security challenges it faced in Saudi Arabia and stay ahead of them, winning the trust of the customers by ensuring their shipments are secure. In addressing its security and operational challenges, DHL Saudi Arabia has been able to meet every TAPA (Transported Asset Protection Association) regulation. And by implementing such a security monitoring system, it’s positioning itself as the last-mile fulfillment giant in the Middle East region.
The challenge was to provide a means for monorail attendants to see customers when speaking with them while simultaneously being able to communicate from the Shonan Enoshima station to the Ofuna station. The solution that recommended was to install the IX Series Peer‑to‑Peer IP Video Intercom to see customers clearly on a 7” touchscreen and reach other attendants with station‑to‑station communication. “We would like to create an environment where our customers feel safe,” says Mr. Nishino Transportation Dept. Subsection Chief, Shonan Monorail Co., Ltd. The situation Shonan Monorail opened in March of 1970 and sees more than 10 million passengers annually. The line features a pioneering suspended monorail, which connects Shonan Enoshima, a major tourist destination, to Ofuna in about 14 minutes. As a community-based transportation infrastructure, it improves convenience for residents in the area and expands tourism demand. The intercom used by customers to request assistance at unattended stations was audio‑only. If the situation had required the station attendant to view a customer, they had to go to a different location where they could see the surveillance camera. This was an inconvenience for both the staff and the customer. To communicate between the Shonan Enoshima station and the ticket office at the Ofuna station, attendants had to leave the ticket booth and use the telephone in the control center, further hindering ticket booth operations The challenge Intercom used by customers to request assistance at unattended stations was audio-only The intercom used by customers to request assistance at unattended stations was audio-only. If the situation had required the station attendant to view a customer, they had to go to a different location where they could see the surveillance camera. This was an inconvenience for both the staff and the customer. To communicate between the Shonan Enoshima station and the ticket office at the Ofuna station, attendants had to leave the ticket booth and use the telephone in the control center, further hindering ticket booth operations. The solution Integration of the IX Series offers audio and video communication, making it easy for employees to verify customers quickly, without leaving their booth. With the ability to call directly between IX Series video masters stations, staff at the Ofuna station can see and speak to fellow employees at the Shonan Enoshima station without leaving their ticket office. Installed Equipment: 3 IX-MV7-HB video master stations 11 IX-EA video door stations 11 third-party network cameras Remote monitoring It is essential to have an IP intercom in the railway industry, where remote support is required for customers using unattended stations. Shonan Monorail is a pioneering suspended monorail that operates two attended stations and six unattended stations. In recent years, it has not only improved customer convenience by introducing a prepaid transportation card but is actively working on social contributions, such as supporting Breast Cancer Awareness through events and car wrapping. In order to respond to customers using unattended stations, IP video intercoms have been used. Compared to conventional intercoms, IP intercoms are less susceptible to restrictions such as wiring distance, making IP intercoms popular in the railway industry, where unattended stations are increasing. Customer-centric solution For Shonan Monorail, which manages all unattended stations at the Ofuna station, the IP video intercom is an indispensable function for supporting customers in a remote location. Before upgrading the IX Series, the only way to check on customers using video was to check the display of a surveillance camera in a separate place. Station employees suggested upgrading to an IP intercom with video so that verifying customers and railway surroundings was more convenient. The IX Series centralized audio and video communications made it more convenient to assist customers and upgraded the current intercom system by using existing equipment. The IX Series provides an IP video intercom system that allows station employees to verify customers, by displaying the customer’s face and surroundings through the network camera. Easy to Use With the ability to use existing infrastructure and PoE switches, the IX Series helped reduce both installation times and cost An IX Series door station with a camera is installed at each unattended station, and inquiries from customers are handled by the IP video intercom at the Ofuna station. The attendant can talk while checking the video that captures the customer’s situation at hand. If the attendant is away from the ticket office, they can use the call transfer feature to connect customers to a station that has a staff member available. Since Shonan Monorail had been using IP audio intercoms for a long time, they were able to upgrade to the IX Series while using existing equipment, such as fiber optical cables and PoE switches, reducing the overall installation cost. Each IP intercom station is PoE and can be wired without a separate power supply. In addition, the connected network cameras share the IP network. With the introduction of the IX Series, one station employee said, “It’s easy to understand the customer’s situation and our work has become easier.” Aiphone’s IX Series contributes to improving convenience for both customers and station employees. Aiphone’s IX Series provides Shonan Monorail attendant’s clear, remote communication to assist customers. It also has the ability to: See anyone who calls with an inquiry Call with two-way video from the Shonan Enoshima station to the Ofuna station Expand the system to virtually any size, while saving on resources Add mobile apps for attendants who need to monitor stations while away The feedback Mr. Nishino and Mr. Yamabe help lead the transportation department at Shonan Monorail Co., Ltd. Their personal insight goes into great depth on how the IX Series Peer‑to‑Peer IP Video Intercom added both security AND convenience in day-to-day operations. Q: What are the immediate benefits of the IX Series after installation? A: Not only can customer identities be confirmed by the video, but attendants can verify commuter passes via the camera. The IX Series offers more features and capabilities, leading to improved response quality. A proven track record Mr. Nishino: There were comments from station employees that they wanted to see and respond to customers visiting unattended stations. We recognized there was a need to upgrade to a system that had audio and video capabilities. Regarding the selection of Aiphone’s IX Series, there were installation records from other railways that had unattended stations, and we felt confident that the product would solve this challenge. Another reason for this selection was that the IX Series was already being used by our group company. Mr. Yamabe: The ticket booth at the Ofuna station is always busy, as it’s handled by one attendant. In addition, inquiries from the six unattended stations need to be handled too. Customers frequently call in from unattended stations, and their requests vary. They range from emergency reports to transportation cards not working properly, making the IX Series a convenient necessity for station employees. Provides a wider range of support Aiphone’s IX Series offers audio and video using only a master station, making it easy to verify and respond to customers Mr. Yamabe: "The IP intercom used previously only offered an audio function, so when we would need to check video surveillance of customers, it would take time away from our other duties. Aiphone’s IX Series offers audio and video using only a master station, making it easy to verify and respond to customers." "If customers have forgotten to touch the IC commuter pass at the time of entry, an employee can verify the pass by having the customer show the ID on camera. This makes it simple to check all the detailed information through the camera of the IX Series door station, like which station the pass originated. The camera offers a clear image that shows the customer’s surroundings and it’s easy to use. Onetouch enlarges the bird’s-eye view of the camera and assists in the operation of the prepaid transportation card machine while monitoring the customer." Extension call feature Mr. Yamabe: "Apart from customer service, the “extension call feature” can be used to communicate with the Shonan Enoshima station. The monitoring center next to the ticket office is equipped with extension call equipment, but it’s more convenient to make the extension call with the IX Series master station when employees are busy at the ticket office and unable to leave. When customers come to the ticket office, the call can be disconnected and we can immediately assist the customer, so they won’t have to wait." Mr. Nishino: "We would like to create an environment where our customers feel safe. We would like Aiphone to continue enhancing the functions of the IX Series, like offering a two-way camera that would allow customers to talk and see the station employee at the same time they are communicating."
Global MSC Security announced that it has been appointed by the City of Edinburgh Council to consult on a planned upgrade of its video surveillance system from analog to IP, as Edinburgh progresses towards its vision to become one of the world smartest capital cities. Working with the Council, Global MSC Security will use its public sector expertise to oversee the preparation of a tender specification of a fully integrated public space surveillance operation. Upgrading public realm CCTV surveillance system The appointment of Global MSC Security follows the announcement that the City of Edinburgh Council is investing over £1 million in its public realm CCTV (including housing blocks, transport network and Council buildings) and has also secured £712,000 from the 'Scotland's 8th City, the Smart City' European Regional Development Fund Strategic Intervention in support of an upgrade to its CCTV infrastructure, as part of its smart city program. Global MSC Security has a wealth of expertise in public space surveillance, having consulted on dozens of local authority CCTV surveillance projects, including The Royal Borough of Windsor and Maidenhead, Central Bedfordshire, Buckinghamshire, Herefordshire, North Somerset, Barnet, Bristol City, Dorset, Neath and Port Talbot, Mid Devon and Maidstone and Luton Councils. Installing new IP cameras, VMS and encoders Global MSC Security will ensure the City of Edinburgh Council is able to upgrade its public space cameras, VMS and encoders Global MSC Security will ensure the City of Edinburgh Council is able to upgrade its public space cameras, video management system (VMS) and encoders, with the right technology at the best price and implemented smoothly. Global MSC Security’s Managing Director, Derek Maltby stated “We offer a wealth of experience in specifying public space surveillance systems for local authorities. Global MSC Security is proud to be involved in what is a major initiative not only for the City but Scotland and its position as a leader in smart services and society.” Resilient and secure city surveillance system He adds, “This important and essential infrastructure upgrade represents a significant investment, and the resulting system will provide the Council with a function-rich, future-proof, highly resilient and secure surveillance system.” Derek further stated, “However, for any organization making the switch from analog to IP, it is vital that the transition is managed in the correct way, to maximize resources and optimize system performance. That begins with a robust tender specification, which is where our expertise lies.” The tender specification is expected to be released by the City of Edinburgh Council in February 2021 and the contract awarded in September.
Hicking Building RTM Company Ltd has teamed up with Videx Security and Joes UK Limited to solve a major door entry issue for a large residential complex. The Hicking Building Ltd. is a Nottingham-based development comprising 329 self-contained flats, managed by property agents Walton and Allen. Many residents were struggling with a call issue because the existing intercom system developed a fault which meant residents weren’t receiving calls from the system panels. Because of this, tenants were missing visitors and deliveries with people thinking they weren’t home. Videx GSM 4812 intercom system Installer Joes UK Ltd. was tasked with finding a suitable intercom system Installer Joes UK Ltd. was tasked with finding a suitable intercom system that would also work in conjunction with the existing access control system, where the fob entry element of this was working normally. Joe, who owns and manages Joes UK Ltd., said “The system installed is a very old system and we were struggling to source the repair parts needed to fix the calling issue tenants were experiencing. To fix the problem and reduce the risk of the issue happening again, I recommended the installation of a digital audio GSM 4812 intercom system by Videx that could work concurrently with the fob entry function of the existing solution.” He adds, “With the Videx GSM 4812, when someone calls a specific apartment the call is automatically directed to a registered phone number of the tenant’s, which is usually their smartphone. They now will never miss that important visitor or delivery and are made aware of who has visited even when they are not there and can authorize entry if they wish, while away from their home.” Parallel operations with software-based fob entry solution The Videx system works alongside the existing software-based fob entry solution that residents have used for many years. Mobile phones are now the handset of choice for the majority of people and as they are enabled with Wi-Fi calling, there’s no need to worry about poor mobile signal. If the existing fob system also developed a fault and stopped working, the Videx GSM system includes a preinstalled fob reader so it would be easy to switch this over to the GSM solution. Mark Gibbon, Sales Manager at Videx Security, said “The GSM system is the ultimate entry system of convenience that also provides maximum security too. There’s no infrastructure or wiring involved; it’s very easy to set up and use.” The GSM system is the ultimate entry system of convenience that also provides maximum security Mark adds, “It’s a win-win situation for both the resident and management company because it means residents won’t have to stay home waiting for a delivery, or miss a visitor, as they can answer the call to their apartment from anywhere in the world. For management companies, our GSM solution offers a fixed cost and minimizes the risk of call outs because there’s no handset maintenance involved.” Remote event log with online access A really useful feature of the GSM system is that it also carries a new remote event log that can be accessed online, allowing events to be viewed in real time, on the move via a phone, tablet/laptop. It’s a great security feature because it’s where a record is kept of calls, gate/door openings and much more. What’s also useful is that alerts can be programmed where an email will be sent should that alert be triggered. For example, if the gate or door is opened out of normal hours or if the registered number for a flat or property is changed too frequently - any unusual activity is flagged.
Car theft is a huge risk for car sales offices, and this is especially an issue for the premium brands. Luxury car giant Eden Auto Premium BMW built a new site in Bordeaux, France, where they house and sell new and second-hand cars, as well as having a car park for customers. That amounts to a lot of cars that need protecting. They researched and compared different technologies and selected Hikvision products to meet their needs. These were then ably installed by reseller Faurie Telecom (Group Convergence), with Hikvision’s help, and the help of French distributor ITESA. The BMW reseller wanted a standalone system to streamline their security operation. Originally they used a night security agent, which was a costly solution. They needed to be able to integrate the security solution into a third party monitoring system, managed by Securitas, in order to reduce manpower costs. Perimeter protection systems The site posed a number of technical challenges. The team also needed to counter some crafty thinking from intruders, who were even resorting to hiding underneath cars during the day, when they can slip in unnoticed. They then could wander around the closed garage, avoiding detection by perimeter protection systems activated only at night. This meant the solution needed to focus on providing real-time, active image at night. With a lot of flags flying on the site, false alarms were a particular issue - these would set them off regularly With a lot of flags flying on the site, false alarms were a particular issue - these would set them off regularly. The complexity of the site also gave a lot of potential for false alarms, which needed to be minimised to reduce overall costs. The solution was made up from Hikvision products, providing a converged system, with seamless monitoring. Central to the system was Hikvision’s Security Radar (DS-PR1-60) for intrusion detection at night. Speed dome PTZ camera The Radar has a large coverage area, and performs excellently at night, whatever the weather. This means that false alarms are kept to a minimum. Radar has the added benefit that it can position humans and vehicles on a map, making it very useful for tracking purposes. This is where the DarkFighter IR Network Speed Dome PTZ camera (DS-2DF8225IX-AEL) comes in. The radar cameras are linked with this for auto tracking. If an event is detected, the control center automatically receives an alarm and can use the PTZ’s auto-tracking function to track any intruders. DarkFighter cameras are also designed to excel at night, so are ideal for this solution. Although radar has promising accuracy rates, the team needed to carefully configure it. The site environment proved a complex installation, with a lot of metal that can cause false alarms for the radar. Seamless security solution We were very satisfied with the innovative products and onsite service provided by the Hikvision team" The local team drafted in expertise from Hikvision HQ’s R&D and technical teams to complete the installation to a high quality and low false alarm rate. The system is coordinated using a AcuSensecamera (DS-2CD2686G2-IZS AcuSense 4K NVR (DS-7716NXI-I4) and a POE Switch (DS-3E0510P-E). Finally, HikCentral provides a user-friendly VMS experience, designed especially to integrate all the different Hikvision products, to make a seamless security solution. Christophe Chamand, from Faurie Telecom, says: “We were very satisfied with the innovative products and onsite service provided by the Hikvision team. From presales and order to technical support and aftersales service, Hikvision has been with us throughout the process, ensuring a successful installation and a happy customer.” With an innovative, converged security solution, BMW has been able to streamline its security, even at night. So intruders sneaking in and hiding during the day are out of luck.
With Razberi Monitor™, security professionals can securely and remotely monitor their physical security network during a time of social distancing. IT professionals can quickly review the cyber posture data in case of a cyber-breach. Razberi Monitor™ provides secure, remote visibility into the availability, performance, and cyber posture of servers, storage, cameras, and other networked security devices. Remote monitoring The tool simplifies the monitoring and support of a multi-site enterprise security system, predicts and prevents problems for security professionals while providing a centralized view that benefits both IT and Physical Security departments. We have listened to the surveillance industry and created our software platform to enhance relationships" According to Tom Galvin, Chief Product Officer, Razberi Technologies, "We have listened to the surveillance industry and created our software platform to enhance relationships and align Physical Security and IT departments. Razberi Monitor allows security professionals to be proactive by predicting problems." Aligning network and surveillance departments Razberi Monitor's software platform, paired with Razberi's video recording and switch appliances, has enabled Tropical Shipping to save on the cost of sending maintenance crews to check on potential issues in their US and Caribbean facilities. "Our network is highly distributed across the US and Caribbean with up to 125 users viewing camera feeds at one time. Razberi Monitor has helped us increase our camera uptime assurance and align our network and surveillance departments," said Chad Nelson, Director of Security, Facilities and Cargo Compliance, Tropical Shipping. "They now have a clear view of all operations, and it puts me in the driver's seat to be able to provide specific alerts to each port remotely, quickly and more efficiently than sending a tech to troubleshoot."


Products


Round table discussion
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditization is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
When it comes to security and to ensuring the integrity of gaming operations, today’s casino market is risk-averse. Regulations direct the required surveillance of table games and slot machines, while modern casinos are often sprawling complexes that have a variety of other risks to be addressed, too. We asked this week’s Expert Panel Roundtable: What are the challenges of the casino market relating to security and surveillance technology?
IP network dependability matters in physical security and safety applications, given that a company’s assets and people are at risk. There have been strides in the areas of network dependability, fault-tolerance, reliability, and survivability. However, networks (or affordable ones, at any rate) still cannot ensure near-100 percent uptime, which is why system designers acknowledge and plan for the possibility of a network outage. We asked this week’s Expert Panel Roundtable: How can/should an IP networked system adapt when network connectivity is lost?
Switches: Manufacturers & Suppliers
- BCDVideo Switches
- OT Systems Switches
- Everswitch Switches
- ComNet Switches
- Videoswitch Switches
- Dahua Technology Switches
- VIVOTEK Switches
- Vicon Switches
- Geutebruck Switches
- Aritech Switches
- Hikvision Switches
- LILIN Switches
- Vanderbilt Switches
- NVT Phybridge Switches
- Parabit Switches
- Messoa Switches
- Alpro Switches
- Bosch Switches
- Dedicated Micros (Dennard) Switches
- Hanwha Techwin Switches