Electronic Security Expo (ESX) 2019 registration is now open for electronic security and life safety industry professionals. The joint trade show and educational conference, owned by the Electronic Security Association (ESA) and The Monitoring Association (TMA), is set for June 3-6, 2019 in Indianapolis, Indiana. ESX is designed to provide passionate professionals a unique forum in which to learn about the latest technology innovations; acquire proven business strategies; gain new insights based...
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no s...
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. eFusion Security Management The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud...
ADT Inc., global provider of monitored security and interactive home and business automation solutions in the United States and Canada, has announced the unveiling of its newly redesigned smart home security system – the ADT Command Panel & Control Platform (ADT Command) – as well as a suite of smart security and home automation products at the Consumer Electronic Show (CES). This year’s theme, “Real Protection,” will highlight the products ADT offers to ensure...
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud computing and mobile communic...
There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event. Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show? Norman: I think there are numer...
ISC East, in collaboration with premier sponsor, the Security Industry Association (SIA), reported strong growth results at the conclusion of this year’s industry event in New York City. The International Security Conference & Exposition is the Northeast’s largest security trade show, where close to 7,500 security and public safety professionals convened this month to meet experts from over 300 leading security brands, all the while co-locating with the launch of Unmanned Security Expo New York and Infosecurity North America, Europe’s global information security event. Welcoming 85 new companies and brands and close to 1,000 more industry professionals compared to 2017, the ISC East exhibit hall bustled and featured expanded in-depth content - including new technologies and product categories, more special events/networking opportunities, and a variety of all-new complimentary education through SIA Education@ISC and Unmanned Security Expo New York. Comprehensive Security for a Safer, Connected World The extensive variety of vendors and professionalism of the ISC staff make it one of the best shows out there" Mary Beth Shaughnessy, Event Director for ISC Security Events, noted, “It was exciting to see such a robust expo floor and high attendance growth with our New York event this year, all while matching up to our brand theme of Comprehensive Security for a Safer, Connected World. The top attended education sessions were formed around a diverse spectrum of topics including cyber-physical integration, converged security for smart cities buildings, the impact of IT and AI on video surveillance/intelligence, critical incidents prevention and mitigation, plus drones, drone-detection, drone-regulations and policies, and more. The present and future is bright for ISC East and we are committed to providing great solutions and education for this community.” Over the past 4 years, the ISC East Show Floor has grown by over 60% in square footage and has come to be known as ‘the highlight of the year,’ stated by Linda Esposito, Security Specialist of US Postal Inspection Service. “The extensive variety of vendors and professionalism of the ISC staff make it one of the best shows out there. In addition, Alex Pachikov of Sunflower Labs, a first-time exhibitor at Unmanned Security Expo, commented, “This was the perfect venue for us to introduce the Sunflower Labs drone-based security system. We had the perfect audience and fantastic exposure to potential customers, installation partners and system integrators.” Unmanned Security Expo Additionally, while Unmanned Security Expo presented 15+ sessions dedicated to the in-depth issues, policies and opportunities for UASs and UGVs, the SIA Education@ISC East program offered 25+ complimentary education courses and highlighted two distinct Keynote Speakers for the first time at ISC East - Philip Halpin, Senior Vice President & Head of Global Security for Brown Brothers Harriman, and James A. Gagliano, Retired FBI Supervisory Special Agent, CNN Law Enforcement Analyst, and Adjunct Assistant Professor at St. John’s University. SIA Education@ISC East 2018 SIA Education@ISC East 2018 was a great success, with hundreds of conference attendees participating in education sessions, engaging keynotes and hands-on workshops" “SIA Education@ISC East 2018 was a great success, with hundreds of conference attendees participating in our education sessions, engaging keynotes and hands-on workshops,” said Don Erickson, CEO of the Security Industry Association. “This year’s sessions highlighted cutting-edge topics like the move to smart cities, convergence in the security industry, the use of artificial intelligence in video analytics, and how some legacy connections leave modern access control data vulnerable to hacking.” With so much learning and knowledge-sharing happening on the show floor, security professionals still found time to participate and engage at the numerous special events that ISC East had to offer, including: the first-ever SIA Women in Security Forum Breakfast, the new Mission 500 Hygiene Kit Building, the ever-popular ASTORS Homeland Security Awards, ISC East’s Featured Product showcase featuring some of the most innovative product technologies, a high-profile celebrity appearance of former NY Yankees player Tino Martinez , the signature ISC East Grand Opening Ceremony, the Crack the Tap Cocktail Reception, and so much more. ISC Security Events As ISC East comes to a close, the ISC Security Events portfolio continues to provide comprehensive security for a safer, connected world through ISC West and Unmanned Security Expo, and Connected Security Expo taking place on April 9-12, 2019 (SIA Education@ISC: April 9-11 | Exhibit Hall: April 10-12) in Las Vegas.
Ping Identity, the provider of Identity Defined Security, announced the public preview of PingOne for Customers. The cloud-based Identity as a Service (IDaaS) offering is built for the developer community and provides API-based identity services for customer-facing applications. It can help large enterprises launch apps faster, replace custom identity services that are difficult to maintain, and facilitate the transition from on-premises deployments to cloud-hosted services. By making it easy to securely authenticate end users, PingOne for Customers frees up developers’ time to focus on delivering business value faster. PingOne for Customers is designed to make it faster and easier to embed registration, login, profile management, multi-factor authentication (MFA) and other cloud-based identity services directly into customer-facing applications. The solution offers developer-friendly APIs, extensive documentation, and a dedicated community to help ensure ease of use as developer teams get up and running. PingOne for Customers includes broad support for identity standards such as OAuth, OpenID Connect, and SAML Support For Identity Standards Organizations are embarking on a broader range of cloud-first digital business initiatives yet struggle with the integration and support of new cloud and SaaS offerings with their existing identity infrastructures. PingOne for Customers addresses these needs and includes broad support for identity standards such as OAuth, OpenID Connect, and SAML. It also offers hybrid IT capabilities, delegated administration, and addresses other enterprise requirements at the onset to provide diverse implementation and deployment options. Integrations across the broader Ping Intelligent Identity Platform will help current enterprise customers maintain a seamless path to the Cloud. Integrating Identity And Access Management Services “The developer community wants to build applications and just leverage a service for securing login and registration, versus creating the capabilities themselves in their app,” said Steve Shoaff, chief product officer, Ping Identity. Speed time to market by leveraging the APIs in PingOne for Customers to embed identity services directly into an application “PingOne for Customers saves time and valuable resources by greatly simplifying how developers integrate identity and access management services into their application development process. By providing easy to integrate identity services, developers can focus on other high-value work and their enterprise customers can rest assured their applications are secure.” Capabilities And Benefits Of PingOne PingOne for Customers provides the following additional capabilities and benefits: Flexible application integration: Speed time to market by leveraging the APIs in PingOne for Customers to embed identity services directly into an application. Tenant-in-tenant architecture: Create multiple development, staging and production environments for apps to support DevOps, agile development and delegated administration. Secure and reliable CIAM platform in the cloud: With support for identity standards (OAuth, OpenID Connect, and SAML), a cloud-based MFA solution, a secure place to store users in the cloud, centralized policies and authentication flows, and much more. IDaaS to on-premises: Connect with existing on-premises infrastructure to provide access management, single sign-on, and data synchronization across hybrid IT environments. According to Forrester Research, "The IDaaS model provides a much faster deployment model by eliminating the need for security and risk pros to purchase and deploy." PingOne for Customers is now available for public preview. Stop by the Ping Identity booth #324 at the Gartner IAM Summit taking place in Las Vegas this week to learn more about the offering.
The International Fire & Security Exhibition and Conference (IFSEC) India Expo, South Asia's largest security, civil protection and fire safety show by UBM India, is gearing up for its 12th edition which is slated for December 5th - 7th, 2018 at Pragati Maidan, New Delhi. Supported by the Asian Professional Security Association (APSA), American Society for Industrial Security (ASIS), Electronic Security Association of India (ESAI), Overseas Security Advisory Council (OSAC) and the Associated Chambers of Commerce and Industry of India (ASSOCHAM) among others, the show will see participation from over 20 countries such as UK, USA, China, Taiwan, Malaysia, Australia, Canada, Singapore, Korea, Russia and will bring together over 300 domestic and globally renowned brands, key government officials, consultants and business experts. Prioritizing Security And Surveillance The Government of India recognizes this vulnerability and has introduced strict regulations and guidelines" The visitor profile of the expo will include professionals such as CSOs, Admin Heads, CIOs, CTOs, Facility Heads, Purchase Managers, System Integrators and Dealers & Distributors of organizations. Speaking on the announcement of the 12th edition of the IFSEC India Show, Mr. Yogesh Mudras, Managing Director, UBM India said, "The South Asia region, which the IFSEC India Expo brings within its radar, is a vulnerable as well as a progressive zone with ongoing threats to homeland security, rising urbanization, proliferating crimes, and low people-to-police ratio being some of the most significant factors. The Government of India recognizes this vulnerability and has introduced strict regulations and guidelines that promote the use of security and surveillance in the country -- the security of children within school premises, and the growing need for women's safety being noteworthy instances.” Electronic Security Market “Besides, in a bid to make the country truly modern and secure, it has till date invested around ₹ 48,000 crores for its Smart City initiative that aims to create at least 100 smart cities in India. Owing to these factors, it comes as no surprise that the electronic security market in India is expected to witness a tremendous growth with a projected CAGR of nearly 13 per cent over the next decade." "IFSEC India 2018 aims to act as a catalyst for the progress and vision of this proliferating industry, as it provides a platform for industry players to collectively ideate, innovate, spot trends and enable the shift in India's security paradigm from a defensive approach to a monitoring and responsive one," he further added. Ever-Evolving Industry The IFSEC India Expo provides high-impact, informative demos and a wealth of opportunities for the visitors IFSEC India will include in its already formidable repertoire, products and technologies pertaining to CCTV & Surveillance, Biometrics & RFID, Integrated Systems, Access Control, GPS Systems, Video Management, Parking Automation, Transport, Perimeter Protection, IoT, Smart Homes, Security & Safe Cities in addition to surveillance for the knowledge of end users and providers. Key global brands & distributors include Premier Plus Partners: Aditya Infotech, Advik, Dahua, eSSL, Globus, Hikvision, Mark, Nuctech, Realtime, TVT and Zkteco; Premier Partners such as Axestrack, Biomax, Honeywell, Mantra, Panasonic, Road Point, Seagate, Timewatch, Unique Electrovision, Vantage, and Western Digital, among others. Significantly, in an industry where upgradation of technology is the very key to surviving the competition, IFSEC India Expo provides high-impact, informative demos and a wealth of opportunities for the visitors to network and learn about new technologies, industry best practices and trends, challenges, market insights and discover the best solutions to keep their business and clients secured. High Octane Business One of the novel ways by which the expo this year is encouraging this vital interaction between key exhibitors with cutting-edge innovations to offer and big ticket buyers is through the creation of the Regalia Lounge, an exclusive, private 5 star lounge, meant solely for one-on-one interactions and high octane business on a 'By Invitation Only' basis. IFSEC India 2018 has decided to proactively decipher relevant insights gained in the global security market as well as latest technology With security in India continuing to be an onerous task, IFSEC India 2018 has decided to proactively decipher relevant insights gained in the global security market as well as latest technology such as aerial vehicles and drones by conducting a two-day conference with the theme 'Unraveling the Evolution in Security Tech' alongside the exhibition. Security Veterans The conference will witness the presence and participation of eminent industry personalities including Shri D.R. Karthikeyan, Chairman, Assocham Homeland Security Council; Capt. Raghu Raman, President - Risk, Security and New Ventures, Reliance Industries Ltd.; Shri M.S. Upadhye, IPS, Chief Security Commissioner, Delhi Metro Rail Corporation; Lt. and Gen. Sudhir Sharma, PVSM, AVSM, YSM, VSM, Former Quartermaster General, Indian Army, among others. Some of the trending topics scheduled to be discussed at the conference are - 'Corporate Risk Management: Integrating Standards and BeSomst Practices into Operations' , 'The Evolving Role of a CSO in Crisis Management and in Ensuring Business Continuity', 'Regulatory Compliance Requirements Related to Corporate Security', 'Industry Best Practices in the Manufacture of Security Products by Bureau of Indian Standards', 'Technology-Enabled Disruptions', 'Emerging Paradigms in Security Architecture', 'How AI & IoT Add Value to Video Surveillance Systems', 'The Threat of Cyber Attacks on Security & Surveillance Systems', and 'How Drones and Unmanned Aerial Vehicles Can be Effectively Used to Enforce Homeland Security'. Impressive Industry Growth The awards will recognize the excellence and innovations of CSOs & Security officers who continuously work behind the scenes This year, IFSEC India is all set to host the 3rd edition of the IFSEC India Awards. With the impressive growth of the Electronic Security Industry in India, the awards have been crafted to specially get the minds behind electronic security in various industry verticals like BFSI, Retail, Manufacturing, Energy, Healthcare, PSUs, IT & ITES and Infrastructure in the limelight. The awards will recognize the excellence and innovations of CSOs & Security officers who continuously work behind the scenes to ensure robust security. The process advisors for the IFSEC India Awards will be Ernst and Young. IFSEC India owes its rich legacy to the 40-year-old IFSEC Global and success to the way the Indian edition has modified itself to suit the specific needs of this region. Recommended by industry experts as the pre-eminent authority on the global security and fire industry, the expo has nudged the industry on the path to a completely secure, smart and digitally enhanced world.
Ava Group (AVA), global provider of security risk management services and technology will be presenting its portfolio of security solutions at International Security Expo, stand E74. The expo also hosts a range of certified conferences and workshops covering every major sector of the security industry. Taking place over two days at London Olympia, the event focuses on the needs of government and CNI amongst other key sectors. Fiber Optic Intrusion Detection Ava Group will be showcasing the latest solutions from its technology division - incorporating Future Fibre Technologies and BQT Solutions. The Ava Group is a market leader of risk management services and technologies, offering a portfolio of complementary solutions encompassing both fiber optic intrusion detection and high security access control and locking. Mark Horton, Global Sales & Marketing Director – Future Fibre Technologies commented, “Our brands have a strong pedigree in some of the expo’s key sectors including government and CNI, and we’re very much looking forward to discussing with visitors how Ava’s solutions can be applied to protect their organizations. Ava Group has had some major project wins in recent months including a major military closed data network, who have selected our data network infrastructure protection solution to secure its network against tapping and tampering. It is projects such as this that demonstrate Ava Group’s expertise in security risk management and protection of client’s assets and infrastructure.” Perimeter Security Technology New ultra-low noise optical detection electronics ensure a single controller can cover a distance up to 110 kilometres Ava Group’s CTO – Technology, Dr Jim Katsifolis will be presenting in the Perimeter Security & Intrusion Detection Technology Workshop on ‘Security within security in a converged perimeter intrusion detection solution’ on the first morning of the exhibition. An accomplished R&D professional, Jim will explore the latest generation of PIDS technologies, the convergence of intrusion detection and cybersecurity as well as addressing some common myths in this field. Featured on the stand will be the enhanced Aura Ai-2 controller from Future Fibre Technologies. This market-leading product offers unrivalled high-sensitivity detection, location accuracy, cut resilience capability and the industry’s longest linear range. New ultra-low noise optical detection electronics ensure a single controller can cover a distance up to 110 kilometres and can accurately detect, locate and report multiple disturbances to +/- 2 metres. Security Management Solution Ava Group is also previewing its Small Site Assurance range, which is designed to protect remote unmanned locations through a holistic security management solution. The solution incorporates intrusion detection, access control and locking as well as environmental monitoring - all controlled remotely from a simple graphical user interface. The Small Site Assurance range is particularly suited for utilities, telecoms, energy, oil & gas and data centers that are at risk from threats such as vandalism, opportunistic and targeted theft, terrorist attack, trespass, system failure, accident or injury. Orca Locking Security Solution The Orca lock is a high-strength lock designed for securing gates, roller doors, shipping containers, and any other large door or entryway From BQT Solutions, Ava Group will be demonstrating the Orca lock. Building on the success of the award winning YG10, the Orca lock is a high-strength lock designed for securing gates, roller doors, shipping containers, and any other large door or entryway. Alongside the Orca’s impressive physical attributes, its ability to integrate into an access control system is what elevates it beyond anything available in the market. Fully monitored, weatherproof, and user configurable, the Orca is the perfect indoor and outdoor locking solution. BQT will also demonstrate the latest software integration between its miPASS Access TMS software and Paxton’s Net2 access control software. The integration enables the seamless addition of BQT biometric readers to new or existing Net2 systems, facilitating a smooth transition from less secure card technologies to more robust options like fingerprint biometrics and BQT’s own miPASS credentials.
Matrox Graphics Inc. will demonstrate a variety of ground-breaking, IP-based innovations at the 2018 Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC). Featuring the industry’s highest-quality capture and encoding technology at the lowest bitrates, Matrox Maevex enterprise encoders, Extio 3 IP KVM extenders, and Mura IPX video wall and multiviewer cards will stream, extend, record, decode, display, and control multiple 4K video content on advanced modeling, simulation, and training systems—all deployed on a standard one Gigabit Ethernet network. I/ITSEC attendees will get a first-hand look at an uncompromised, high-performance 4K-over-IP ecosystem—from capture all the way to consumption—that is critical for a wide range of virtual and immersive training applications in the government, military, industry, and academic and research sectors. Simultaneous Capture, Streaming And Recording Matrox Extio 3 IP KVM extenders provide seamless control of training and simulation systems from a distanceMatrox Maevex 6120 and Maevex 6150 dual and quad 4K enterprise encoders allow for the simultaneous capture, streaming, and recording of multiple 4K inputs. These powerful all-in-one appliances deliver content to on-premises endpoints, to cloud and internet services, and also record for later editing and viewing, concurrently. Matrox Extio 3 IP KVM extenders provide seamless control of training and simulation systems from a distance. Delivering exceptional 4Kp60 4:4:4 or quad 1080p60 4:4:4 performance over a standard 1 GbE network—at unprecedentedly low bitrates—Extio 3 enables the design of a scalable and cost-effective KVM matrix over IP to securely route any system to any remote location on the network. Monitoring And Visualization Of Data Points Matrox Mura IPX video wall and multiviewer cards offer the highest-density capture, encode, decode, and display capabilities on the smallest footprint. The versatile Mura IPX cards are ideal for the monitoring and visualization of many data points (baseband, IP, or local applications), as well as for sharing and/or recording—either a region of interest or the entire video wall—for real-time information sharing or review purposes. See Matrox in action at I/ITSEC 2018 (Orlando, USA), booth 627, from November 26-30, 2018.
PSA, the world’s largest security and systems integrator consortium, announces the education lineup, conference agenda and a new exhibit showcase date for TEC 2019 to be held March 11-14, 2019 at the Sheraton Downtown in Denver, CO. TEC, presented by PSA, is the premier education and networking event for all professional systems integrators in the security and audio-visual markets. This year’s education conference will feature over 100 education sessions, workshops and certification trainings from industry leading experts and partner organizations. Dedicated Learning Tracks The event will also leverage a full-day of dedicated exhibit hours on Thursday, March 14, 2019 The event will also leverage a full-day of dedicated exhibit hours on Thursday, March 14, 2019 where more than 125 security and audio-visual vendors will showcase their product and services along with networking events that utilize the offerings of Denver. “We are very excited about the changes coming to TEC this year that will further open the doors of this conference to more systems integration companies across the nation,” said Kim Garcia, director of marketing for PSA. “For many years TEC has been open to all industry professionals to attend regardless of their affiliation with PSA because the training we offer is meant to better the industry as a whole as well as the attendees in their personal disciplines.” Exchanging Information The TEC 2019 education program will deliver invaluable sessions to systems integration professionals with a desire to stay relevant and thrive in changing markets through personal and professional development. With dedicated learning tracks focused on job function, attendees will leave TEC with ways to improve operational efficiencies, add additional value to their businesses and their customers’ journeys and support emerging market trends including managed services and cybersecurity from their own vantage points. PSA TEC is all about building relationships and exchanging information with people who share the same challenges you do every day" “TEC is really one of the best kept secrets in our industry for any professional looking for a training and exhibit venue where they don’t get lost in the crowd,” said Garcia. “PSA TEC is all about building relationships and exchanging information with people who share the same challenges you do every day. Whether you are a business owner, technician, project manager, sales and marketing professional or operational support, there is training available to you at TEC that can make you better at your job.” General registration opens on December 12, 2018. PSA Owners/Members will have exclusive registration access starting on December 5, 2018. Discounted early bird pricing is available until January 12, 2019 for all attendees.
Thousands of security professionals gathered Nov. 14-15 at the Javits Center in New York City to explore new products, solutions and technologies, network with security luminaries and obtain high-quality industry education. ISC East, sponsored by the Security Industry Association (SIA), is the Northeast’s largest security industry event; more than 7,000 security professionals attended or exhibited at this year’s conference. Following day 1 of ISC East, SIA gathered industry luminaries and experts for SIA Honors Night, an annual event featuring a cocktail reception, a gala dinner benefiting Mission 500, engaging entertainment and an awards ceremony recognizing industry leaders. Sold-Out Event SIA Honors Night 2018 was a sold-out event held at the Current at Chelsea Piers. The awards presented at SIA Honors Night 2018 were: SIA Progress Award (presented by SIA’s Women in Security Forum) – Eddie Reynolds, president and CEO, iluminar Inc. Women in Biometrics Awards (co-founded by SIA and SecureIDNews and co-presented with sponsors FindBiometrics, IDEMIA and SIA’s Women in Security Forum) – Kelly Gallagher, senior account manager at NEC Corporation of America; Lisa MacDonald, director of the Identity Management Division in the Office of Biometric identity Management at the U.S. Department of Homeland Security; Colleen Manaher, executive director of U.S. Customs and Border Protection; Lora Sims, senior biometric examiner at Ideal Innovations, Inc.; and Anne Wang, director of biometric technology research and development at Gemalto Cogent SIA Insightful Practitioner Award – Guy M. Grace, Jr., chair of the Partner Alliance for Safer Schools Steering Committee and director of security and emergency planning for Littleton Public Schools in the Denver suburb of Littleton, Colorado Jay Hauhn Excellence in Partnerships Award – Larry Folsom, co-founder and president, I-View Now George R. Lippert Memorial Award – Pat Comunale, retired security industry veteran, former member of the SIA Board of Directors and former CEO and president for Tri-Ed Distribution, an Anixter company Standout Keynotes SIA Honors Night also highlighted Mission 500, a charity that advocates for children and families living in extreme poverty in the United States Honors Night guests enjoyed keynote remarks from Bonnie St. John, a Paralympic ski medalist, Fortune 500 business consultant, Rhodes scholar, former White House official and best-selling author. St. John discussed her journey to become the first African-American ever to win medals in Winter Olympic competition despite having her right leg amputated at age five and shared her top lessons from mentors and her advice for cultivating resilience. SIA Honors Night also highlighted Mission 500, a charity that advocates for children and families living in extreme poverty in the United States; each year, SIA Honors Night raises funds for Mission 500. SIA presented 26 engaging education sessions through the SIA Education @ ISC East program, including two standout keynotes and four hands-on workshops. Hundreds of conference attendees participated in these sessions, with impressive speakers like Valerie Thomas, ethical hacker and executive consultant at Securicon; Pierre Bourgeix, president at ESI Convergent; Scott Swann, president and CEO of IDEMIA National Security Solutions; and Jumbi Edulbehram, regional president – Americas, Oncam. SIA sponsored Infosecurity North America’s Keynote Stage, the central hub of the event Confronting Emerging Threats Highlighted education sessions at this year’s conference included: Friend or Foe? Technology Disruption and the Physical Security Industry, a keynote address by Philip Halpin, senior vice president and head of global security at Brown Brothers Harriman, one of the country’s oldest and largest privately held financial firms 21st Century Best Practices: Reporting From the Front Lines on How Law Enforcement and the Security Industry Are Confronting Emerging Threats, a keynote address by James A. Gagliano, a retired FBI supervisory special agent, CNN law enforcement analyst and adjunct assistant professor at St. John’s University Cybersecurity Professionals ISC East 2018 was co-located with two additional conferences – Infosecurity North America and Unmanned Security Expo Additional cutting-edge topics covered in the education sessions included the move to smart cities, convergence in the security industry and the use of artificial intelligence in video analytics. ISC East 2018 was co-located with two additional conferences – Infosecurity North America and Unmanned Security Expo. SIA sponsored Infosecurity North America’s Keynote Stage, the central hub of the event, which featured a presentation from world-famous hacker Kevin Mitnick, insights from Dave Hogue of the National Security Agency’s Cybersecurity Threat Operations Center, a discussion on the cyber skills shortage gap and ways to attract, develop and retain talented cybersecurity professionals and more. Handle Sensitive Data Additional events at ISC East 2018 included: A breakfast presented by ISC Security Events and SIA’s Women in Security Forum featuring a panel discussion celebrating women in security and supporting the participation and advancement of women in the industry Paid hands-on workshops providing cutting-edge information and valuable insights on the most current business trends, technologies and new developments in security Free exhibitor product training sessions sharing live, in-depth demonstrations A meeting with SIA’s Data Privacy Advisory Board, which provides information and best practices to help SIA members handle sensitive data in a safe and secure manner to protect the personally identifiable information of their employees, partners and customers from potential breaches
Artificial intelligence and machine learning are the rage in tech right now and not surprisingly, many cyber companies are beginning to automate an increasing amount of their operations. Some of this is great, particularly when it assists cybersecurity professionals to automate mundane tasks and focus more of their attention on higher level analysis. But so far, machine learning is more hype than helpful for cybersecurity, but that does not mean you can’t automate some tasks to keep your organization safe. Effective Machine Learning Applications At its most basic, machine learning technology is supposed to enable cybersecurity companies to predict the nature of future attacks based on past behavior, similar to how Netflix displays what you want to watch based on what you’ve previously viewed. According to Jack Gold, president and principal analyst at J. Gold Associates, this innovation can assist cyber companies to transition away from a “signature-based” system to detect malware. Instead, he sees more companies adopting a machine learning approach that aims to analyze past incidents in a broader manner and aggregate information from a multitude of sources. Machine learning technology is supposed to enable cybersecurity companies to predict the nature of future attacks Specifically, some machine learning applications for cybersecurity are effective at doing the following: detecting malicious activity, helping security officers determine what tasks they need to complete in an investigation process, analyzing mobile endpoints, decreasing the number of false positive threats, automating repetitive tasks like interrupting ransomware, and potentially closing some zero-day vulnerabilities. A number of tech giants have invested in these capabilities recently, including Google, which is employing machine learning to help protect Android mobile endpoints. Amazon also bought a startup called harvest.AI to help it aggregate and better understand data located on the S3 cloud storage service. Limitations Of AI For Cybersecurity That said, the signal-to-noise ratio for threat intelligence-type automation events isn't effective for most organizations at the moment. The reality is automating threat intelligence - or in other words, identifying adversaries automatically - is difficult to execute within an organization because every company’s threats, vulnerabilities, and risks are unique. Ultimately, machine learning can help cybersecurity outfits, but it can’t replace many important functions. In an article for Forbes, Alexander Polyakov explains well why machine learning’s applications for cybersecurity are limited. He writes, “There will always be a person who tries to find issues in our systems and bypass them. Therefore, if we detect 90% [of] attacks today, new methods will be invented tomorrow.” Cybersecurity outfits can pair their human intellect with machine technology to catch hackers before they do too much damage Put in another way, there is a reason that machine learning is very good at predicting events like the weather. As McAfee CTO Steve Grobman described at McAfee MPOWER, their annual security conference, the weather abides by laws of physics. So even with phenomena such as global warming, the weather will largely act in the future based on how it has been in the past. Pairing Human Intellect And Machine Technology Cyber attacks, meanwhile, are the complete opposite. Hackers become smarter, and are always one step ahead of cybersecurity officers, inherently and frequently shifting their strategies so that CISOs will not detect them. For all the incidents machine learning technology can identify, which is helpful, there will always be sophisticated attacks that no machine learning algorithm will be able to find. It is also worth stating a simple fact: Humans hack. While they may use fancy technology to deploy these attacks, it is a human-led effort. Therefore, at the highest level, cybersecurity officers will be the only force able to stop hackers from penetrating critical networks. Machines don’t fully understand us. Only humans can still (and probably always) comprehend hackers’ larger strategy. Instead, cybersecurity outfits can pair their human intellect with machine technology to sort through data faster and catch hackers before they do too much damage. No cybersecurity company should be led by robots -- and that’s a good thing.
The physical security industry is rapidly changing, ever evolving, and one that is growing faster than most other sectors of the greater global market. The latest research shows that the forecasted growth rates will be a compound average growth rate (CAGR) of 7.2% and a total market revenue opportunity of $41.27B through 2022. These economic indicators make the industry a very attractive investment for entrepreneurs and for investment from large corporations from other industries. At ISC West 2018, this was extremely evident as there was a palpable buzz from technologies such as artificial intelligence (AI), machine learning, cloud-based video management systems and cloud-based access control systems. New market entrants such as Amazon, and a seemingly increased interest and investment from the likes of Intel, IBM, and even Microsoft were present and contributed strongly to the buzz of the industry’s largest tradeshow.The global managed security services market is projected to reach nearly $40.97 Bn, with a CAGR of 16.6% over the next five years Need For Education And Enhanced Security With the increased profile of the industry, one can clearly see that the physical security industry is expanding globally to new consumers; bringing with it an increased need to further secure products and services with comprehensive physical and cybersecurity protocols and the need for education. This convergence of physical security and cybersecurity will create new industry leaders that will emerge to lead a new segment of the combined market through strong investment and leadership. According to a report published from Allied Market Research (AMR), the global managed security services market is projected to reach nearly $40.97B, with a CAGR of 16.6% over the next five years. Correlating these two market data points, the forecast for the physical security market is expected to have nearly 18% of the total market opportunity comprised of cloud services at nearly $7B. Sharing Security Service Best Practices In September 2017 at the Cloud+ Conference in Austin, Texas, the leaders of the Access Control as a service (ACaaS) and Video Surveillance as a Service (VSaaS) markets, converged to share industry trends, observations of customer adoption, best practices in implementation and service, financial models, and several in-depth discussions on securing physical security of cloud implementations through cybersecurity. The physical security market will have nearly 18% of the total market opportunity comprised of cloud services These cybersecurity discussions absolutely dominated every discussion with the clear message that as a cloud service provider, manufacturers and integrators must continue to create robust and scalable cybersecurity offerings to protect customer data and facilities. Interestingly, an analysis of all of the past cyber breaches was presented by keynote speaker Dean Drako of Eagle Eye Networks, who, through a powerful visual diagram, noted that all existing breaches in the physical security industry were entirely on manufacturer provided hardware solutions; VMS physically installed on customer premises, and camera specific vulnerabilities across multiple providers.Network personnel, cybersecurity personnel, firewall experts, and cloud-specific software development staff all need to be added to core physical security engineering expertise Cloud Versus Non-Cloud Services The insight that one was able to glean from this information and, that of a greater analysis of cybersecurity hacks across all industries, was that manufacturers and providers of cloud services were more secure and reliable by orders of magnitude than non-cloud solutions. The reason for these phenomena also became glaringly evident; the security protocols of a cloud service provider is central to the business’s value proposition and as such should be addressed across all levels of manufacturing, implementation, and customer utilization. Conversely, non-cloud deployed products rely on field implemented cyber strategies from integrators and end users which often expose lack of skills, education and budget to fully secure these physical security products. Ensuring Successful Deployment As a SaaS service provider, the technical personnel makeup results in an expansion of staff and expertise. Network personnel, cybersecurity personnel, firewall experts, and cloud-specific software development staff all need to be added to core physical security engineering expertise to ensure that the product developed can be successfully implemented and deployed.Implementing a process to protect millions of customer’s data records and facilities begins with mapping out a strategy to secure software and hardware. These new jobs in the physical security industry will astronomically expand as the market continues to grow $6 Bn in a little over 4 years providing new opportunities to existing and new personnel to enter the industry. As a leader in access control hardware and an ACaaS provider, ISONAS has taken it upon themselves to implement a process to ensure that their customers can easily implement their products and gain great peace of mind in regard to the security of the solutions. Data Security Strategies Implementing a process to protect millions of customer’s data records and facilities begins with mapping out a strategy to secure software and hardware. This means employing high-level, seasoned cloud deployment experts to create a strategy in our AWS infrastructure and all ancillary supporting technologies to minimize attack surfaces, create complex, proprietary associations in a multi-layered and multi-tiered connection throughout the application and lastly ensuring that all communication to and from customers’ devices are encrypted and secured. Implementing a process to protect customer’s data records and facilities begins with mapping out a strategy to secure software and hardware Once implemented ISONAS took it upon themselves to validate the infrastructure and the customers experience by subjecting the environments to 3rd party penetration tests. Addressing Cyber Threats These tests, taken up quarterly, ensure a customer that the latest in cyber threats are being addressed and that the manufacturer is providing the latest solutions available in the market.Integration implementation personnel should gain greater knowledge in networks and cybersecurity best practices for their solutions An added benefit is that customers gain the scalable benefits of enterprise corporate cybersecurity protocols at a fraction of the cost of implementing these on their individual premises. As an industry, however, it is not simply the responsibility of the cloud service provider to ensure that the customers data in video and access control are being protected. It is also incumbent on the integrator to ensure that the installation and implementation of the products and solutions are deployed in an educated and skill-based manner. Knowledge Of Networks And Cybersecurity Best Practices The products and services utilized must be easy to implement, be clear in their requirements of the end user networks, and simplistic to apply. Nearly all manufacturers of these products are working diligently to ensure that the integrator has all of the tools at their fingertips to ensure a successful implementation. However, it will remain important that the integration implementation personnel gain a greater knowledge in networks and cybersecurity best practices for their solutions.The products and services utilized must be easy to implement, be clear in their requirements of the end user networks, and simplistic to apply In most cases, this will mean additional jobs for new higher-level personnel, access to additional services to provide to end users, and an elevation of networking and security expertise within their business. Expanding The Reach Of Physical Security These new-found skills and expertise will likely bleed into new markets and expand the reach of the traditional physical security market. It truly is an exciting time to be a part of a rapidly expanding market in the physical security space and to watch the industry react to the growing need for cybersecurity within products and services. In the next four years, there will be new innovations, new investments, and new winners and losers in products and services. It seems clear that those integrators and manufacturers who have begun to create the strategies and products for tomorrow will be well ahead of those who are not actively addressing the need for SaaS products, yet the window to opportunity remains wide open.
ISC East is making a name for itself as a must-attend regional conference and trade show in New York City that brings together the large community of law enforcement and private sector security professionals from the Tri-State area. ISC East, being held Nov. 14-15 at New York’s Javits Center, is emerging from the long shadow of its sister show – ISC West in Las Vegas in the spring – and making its own mark on the industry. ISC East is 20% larger than last year, and exhibitors have swelled from 230 to more than 300. Familiar names at ISC East this year (who were absent in 2017) include Allegion, Arecont Vision Costar, Bosch Security Systems, and Seagate Technology. In all, there are 115 new exhibitors compared to 2017.Familiar names at ISC East this year (who were absent in 2017) include Allegion, Arecont Vision Costar and Bosch Security Systems “We purposefully make sure we reflect the region we are in,” says Will Wise, Group Vice President, Security Portfolio, Reed Exhibitions. “It’s not a mistake that both our keynote speakers have New York-centric backgrounds and have topics to reach a larger market. We want to tap into the strengths of the region.” ISC East (International Security Conference & Exposition) has come a long way in the last five years. In 2014, the show was a mere 28,000 square feet, and this year it has grown to 44,000 square feet of exhibit space. One factor driving growth has been improvements in the educational session, powered largely by show partner Security Industry Association (SIA). The two-day event is characterized by “good energy” on both days, says Wise. There is less than 10% duplication of attendance with ISC West. Liability Issues Of Event Security A big topic for New York and surrounding areas is event security, and one session covers “Confined Space Protection & Risk Mitigation for Today’s Industry Leaders.” The session will focus on safeguarding event organizers’ brands, protecting them from liability, and balancing the need for security that doesn’t negatively impact the “guest experience.” One factor driving growth has been improvements in the educational session, powered largely by show partner Security Industry Association (SIA) Liability issues of event security are especially timely now, given MGM Resorts' recent lawsuit asking the courts to protect it from legal liability in the wake of the Las Vegas massacre last October. “Event security is integration of physical security with smart technology and not being overzealous,” says James DeMeo, Founder, President and CEO of Unified Sports & Entertainment Security Consulting LLC. DeMeo’s presentation on event security is one of the “back by popular demand” sessions at ISC East – there was a big turnout for his previous sessions at last year’s ISC East and at ISC West. “A big part of event security is integrating technology, but we also need the human element,” says DeMeo. “Good guest security and harmonious relationships require a level of training that includes escalation, behavioral analysis, and communicating more harmoniously.” ISC East is 20% larger than last year, and exhibitors have swelled from 230 to more than 300 Holistic Approach And Technology Integrations From the session, DeMeo hopes attendees will take away awareness of the need for responsible social media monitoring, integration of technology, threat behavior analysis and early attack indicators, proactive risk mitigation, and staff training. The emphasis is on a holistic approach “from the top down and the bottom up,” says DeMeo. “It’s a sophisticated niche based on potential liability, and we must do everything possible to protect fans and patrons.” Crowd security is another ISC East topic that is tailor-made to the New York location of the show Crowd security is another ISC East topic that is tailor-made to the New York location of the show. A session on installation of safety and security barriers to protect pedestrians and crowds is another session that is “back by popular demand.” Rob Reiter, co-founder of the Storefront Safety Council, will present the session on protecting urban environments. Another return session is about drone security and regulations. It will provide an overview of current policy and regulatory framework and provide understanding of how to get involved in the discussion to enable drone use in security applications. Converged Security And Smart Cities A new session at ISC East this year will be “Smart Cities, Smart Buildings and the Evolution of the Converged Security Approach.” Pierre Bourgeix, president of ESI Convergent, will help attendees understand converged security and how it relates to the smart cities and smart buildings movement. Located on the ISC East exhibit floor, Unmanned Security Expo will include exhibits and demos of UAVs, UGVs and autonomous systems SIA and ASIS International will present findings from a study on how successful individuals can gain experience and skills they need to advance their security careers. Co-locating with ISC East will be the Unmanned Security Expo, which focuses on Unmanned Aerial Vehicles (UAVs), Unmanned Ground Robotics & Vehicles (UGVs), counter-drone solutions and software applications to support them. Located on the ISC East exhibit floor, Unmanned Security Expo will include exhibits and demos of UAVs, UGVs and autonomous systems. Also co-locating with ISC East will be Infosecurity North America, which includes a conference program with well-respected industry speakers, an expo floor and networking opportunities.
The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression. “Just learning about this made the whole trip worthwhile,” said one GSX attendee at the Johnson Controls booth, referring to the company’s new PowerSeries Pro intrusion devices. It’s the kind of feedback that makes the expense of exhibiting at a big trade show worthwhile. The new PowerSeries Pro is an extension of Johnson Controls’ existing line that is expressly designed for the commercial security market. The ‘hybrid’ (wired or wireless) device offers ease of installation and full cybersecurity including 128bit AES encryption with spread spectrum for no jamming or interference. It employs frequency hopping technology first developed for the Israeli defense force. Wireless Technology For Cybersecurity PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product PowerSeries Pro uses PowerG wireless technology and expands the portfolio of PowerG devices from residential through commercial. For use in a wired solution, the main advantage is ease of installation; terminal blocks ‘pop out’ easily and can be wired and plugged back in. Alternatively, PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product – wireless at the same level of cybersecurity as wired. Johnson Controls addresses three big factors with the product line: cybersecurity, user control, and easy installation and dependability. It’s part of Johnson Controls’ broader approach to provide ‘one-stop shopping’, enabling an end user to control their environments, video and access, and protect their contents, according to the company. Need For More Security In K-12 Schools In addition to reaching end users, lock company Allegion sees the show as an opportunity to meet with technology partners. “It’s great to bring together a concentration of people in the industry,” said Brad Aikin, Channel Led Business Leader, Integrator Channel. “We have had good conversations with technology companies here at the show in terms of partnering, both physical access control and OEM partners. We have also had good conversations with the integrator channel.” From speaking with education end users at GSX, Aikin sees a large unmet need for security in K-12 schools, more so than in colleges and universities. “K-12 is underserved,” he says. “They need to identify their priority of needs, and now they can serve needs they couldn’t before, both layering levels of security and phasing in implementation over time. Now things can be applied and tried out without disrupting the environment.” An example is the Von Duprin RU RM (Remote Undogging and Remote Monitoring) door exit devices, which are being integrated by access control partners Sielox, IDenticard and Vanderbilt. Intelligence is added to the door exit device to enable inexpensive monitoring of secondary, previously unconnected doors. The doors can be monitored and locked or unlocked at various points in the day. Lock company Allegion sees the show as an opportunity to meet with technology partners Bridging The Gap Between IT And Physical Security One exhibitor – ADT – noticed more information technology (IT) professionals accompanying their physical security counterparts at this year’s GSX exhibition. “They come along to kill dreams on the spot,” said Morgan Harris, Senior Director Enterprise Solutions, noting the IT department’s frequent hesitancy to add untrustworthy elements to the network. ADT is looking to transform and expand its 144-year-old brand in the commercial security space and has completed eight acquisitions in the last year to accomplish the goal. Some of the acquisitions build on ADT’s expanding cybersecurity initiative, which is both a fully-functioning stand-alone business and an effort to bridge the divide between IT and physical security. ADT is positioning itself to manage enterprise risk in the broadest sense. Combining IT And Cybersecurity The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?" “The Internet of Things (IoT) is fueling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?” asked Harris. “Projects have failed because information was lost in translation.” ADT seeks to have skillsets, experience and certifications on both sides of the issue. “It enables us to be the in-between,” says Harris. “We can blend the two together and be the translator. It’s great for both sides, advocating for security counterparts and for the network simplifies deployment and processes.” Harris sees a trade-off between cybersecurity and convenience in the industry. For example, if a manufacturer says they have a simplified process and only offers firmware updates once a year, cybersecurity suffers, he said. Lack of third-party testing is another way that manufacturers sometimes trade cybersecurity for convenience, at heightened risk to integrators and end users. Training Courses For Integrators And Partners Milestone Systems is expanding its level of involvement with integrator partners, and now provides Partner Business Reviews (PBR) to assess an integrator’s activities, sales and training, pipeline and marketing initiatives. The partner reviews often uncover issues that can be easily rectified through additional training, says Megan McHugh, Milestone’s Training Marketing Manager, Learning and Performance. Milestone uses a dashboard to track each integrator’s completed training courses and can point out additional courses needed to ensure an integrator partner’s success. Milestone offers a variety of in-person, e-learning and YouTube video courses to train installing partners, systems integrators and self-integrators on best practices Milestone offers a variety of in-person, e-learning and YouTube video courses (in 12 different languages) to train installing partners, systems integrators and self-integrators on best practices. ‘Cloud Labs’ are instructor-led online classes. All courses are linked to a variety of support resources. Sometimes a simple checklist accessed on a smart phone can ensure that every aspect of an install is performed and can instill added confidence in customers. The open platform company’s new agile development cycle – releasing multiple versions of XProtect software throughout the year – creates extra challenges to keep learning initiatives up to date. Along with each new release, various existing courses are updated. The concepts of “training and certification” are being replaced at Milestone with “learning and performance,” says McHugh. Milestone is also looking to hire 170 new R&D staff and open a new center in Barcelona (in addition to current R&D centers in Copenhagen and Sofia, Bulgaria). Making Camera Installation Easy Hanwha Techwin is another company that is seeing more interest in cybersecurity, as well as concern about whether a product is supported professionally. They have doubled-up production in South Korea and added capacity in Vietnam to avoid manufacturing in China. Thinking about their integrators, Hanwha Techwin is putting more emphasis on making installation easy. Installation costs may be up to 50 percent of a job, so easier installation frees up money to buy more or better cameras. With a new design of their cameras, an electrical contractor can now install the camera base and conduit, and then the integrator can easily plug in the camera later. Camera bases are common across multiple models, so a customer could switch out a 5-megapixel for a 2-megapixel camera later on if they want to (same housing plate). ‘Skins’ allow the color of cameras to be changed to match surrounding décor. “We are changing the idea of how people approach selling a camera, and it’s a whole new idea of how to install cameras,” said Tom Cook, Senior Vice President, North American Sales, Hanwha Techwin. Hanwha cameras can include a sound classification analytic to detect sounds such as gunshots Cameras With Sound Detection Technology Hanwha offers more flexibility in the field – interchangeable parts are packed together to enable configuration on site. And there is no need to stand on a ladder to position cameras; stepper motors help with remote camera positioning. Multi-sensor cameras have modules (combining lenses and sensors) that can be switched out at installation. Hanwha Techwin cameras can also include a sound classification analytic to detect sounds such as gunshots, screams or glass breaks, especially useful in K-12 education environments. Unification and the customer journey were a key emphasis for Genetec at GSX 2018. Unification for Genetec means combining multiple functions on one platform, from one vendor and using one source code. The company approaches the market by analyzing each customer’s journey as it relates to Genetec products. A typical customer journey involves (1) a company looking for standalone systems; (2) the need to centralize systems through integration and unification; (3) increasing automation and workflow; and (4) adding intelligence for more informed decision-making. “Genetec wants to get more in-depth with customers, be more comfortable with their business, and understand their challenges,” said Derek Arcuri, Product Marketing Manager. “We want to get naked with our customers.” Machine Learning Engine For Crime Prevention In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur There was a big crowd at the Genetec booth, and not because the comment was applied literally. Genetec has divided itself into multiple parts, each focused on a vertical market such as retail or transportation. The approach is to operate as a ‘federation of startups’, with each market sector accountable to fill in the gaps in the portfolio to meet the specific needs of each vertical. For example, Genetec’s Citigraf is an unsupervised machine learning engine with an algorithm to detect anomalies and trends from a large pool of data in a municipal environment. In the city of Chicago, Citigraf detects patterns in crime behavior and determines where a crime is likely to occur. The system alerts operators in a bureau or area that has a higher risk level and should beef up the number of first responders. Chicago has seen a 39 percent decrease in average response time of first responders as a result. In the retail market, Genetec leverages the security infrastructure to analyze shopping trends and provide data for merchandising and operations. “Each customer is getting a portfolio of products tailored to the industry they are in,” says Arcuri. Demonstrating IoT Devices Axis Communications displayed its range of products at GSX, demonstrating its almost total transformation from an IP camera company to a supplier of a full range of Internet of Things (IoT) devices. “Axis is broadening its portfolio to include more solutions,” said Scott Dunn, Senior Director, Business Development Systems and Solutions. “Our success is driven by continuing to innovate our portfolio. The market is continuing to grow, and Axis is continuing to expand its market share.” Eight ‘Axis Customer Experience Centers’ around the United States help Axis stay close to their integrators, customers, partners and prospects. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security Axis has offered access control IP edge devices since 2013, and now has a new A1601 door controller being sold with partner-only software (no embedded Axis software like previous A1001 devices). In audio products, Axis has a portfolio of speakers, intercoms, and public address systems. Acquisition Of IP Door Intercom Company Enhancing the audio line was acquisition in 2016 of 2N, an IP door intercom company headquartered in Prague, Czech Republic. In North America, the 2N team is now fully part of Axis. The line emphasises simple architecture, programmability, and the ability to integrate widely. The products use Session Initiation Protocol (SIP) to integrate through the cloud or peer-to-peer. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security. Retail, education and enterprise customers are gravitating to IP audio. An IP bridge can tie existing analog components into the IP system. For perimeter security, Axis offers a radar device to help eliminate false alarms, as well as thermal cameras.
The Global Security Exchange (GSX) seems smaller this year, which is not surprising given the absence on the show floor of several big companies such as Hikvision and Assa Abloy (although their subsidiary HID Global has a big booth). A trend affecting the number of companies exhibiting at GSX 2018, and other trade shows, is industry consolidation, which is impacting the show even beyond the fewer exhibitors this year in Las Vegas. GSX is the new branding for the trade show formerly known as ASIS. There was an impressive crowd of visitors waiting for the show floor to open Tuesday morning; the conference part of the program began on Monday. After the attendees filed through the doors, the foot traffic seemed brisk throughout the morning, and was somewhat steady until the end of the first day. Exhibitors as a whole seemed pleased with the first day and cautiously optimistic about the rest of the show. Acquisitions And Consolidation HID Global announced on the first day that they will acquire Crossmatch - emphasizing the impact of consolidationEmphasising the impact of consolidation on the industry as a whole, and on this show, was an announcement from HID Global on the first day that they will acquire Crossmatch, a biometric identify management and secure authentication solutions provider. It’s a comparatively large acquisition for the company specializing in trusted identity solutions. Just days earlier, another acquisition also seemed to confirm the trend when UTC Climate, Controls and Security — the owner of Lenel — announced an agreement to acquire S2 Security. The fruits of another recent acquisition was on display at the GSX 2018 hall, where Isonas took its place near the front entrance as part of the Allegion booth, just three months after the global security provider acquired the ‘pure IP access control company.’ Isonas is well positioned in two of the three fastest growing segments of the access control market — IP hardware, which is growing 41 percent per year globally, and access control as a service, or ‘cloud’ technology, which is also outpacing the overall access control market. Allegion also has the third fast-growing segment, wireless locks, covered with its Schlage brand. "New Avenues Of Growth" The early days of new ownership is opening fresh opportunities for both organizations as Allegion seeks to leverage Isonas’ intellectual property and the smaller company finds new avenues of growth in the larger organization, says Rob Lydic, Isonas Global Vice President of Sales. Motorola joined Avigilon in a higher profile role at their booth, emphasizing consolidation in the industry Lydic sees a likelihood of additional acquisitions in the near future in the security space, given the large amount of capital currently available to be deployed, and the large number of entrepreneurial companies looking to make the leap, as Isonas did, from a small booth at the back of the hall to front-and-center as part of a big industry player. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth. In addition to signage, ownership by Motorola is also impacting the Avigilon product offerings. For example, the Motorola Ally security incident management and communications system has been integrated with Avigilon’s analytics-based event detection, and is being positioned to serve the enterprise market. The system simplifies security operations with a single platform that allows access to critical data, including video and access control systems, directly from any web-enabled device. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth Avigilon is displaying Motorola Solutions’ CommandCenter Aware integrated with Avigilon’s systems for use with public safety applications to provide dispatchers and intelligence analysts with video feeds, incident details, alerts, data mapping and responder location. Avigilon has also integrated its AI-driven Appearance Search technology with its Access Control Manager system, so video searches can be performed based on a badge credential. The system can automatically pull up any information, whether video or events in the access control system, based on the badge information. It can also be used to search for lost badges, or to view where a person is located in the building. Avigilon introduced an AI appliance that allows existing cameras to be integrated with Appearance SearchThe company introduced an AI appliance that allows existing (non-Avigilon) cameras (up to 20 two-megapixel cameras) to be integrated with Appearance Search. Also, the next generation of analytics allows detection of more things, such objects a person may be holding, or detection based on what they are wearing. The Growth Of The Cannabis Market Although attendees at GSX are generally understood to be more end users than integrators, Joe Grillo, CEO of ACRE, the parent company of Vanderbilt Industries and ComNet, says he sees little difference in attendees at GSX compared to the ISC West show in the spring. “We see all our resellers here,” he says. Grillo noticed that Day One booth traffic was “not consistently busy, but steady.” Grillo says ACRE expects to be active again soon in the mergers and acquisitions market. The company has grown through six acquisitions since its founding, and has had one divestiture (when it sold Mercury Security to HID last fall). Since selling Mercury, ACRE has been ‘back in the buying mode,’ just looking for the right opportunity, says Grillo. New markets are a theme at GSX, and one of the biggest new opportunities is the cannabis industry. Marijuana has been legalized in dozens of U.S. states, and Canada is on the verge of legalizing the drug. March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics March Networks is among the companies targeting the cannabis industry in a big way. Already across the U.S., March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics. The business intelligence solutions also aid compliance in the highly-regulated industry. March Networks provides radio frequency identification (RFID) tag to track plants throughout the channel, and tracking is integrated with video systems to provide correlated video views. A couple of exhibitors mentioned to me the need for commercial companies to deploy a comparable level of automation as their employees are accustomed to in the smart home environment. That suggests a need for things such as smartphone integration and voice commands. One exhibitor putting its toe in the water is Hanwha Techwin, which showed an Amazon Echo device used to control a video management system (VMS) with voice commands. Could the simple integration be a preview of the future of control rooms, where security officers merely talk to their equipment rather than operating controls? We’ll be talking to more companies (and maybe a few machines) on Day Two of the show, and will be reporting what we hear.
Siklu Inc., a global provider of millimeter-wave solutions, announced that it has been selected by the City of Cambridge, England, to provide wireless connectivity for the city’s CCTV surveillance system in its town center. The Siklu EtherHaul radios deployed in Cambridge City Centre replace the 5.8 GHz wireless technology previously used by the city for its CCTV network. Wireless mmWave Technology Cambridge City Centre is a commercial and historic district that is adjacent to Cambridge University, making it a high traffic area for traditional 5 GHz wireless networks that are used by businesses, university departments and residents. Siklu radios bypass the congested 5.8 GHz spectrum wireless frequency by using the millimeter wave spectrum to transmit information across Cambridge’s CCTV networks, providing an interference-free and secured communication infrastructure for the city. “Siklu’s millimeter wave technology eliminated the camera latency issues that the previous wireless infrastructure presented,” said Ron Johnson, the owner of Videcom Security, which installed the Siklu radios for the city. “The CCTV network in the city center is now so robust that we have been able to install additional cameras in the area for more comprehensive security coverage without sacrificing fiber-like network speed, reliability and stability.” Secure Network Communication The public CCTV system shared by Cambridge and several other cities in the district monitors 254 cameras total, 24 hours a day and 365 days a year to monitor public events, thwart crime, manage traffic and provide residents and businesses with a safe place to live and work. Unlike legacy wireless networks whose wide beams can be vulnerable to interception, the Siklu radios deployed in Cambridge’s CCTV system use ultra-narrow beams in the 60GHz millimeter wave spectrum to transmit information across the network securely, making the radios inherently secure from interceptions and hacking. As a result, sensitive information can be transmitted across the network securely. “As technology advances and physical security requires more and more security and reliable network bandwidth, Siklu can offer cities like Cambridge the infrastructure needed to keep city centers and other areas safe,” said Eyal Assa, Siklu’s CEO. The Siklu EtherHaul mmWave product line will be showcased at IFSEC as part of Milestone Systems’ stand #E750, where Siklu will also conduct a live demonstration.
More than one hundred years after the first race, ACO (Automobile Club de l’Ouest, or roughly translated, the Automobile Club of the West), creator and organiser of the famous 24 hours of Le Mans, has selected the leading integrator of a secure and traceable access control solution, LOCKEN for its fast and reliable security system. 24 Hours Of Le Mans Behind the tireless car tracks, there is a set of intricate and complex facilities. In close proximity to the entrance, which welcomes more than quarter of a million spectators, there is a Museum, about 40 restaurants, 20 shops, a medical center, security stations all along the circuit, paddocks, where more than 10,000 competition tyres are stored, and of course the stands for each of the 60 competitors. This accounts for hundreds of different access points, requiring a variety of permissions, which must be closely controlled and monitored by ACO. Access rights are extensive for ACO employees, and some of the circuit’s customers, such as Porsche, which operates a modern building on the track side, while competitors and special guests have limited rights. The Porsche Experience Centre allows fans to try out its cars, all year round, on an allocated part of the circuit. With approximately 800,000 visitors hosted on the site each year, ACO has to account for 300,000 accesses, 53,000 of which must be managed during the competition, or the equivalent of 1,800 accesses controlled per day in June. The system already handles 544 points on the site, with 407 different keys to enable access LOCKEN’s Cyberlock Solution The specific requirements for access to its enclosure led ACO to focus on the management of access rights, to ensure perfect traceability for all stakeholders. The scope and diversity of facilities, which total several hundreds of crossing points, requires a secure, yet flexible solution. LOCKEN’s Cyberlock solution is based on unique key-centric technology, which provides the highest possible levels of security and efficiency, with the power delivered by a re-chargeable digital smart key and innovative software (including traceable data). Key-centric access management is built with the user in mind, it is based around three elements, a smart key, digital cylinders, and a unique software suite, providing robust access control. A trial phase, over several years, has allowed ACO to confirm the reliability and ease of use of the technologies, and LOCKEN to illustrate its enhanced capabilities. The system already handles 544 points on the site, with 407 different keys to enable access. Enhanced Access Control Solutions Toze Coelho, who is in charge of access within the operational management at ACO, comments: "In 2016, we equipped the sports module, which is at the heart of the race, dedicated to the management of safety - monitoring by cameras/monitors - where instructions are given to the commissioners positioned along the track. This space is highly sensitive, equipped with multiple networks, and is prohibited to the public.” “Our aim is to extend this process to provide full access control, and we are particularly keen to equip the Museum of the 24 hours of Le Mans with the LOCKEN solution." By contributing to the security of the 24 hours of Le Mans circuit, LOCKEN has positioned itself as a leading player in providing enhanced access control solutions to international venues and events.
Technical furniture manufacturer Thinking Space Systems have improved the working environment of CCTV operators at Blackburn with Darwen Council, with custom designed control room furniture recently installed within their new CCTV hub. Thinking Space were awarded the contract to provide control room furniture for the brand-new CCTV hub at Blackburn with Darwen Council. Accommodating four operators and two supervisors, the cool blues and greys for the interior for the room were matched by Thinking Space with their ergonomic furniture, to create a calm and peaceful environment for this 24/7 monitoring station. Of particular interest in this project was the 11 meter spanning Evolution media wall manufactured and installed by Thinking Space. Perfect alignment was key in ensuring the correct sight lines for operators and an aesthetically pleasing finish for the 33 large flat screens, mounted in a configuration of three rows of eleven. Thinking Space used laser positioning technology to achieve an accurate solution. Blackburn With Darwen Council CCTV hub The hub was officially opened in March 2017 with Thinking Space invited to the proceedings. Based in King George’s Hall, Blackburn, the new control room monitors over 240 cameras across East Lancashire in a bid to cut crime and make cost savings. Opening the new facility, which had been in operation since the previous month, Assistant Chief Constable Mark Bates and Council leader Mohammed Khan from Blackburn with Darwin Council led the proceedings, hailing the complete project as a resounding success. Peter Wareing, CCTV Services Manager for Blackburn with Darwen Council explained why communications between all parties ensured its success. “Thinking Space worked closely with both myself and our CCTV installers from day one, providing me with 2D and 3D images of the finished product, allowing me to better convince Partners of the finished article. As the project progressed, Thinking Space were in regular contact with me to ensure that I was receiving exactly what I needed” explained Peter. “The build and install went smoothly, something a project manager looks forward to! The finished article really looks the part and provided that wow factor, with sight lines all taken account of and Operators able to provide an excellent service in comfort.” See their furniture demonstrations at Stand H1125, IFSEC International from 20-22nd June.
Navi Mumbai officials have the benefit of operating in a modern environment, maximising Qognify’s Safe City solution Qognify, the provider of big data solutions for physical security and operations, announces the successful implementation of its market-leading Safe City solution in Navi Mumbai, a planned township that was established to handle the population overflow from the overcrowded and ever-growing city of Mumbai. Together with CIDCO (City and Industrial Development Corporation, the agency established for managing the new city) and system integrator WIPRO, Qognify has designed an integrated and holistic solution that helps Navi police to maintain law, order and safety. As a planned township, Navi Mumbai officials have the benefit of operating in a modern environment, allowing to maximize Qognify’s Safe City solution. At the core of the solution are Qognify Situator, an advanced Situation Management platform, and Qognify’s Video Management Solution, which controls the hundreds of surveillance cameras throughout the city. Safe City Solution Functions With the solution’s implementation, the city has gained the ability to improve traffic management, deter criminal activity, effectively manage response to events, and resolve investigations efficiently: A central command center is using the platform to monitor entry and exit points of the city, toll points, traffic junctions, accident prone road sections, subway and railway stations, schools, key residential areas, open markets, and key utility infrastructure areas such as electrical substations and the main water supply lines. Special “Emergency Communication Boxes” act as “panic buttons” and allow people to generate alerts and communicate directly to the control room in case of emergency. Qognify’s video management solution provides high quality video feeds. Smart integration with Agent Vi’s video analytics solutions enables immediate detection and extraction of security and safety incidents from surveillance cameras throughout the city. This integration enables the triggering of real-time, automatic alerts of incidents in Qognify Situator, that in turn, generates the appropriate operating procedure and response plan for the operators to act upon. "The Navi Mumbai security program goes far beyond a CCTV system" Situator provides a unified, operational view of the city by integrating all the components of the solution, while providing advanced collaboration capabilities for field personnel who are able to send real time images as well as videos to the control room with the type of the incident at hand and the GIS coordinates of the field respondent. Navi Mumbai Security Program “The Navi Mumbai security program goes far beyond a CCTV system,” said Mr. Soma Vijayakumar, CIDCO. “It is a smart solution that integrates video, emergency response, traffic control, license plate identification and more. Qognify is the core important element of this platform, providing a solution which is among the most modern and advanced available anywhere.” “Navi Mumbai has embarked on a remarkable program which will enhance the safety and security of its citizen, visitors and assets,” said Moti Shabtai, Qognify’s President. “We’re proud to be a part of this multi-solution, multi-agency project that fulfills the vision of the city authorities to provide a security and safety to its constituents.” Qognify will be featuring its security and operations solutions in booth 9101 at ISC West, April 5-7 in Las Vegas.
Hikvision will showcase its cutting edge video surveillance solutions at ISC West 2016 in Las Vegas, booth 14059 Hikvision USA, the North American leader in innovative, award-winning video surveillance products, has partnered with the Sunset Plaza Hotel in Los Angeles to provide a security solution for round-the-clock surveillance. Located on the bustling Sunset Strip, the hotel had a great need for versatile, user-friendly cameras and recorders that allowed their staff to keep an eye on the premises at all times. A variety of Hikvision models now protect the hotel guests and serve as powerful tools to keep hotel operations running smoothly. 24-Hour Video Surveillance The hotel had outgrown their legacy analog system and was hoping to upgrade to cameras that provided broad coverage and high-quality images in a variety of interior and exterior environments. It was also important that the interface for the security system was easy for employees to learn. “We wanted something that we could use from an operational standpoint and from a safety standpoint,” explained Brenda Elias, Operations Manager for the Sunset Plaza. Ms. Elias turned to Constantin Paul Bunea, the founder and CEO of Darkcad Tec, who had been serving as systems integrator for the hotel for ten years. After considering the options available on the market, he felt confident that Hikvision was the brand that would meet their needs. “I selected Hikvision cameras because the quality is very high, third party integration is easy, and the company provides excellent technical support.” Mr. Bunea stated. Versatility And Scalability Of Hikvision Products Darkcad Tec installed over twenty Hikvision IP cameras throughout the hotel, each well suited for a specific function. The DS-2CD2332-I turret, with Hikvision’s patented EXIR infrared technology, is being used in the parking garage, boasting image quality clear enough to make out license plates. A 3 MP fisheye camera, the DS-2CD6332FWD-I, allows for a 360° view of the main entrance. Cameras such as the DS-2CD2132F-I dome are being used at other hotel entrances, where HD real-time video is essential. This surveillance system is but one example of Hikvision products providing benefit to hotels all across North America. “The versatility and scalability of Hikvision products make them well-suited for a wide range of vertical markets,” stated Jeffrey He, President of Hikvision USA and Hikvision Canada. “We are pleased to serve our customers in the hospitality industry as they seek to provide safe and enjoyable experiences for their guests.” Hikvision At ISC West 2016 To learn more about Hikvision’s cutting edge video surveillance solutions, see them in person at ISC West in Las Vegas, booth 14059, April 6-8.
SpotterRF CSR monitors two infamous avalanche gullies along Swiss Alps road leading to renowned village SpotterRF, the leading manufacturer of compact surveillance radar (CSR), recently announced completion of the world’s first Spotter radar protected ski resort road system by GEOPRAEVENT in Zermatt, Switzerland. The SpotterRF CSR monitors two infamous avalanche gullies along the Swiss Alps road leading to the renowned village. The unique 24/7 two-tier perimeter line system triggers automatic road closure at the mouth of the canyon when it detects a snow avalanche threatening motorists on the only road leading to Zermatt. Lorenz Meier, CEO for GEOPRAEVENT states, “We chose SpotterRF because of the large radar coverage, small size, low-power and the possibility to implement its own algorithms on the raw data. They're a great team to work with. Our customer has repeatedly stated that he is thrilled by the system.” Large Radar Coverage With a range of 2000 meters and a horizontal opening angle of 90°, the radar surveys an area of more than two square kilometers. When triggered, the system reacts within seconds, immediately closing the road by means of traffic lights and barriers. Local authorities receive prioritized notification. Live cameras installed along the road allow them to check on the situation immediately — even at night, as all cameras are equipped with infrared floodlights. If the avalanche has not reached the road, authorities can reopen it from their computers or smart phones within minutes. SpotterRF Compact Surveillance Radar “Global demand for SpotterRF compact surveillance radar is extending our reach into new applications and industries,” states Logan Harris, SpotterRF CEO. “Our Swiss partner, GEOPRAEVENT did a marvellous job designing and adding their own proprietary algorithms to our Spotter radar to create a system that responds in seconds to protect motorists traveling these curvy mountain roads.” SpotterRF At ISC West SpotterRF delivers its award-winning compact surveillance radar (CSR) systems through more than 60 strategic integrators to a global marketplace in 24 countries on six continents. This award-winning radar will be demonstrated at the upcoming Security Industry Association (SIA) ISC West tradeshow in Las Vegas, Nevada April 6-8 (booth# 14135).