Luxul, globally renowned innovator of IP networking solutions for security integrators, has announced its technology lineup for ISC West 2019, taking place April 10-12 at the Sands Expo in Las Vegas. In Legrand | AV's booth 29098, Luxul will exhibit PoE Self-Healing, managed Gigabit switches; award-winning routers with integrated Domotz remote management technology; the company's next-generation wireless controller; "Good, Better, Best" dual-band wireless access points (APs); and the new Easy Se...
Booth number: 14039 Dahua Technology USA Inc. will display video surveillance solutions, access control and intercoms at ISC West. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. The first year that we exhibited at ISC West was in 2012. That was before we had a local US operation. The market started to pick up our brand and was surprised that we offer extensive product portfolios. In 2014, we registered our US office and cont...
PSA the systems integrator consortium, announces it will host an education track with sessions during ISC West in Las Vegas, NV on April 9-11, 2019. The PSA education track will be held exclusively on Tuesday, April 9. Members of PSA Committees, PSA executive leadership team, and other industry experts will lead the six sessions that are included in the PSA Track. The sessions being offered will include: The Emerging Leader: The Change Agent In The Security Industry April 09, 2019, 8:30 AM -...
Paxton, the global brand of electronic IP access control and video intercom systems, invites dealers to discover new opportunities to grow their business at their booth at ISC West. This year, they are introducing more products than ever before with exciting demonstrations from their team of industry experts. Demand for dealer training in 2018 exceeded all expectations, so this year, Paxton are launching a new training program across the United States. Attendees can visit Paxton at booth 22043...
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What W...
Raytheon Company (RTN) and German sensor specialist HENSOLDT, both globally renowned air traffic radar providers, are on path to provide two European customers integrated air surveillance radars that combine HENSOLDT’s next-generation primary airport surveillance radar (ASR-NG) and Raytheon’s Mode S monopulse secondary surveillance radar (Condor Mk 3). World Air Traffic Management Congress 2019 As reported by both companies at World Air Traffic Management (ATM) Congress 2019 in Mad...
At ISC West this year, on booth 11099, Veracity will be demonstrating its expanded suite of COLDSTORE solutions, from the new COLDSTORE 2U delivering 112TB video storage in a compact rack-mounted space up to the COLDSTORE Colossus, the 4U, 45-bay, 630TB video storage solution. The COLDSTORE family offers unique benefits including a 10x increase in hard disk life and power savings of 90%+. In fact, Colossus, with 630TB and 45 disks, consumes less than 80W of power! This gives the COLDSTORE range not only enviable performance benefits but also a compelling total cost of ownership case not available with other video storage solutions, especially for longer retention periods. Eliminating Storage Systems’ Operational Issues COLDSTORE has patented technology designed specifically for sequential and continuous recording of video surveillance channelsCOLDSTORE is in use throughout the world at critical infrastructure sites, major sporting venues, in retail, in custodial and policing environments and in city center command and control operations. COLDSTORE has patented technology designed specifically for sequential and continuous recording of video surveillance channels. As a result, many of the operational issues with standard storage systems, such as long disk rebuild times, high power consumption, excess heat and reduced disk life, are eliminated. Also, on display at ISC West will be the COLDSTORE Pro 3U, 210TB unit that uses only 0.3W per Terabyte. Visitors will learn about COLDSTORE’s new embedded NVR functions and the ability to record from camera direct to COLDSTORE through ONVIF compatibility or using embedded COLDSTREAM code in open platform cameras, such as Axis and Hanwha. Over 100 channels can be supported, at 4Mbps per channel. Integrated Command And Control Solution Veracity will also be demonstrating VIEWSCAPE, the integrated and open command and control solution. VIEWSCAPE is a real success story in use in many city center, retail, critical infrastructure and other sites. Anyone with an interest in C3, critical command solutions should get to know VIEWSCAPE. With over 100 integrations, this comprehensive command and control system can be seen at Veracity’s booth 11099. The full integration of COLDSTORE with Hanwha Techwin’s Wisenet WAVE will be on show on both the Veracity and Hanwha Techwin booth The full integration of COLDSTORE with Hanwha Techwin’s Wisenet WAVE will be on show on both the Veracity and Hanwha Techwin booth. Wisenet WAVE is an IP Video management platform that allows users to create IP video surveillance solutions tailored to any type of project, usable by anyone and on any device. It is simple to setup and use, and when integrated with COLDSTORE delivers an impressive suite of features with all the benefits of COLDSTORE’s long-term video retention capabilities. LONGSPAN Ethernet Over Coax Solution Veracity is most famous for its transmission solutions. In 2005, Veracity launched the world’s first Ethernet over coax solution. As a market leader, the full range of multi-channel Ethernet over Coax, extreme distance Ethernet and other transmission products will be on show. This includes LONGSPAN, which delivers IP video and POE (Power over Ethernet) over a distance of 820m (2,690ft) on standard Ethernet cable. Veracity will also have its informative IP transmission workshop running at the booth. Veracity operates in the USA from its office in Dallas, Texas and continues to experience rapid growth fueled by the development of strong relationships with many customers and partners across the United States. Veracity experts will be available throughout ISC West at booth 11099 from the 10th to 12th April 2019 at the Sands Expo in Las Vegas. Make sure you visit us.
ASIS International, the association of security management professionals, released the ASIS Private Security Officer Selection and Training (PSO) Guideline (ASIS PSO-2019) which provides recommendations for establishing and managing a program for the selection and training of private security officers. The new Guideline is critical as the private security industry employs millions of security officers across the nation to protect people, property, information, and other key assets. Applicable to both proprietary and contract security, the guideline focuses on three key areas of a private security officer selection and training program — its development, implementation, and improvement. The framework comprises: Establishment of policies and procedures; Assignment of roles and responsibilities; Allocation of resources to the program; Setting vetting and selection criteria; Private security officer training and competencies; and Program evaluation and improvement. Improving Selection And Training Program ASIS International develops standards and guidelines to serve the needs of security practitioners in today’s global environmentThe Guideline is consistent with industry best practices and takes into account legal, regulatory, and contractual obligations. “While the guideline includes most elements of the 2010 edition, it goes a step further in providing organizations a generic framework for designing or improving its selection and training program,” said Chuck Baley, PSO Technical Committee Chair. ASIS International, in its role as an accredited Standards Developing Organization (SDO), develops standards and guidelines to serve the needs of security practitioners in today’s global environment. It is recognized globally through its Category-A Liaison Status in the International Organization for Standardization (ISO) Risk Management and Security and Resilience Technical Committees. Current projects under development focus on Active Assailant, Enterprise Security Risk Management (ESRM), and Security Awareness.
Pelco by Schneider Electric, the trusted global provider of end-to-end video security solutions, will be exhibiting products, solutions, and services for several market segment applications at ISC West 2019, held in Las Vegas from April 10-12. Pelco is shaping the future with leading technologies such as Cloud Services, Automatic License Plate Recognition, 4K imaging capability, and advanced deep learning-based analytics. Pelco will showcase VideoXpert Video Management System (VMS) platform enhancements, the GFC Professional 4K camera, and the recently-launched Spectra Professional 4K camera. Pelco VMS and cameras are broadly deployed across a wide range of vertical market applications High Level Support For Integrators When combined with the new VxCare Professional Services offering, a bundled three-tier service plan for VideoXpert Professional and Enterprise systems, customers can benefit from optimized performance and system availability of their video management system backed by a high level of support for both integrators and end users. Additionally, Pelco will preview other products and services that will be available in the next few months. Pelco VMS and cameras are broadly deployed across a wide range of vertical market applications and trusted by some of the most demanding customers in the world. Pelco will be showcasing multiple deployment examples including healthcare, city surveillance, commercial/retail, education, and others. Other Cameras On Display In addition to the GFC and Spectra Professional 4K cameras, many other Pelco products and services will be on display at the event. In addition to the GFC and Spectra Professional 4K cameras, the GFC Professional Multi, the Evolution camera series will be on display Among them are the upcoming GFC Professional Multi (multi-directional IP camera), the Evolution camera series (ultra-wide-angle panoramic monitoring), the Spectra Enhanced and the award-winning Esprit Enhanced cameras, the Optera 270 camera (seamless panoramic view), and the High Security Corner Mount IBD camera, to name a few. Visitors are encouraged to experience our hands-on, real-time product demos at Booth #20031. Pelco’s Director of Segment Marketing, Stuart Rawling, will present ‘Gearing Up for an Automated Revolution’ which will cover how the security business will be impacted by the current technology revolution. Mr. Rawling’s presentation will take place in the Sands Convention Center on Thursday, April 11, from 11 a.m.- 12 p.m. local time.
Booth number: 34103 Oncam offers industry-leading 360 and 180-degree video technology. The company has the largest range of wide-angle cameras that are open platform and easy to integrate. Unique dewarping technology allows the creation of award-winning video solutions for stakeholders from the C-suite to the security officer in wide range of industry segments. Oncam’s products greatly enhance situational awareness. Oncam recently introduced two specialty cameras to the market: the Evolution ExD camera line for use in potentially explosive atmospheres, harsh and hazardous environments; and the new Evolution 05 and 12 Stainless Steel Camera line, for resilient protection in hazardous environments where resistance to the elements and compliance to stringent regulations are paramount. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. We were able to meet a number of new technology partners, integrators and end users in the booth and on the show floorWhile Oncam personnel have been attending the show for a few years, last year was the first year we decided to invest in a booth. It was a great decision given the large number of attendees, leads and valuable conversations we were able to have on the show floor. We were able to meet a number of new technology partners, integrators and end users in the booth and on the show floor. The opportunity to highlight our technology and discuss its potential with new and existing partners was exponentially valuable for our overall business goals. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? For us, relationships are critical to our success. In an effort to maximize our presence on the show floor, we work with strategic alliance and technology partners, to demonstrate our solutions in their booths. Essentially, we are able to highlight not only demo areas within our own space, but across the exhibit hall. Our team is also empowered to talk to our valued partners, engage in conversations with passersby who might not know about our technology, and offer insight to the media on the initiatives we're working on. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Building our brand is all about the relationships we nurture, whether it's with our technology partners, integrator partners or end-user customersBuilding our brand is all about the relationships we nurture, whether it's with our technology partners, integrator partners or end-user customers. As a result, a successful show is one where we're able to have meaningful conversations about the challenges they face, how our solutions can and will meet those needs, and discuss ways we can add more value to projects and partnerships as a whole. We're also focused on meeting end-user customers and educating them on the advantages that wide-angle, single-sensor video solutions can bring to their business. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West has increasingly become the ‘must do’ show for the security industry, which offers companies like ours the advantage of planning and promoting our products before, during and after the show. It also presents an opportunity to meet a variety of end user companies from a number of markets who attend to not only see the latest and greatest products, but attend educational sessions aimed at maximizing their time during the show. Finally, it's always a place where we can talk about and introduce some of the latest advancements in technology, including AI-driven tools, robotics, cameras with higher resolutions — the list goes on and on.
Booth number: 22031 This year at ISC West 2019, Avigilon Corporation will be showcasing some of its most advanced video, artificial intelligence, video analytics, access control and cloud solutions. Avigilon will be demonstrating how these technologies are redefining how customers utilize data in order to help them gain actionable information. On display at the booth will be the launch of Avigilon’s latest video management software and a preview of next-generation camera line Through the power of cutting-edge video analytics and artificial intelligence (AI) technology, Avigilon believes that its new products and technologies can help customers detect, verify and respond faster to potentially critical events. On display at the booth will be the launch of Avigilon’s latest video management software and a preview of next-generation camera line, featuring its most advanced video analytics to date. Avigilon will also be joined by Motorola Solutions to demonstrate how their solutions help customers proactively keep people safe and assets protected. Together, they will showcase how the integration of Avigilon’s video management software with Motorola Solutions’ suite of software provides an unparalleled solution for the rapidly evolving needs of public safety. For more about Avigilon’s presence at ISC West, we contacted Alex Asnovich, Vice President, Global Marketing and Communications, Avigilon. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. The first year Avigilon exhibited at ISC West was 2008. Since then, the event has become the largest converged security industry trade show in the U.S. Throughout the years, Avigilon’s booth has expanded to accommodate our growing portfolio of products and technologies. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? ISC West is Avigilon’s biggest and most successful security industry trade show in North America. We have been able to use it as a launch pad for our most anticipated products of the year and to secure a number of new customers across a variety of verticals as a result of exhibiting. Q: What Company Activities (Outside Of The Show Floor) Does Your Company Organize Each Year? We host a speaking session on the sidelines of ISC West and invite our partners and end-users to attend and discuss the latest in AI technologyWe typically host a speaking session on the sidelines of ISC West and invite our partners and end-users to attend and discuss the latest in artificial intelligence (AI) technology. Since our partners and customers are the key to our continued success, we will host an exclusive invitation-only partner event to show our appreciation for their loyalty and commitment to Avigilon. We will also take this opportunity to share some exciting information regarding Avigilon’s new partner program. The event will include first-class entertainment, food and beverages and an unrivaled view encompassing the Las Vegas strip and beyond. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? As the largest converged security industry trade show in the US, ISC West provides us with the opportunity to engage with our key regional and international partners and demonstrate how our innovative solutions can meet their needs.
Booth number: 26061 Genetec Inc. is a technology company with a broad solutions portfolio that encompasses security, intelligence, and operations. The company’s flagship product, Security Center, is an open-architecture platform that unifies IP-based video surveillance, access control, automatic license plate recognition, communications, and analytics. Genetec also develops cloud-based solutions and services designed to improve security and contribute new levels of operational intelligence. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience? Genetec also develops cloud-based solutions and services designed to improve security and contribute new levels of operational intelligence2006 was the first year that Genetec exhibited at ISC West, and we remember what a whirlwind it was and being blown away by the scale of the show floor. It helped cement our desire to return year after year. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? Genetec uses marketing outreach prior to the event to invite our customers and partners to connect with us at the show. We also take advantage of on-site sponsorship opportunities to advertise at the convention center. During the event, we welcome all feedback that attendees are willing to share with our team. After the event, we will communicate with booth visitors to thank them for their support and nurture our existing and potential relationships. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? The primary successes at the show are measured by the level of engagement with our current and potential end-users, the number of leads that are secured at the booth as well as the increase in brand awareness that is observed. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? ISC West allows us to connect and engage with our customers and partners ISC West allows us to connect and engage with our customers and partners, to touch point on common activities, as well as celebrate our joint wins during cocktail events that we host throughout the show week. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West offers a unique opportunity for Genetec to be face-to-face with our existing customers and prospects to not only generate business opportunities but to also showcase new technology and initiatives from the business to physical security industry experts. Genetec attracts hundreds of visitors to its booth at the show, and this allows us to spend time better understanding market needs and reactions to the innovations we are delivering. ISC West is not just about networking but the show is also great place to help us better understand our market and customers.
Thousands of security professionals gathered Nov. 14-15 at the Javits Center in New York City to explore new products, solutions and technologies, network with security luminaries and obtain high-quality industry education. ISC East, sponsored by the Security Industry Association (SIA), is the Northeast’s largest security industry event; more than 7,000 security professionals attended or exhibited at this year’s conference. Following day 1 of ISC East, SIA gathered industry luminaries and experts for SIA Honors Night, an annual event featuring a cocktail reception, a gala dinner benefiting Mission 500, engaging entertainment and an awards ceremony recognizing industry leaders. Sold-Out Event SIA Honors Night 2018 was a sold-out event held at the Current at Chelsea Piers. The awards presented at SIA Honors Night 2018 were: SIA Progress Award (presented by SIA’s Women in Security Forum) – Eddie Reynolds, president and CEO, iluminar Inc. Women in Biometrics Awards (co-founded by SIA and SecureIDNews and co-presented with sponsors FindBiometrics, IDEMIA and SIA’s Women in Security Forum) – Kelly Gallagher, senior account manager at NEC Corporation of America; Lisa MacDonald, director of the Identity Management Division in the Office of Biometric identity Management at the U.S. Department of Homeland Security; Colleen Manaher, executive director of U.S. Customs and Border Protection; Lora Sims, senior biometric examiner at Ideal Innovations, Inc.; and Anne Wang, director of biometric technology research and development at Gemalto Cogent SIA Insightful Practitioner Award – Guy M. Grace, Jr., chair of the Partner Alliance for Safer Schools Steering Committee and director of security and emergency planning for Littleton Public Schools in the Denver suburb of Littleton, Colorado Jay Hauhn Excellence in Partnerships Award – Larry Folsom, co-founder and president, I-View Now George R. Lippert Memorial Award – Pat Comunale, retired security industry veteran, former member of the SIA Board of Directors and former CEO and president for Tri-Ed Distribution, an Anixter company Standout Keynotes SIA Honors Night also highlighted Mission 500, a charity that advocates for children and families living in extreme poverty in the United States Honors Night guests enjoyed keynote remarks from Bonnie St. John, a Paralympic ski medalist, Fortune 500 business consultant, Rhodes scholar, former White House official and best-selling author. St. John discussed her journey to become the first African-American ever to win medals in Winter Olympic competition despite having her right leg amputated at age five and shared her top lessons from mentors and her advice for cultivating resilience. SIA Honors Night also highlighted Mission 500, a charity that advocates for children and families living in extreme poverty in the United States; each year, SIA Honors Night raises funds for Mission 500. SIA presented 26 engaging education sessions through the SIA Education @ ISC East program, including two standout keynotes and four hands-on workshops. Hundreds of conference attendees participated in these sessions, with impressive speakers like Valerie Thomas, ethical hacker and executive consultant at Securicon; Pierre Bourgeix, president at ESI Convergent; Scott Swann, president and CEO of IDEMIA National Security Solutions; and Jumbi Edulbehram, regional president – Americas, Oncam. SIA sponsored Infosecurity North America’s Keynote Stage, the central hub of the event Confronting Emerging Threats Highlighted education sessions at this year’s conference included: Friend or Foe? Technology Disruption and the Physical Security Industry, a keynote address by Philip Halpin, senior vice president and head of global security at Brown Brothers Harriman, one of the country’s oldest and largest privately held financial firms 21st Century Best Practices: Reporting From the Front Lines on How Law Enforcement and the Security Industry Are Confronting Emerging Threats, a keynote address by James A. Gagliano, a retired FBI supervisory special agent, CNN law enforcement analyst and adjunct assistant professor at St. John’s University Cybersecurity Professionals ISC East 2018 was co-located with two additional conferences – Infosecurity North America and Unmanned Security Expo Additional cutting-edge topics covered in the education sessions included the move to smart cities, convergence in the security industry and the use of artificial intelligence in video analytics. ISC East 2018 was co-located with two additional conferences – Infosecurity North America and Unmanned Security Expo. SIA sponsored Infosecurity North America’s Keynote Stage, the central hub of the event, which featured a presentation from world-famous hacker Kevin Mitnick, insights from Dave Hogue of the National Security Agency’s Cybersecurity Threat Operations Center, a discussion on the cyber skills shortage gap and ways to attract, develop and retain talented cybersecurity professionals and more. Handle Sensitive Data Additional events at ISC East 2018 included: A breakfast presented by ISC Security Events and SIA’s Women in Security Forum featuring a panel discussion celebrating women in security and supporting the participation and advancement of women in the industry Paid hands-on workshops providing cutting-edge information and valuable insights on the most current business trends, technologies and new developments in security Free exhibitor product training sessions sharing live, in-depth demonstrations A meeting with SIA’s Data Privacy Advisory Board, which provides information and best practices to help SIA members handle sensitive data in a safe and secure manner to protect the personally identifiable information of their employees, partners and customers from potential breaches
Artificial intelligence and machine learning are the rage in tech right now and not surprisingly, many cyber companies are beginning to automate an increasing amount of their operations. Some of this is great, particularly when it assists cybersecurity professionals to automate mundane tasks and focus more of their attention on higher level analysis. But so far, machine learning is more hype than helpful for cybersecurity, but that does not mean you can’t automate some tasks to keep your organization safe. Effective Machine Learning Applications At its most basic, machine learning technology is supposed to enable cybersecurity companies to predict the nature of future attacks based on past behavior, similar to how Netflix displays what you want to watch based on what you’ve previously viewed. According to Jack Gold, president and principal analyst at J. Gold Associates, this innovation can assist cyber companies to transition away from a “signature-based” system to detect malware. Instead, he sees more companies adopting a machine learning approach that aims to analyze past incidents in a broader manner and aggregate information from a multitude of sources. Machine learning technology is supposed to enable cybersecurity companies to predict the nature of future attacks Specifically, some machine learning applications for cybersecurity are effective at doing the following: detecting malicious activity, helping security officers determine what tasks they need to complete in an investigation process, analyzing mobile endpoints, decreasing the number of false positive threats, automating repetitive tasks like interrupting ransomware, and potentially closing some zero-day vulnerabilities. A number of tech giants have invested in these capabilities recently, including Google, which is employing machine learning to help protect Android mobile endpoints. Amazon also bought a startup called harvest.AI to help it aggregate and better understand data located on the S3 cloud storage service. Limitations Of AI For Cybersecurity That said, the signal-to-noise ratio for threat intelligence-type automation events isn't effective for most organizations at the moment. The reality is automating threat intelligence - or in other words, identifying adversaries automatically - is difficult to execute within an organization because every company’s threats, vulnerabilities, and risks are unique. Ultimately, machine learning can help cybersecurity outfits, but it can’t replace many important functions. In an article for Forbes, Alexander Polyakov explains well why machine learning’s applications for cybersecurity are limited. He writes, “There will always be a person who tries to find issues in our systems and bypass them. Therefore, if we detect 90% [of] attacks today, new methods will be invented tomorrow.” Cybersecurity outfits can pair their human intellect with machine technology to catch hackers before they do too much damage Put in another way, there is a reason that machine learning is very good at predicting events like the weather. As McAfee CTO Steve Grobman described at McAfee MPOWER, their annual security conference, the weather abides by laws of physics. So even with phenomena such as global warming, the weather will largely act in the future based on how it has been in the past. Pairing Human Intellect And Machine Technology Cyber attacks, meanwhile, are the complete opposite. Hackers become smarter, and are always one step ahead of cybersecurity officers, inherently and frequently shifting their strategies so that CISOs will not detect them. For all the incidents machine learning technology can identify, which is helpful, there will always be sophisticated attacks that no machine learning algorithm will be able to find. It is also worth stating a simple fact: Humans hack. While they may use fancy technology to deploy these attacks, it is a human-led effort. Therefore, at the highest level, cybersecurity officers will be the only force able to stop hackers from penetrating critical networks. Machines don’t fully understand us. Only humans can still (and probably always) comprehend hackers’ larger strategy. Instead, cybersecurity outfits can pair their human intellect with machine technology to sort through data faster and catch hackers before they do too much damage. No cybersecurity company should be led by robots -- and that’s a good thing.
The physical security industry is rapidly changing, ever evolving, and one that is growing faster than most other sectors of the greater global market. The latest research shows that the forecasted growth rates will be a compound average growth rate (CAGR) of 7.2% and a total market revenue opportunity of $41.27B through 2022. These economic indicators make the industry a very attractive investment for entrepreneurs and for investment from large corporations from other industries. At ISC West 2018, this was extremely evident as there was a palpable buzz from technologies such as artificial intelligence (AI), machine learning, cloud-based video management systems and cloud-based access control systems. New market entrants such as Amazon, and a seemingly increased interest and investment from the likes of Intel, IBM, and even Microsoft were present and contributed strongly to the buzz of the industry’s largest tradeshow.The global managed security services market is projected to reach nearly $40.97 Bn, with a CAGR of 16.6% over the next five years Need For Education And Enhanced Security With the increased profile of the industry, one can clearly see that the physical security industry is expanding globally to new consumers; bringing with it an increased need to further secure products and services with comprehensive physical and cybersecurity protocols and the need for education. This convergence of physical security and cybersecurity will create new industry leaders that will emerge to lead a new segment of the combined market through strong investment and leadership. According to a report published from Allied Market Research (AMR), the global managed security services market is projected to reach nearly $40.97B, with a CAGR of 16.6% over the next five years. Correlating these two market data points, the forecast for the physical security market is expected to have nearly 18% of the total market opportunity comprised of cloud services at nearly $7B. Sharing Security Service Best Practices In September 2017 at the Cloud+ Conference in Austin, Texas, the leaders of the Access Control as a service (ACaaS) and Video Surveillance as a Service (VSaaS) markets, converged to share industry trends, observations of customer adoption, best practices in implementation and service, financial models, and several in-depth discussions on securing physical security of cloud implementations through cybersecurity. The physical security market will have nearly 18% of the total market opportunity comprised of cloud services These cybersecurity discussions absolutely dominated every discussion with the clear message that as a cloud service provider, manufacturers and integrators must continue to create robust and scalable cybersecurity offerings to protect customer data and facilities. Interestingly, an analysis of all of the past cyber breaches was presented by keynote speaker Dean Drako of Eagle Eye Networks, who, through a powerful visual diagram, noted that all existing breaches in the physical security industry were entirely on manufacturer provided hardware solutions; VMS physically installed on customer premises, and camera specific vulnerabilities across multiple providers.Network personnel, cybersecurity personnel, firewall experts, and cloud-specific software development staff all need to be added to core physical security engineering expertise Cloud Versus Non-Cloud Services The insight that one was able to glean from this information and, that of a greater analysis of cybersecurity hacks across all industries, was that manufacturers and providers of cloud services were more secure and reliable by orders of magnitude than non-cloud solutions. The reason for these phenomena also became glaringly evident; the security protocols of a cloud service provider is central to the business’s value proposition and as such should be addressed across all levels of manufacturing, implementation, and customer utilization. Conversely, non-cloud deployed products rely on field implemented cyber strategies from integrators and end users which often expose lack of skills, education and budget to fully secure these physical security products. Ensuring Successful Deployment As a SaaS service provider, the technical personnel makeup results in an expansion of staff and expertise. Network personnel, cybersecurity personnel, firewall experts, and cloud-specific software development staff all need to be added to core physical security engineering expertise to ensure that the product developed can be successfully implemented and deployed.Implementing a process to protect millions of customer’s data records and facilities begins with mapping out a strategy to secure software and hardware. These new jobs in the physical security industry will astronomically expand as the market continues to grow $6 Bn in a little over 4 years providing new opportunities to existing and new personnel to enter the industry. As a leader in access control hardware and an ACaaS provider, ISONAS has taken it upon themselves to implement a process to ensure that their customers can easily implement their products and gain great peace of mind in regard to the security of the solutions. Data Security Strategies Implementing a process to protect millions of customer’s data records and facilities begins with mapping out a strategy to secure software and hardware. This means employing high-level, seasoned cloud deployment experts to create a strategy in our AWS infrastructure and all ancillary supporting technologies to minimize attack surfaces, create complex, proprietary associations in a multi-layered and multi-tiered connection throughout the application and lastly ensuring that all communication to and from customers’ devices are encrypted and secured. Implementing a process to protect customer’s data records and facilities begins with mapping out a strategy to secure software and hardware Once implemented ISONAS took it upon themselves to validate the infrastructure and the customers experience by subjecting the environments to 3rd party penetration tests. Addressing Cyber Threats These tests, taken up quarterly, ensure a customer that the latest in cyber threats are being addressed and that the manufacturer is providing the latest solutions available in the market.Integration implementation personnel should gain greater knowledge in networks and cybersecurity best practices for their solutions An added benefit is that customers gain the scalable benefits of enterprise corporate cybersecurity protocols at a fraction of the cost of implementing these on their individual premises. As an industry, however, it is not simply the responsibility of the cloud service provider to ensure that the customers data in video and access control are being protected. It is also incumbent on the integrator to ensure that the installation and implementation of the products and solutions are deployed in an educated and skill-based manner. Knowledge Of Networks And Cybersecurity Best Practices The products and services utilized must be easy to implement, be clear in their requirements of the end user networks, and simplistic to apply. Nearly all manufacturers of these products are working diligently to ensure that the integrator has all of the tools at their fingertips to ensure a successful implementation. However, it will remain important that the integration implementation personnel gain a greater knowledge in networks and cybersecurity best practices for their solutions.The products and services utilized must be easy to implement, be clear in their requirements of the end user networks, and simplistic to apply In most cases, this will mean additional jobs for new higher-level personnel, access to additional services to provide to end users, and an elevation of networking and security expertise within their business. Expanding The Reach Of Physical Security These new-found skills and expertise will likely bleed into new markets and expand the reach of the traditional physical security market. It truly is an exciting time to be a part of a rapidly expanding market in the physical security space and to watch the industry react to the growing need for cybersecurity within products and services. In the next four years, there will be new innovations, new investments, and new winners and losers in products and services. It seems clear that those integrators and manufacturers who have begun to create the strategies and products for tomorrow will be well ahead of those who are not actively addressing the need for SaaS products, yet the window to opportunity remains wide open.
If you’re heading to ISC West in Las Vegas this year, it’s helpful to acknowledge immediately that there’s no way you can experience all aspects of the show. Just not enough time and too many options. Once you give up on seeing everything, you can immediately lower stress. But you also raise the stakes in terms of picking and choosing exactly what you have time for – or want to make time for. Hoping to help out as we all set our ISC West priorities, here are some ways to make the most of ISC West. Get There Early If you think the show starts on Wednesday (April 10), you have already missed the boat. Wednesday is the first day of the ISC West Exhibition, but there is a whole day of conference programming the day before – on Tuesday, the 9th. So plan to arrive early for conference sessions such as the End User Physical Security and Strategic Management tracks, a whole day of presentations by the PSA Security Network, and many other conference sessions. Learn From The Best You can also learn about Body-Worn Cameras for Government Personnel, School Safety and Private SecurityWant to hear about Taming the Surveillance Data Monster? There’s a session on Thursday. Want to learn about Establishing a Corporate Drone Program? That session is on Wednesday the 10th. They’re among the wealth of information-sharing sessions at ISC West. You can also learn about Body-Worn Cameras for Government Personnel, School Safety and Private Security; 3D Virtualization for Physical Security; and Using Enterprise Security Risk Management to Define Security's Value. Plan For The Future So much at ISC West is geared toward the future – new opportunities, tomorrow’s hot new product, and the start of business ventures that will be profitable for years to come. Some of the conference sessions are especially forward-looking, too, including a session on Thursday about the Stadium of the Future. A session called Getting Smarter and Safer: The Campuses of Tomorrow is on Wednesday, April 10. Another Wednesday session is Meet the Jetsons: Understanding the Promise and Challenges of Smart Cities. The Vision of the Future of the ISOC (Intelligent Security Operations Center) is on Thursday, as is the Smart Home of the Future session. All in all, ISC West can help you focus on the future in a big way. Meet Someone New Programs like SIA’s New Product Showcase can help, by recognizing innovation in a variety of product categoriesISC West sometimes emits the vibe of a yearly reunion of friends (who happen to be in business together). It’s great to see old friends again, but we shouldn’t miss the chance to meet new people, too. There is a multitude of networking events related to the industry’s big spring gathering, so the opportunities to expand one’s network and meet new people are abundant. Making the most of them takes effort, and some level of strategy. And there are also other, not-so-obvious moments to make new friends and acquaintances – whether it’s sharing a taxi or waiting for the next session to start. Bring a lot of business cards Find Something New The chance to view industry innovation is a huge draw of ISC West, but it can take discipline to separate the wheat from the chaff. The latest-and-greatest could literally be anywhere on that big trade show floor. Programs like SIA’s New Product Showcase can help, by recognizing innovation in a variety of product categories. The announcements of winners will be made on April 10, and, historically, these awards have gone to some of the newest and most innovative products at ISC West. A What’s New at ISC West session on Wednesday can provide additional guidance. Do Good In Addition To Doing Well A 10-year tradition at ISC West is the Security 5K/2k Run/Walk, a charity event benefiting Mission 500’s fundraising efforts to assist children in crisisISC West is all about business, but there’s also a specific opportunity to help make the world a better place. A 10-year tradition at ISC West is the Security 5K/2k Run/Walk, a charity event benefiting Mission 500’s fundraising efforts to assist children in crisis around the world. Why not avoid a late night on April 10th and rise early on the 11th to be a part of a remarkable event that has united the security industry to provide aid for children in need? Say Thank You Showing gratitude is an under-emphasized opportunity at ISC West, where the promise of new fortunes can eclipse our successes of the past. We will all see colleagues and friends we have been doing business with for years, so what better time to express a simple ‘thank you’, buy them a drink, propose a toast, celebrate? Helping to set a tone of gratitude is the ‘Official ISC West Customer Appreciation Party’ on Thursday. Parties are one way to say thanks, and a heartfelt verbal expression is another. ISC West will provide plenty of both – and they’re not to be missed.
From robots to drones to counter-drone solutions, a range of new technologies will be displayed at ISC West 2019. The Unmanned Security Expo will return, including a dedicated complimentary education theater for attendees offering sessions on a range of topics. UAVs, UGVs And Autonomous Systems Also included will be demos of the best UAVs (unmanned aerial vehicles), UGVs (unmanned ground robotics and vehicles) and autonomous systems on the market. The market growth for unmanned technologies being used for security and safety benefits is progressing at a rapid pace. Let’s look at some of the exhibitors in the 2019 Unmanned Security Expo: Cobalt Robotics' robots are purpose-built for a specific use case, providing after-hours support and security for corporate locations Cobalt Robotics' robots are purpose-built for a specific use case, providing after-hours support and security for corporate locations. Indoor environments, which are confined and controlled, present fewer navigation challenges for robots, which can quickly become familiar with the surroundings and navigate easily through an office space. Indoor robots can provide benefits beyond security, too, such as facility management, promoting employee health and safety, and emergency response Compact Surveillance Radar (CSR) System SpotterRF provides the world’s most advanced compact surveillance radar (CSR) system for affordable wide-area, all-weather perimeter security and small force protection. Incorporated in 2009, the company attained profitability quickly and is ahead of forecasts. Dedrone has remained at the front of the issue of drone threats, integrating installations to military bases, stadiums, public events, and private individuals. The company has expanded its operations to include a new office in Washington, D.C, and has continued to upgrade its DroneTracker software. DroneTracker is the industry’s first airspace security solution that includes automated summary reporting for instant diagnosis of drone airspace activity. Airspace Security And Drone Tracker Magos Systems is a state-of-the-art radar technology and perimeter protection solutions provider Magos Systems is a state-of-the-art radar technology and perimeter protection solutions provider. Founded in 2007 in Israel, Magos first specialized in advanced radar solutions for the military and defense markets. In 2015, Magos’ technology was declassified, allowing the company to focus on developing best-in-class systems for the commercial security market. Today, Magos radars are used in over 30 countries in critical infrastructure, data centers, electric utility sub stations, and oil refineries as well as in other commercial verticals like vineyards and car lots. Now, Magos is positioned to see increased adoption of its solutions in the U.S. Patriot One Technologies Inc. develops solutions to detect concealed weapons, utilizing novel radar technologies. Their innovative radar technology provides first responders and security personnel valuable time in active threat scenarios. The technology offers stand-off detection of concealed threats typically employed in public locations. These are just a few of the exhibitors in the Unmanned Security Expo. They represent technologies that will help to shape the future of the security marketplace.
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no searching in a bag or purse for the card). And there’s no personal identification number (PIN) code to remember; no “intrusive” biometric element that can concern some users. James Segil, President and Co-Founder of Openpath, says the simplified process “uses fewer thought cycles.” Reliability of the system comes from Openpath’s SurePath triple-connect technology “We wanted to make mobile access control that people want to use and can use safely and with ease,” he says. “We wanted to make using a smart phone for access control easier and more reliable than using a keycard.” Simplified User Operation In the simplified scenario, the mobile credential resides on a smart phone that can remain tucked away in the user’s purse or pocket. The credential remains active without the user needing to open an app. The wave of the hand signals intent, which causes the button to light up, activate and the door is ready to open. Segil says the simplicity of operation has contributed to the system seeing an unheard-of 94% adoption rate among users. Reliability of the system comes from Openpath’s SurePath triple-connect technology. The smart phone credential is delivered using Bluetooth, WiFi or LTE (cellular) – whichever signal reaches the reader first enables the door to be opened. So even if a company’s WiFi is down or Bluetooth proves unreliable, there is still a third option. Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems Seamless Cloud Integration Segil is a serial entrepreneur who has had experiences as a frustrated user, dealing with many different offices, people and access control deployments over the years – subletting office space, changing PIN codes, dealing with 10 different offices using 10 different cards. Based on that experience, Openpath’s founders saw a need for a more user-centric approach to access control, and a chance to improve the office experience to be more aligned with employees’ experiences in their smart homes. Segil says he also saw “significant lethargy” among incumbent players in the access control space, and a market in which mobile and cloud technologies had still not taken hold. In addition to a simplified user experience built around mobile credentialing, Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems. The “elegant” readers, including a flush-mounted version, fit in well with high-end office environments. The company launched in May 2018. Openpath has been signing up national and regional channel partners all across the U.S. Openpath is focused on the commercial real estate market, where they have already seen significant adoptions, especially among mid-sized companies. Larger deployments as part of new construction are in the pipeline. National System Integration In the past six months since its launch, Openpath has been signing up national and regional channel partners all across the U.S. and now has a nationwide footprint and is able to service customers all over the U.S. They are not yet disclosing any specifics about the number of partners they have signed up and who they are. “I can share that we have a number of large national system integration and security brands on board as channel partners and many more regional and local system integrators,” says Segil. They are looking for additional integrator partners. “There is a cohort of folks out there who say ‘I get it,’ and I want to offer it to my customers,” says Segil. The cloud element of the system can provide recurring monthly revenue (RMR). Openpath’s system offers flexibility in terms of meeting each customer’s security needs. In addition to the “super convenient” scenario described above, the system can also be configured to be “super secure,” using two-factor authentication and other measures, says Segil. There are multiple “flavors” between the two extremes. It can also be integrated with elevators to enable the buttons on allowed floors. Integration With Existing Systems Cloud software simplifies operation for both tenants and landlords. The system is backwards-compatible to existing systems and can be used to retrofit and mobile-enable a legacy system, providing the benefits of mobile features and cloud operation to multiple sites. The software can interface with enterprise applications such as Active Directory, and an application programming interface (API) facilitates integration with other systems and building components. It operates with marketing automation platforms such as Flack and visitor management systems such as Envoy. The system is backwards-compatible, providing the benefits of mobile features and cloud operation to multiple sites Open standards make the system easy to install in new or existing buildings using RS485, or Cat 5 or Cat 6 wiring, whatever is in place. Retrofit installations can use existing panels, servers, software, etc., or they can be replaced. The Openpath panel is installed right next to an existing panel in a retrofit and preserves all legacy integrations of the previous system. Access Credentials Compatibility In its simplest configuration, the Openpath system consists of single or four-door panels wired using standard ports, Wiegand ports and REX ports, each connected to software in the cloud. Each panel works offline if the internet connection is down. Various key fobs, cards and other credentials are available in addition to mobile credentials. Openpath was one of the new exhibitors at last fall’s GSX show in Las Vegas, occupying a large-sized booth for a startup company. The “beautiful” hardware drew a lot of attention, says Segil. “The channel loves us, and we signed a lot of people,” he adds. “We were excited by the response.”
Apstec Systems (Apstec) announces that its Human Security Radar (HSR) system will be deployed at the Palexpo Exhibition and Congress Centre in Geneva to improve safety and security for the International Motor Show 2019. Asptec’s HSR system is the world’s first fully automatic real-time mass people screening solution. Held over a period of ten days, the Geneva International Motor Show is one of the automotive industry’s flagship events and attracts large numbers of visitors every year. The organisers are anticipating up to three-quarters of a million visitors over the duration of this year’s event, with capacity reaching 150,000 attendees a day during peak times. Largest Conference Centres The Palexpo is one of the largest conference centres in Europe, and as such has a duty of care to its visitors HSR is uniquely well suited to managing this level of throughput and providing a high level of security without causing disruption to the flow of visitors into the venue, or negatively impacting their experience. Two HSR systems will be deployed for the show, each capable of screening up to 10,000 people per hour. The Palexpo is one of the largest conference centres in Europe, and as such has a duty of care to its visitors. Traditional security checkpoints or manual searches, which scan one individual at a time, are not suited to large venues and public places, leading to queues and delays. Although security is still paramount, attention has moved towards the need to add a critical level of defense that doesn’t impede visitor experience. Cost-effective solution HSR was designed to address this challenge, and offers a practical and cost-effective solution to security screening in high footfall scenarios. The first fully automated, real-time mass screening solution, HSR provides seamless security to protect public places from terrorist attacks. Developed by specialists in the fields of radio physics, electronics and software engineering, the walkthrough system has been built in conjunction with authorities and ‘end users’ in security and counter-terrorism. HSR screens for mass casualty threats including improvised explosive devices concealed on the body or in body-worn bags, and firearms wherever they are carried, without the need for an operator to inspect suspect materials. It leverages centimeter wave technology, meaning it can discriminate explosives from benign materials, with a high degree of accuracy. Security screening The Palexpo’s deployment of HSR is the latest major implementation of this new technology Gregory Labzovsky, CEO, Apstec, explained: “Until recently, it’s been almost impossible to secure public spaces in a simple and cost-effective way, with existing approaches to security screening proving to be impractical, inconvenient and expensive to operate. HSR enables venue owners to close a critical security capability gap without impacting the experience of their patrons. We’re delighted to be working with The Geneva International Motor Show to enhance safety for thousands of motoring exhibitors and enthusiasts.” The Palexpo’s deployment of HSR is the latest major implementation of this new technology. The system has been installed in some of the world’s busiest airports, as well as in sports stadiums, entertainment venues, mass transport hubs and networks.
Siklu Inc., a global provider of millimeter-wave solutions, announced that it has been selected by the City of Cambridge, England, to provide wireless connectivity for the city’s CCTV surveillance system in its town center. The Siklu EtherHaul radios deployed in Cambridge City Centre replace the 5.8 GHz wireless technology previously used by the city for its CCTV network. Wireless mmWave Technology Cambridge City Centre is a commercial and historic district that is adjacent to Cambridge University, making it a high traffic area for traditional 5 GHz wireless networks that are used by businesses, university departments and residents. Siklu radios bypass the congested 5.8 GHz spectrum wireless frequency by using the millimeter wave spectrum to transmit information across Cambridge’s CCTV networks, providing an interference-free and secured communication infrastructure for the city. “Siklu’s millimeter wave technology eliminated the camera latency issues that the previous wireless infrastructure presented,” said Ron Johnson, the owner of Videcom Security, which installed the Siklu radios for the city. “The CCTV network in the city center is now so robust that we have been able to install additional cameras in the area for more comprehensive security coverage without sacrificing fiber-like network speed, reliability and stability.” Secure Network Communication The public CCTV system shared by Cambridge and several other cities in the district monitors 254 cameras total, 24 hours a day and 365 days a year to monitor public events, thwart crime, manage traffic and provide residents and businesses with a safe place to live and work. Unlike legacy wireless networks whose wide beams can be vulnerable to interception, the Siklu radios deployed in Cambridge’s CCTV system use ultra-narrow beams in the 60GHz millimeter wave spectrum to transmit information across the network securely, making the radios inherently secure from interceptions and hacking. As a result, sensitive information can be transmitted across the network securely. “As technology advances and physical security requires more and more security and reliable network bandwidth, Siklu can offer cities like Cambridge the infrastructure needed to keep city centers and other areas safe,” said Eyal Assa, Siklu’s CEO. The Siklu EtherHaul mmWave product line will be showcased at IFSEC as part of Milestone Systems’ stand #E750, where Siklu will also conduct a live demonstration.
More than one hundred years after the first race, ACO (Automobile Club de l’Ouest, or roughly translated, the Automobile Club of the West), creator and organiser of the famous 24 hours of Le Mans, has selected the leading integrator of a secure and traceable access control solution, LOCKEN for its fast and reliable security system. 24 Hours Of Le Mans Behind the tireless car tracks, there is a set of intricate and complex facilities. In close proximity to the entrance, which welcomes more than quarter of a million spectators, there is a Museum, about 40 restaurants, 20 shops, a medical center, security stations all along the circuit, paddocks, where more than 10,000 competition tyres are stored, and of course the stands for each of the 60 competitors. This accounts for hundreds of different access points, requiring a variety of permissions, which must be closely controlled and monitored by ACO. Access rights are extensive for ACO employees, and some of the circuit’s customers, such as Porsche, which operates a modern building on the track side, while competitors and special guests have limited rights. The Porsche Experience Centre allows fans to try out its cars, all year round, on an allocated part of the circuit. With approximately 800,000 visitors hosted on the site each year, ACO has to account for 300,000 accesses, 53,000 of which must be managed during the competition, or the equivalent of 1,800 accesses controlled per day in June. The system already handles 544 points on the site, with 407 different keys to enable access LOCKEN’s Cyberlock Solution The specific requirements for access to its enclosure led ACO to focus on the management of access rights, to ensure perfect traceability for all stakeholders. The scope and diversity of facilities, which total several hundreds of crossing points, requires a secure, yet flexible solution. LOCKEN’s Cyberlock solution is based on unique key-centric technology, which provides the highest possible levels of security and efficiency, with the power delivered by a re-chargeable digital smart key and innovative software (including traceable data). Key-centric access management is built with the user in mind, it is based around three elements, a smart key, digital cylinders, and a unique software suite, providing robust access control. A trial phase, over several years, has allowed ACO to confirm the reliability and ease of use of the technologies, and LOCKEN to illustrate its enhanced capabilities. The system already handles 544 points on the site, with 407 different keys to enable access. Enhanced Access Control Solutions Toze Coelho, who is in charge of access within the operational management at ACO, comments: "In 2016, we equipped the sports module, which is at the heart of the race, dedicated to the management of safety - monitoring by cameras/monitors - where instructions are given to the commissioners positioned along the track. This space is highly sensitive, equipped with multiple networks, and is prohibited to the public.” “Our aim is to extend this process to provide full access control, and we are particularly keen to equip the Museum of the 24 hours of Le Mans with the LOCKEN solution." By contributing to the security of the 24 hours of Le Mans circuit, LOCKEN has positioned itself as a leading player in providing enhanced access control solutions to international venues and events.
Technical furniture manufacturer Thinking Space Systems have improved the working environment of CCTV operators at Blackburn with Darwen Council, with custom designed control room furniture recently installed within their new CCTV hub. Thinking Space were awarded the contract to provide control room furniture for the brand-new CCTV hub at Blackburn with Darwen Council. Accommodating four operators and two supervisors, the cool blues and greys for the interior for the room were matched by Thinking Space with their ergonomic furniture, to create a calm and peaceful environment for this 24/7 monitoring station. Of particular interest in this project was the 11 meter spanning Evolution media wall manufactured and installed by Thinking Space. Perfect alignment was key in ensuring the correct sight lines for operators and an aesthetically pleasing finish for the 33 large flat screens, mounted in a configuration of three rows of eleven. Thinking Space used laser positioning technology to achieve an accurate solution. Blackburn With Darwen Council CCTV hub The hub was officially opened in March 2017 with Thinking Space invited to the proceedings. Based in King George’s Hall, Blackburn, the new control room monitors over 240 cameras across East Lancashire in a bid to cut crime and make cost savings. Opening the new facility, which had been in operation since the previous month, Assistant Chief Constable Mark Bates and Council leader Mohammed Khan from Blackburn with Darwin Council led the proceedings, hailing the complete project as a resounding success. Peter Wareing, CCTV Services Manager for Blackburn with Darwen Council explained why communications between all parties ensured its success. “Thinking Space worked closely with both myself and our CCTV installers from day one, providing me with 2D and 3D images of the finished product, allowing me to better convince Partners of the finished article. As the project progressed, Thinking Space were in regular contact with me to ensure that I was receiving exactly what I needed” explained Peter. “The build and install went smoothly, something a project manager looks forward to! The finished article really looks the part and provided that wow factor, with sight lines all taken account of and Operators able to provide an excellent service in comfort.” See their furniture demonstrations at Stand H1125, IFSEC International from 20-22nd June.
Navi Mumbai officials have the benefit of operating in a modern environment, maximising Qognify’s Safe City solution Qognify, the provider of big data solutions for physical security and operations, announces the successful implementation of its market-leading Safe City solution in Navi Mumbai, a planned township that was established to handle the population overflow from the overcrowded and ever-growing city of Mumbai. Together with CIDCO (City and Industrial Development Corporation, the agency established for managing the new city) and system integrator WIPRO, Qognify has designed an integrated and holistic solution that helps Navi police to maintain law, order and safety. As a planned township, Navi Mumbai officials have the benefit of operating in a modern environment, allowing to maximize Qognify’s Safe City solution. At the core of the solution are Qognify Situator, an advanced Situation Management platform, and Qognify’s Video Management Solution, which controls the hundreds of surveillance cameras throughout the city. Safe City Solution Functions With the solution’s implementation, the city has gained the ability to improve traffic management, deter criminal activity, effectively manage response to events, and resolve investigations efficiently: A central command center is using the platform to monitor entry and exit points of the city, toll points, traffic junctions, accident prone road sections, subway and railway stations, schools, key residential areas, open markets, and key utility infrastructure areas such as electrical substations and the main water supply lines. Special “Emergency Communication Boxes” act as “panic buttons” and allow people to generate alerts and communicate directly to the control room in case of emergency. Qognify’s video management solution provides high quality video feeds. Smart integration with Agent Vi’s video analytics solutions enables immediate detection and extraction of security and safety incidents from surveillance cameras throughout the city. This integration enables the triggering of real-time, automatic alerts of incidents in Qognify Situator, that in turn, generates the appropriate operating procedure and response plan for the operators to act upon. "The Navi Mumbai security program goes far beyond a CCTV system" Situator provides a unified, operational view of the city by integrating all the components of the solution, while providing advanced collaboration capabilities for field personnel who are able to send real time images as well as videos to the control room with the type of the incident at hand and the GIS coordinates of the field respondent. Navi Mumbai Security Program “The Navi Mumbai security program goes far beyond a CCTV system,” said Mr. Soma Vijayakumar, CIDCO. “It is a smart solution that integrates video, emergency response, traffic control, license plate identification and more. Qognify is the core important element of this platform, providing a solution which is among the most modern and advanced available anywhere.” “Navi Mumbai has embarked on a remarkable program which will enhance the safety and security of its citizen, visitors and assets,” said Moti Shabtai, Qognify’s President. “We’re proud to be a part of this multi-solution, multi-agency project that fulfills the vision of the city authorities to provide a security and safety to its constituents.” Qognify will be featuring its security and operations solutions in booth 9101 at ISC West, April 5-7 in Las Vegas.
Hikvision will showcase its cutting edge video surveillance solutions at ISC West 2016 in Las Vegas, booth 14059 Hikvision USA, the North American leader in innovative, award-winning video surveillance products, has partnered with the Sunset Plaza Hotel in Los Angeles to provide a security solution for round-the-clock surveillance. Located on the bustling Sunset Strip, the hotel had a great need for versatile, user-friendly cameras and recorders that allowed their staff to keep an eye on the premises at all times. A variety of Hikvision models now protect the hotel guests and serve as powerful tools to keep hotel operations running smoothly. 24-Hour Video Surveillance The hotel had outgrown their legacy analog system and was hoping to upgrade to cameras that provided broad coverage and high-quality images in a variety of interior and exterior environments. It was also important that the interface for the security system was easy for employees to learn. “We wanted something that we could use from an operational standpoint and from a safety standpoint,” explained Brenda Elias, Operations Manager for the Sunset Plaza. Ms. Elias turned to Constantin Paul Bunea, the founder and CEO of Darkcad Tec, who had been serving as systems integrator for the hotel for ten years. After considering the options available on the market, he felt confident that Hikvision was the brand that would meet their needs. “I selected Hikvision cameras because the quality is very high, third party integration is easy, and the company provides excellent technical support.” Mr. Bunea stated. Versatility And Scalability Of Hikvision Products Darkcad Tec installed over twenty Hikvision IP cameras throughout the hotel, each well suited for a specific function. The DS-2CD2332-I turret, with Hikvision’s patented EXIR infrared technology, is being used in the parking garage, boasting image quality clear enough to make out license plates. A 3 MP fisheye camera, the DS-2CD6332FWD-I, allows for a 360° view of the main entrance. Cameras such as the DS-2CD2132F-I dome are being used at other hotel entrances, where HD real-time video is essential. This surveillance system is but one example of Hikvision products providing benefit to hotels all across North America. “The versatility and scalability of Hikvision products make them well-suited for a wide range of vertical markets,” stated Jeffrey He, President of Hikvision USA and Hikvision Canada. “We are pleased to serve our customers in the hospitality industry as they seek to provide safe and enjoyable experiences for their guests.” Hikvision At ISC West 2016 To learn more about Hikvision’s cutting edge video surveillance solutions, see them in person at ISC West in Las Vegas, booth 14059, April 6-8.
Round table discussion
The reviews are in, and ISC West was another hit. Brisk attendance and a comprehensive lineup of the industry’s top companies and products contributed to another successful show for Reed Exhibitions. Our Expert Panel Roundtable, who have attended many such events, added their own reflections to the industry’s post-ISC glow. We asked this week’s Expert Panel Roundtable: How successful was ISC West 2018 for security industry exhibitors and visitors?
A big trade show, such as the upcoming ISC West, has a lot to offer for attendees. How can attendees maximize the value they get out of ISC West? For advice, we go to our Expert Panel Roundtable, all seasoned veterans of many big trade shows. Specifically, we asked the panel: How can attendees get the most out of a big trade show like ISC West?
A busy trade show abounds with new products and expanded features, colorful signage and blinking video screens, all competing for attention from busy attendees. It’s a microcosm of how the security marketplace – or any market, for that matter – sells its products. But what happens if the reality turns out different to the sales pitch? What happens when product or system performance doesn’t quite live up to the claims? Some would call that hype, and it can lead to disillusioned and frustrated customers. We asked this week’s Expert Panel Roundtable: What is the negative impact of hype in the security marketplace?