SonicWall announced it had appointed Tristan Bateup as Country Manager for Ireland, building on the company’s long-established collaboration with distributors in the region as it continues to expand its presence and capabilities in the country. Tristan has over a decade of experience in the cybersecurity industry, including five years managing SonicWall partner business at long-time distributor Exertis. From there, he joined SonicWall, where he served as Strategic Account Manager for the...
Camden Door Controls, a globally renowned provider of door activation, control and locking products, is pleased to announce the release of CV-7600 Series Bluetooth-enabled card reader, a mobile-ready reader based on RFID technology that combines Bluetooth Low Energy (BLE) and contactless smart card technologies. CV-7600 Series card reader In operation, the latest CV-7600 Series Bluetooth-enabled card reader is capable of reading data stored on a contactless smartcard credential via high freque...
Maxxess Systems, a globally renowned company in event response management and collaboration systems, is pleased to announce their partnership with SmartPTT by Elcomplus, an advanced communications radio technology company, to deliver a powerful integration with Motorola Digital Radios that will improve response times to critical events. SmartPTT integration with InSite This new SmartPTT integration with Maxxess InSite allows InSite to automatically communicate over Motorola Digital Radios in t...
Identiv, Inc. has announced its cohesive collection of COVID-19 response solutions in order to support enterprises and government customers in worldwide offices that are now reopening. Identiv’s frictionless, touchless solutions create healthier and more hygienic offices. The hands-free technology also streamlines transactions and access, temperature tracking, and contact tracing to help employees and visitors feel safe and secure. Frictionless, hands-free technology “With the thr...
Resilience and efficiency have become watchwords for public institutions, before, during and after the ongoing health crisis (COVD-19 pandemic outbreak). In delivering services fit for the modern world, these institutions need more than just innovation and accountability. They require flexibility and agility, too, including in how they approach security. Importance of locks and keys The lock and key have enjoyed public trust for a long time. Keys were used in Ancient Egypt and Assyria, and war...
Customers may know it as DMP’s enhanced all-in-one system — and until now, the XTLtouch has only been available to Verizon customers. DMP is pleased to announce that the XTLtouch Wireless Control Panel with AT&T LTE is here. “We’re very excited about this,” says DMP’s Vice President of Sales Mark NeSmith. “No other all-in-one offers the same powerful and flexible solution. For areas that require AT&T service, this allows our dealers to much more...
Allegion US, a provider of security products and solutions, announces the launch of Schlage® Mobile Access Solutions, a comprehensive, secure and flexible access control solution portfolio. In the age of digital transformation and the evolving mobile economy, providing secure, convenient access is at the forefront of security challenges faced by multifamily properties, businesses and campuses alike. The Schlage Mobile Access Solutions portfolio redefines access control for the mobile world. Mobile credential experience As a complete cloud-based ecosystem, it enables the use of mobile credentials on openings across a property or site, delivering straightforward mobile credential experience for end users and site administrators. Developed by a pioneer in the security space for 100 years, Schlage Mobile Access Solutions is a comprehensive portfolio that provides customers and end users with a premium mobile offering, providing them seamless access to where they live, work and visit: Schlage Mobile Access Credential - The new credential features AES-256 asymmetric credential encryption and works in offline scenarios once downloaded from the cloud. This means it is reliable and even works in environments where internet access is down or cellular service is spotty. Schlage Mobile SDK - Designed for Physical Access Control Software (PACS) providers to easily integrate this Bluetooth mobile credential into their system, which allows seamless credential management and secure delivery/communication with Schlage locks. Schlage Mobile Enabled Control™ Smart Lock - Schlage’s multifamily resident door lock is now mobile enabled and allows properties to offer high-tech, convenient security to residents. Schlage NDE Mobile Enabled Wireless Lock – The wireless cylindrical lock is now mobile enabled, and the new interior push button expands the way the lock operates to include storeroom, office, privacy and apartment functions. Schlage LE Mobile Enabled Wireless Lock - The wireless mortise lock is now mobile enabled and available with an indicator, interior push button or deadbolt to support storeroom, privacy, apartment and office applications. Schlage MTB Mobile Enabled Multi-Technology Reader – The new Schlage MTB Series Readers are now mobile enabled and compatible with 2.4 GHz Bluetooth, 13.56 MHz smart and 125 kHz proximity, allowing the ability to process multiple credential formats simultaneously. They feature a RS-485 interface and out-of-the-box support for Open Supervised Device Protocol (OSDP) for secure bi-directional communication. The MTB series can be simply installed with plug and play mode or commissioned via the ENGAGE app for simplified, in-field configuration. Schlage CTE Controller - Designed to work with a Schlage mobile enabled multi-technology reader, the CTE is an ENGAGE™ enabled, single-opening controller that allows perimeter and common area openings to be managed in a single system along with Schlage Control Mobile Enabled Smart Locks and NDE cylindrical and LE mortise wireless It is ideal for multifamily, commercial mixed use and retail storefront applications. Convenient access control solution Schlage Mobile Access Solutions is ideal for small to medium-sized businesses" While mobile access is not new to the industry, Schlage’s belief in open global standards and interoperability, along with its commitment to cybersecurity, differentiates its portfolio from competition. This ultimately provides customers with better options for control of their security solutions in years to come. “Allegion is always looking for ways to address our customers’ evolving needs with real, sustainable innovation, so we’re excited to launch this comprehensive cloud-based mobile enabled portfolio,” said Brad Sweet, commercial marketing leader at Allegion. “Schlage Mobile Access Solutions is ideal for small to medium-sized businesses, multifamily properties and higher education campuses that want a customizable, interoperable, secure and convenient access control solution.” The launch of Schlage Mobile Access Solutions portfolio is the next wave in Allegion's mission to serve the industry with flexible access control solutions, making seamless, comprehensive security the new standard for businesses, institutions and beyond.
Pulse Secure, a renowned provider of software defined Secure Access solutions, announced achieving Common Criteria certification for both its virtual private network (VPN) and network access control (NAC) solutions under NIAP’s most current collaborative Protection Profile for Network Devices (NDcPP). Pulse Secure’s certified solutions increases cybersecurity assurance for remote, cloud and on-premises access productivity, visibility and compliance for government agencies, government contractors, as well as private-sector enterprises. Common Criteria certification is governed by ISO/IEC standards bodies and maintained by the National Information Assurance Partnership (NIAP) according to internationally recognized security testing standards. Encompassing security requirements The solutions were awarded certification against the most current NIAP approved protection profile Common Criteria certification listing for Pulse Connect Secure v9.1 (VPN) and Pulse Policy Secure vv9.1 (NAC) can be found respectively on the NIAP website. The solutions were awarded certification against the most current NIAP approved protection profile encompassing security requirements, an evaluation and validation scheme, and rigorous test activities carried out by UL Verification Services Inc. Prior versions of both solutions had achieved Common Criteria certification. Pulse Secure has been extensively deployed in federal, military and supporting contractor applications to support: Comply to Connect standards, Command Cyber Readiness Inspections (CCRI), 802.1X port-control and DISA STIGs, NIST’s Risk Management Framework (RMF), Host-based Security System (HBSS) and DFAR 252.204-7012 assurance, and Internet of Things (IoT) security initiatives. Assure increased requirements In addition, the solutions have also attained FIPS 140-2 Level 1 certification, and are certified on the U.S. DoD Unified Capabilities (UC) Approved Products List (APL) and for JTIC joint warfighting IT interoperability. “Government IT organizations are always on the defensive, but like commercial entities, they must also assure increased requirements for availability, responsiveness and compliance. This is especially true for users and devices requesting access to and operating on federal and military networks,” said Alex Thurber, Chief Revenue Officer at Pulse Secure. Secure access challenges For over a dozen years, Pulse Secure has helped government agencies address secure access challenges for hybrid IT “Pulse Secure is uniquely positioned to give Federal CIOs the means to advance network and cloud access, situational intelligence, and endpoint protection in a timely and cost-effective way that supports compliance mandates. Our recent Common Criteria certifications serves to further validate the design and effectiveness of our Secure Access platform.” For over a dozen years, Pulse Secure has helped government agencies address secure access challenges for hybrid IT – efficiently, seamlessly and cost-effectively. Unified access control By implementing Pulse Secure, Federal defense, intelligence and civilian agencies can: Assure user experience and protected connectivity with always-on and on-demand VPN, as well as simultaneous and split tunneling Satisfy NIST 800-53 controls and specifications regarding 802.1x, Layer 2 Switch STIG, WLAN Authentication Server Security STIG, and Comply-to-Connect requisites Centrally manage an easy-to-use VPN and NAC/802.1x solution for wired, wireless and remote connections with flexibility for physical, virtual and cloud deployment Gain extensive user insight and unified access control for remote and internal endpoints, whether managed, uncatalogued, unsanctioned or unknown Automate endpoint and access situational awareness and security response through end-to-end visibility, policy-based controls, and infrastructure interoperability Validate device compliance with continuous remote, pre-network connection and post-connection host checking to efficiently find, assess and mitigate exposures Preserve remote and onsite user experience with context-aware identity authentication supporting a range of smartcards, certificate handling and single sign-on (SSO) Leverage build-in User Entity Behavior and Analytics (UEBA) anomaly detection and response Integrate Pulse Secure via open standards that negates single vendor lock Security access tools Organizations can centrally orchestrate Zero Trust policy to ensure compliant access to applications Pulse Secure’s VPN and NAC solutions can be procured separately or as part of its Pulse Access Suite Plus solution set that provides adaptive identity and device authentication, protected connectivity, extensive visibility and analytics, and threat response across mobile, network and multi-cloud environments. By consolidating disparate security access tools into an integrated platform, government agencies gain easy access for users and a single-pane-of-glass to streamline provisioning, management and scalability. Organizations can centrally orchestrate Zero Trust policy to ensure compliant access to applications, resources and services across distributed network, private cloud and public cloud environments. On-premise access control “The federal government continues progress cybersecurity and data protection capabilities with mandates to be more proactive, vigilant and agile. Beyond broader mobility, IoT and cloud initiatives, recent work from home and increased remote access capacity have expanded threat vectors and attack surfaces – placing greater requirements to modernize disjointed, legacy VPN and NAC solutions,” said Jerahd Hollis, Chief Technology Officer at immixGroup. “Pulse Secure’s integrated, interoperable and scalable approach to remote and on-premise access control address these challenges and allows agencies to deliver easier accessibility with necessary operational insight, controls and efficiency to satisfy NIST guidelines and achieve Zero Trust readiness.”
Businesses, large and small, create data which needs protecting, whether in an onsite server room or co-located at a data center. When a business imagines a corporate data breach, they’re probably picturing black-hat hackers pursued by cybercrime investigators. The reality is often more mundane. Only around a half of breaches involve hacking, according to one recent report. Gaps in the physical security, the business’ data and servers are equally important targets. Perhaps the company director leaves their laptop on the train. Or an unauthorized visitor spots open server racks and quickly downloads records onto his smartphone. Or maybe the server room access control is left entirely to lock-and-key technology which cannot be easily tracked. Physical server security Securing sensitive data needs the involvement of every member in an organization, from top to bottom. But physically protecting servers and data stores is the heart of the security and IT manager’s role. How much could a data breach cost someone? In the absence of appropriate physical server security, the mundane can be dangerous — and expensive. Recent research for IBM by the Ponemon Institute estimates the average total cost of a data breach at $3.86 million (€3.57 million). According to the same benchmark report, this average is rising, by 6.4% in the last year alone. Some of the highest breach costs are borne by companies in Europe, including Germany, France, Italy and the UK. Unauthorized access As Big Data gets bigger, so does the regulatory landscape for data handling Such costs can be direct: in business disruption, lost mailing lists or disabled logistics software. They can be indirect: an erosion of customer trust and damaged “brand equity”. Hard-earned goodwill and positive reputations are quickly reversed. Costs also come from fines levied by government and supranational regulators. As Big Data gets bigger, so does the regulatory landscape for data handling. The most relevant framework for those operating in the EMEA region is the European Union’s General Data Protection Regulation (GDPR). This wide-ranging data privacy rulebook has been enforced since May 2018. GDPR requires businesses to protect storage of all personal information, including customer and employee data. The business’ safeguards must include both electronic and physical barriers to unauthorized access. Server protection is critical. Physical security for the servers Does a company know who last accessed their servers, and when? If the answer to either question is “no”, the company is taking unnecessary risks with data security. Yet ensuring they stay on the regulators’ right side, and avoid a costly breach, could be straightforward: better access control. To ensure maximum security of their servers, in its recent white paper ASSA ABLOY recommends three levels of security working together within an integrated access system. Security management systems Level 1 — perimeter security ensures only authorized personnel enter a data storage building. Here, door and gate electronic locks with credential readers can work alongside the likes of CCTV and monitored fencing. It’s a company’s first line of physical breach defense. Level 2 — server room access can be monitored and controlled with a range of access control door devices with inbuilt credential readers, including Aperio battery-powered escutcheons or complete security locks. Either device integrates seamlessly with access and security management systems from over 100 different manufacturers. At room level, physical security must also include water- and dustproofing, electromagnetic security and protection against other physical threats to servers and data. Level 3 — final level of physical data security is a company’s server rack or cabinet. Server rooms have a steady flow of authorized traffic: cleaners, maintenance staff, repair technicians and others. Employee screening cannot be perfect — and accidents happen. Rack or cabinet locking with RFID readers is the last line of defense against a malicious or accidental physical data breach. Real-time access control ASSA ABLOY’s Aperio KS100 adds real-time access control and monitoring to server racks and cabinets ASSA ABLOY’s Aperio KS100 Server Cabinet Lock adds real-time access control and monitoring to server racks and cabinets. The lock works with an existing or new access control system; compatible credentials employ all standard RFID protocols including iCLASS, MIFARE and DESFire. Under the EU’s GDPR, the business must inform anyone affected by a breach “without undue delay”. With the Aperio KS100, the business would know right away if unauthorized access had even been attempted. Once installed, KS100 locks integrate with the access control system and communicate wirelessly via an Aperio Communications Hub, even if the company’s racks are co-located in a distant data centre. Once online integration with the security admin system is complete, lock access decisions are communicated from and recorded by the company’s software wirelessly. Data protection regulations “When Aperio replaces mechanical locking at all three levels of server access control, lost keys no longer compromise data security. Lost credentials are simply deauthorized and a valid replacement reissued. The current status of any lock, at any level, is revealed with the click of a mouse. Generating detailed audit trails is straightforward, making the KS100 and other Aperio wireless locks invaluable for incident investigation”, explains Johan Olsén, Aperio Product Manager at ASSA ABLOY Opening Solutions EMEA. The right electronic locking keeps the customer reputation intact, the business data off the Dark Web, and on the right side of the multiple data protection regulations, including GDPR.
Allot Ltd., a globally renowned provider of innovative network intelligence and security-as-a-service (SECaaS) solutions for communication service providers (CSPs) and enterprises, has launched Allot BusinessSecure, a new solution that CSPs can offer their SMB and enterprise customers to protect them from emerging cyber security threats, including malware, phishing, ransomware and crypto-mining, while increasing revenue. Allot BusinessSecure Allot BusinessSecure is the newest member of the Allot Secure family of unified cyber security solutions, the world’s renowned network-based security as a service solution, used by over 23 million consumer and business subscribers. Allot Secure also includes solutions for a unified experience on devices that are on mobile networks (NetworkSecure), fixed home networks (HomeSecure), public Wi-Fi networks (EndpointSecure), and for IoT devices (IoTSecure). Machine Learning technology Using machine learning technology, Allot BusinessSecure automatically identifies all devices in the network Using machine learning technology and network visibility tools, Allot BusinessSecure automatically identifies all devices in the network and applies a customizable security policy to protect them and the network. The solution offers a network-based antivirus service that requires no security expertise and needs no installation on business or employee devices. In addition, Allot BusinessSecure hardens the customer premises equipment (CPE) to further protect against many types of vulnerabilities. Unified reporting on all protected devices Through the unified BusinessSecure application, businesses can assign devices to a device group or branch and apply content control to the selected branch, device group or individual device to tailor ‘allowed’ content during working hours. The application also delivers unified reporting on all protected devices, including IoT devices on the network. BusinessSecure includes a self-diagnostics chat bot that greatly reduces the time and effort required to troubleshoot network problems. Network-based cyber security solution “Over the last few years, Allot has successfully helped communication service providers all over the world deliver network-based cyber security solutions to their subscribers,” said Angel Fernandez, AVP of Security Solutions - Product Management at Allot Ltd. "Now, CSPs can generate new revenue from their SOHO, SMB and enterprise customers with similar services that are designed for businesses.”
Marks USA, a division of NAPCO Security Technologies, and sister division of Alarm Lock, is excited to announce the debut of new virtual online and field training classes including new pro courses on architectural-grade hardware, locking and access lock lines, by technology or vertical market. Real-World applications Taught by CRL-locking pros for locking pros, the virtual online classes can be a great tech refresher or new introduction, ideal while quarantined or working from home. Field classes are also available where applicable. All local Marks USA online classes can be taken at one’s computer in the safety and comfort of their home or office, are presented live and offer a Question & Answer session following each class. Field classes are hands-on and taught with real-world applications and locking expertise.
Camden Door Controls has announced the market introduction of CM-75 Series Column push plate switches with built-in Kinetic no-battery wireless transmitters. Kinetic by Camden is an advanced 900 Mhz. 'power harvesting' wireless system that uses the energy created by the operation of the switch to power the wireless transmitter. Eliminating the batteries means avoiding annual maintenance charges, along with disposing of hazardous waste in landfill. CM-75 Series Column switches Kinetic by Camden offers the reliable performance of a wired system for less than ½ the installed cost. Kinetic features up to a 300’ range and the switches are rated for one million cycles. Kinetic also features an ultra-compact receiver that’s easily installed in automatic door operator cabinets. The CM-75 Series Column switches are available in aluminum, with the choice of clear, dark bronze and blue finishes, and Camden also offers a 36” tall stainless steel model. Column switches are ideal where high/low switches (at hand and wheelchair foot height) are required by state or provincial codes.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data center, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. CV-19 means that huge numbers of people are getting access to the same desktop and files, and collaborative communication toolsBut as we know, CV-19 means that huge numbers of people are getting access to the same desktop and files, applications and collaborative communication tools that they do on a regular basis from the office or on the train. Indeed, the new generation of video conferencing technologies come very close to providing an “almost there” feeling. Hackers lie in wait Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical servers. Less than a month ago, we emerged from a period of chaos. For months hackers had been exploiting a vulnerability in VPN products from Pulse Secure, Fortinet, Palo Alto Networks, and Citrix. Patches were provided by vendors, and either companies applied the patch or withdrew remote access. As a result, the problem of attacks died back. But as companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on. That’s because remote desktop protocol (RDP) has been for the most part of 2019, and continues to be, the most important attack vector for ransomware. Managing a ransomware attack on top of everything else would certainly give you sleepless nights. As companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical serversExposing new services makes them also susceptible to denial of service attacks. Such attacks create large volumes of fake traffic to saturate the available capacity of the internet connection. They can also be used to attack the intricacies of the VPN protocol. A flow as little as 1Mbps can perturbate the VPN service and knock it offline. CIOs, therefore, need to acknowledge that introducing or extending home working broadens the attack surface. So now more than ever it’s vital to adapt risk models. You can’t roll out new services with an emphasis on access and usability and not consider security. You simply won’t survive otherwise. Social engineering Aside from securing VPNs, what else should CIO and CTOs be doing to ensure security? The first thing to do is to look at employee behavior, starting with passwords. It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposed. Best practice would be to get all employees to reset their passwords as they connect remotely and force them to choose a new password that complies with strong password complexity guidelines. As we know, people have a habit of reusing their passwords for one or more online services – services that might have fallen victim to a breach. Hackers will happily It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposedleverage these breaches because it is such easy and rich pickings. Secondly, the inherent fear of the virus makes for perfect conditions for hackers. Sadly, a lot of phishing campaigns are already luring people in with the promise of important or breaking information on COVID-19. In the UK alone, coronavirus scams cost victims over £800,000 in February 2020. A staggering number that can only go up. That’s why CIOs need to remind everyone in the company of the risks of clickbait and comment spamming - the most popular and obvious bot techniques for infiltrating a network. Notorious hacking attempts And as any security specialist will tell you, some people have no ethics and will exploit the horrendous repercussions of CV-19. In January we saw just how unscrupulous hackers are when they started leveraging public fear of the virus to spread the notorious Emotet malware. Emotet, first detected in 2014, is a banking trojan that primarily spreads through ‘malspam’ and attempts to sneak into computers to steal sensitive and private information. In addition, in early February the Maze ransomware crippled more than 230 workstations of the New Jersey Medical Diagnostics Lab and when they refused to pay, the vicious attackers leaked 9.5GB or research data in an attempt to force negotiations. And in March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHO and healthcare organizations in general since the pandemic broke. We’ll see lots more opportunist attacks like this in the coming months. More speed less haste In March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHOFinally, we also have bots to contend with. We’ve yet to see reports of fake news content generated by machines, but we know there’s a high probability it will happen. Spambots are already creating pharmaceutical spam campaigns thriving on the buying behavior of people in times of fear from infection. Using comment spamming – where comments are tactically placed in the comments following an update or news story - the bots take advantage of the popularity of the Google search term ‘Coronavirus’ to increase the visibility and ranking of sites and products in search results. There is clearly much for CIOs to think about, but it is possible to secure a network by applying some well thought through tactics. I believe it comes down to having a ‘more speed, less haste’ approach to rolling out, scaling up and integrating technologies for home working, but above all, it should be mixed with an employee education program. As in reality, great technology and a coherent security strategy will never work if it is undermined by the poor practices
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
The next step in the journey of digital transformation, the fifth generation of wireless communications technologies (5G) will have an enormous impact on mankind, and on every industry including security. In short, 5G will disrupt the way we live and work. To discuss the changes, we presented our questions to Benoît Jouffrey, VP 5G Expertise at Thales, which is at the forefront of the transformation with an emphasis on trust and security. Following are his responses. Q: In layman's terms, what is the difference between 4G and 5G ecosystems as they relate to opportunity, flexibility and choice in networking tools? Jouffrey: Compared with largely one-size-fits-all 4G services, the 5G ecosystem will provide organizations with much greater choice and flexibility in the way they communicate over mobile networks. The network slicing capabilities of 5G means that business can have their own independent networks, with each one customized to their unique requirements and backed up by service-level agreements (SLA). Another aspect of 5G will be the ability to drive latency between UE (User Equipment) and network down to below a few milliseconds, which will massively boost the performance and scalability of enterprise applications. Q: How can these capabilities drive a company's digital operations? 5G will allow enterprises to be connected more efficiently Jouffrey: 5G will allow enterprises to be connected more efficiently: they can rely on a higher density of connected devices exchanging more information in a better timeframe. Due to these slicing capabilities, 5G networks allow for much greater personalization than 4G networks. This means that businesses could benefit from this personalized network, tailored to their portfolio of Internet of Things (IoT) use cases, and not be necessarily expected to rely on a one-size-fits-all network. By combining the unique capabilities of 5G with the insights derived from analytics, machine learning, and artificial intelligence, enterprises will be in much better stead to run their operations efficiently and securely. Q: How might 5G impact the use of cloud systems? Jouffrey: 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have a small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate. Q: How can one provide trustworthy 5G lifecycle management for IoT devices? Jouffrey: Trustworthy IoT lifecycle management is an end-to-end approach from the secure provisioning of keys within the devices, to the proper identification of the users, from the authentication on the network or the network slice, to the secure handling of the data either at stored or in motion. Resources need to be invested long before this to qualify the business model, in prototyping, as well as prototype testing. Most organizations don’t have the resources to counter all the security challenges of their 5G IoT deployments. Businesses will often end up choosing between navigating a risk-laden 5G environment, with inadequate or incomplete trust mechanisms, or outsourcing these requirements. When looking at outsourcing, companies must choose a provider with expertise in digital security, ensuring 5G IoT deployments have data protection and connectivity credentials built in, together with end-to-end data protection solutions such as encryption – protecting data in the device, network, and cloud at rest and in transit. Q: How can wireless modules address new 5G IoT use cases? Wireless modules can be expected to play a bigger role than in previous generations of cellular Jouffrey: As IoT considerations are integrated into the 5G ecosystem, wireless modules can be expected to play a bigger role than in previous generations of cellular. 5G modules support different characteristics to earlier generations – the 5G use cases are much more complex, varied, from high-end use cases requiring high data usage and throughput, such as for industrial routers, to low-throughput, energy consumption optimized devices, as required for some IoT sensors. At the end, compared to the largely one-size-fits-all approach that preceded it, 5G will increase the demand for vertical-tailored wireless modules. Importantly, these wireless modules need to support new data protection and security features that go well beyond conventional compliance to 3rd Generation Partnership Project (3GPP) standards. Due to the extent of personalization within 5G networks, wireless modules must also offer providers and customers greater security as well as agility all along the device lifespan. Q: What are the new data protection challenges posed by 5G, and how can they be addressed? Jouffrey: The 5G era presents exciting opportunities, as well as security challenges. The greatest risks to enterprise data on 5G networks – including eavesdropping, man-in the middle attacks, denial of services, loss or compromisation of data – were already known in 4G. The 5G standards have looked at providing answers to these threats and come with some noticeable improvements, such as the encryption of the international mobile subscriber identity (IMSI), otherwise known as the Subscription Permanent Identifier in 5G. But what’s different with 5G is the threat surface area, due notably to the variety of devices that will be used over these 5G networks and the underlying technologies used for the deployment of the networks, such as cloud native virtualization. On top of this, it’s the first generation of cellular to launch in an era of global cyber-crime, funded by organized crime and states alike. So, whilst enterprises should look to the ecosystem of telecom operators and cloud providers, vendors, and system operators to help understand the opportunities presented by 5G – this same ecosystem needs to guide them in countering any new risks that the 5G architecture may pose. The key to securing 5G enabled devices is to build security into devices from the outset using encryption. The key to securing 5G enabled devices is to build security into devices from the outset Q: What new roles can the 5G embedded universal integrated circuit card (eSIM) endorse in network authentication? Jouffrey: 5G is the first generation of cellular to launch in a buoyant eSIM market. The eSIM will be key in supporting network slicing authentication and security, enabling enterprises to leverage their credentials to pre-select network slices. However, to support secure authentication for mobile networks that may require the usage of different authentication algorithms over time, these 5G eSIMs must support this flexibility of usage of multiple authentication and authorization credentials. With this capability built into these eSIMs from the start, mobile operators can remotely swap the authentication algorithm either for a dedicated primary authentication, or in a definitive way, thanks to key rotation management, thus maintaining a trusted environment.
The success of smart homes began with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically. Smart home systems In 2017, there were about 122 million smart home devices shipped globally, according to IHS Markit. The retail channel represented about 62 percent of all device shipments in 2017 and will represent about 70 percent in 2021. Despite the increased demand for professional installation, the “do-it-for-me” approach, most the volume remains with ad-hoc purchases. This includes a consumer video camera or a smart thermostat purchase from a retailer. Data capture form to appear here! When a consumer wants to add devices to an existing professionally installed system, they often will buy products from retail. Flexible service offerings and pricing are already taking shape across smart home offerings. DIY installed smart home systems such as Scout Alarm already offer no contract monitoring. Professional monitoring companies are already offering no contract pricing, and providers such as Comcast are looking to pilot programs for just video monitoring, bundled with Internet for a low monthly fee. Home automation system Connected smart locks can actually act as an extension of a smart hub or controller Options for financing are also going to become commonplace. Smart home equipment is expensive, even when attempting to outfit a modest size home (2,500 square feet). Immediate access to services is becoming more critical. This means consumers should be able to access on-demand service options directly from a mobile device to activate or deactivate professional monitoring. Lastly, pricing still needs to come down for many smart home devices, but there is a threshold. For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to communicate wirelessly with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. Residential security According to a 2018 Residential Security Market Report prepared by Parks Associates, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. For example, with their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchases. There are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” Full-time monitoring DIY products have broken down barriers for additional purchase and installation of professionally installed systems What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Instead of paying for monthly monitoring, homeowners can install a web cam, access from a smartphone or tablet and essentially do their own security monitoring. The downside of this approach is readily apparent. Without full-time monitoring, homeowners can easily miss the break-in or the aged parent who falls and can’t get up. Near-field communication Until they log on and take a look, there’s no central station to send medical aid or call the police. Connecting door locks and other devices to the Internet can also open a door to hackers, if the infrastructure isn’t properly protected. The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household Traditional security features For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market that want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Missed part one of our smart home mini series? Read it here.
Many exhibitors at GSX 2019 saw the show as a success, despite slower booth traffic on the second and third days. According to show sponsor ASIS International, there were more than 20,000 registrants from 125 countries around the world, including those who attended the conference as well as the exhibition. Exhibitors definitely put their best feet forward, enthusiastically promoting their technology breakthroughs, but how convincing were they? The comments from at least one attendee – a large corporate end user who represents a key demographic for show organizers – bluntly suggest that healthy skepticism was on display side-by-side with the promotional energy in play.On this floor, there are some lies being given out. Ask the tough questions, make the exhibitors show you" “On this floor, there are some lies being given out,” said Rudy A. Wolter, CTO, Security and Investigative Services for Citigroup, a financial services corporation. He advised fellow attendees to “listen for them, ferret them out, ask the tough questions. Make [the exhibitors] show you.” “Don’t be afraid to ask these men and women questions,” added Wolter. “Don’t be afraid to challenge them. If you don’t challenge them, they’re not getting any better which means we aren’t getting any better. At the end of the day, they’re the leaders; they’re the ones making change; they’re the ones touching systems; they’re the ones helping integration.” Banking security with Verint At Citigroup, Wolter oversees 1,300 bank branches in North America that use Verint systems, including 23,000 cameras tied into a single command center. Skepticism aside, Wolter also provided evidence that even tough customers can be brought around. Specifically, he is sold on Verint: “When you have a problem, this company listens,” he told attendees at a Verint gathering on the show floor. New at GSX 2019 is the Verint Video Investigator, which is software that empowers investigators to quickly find the data they need to identify security threats in near real-time. In all, Verint serves in excess of 2,300 individual financial institutions, with tens of thousands of branches. Wolter was one of several end users willing to sing their praises publicly. Other GSX exhibitors were also proud to have their own real-world success stories. Placing the emphasis on outcomes At GSX, I heard more than once that outcomes are more important than technologies. Customers don’t want to hear about technologies, but rather about what those technologies can do for them. Avigilon, now a subsidiary of Motorola Solutions, is another company that is focused on outcomes rather than technology per se. “Instead of focusing on megapixels and terabytes, the end user is focused on perimeter security, loss prevention and risk management,” says John Kedzierski, Sr. VP of Video Solutions at Motorola Solutions. “We are working to provide that outcome." The end user is focused on perimeter security, loss prevention and risk management" How operators work to ensure outcomes is another aspect that is changing, says Kedzierski. “Watching video is obsolete,” he says. Using Avigilon’s new system, the operator instead is looking at color-coded hexagons; one color means motion, another means an analytic event. Operators click on various hexagons to view video. Also at GSX 2019, Avigilon featured its new H5A camera line, with expanded object classification analytics, detailed object detection, and tracking in crowded scenes; and focused on the Avigilon Blue cloud system. They are working to make every camera capable of detecting faces, which can be matched to a watch list. How technology addresses marketplace changes Addressing the changing marketplace was another GSX theme. As the workplace changes, ASSA ABLOY Americas is adapting its technology to address new employment practices such as "hot-desking," and remote and mobile workers, says Peter Boriskin, Chief Technology Officer. Systems have to be able both to protect assets and also to provide flexibility to accommodate the changing workforce, he said. Corporate acquisitions are directly expanding the capabilities that ASSA ABLOY brings to the market. For example, they recently acquired Luxer One, a locker company that enables secure delivery of packages without customers needing to stand in line or wait for service. Deliveries can be made in seconds. Peter Boriskin of ASSA ABLOY Americas led a booth tour, including new power capabilities gained in the acquisition of LifeSafety Power Another recent ASSA ABLOY acquisition is LifeSafety Power, which is expanding the company’s capability to provide proactive data on wired systems by tracking power usage. For example, a spike in current might mean a problem with a component. Compiling “intelligent triggers” enables creation of a dashboard to provide analytics of wired systems. ASSA ABLOY has also been devising predictive analytics of wireless locks to predict battery life, for instance, and to address other maintenance challenges. “We want to know what’s going on at a door without visiting it,” says Boriskin. New exhibitors make their mark New exhibitors were part of the GSX mix. One new exhibitor was Vaion. It’s their first trade show after launching at IFSEC in London in June. Vaion combines a small camera portfolio with on-premise servers and software managed through the cloud for an end-to-end solution. Tormod Ree, co-founder and CEO, calls it a “hybrid cloud delivery model”. Vaion is also a “more proactive security model,” said Ree. Video is analyzed for anomalies, and the server “learns” what is normal and not normal. The system provides alerts and notifications, occupancy counting and traffic control, among other features. And “overlays” are employed to present information on a map. Vaion can highlight video that is more likely to be relevant and prioritize feeds that have more activity. Vaion designs the hardware, which is manufactured in Taiwan. Vaion was a first-time exhibitor at GSX 2019 with their end-to-end video system; Tomod Ree is co-founder and CEO Gunshot detection technology EAGL Technology displayed their “Firefly” gunshot detection technology at GSX 2019. Based on technology originally developed for use in the military for sniper detection, the U.S. Department of Energy adapted it to civilian uses after the Sandy Hook School shooting. Boaz Raz, CEO, said the technology is the “most advanced and affordable, wireless for use indoors or outdoors, and it can control doors and cameras”. It doesn’t “listen” for gunshots like some competitors; rather it measures energy for “6 sigma” accuracy (almost 100%). Defining, and redefining, end-to-end solutions End-to-end solutions were all the rage at GSX 2019, but Allied Universal was one exhibitor that pondered what, exactly, is an end-to-end solution? It means different things to different people. For example, a video company’s end-to-end solution would not include access control. When Allied Universal claims to offer an end-to-end solution, they mean it in the broadest definition of the term, including all security systems deployed for a customer as well as the important human element (i.e., manguarding). “The industry’s emphasis on ‘end-to-end’ doesn’t encompass a full solution,” says Mike Mullison, Allied Universal’s Chief Information Officer. “When somebody uses the term end-to-end, you have to ask: What’s at both ends?” The lines between cyber and physical threats are blurring. Clients want full-service solutions" “The lines between cyber and physical threats are blurring,” adds Mullison. “Clients want full-service solutions.” Allied Universal is adding new technology elements to its offering, and Mullison says “the next phase of growth will be fueled by technology.” Allied Universal recently introduced the Heliaus product, a smart phone app that accesses an analytics engine to predict outcomes and prescribe optimum responses. It literally puts technology in a security guard’s hand. One customer has found that use of the technology resulted in a 20% reduction in safety and security incidents. The latest in access control among exhibitors In addition to video, access control had a big profile at GSX 2019, as evidenced by ASSA ABLOY America and many other companies. Another example is SALTO Systems, featuring its new NEO cylinder for wireless access control and the SALTO Virtual Network (SVN); the SVN-Flex extends and increases the number of updating points directly to the door. The SVN-Flex extends and increases the number of updating points directly to the door The compact SALTO NEO Cylinder is designed for doors where fitting an electronic escutcheon is not possible or required and can be installed on standard doors, server racks, gates, cabinets, electric switches, or sliding doors. Low energy consumption results in 110,000 cycles with just one set of batteries. Other SALTO products are SALTO KS (Keys as a Service); SALTO BLUEnet Wireless for Bluetooth RF-driven real-time control of doors; the XS4 One Deadlatch stand-alone electronic lock; and JustIN Mobile, which replaces the need for an access card by securely sending a mobile key Over the Air (OTA) to an iOS or Android device from SALTO’s ProAccess SPACE management software. The next step in integration A new company reflecting the GSX emphasis on integration is Security and Safety Things (SAST), which is still in launch mode but expects to have its first pilot customers in the Q4. The first camera vendors embracing the SAST platform will have cameras for sale at ISC West in the spring. SAST is creating an Internet of Things (IoT) platform for the next generation of security cameras. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphones.SAST is creating an IoT platform for the next generation of security cameras “SAST is a technology platform, but it is also a business platform and a relationship platform,” said Emmanuel Ventadour, VP Sales and Marketing. For app developers, SAST also provides non-technical commercial services (i.e., easing their route to market.) Hartmut Schaper, CEO, emphasizes the “openness” of the company. Even though they are a spinoff of Bosch, they are treating every camera manufacturer equally, he says. For integrators, the use of apps can expand their field of play. Apps will empower integrators to use video for more business processes – not just security – and expand their reach with customers, says Schaper. From skepticism to sales There were plenty of product claims at GSX to feed the skepticism of even the toughest of potential customers. Fortunately, product claims were only the beginning of conversations with attendees at this year’s show. No doubt manufacturers were put through their paces more than once, and a few of them even came out on the other side with potential new business to show for their efforts. That’s the true measure of success at GSX 2019, or any trade show. Click here to read our reviews from Day One and Day Two of the show.
Multiple Construction sites in the Albuquerque area are managed by Shumate Constructors, Inc., an Albuquerque, New Mexico-based construction contractor, that is also renowned for building educational facilities. In addition to building schools from the ground up, Shumate Constructors completes school additions and remodels. Construction site thefts Three years ago, the company began having problems keeping thieves out of its construction sites during non-working hours. Unwatched construction sites are hot beds for a variety of thefts - from copper pipes and wire to hand tools to heavy-duty machinery. The loss of machinery, such as front-end loaders, would cost hundreds-of-thousands of dollars. Sometimes workers will arrive to a site in the morning only to find materials, such as copper pipe, gone along with their tools. Enhancing construction site security The sites also presented a challenge due to changing construction conditions The result is the loss of a whole day and sometimes multiple days of work. On top of the lost time, the contractor has to cover the cost of replacing materials, file an insurance claim for each theft and complete additional administrative paperwork that they weren’t planning to invest time in. The sites also presented a challenge due to changing construction conditions. Equipment or storage containers are delivered and removed, the sites are graded/re-graded and as sections of build were completed, tools, materials and supplies were moved to different areas. Flexible, reliable wireless solution At a contractor trade show a few years ago, Mark Shumate, President of Shumate Constructors met Dave Meurer, President of Albuquerque’s Armed Response Team. Meurer introduced Shumate to the idea of a flexible, reliable wireless solution that could continually monitor the entire site without the need to trench around the perimeter. “Mark [Shumate] was fed up with theft at his construction sites so we started to discuss some prevention ideas,” said Meurer, adding “I knew this was a great fit for the combined Inovonics transmitter and Optex sensor solution.” Optex sensors installed He further said, “At the Armed Response Team, we refer to this solution as the never sleeping, non-blinking eye. Shumate was not aware of any reliable solutions that could provide this type of theft prevention, but we explained that we were very confident in this application and he was definitely interested.” To install each combined sensor, the Armed Response Team attached the Optex sensors to a freestanding steel post with a base plate on it and deployed them throughout the site. This allowed the flexibility to be easily moved to accommodate site changes. Once installed, a signal was easily achieved. iSeries Optex/Inovonics sensors The amount of iSeries Optex/Inovonics sensors needed at Shumate’s sites vary The sensors in the combined solution often need to communicate as far as an entire city block and the perimeters can be several thousands of feet. The iSeries Inovonics/Optex solution was able to easily accomplish this feat. The amount of iSeries Optex/Inovonics sensors needed at Shumate’s sites vary. For some sites, it can be as few as a dozen, and others it can be as many as 30 or more. “Together, the products offer a great solution,” noted Meurer, adding “The Optex sensors can handle varying weather conditions and Inovonics’ wireless connectivity offers less signal drop and more consistent reporting signal than any of the other transmitters we’ve tried.” Efficient perimeter security solution “Between the perimeter technology by Inovonics and Optex, and the Armed Response Team’s follow-up, we have seen zero thefts for all projects since installation. With the integrated wireless solution, the construction sites are monitored on a real-time basis and immediately notify the Armed Response Team upon unauthorized access,” said Mark Shumate, President of Shumate Constructors. He adds, “We look at the perimeter security solution as a great investment. Annually, the cost of manpower, replacement of lost or stolen items and damage repairs could easily cost three times more than we spend on Armed Response Teams’ services with the Optex and Inovonics solution.”
A high school campus in an Atlanta suburb underwent a complete remodel. Temporary modular buildings were set up on a large area of the campus to act as classrooms during the year-plus long construction. Due to the temporary structures, accessible HVAC units and threat of vandalism, a stable and reliable solution was needed that would also be easy to both install and move if necessary. Wireless passive infrared detectors An integrator was selected who then teamed up with Optex to create a reliable, effective security solution that included iSeries battery-powered, wireless passive infrared detectors. This allowed for a simple, inexpensive yet effective way to protect the assets inside the structures, as well as the HVAC units on the exterior. The detectors protecting the perimeters of the site were set up to trigger strobe lights that alert an on-site guard to the location of any breach, while the system as a whole is monitored by the district's security team. Because the integrator chose to install a battery-powered, wireless option, any of the units can also be relocated if needed, based on changing site conditions or future security needs. Crime prevention at perimeter The temporary campus now maintains a secure perimeter and campus that detects intruders and prevents theft and vandalism. With the battery-powered system in place, the end user has multiple levels of protection and can respond quickly to alarms before any damage is done. Benefits and features of the iSeries battery-powered, wireless outdoor PIR detectors from OPTEX include: No trenching or wiring required allows for a quicker and less expensive install. End user will experience less downtime to business operations. iSeries version includes Inovonics EN1941 transmitter and batteries pre-installed, allowing for a quicker set-up time on job site. Dual PIR feature greatly increase stability outdoor and drastically reduces any false or missed alarms. Units can be easily relocated based on changing site conditions. Outdoor multiple detection pattern Optex’s outdoor PIR detectors (excluding the LX series) utilize the Multiple Detection Pattern technology, where two double-layered detection patterns (upper and lower) have to be activated to generate an alarm condition. This reduces false alarms, particularly those caused by temperature changes, light reflection and small animals. The size judging function virtually eliminates false alarms due to small animals and other moving objects such as vehicles. By utilizing originally developed pyro-elements, it creates a configuration area consisting of 94 high density detection zones. Also, the detection pattern technology requires both detection areas have to be activated in order to generate an alarm condition making it more tolerant to false alarms caused by small animals or pets.
From simple thefts of copper wire from light fixtures, to substantial damage to rooftop HVAC systems, copper continues to be stolen from everywhere that it is readily available. When a church in Georgia began feeling the effects of copper theft, the integrator associated with the property's interior security once again turned to OPTEX for help. The church utilized both rooftop and ground level HVAC systems, with easy access to each. Changing security needs Because of labor and cost associated with wiring, along with the difficulty bringing power to the rooftops, the Regional Sales Director for OPTEX recommended the iSeries line of battery-powered, wireless PIR's. The iSeries detectors offered spot and curtain protection for all HVAC units while also securing all access points to each. For future consideration, the addition of the wireless feature also allows the integrator to relocate and easily adjust the detectors based on changing security needs. With the system in place, copper and other related thefts have been eliminated and the end user can now respond quickly before any damage is done. All of the battery-powered, wireless detectors from OPTEX come with an empty backbox and work with most manufacturers' wireless transmitters. Narrow detection areas OPTEX will pre-install the batteries and an Inovonics EN1941 wireless transmitter When one selects the iSeries version, OPTEX will pre-install the batteries and an Inovonics EN1941 wireless transmitter. One less time consuming step to do for the installer! The iSeries HX-80NRAMi is an 80' x 6' high mount, battery-powered, outdoor passive infrared detector with Anti-Masking. The iSeries version comes with an Inovonics EN1941 transmitter and batteries pre-installed. The iSeries BX-80NRi is a 3' x 80' low mount, battery-powered, outdoor passive infrared detector with Pet Tolerance. The iSeries version comes with an Inovonics EN1941 transmitter and batteries pre-installed. With it's long, narrow detection areas that extend from both sides, the battery-powered BX-80NRi is specifically designed to be wall-mounted centrally on a building or HVAC unit. Passive infrared detector The iSeries VX-402Ri is a 40' x 40' low mount, battery-powered, outdoor passive infrared detector with Pet Tolerance. The iSeries version comes with an Inovonics EN1941 transmitter and batteries pre-installed, and the dual PIR's create two detection areas (upper and lower) that must be compromised simultaneously in order to go into alarm. OPTEX has addressed and met the need for a line of easy to install, stable outdoor detectors that will deter and ultimately prevent copper theft.
Interface Security Systems, a managed services provider delivering managed network, asset protection, and business intelligence solutions to distributed enterprises, provided RMH Franchise, the world’s second-largest Applebee’s franchisee, with secure SD-WAN over broadband, 4G/LTE wireless WAN backup and VoIP solutions. A significant update for RMH’s aging network environment, the solutions are boosting RMH’s application performance, wireless failover capabilities, and providing a seamless voice solution that has proved to be particularly useful during times of lockdown and social distancing. Stricter compliance rules Founded in 2012, RMH Franchise operates more than 131 restaurants across 14 states. While it traditionally has offered in-house dining, additional Applebee’s options such as Carside To Go, online ordering and delivery have proved invaluable throughout the current health crisis. “I had been mainly keeping our IT in-house and managed our own Internet connections, routers, security, etc.,” explained Roger Somers, Executive Director of IT, RMH Franchise. “As our footprint was growing, the requirements for a secure network were also increasing, and it made sense for us to outsource. PCI (Payment Card Industry) requirements also became more stringent and businesses were required to adhere to stricter compliance rules.” Cost-Effective solution Interface implemented a next-generation Secure SD-WAN network architecture with broadband upgrades Somers was looking for a managed services provider who could quickly deliver a cost-effective solution for managing and securing their IT network and voice communications across all locations. Interface, a preferred provider for CSCS, the purchasing agent for Applebee’s, perfectly fit the bill and customized a scalable solution bundle. Interface implemented a next-generation Secure SD-WAN network architecture with broadband upgrades. Additionally, Interface combined managed 4G/LTE wireless capability with terrestrial circuits in areas with low-speed broadband to deliver an improved restaurant and guest experience. The 4G/LTE service automatically takes over should the primary network connection fail. It offers seamless fail-over for POS transactions, credit card processing, inventory management and other key processes to continue to perform without interruption or store personnel involvement. Consolidating several vendors Interface also implemented its VoIP phone service and consolidated several vendors, migrating all RMH’s locations from legacy phone systems to a fully hosted cloud model, saving long distance costs and standardizing all locations. As the worldwide health crisis became an ever-increasing concern and more restaurant guests were staying home, RMH leveraged these solutions for Carside To Go, and online delivery. Apart from the significant cost savings realized through Interface’s managed VoIP services, another benefit Somers sees is the cloud auto attendant feature. “The remote recording plays our business hours, curbside delivery or take out specials and can dynamically route calls. This reduces a lot of the call volume directly into the restaurants, has increased our efficiencies, and saved us time and money,” he explained. Providing business continuity Somers added that Interface has made spinning up secure networking and voice services ‘simple, fast and scalable’ with a fully configured proprietary cabinet that includes all of the franchises’ managed services. The Interface Cloud-Powered Remote Reboot feature power cycles equipment without any onsite intervention" He continued that the wireless backup has become “Increasingly important as we continue to layer more critical services on our Internet connection like tabletop devices. The Interface Cloud-Powered Remote Reboot feature power cycles equipment without any onsite intervention, before employees or guests realize there may be an issue. If an Internet provider is down or there is any sort of network failure, rolling over to 4G/LTE is automatic and provides for business continuity. That has become critical for us.” Alarm monitoring services Since implementing the Interface solutions, RMH has increased agility, gained operational efficiencies, and augmented security, all while realizing 10X cost savings. RMH is planning on further strengthening the partnership with Interface by adding alarm monitoring services to Interface’s powerful bundle of managed services for networking, voice and security. “RMH Franchise has been at the forefront of implementing technology that delivers a superior experience to their clients. We are proud to be their managed services provider and look forward to our continued partnership,” said Brent Duncan, Chief Revenue Officer at Interface Security Systems.
Resilience and efficiency have become watchwords for the public institutions, before, during and after the ongoing health crisis. In delivering services fit for the modern world, these institutions need more than just innovation and accountability. They require flexibility and agility, too, including in how they approach security. The lock and key have enjoyed public trust for a long time. Keys were used in Ancient Egypt and Assyria, and warrant a mention in the Christian Old Testament. As a technology the key is familiar and proven, user-friendly and dependable. It can also be inflexible and time-consuming to manage. The security challenges of delivering public services do not stand still, but standard mechanical keys cannot move with oneself. Filtering access intelligently and dynamically has become part of security’s job description. Yet there is no need to dispose of the key altogether. One can adapt it, rather than throw it out. Intelligent, programmable keys combine the powerful features of electronic access control with the convenience of a mechanical key. They are keys, familiar and user-friendly… but evolved. When the key has a brain, one can do more with less. These efficiencies are critical in a world where demands on the public institutions are at levels not seen in generations. Cut workload and solve the problem of lost keys One [lost] key cost from €3,000 to €4,000 for changing cylinders and replacing the keys" Lost keys present mechanical security with its most intractable problem. When a key goes missing, time and budget are expended to remedy the situation. Extensive rekeying and reissuing to relevant keyholders are complex and expensive. Programmable keys, however, solve the problem quickly. The French town of Villiers-le-Bel, north of Paris, faced these familiar key management challenges. Each person in their Municipal Technical Centre carried approximately 40 physical keys. If one was lost or stolen, all compromised cylinders had to be changed. To prevent unauthorised access, all the keys had to be replaced, too, at great expense. Key duplication costs were mounting. “One [lost] key cost from €3,000 to €4,000 for changing cylinders and replacing the keys,” explains Fabrice Girard, Territorial Technician at the town’s Municipal Technical Centre. To fix this expensive lost key problem, Villiers-le-Bel city administrators chose to combine trusted mechanical security with new electromechanical key-operated locking, all managed within the same flexible, wireless access control system. Now lost or stolen electronic keys are cancelled instantly using secure cloud software which works inside a standard browser, no software installation required. Administrators can program access rights for any key, padlock or cylinder. They filtre access to specific sites and doors according to the precise requirements of every municipal employee. Keep residents safe in their homes In Aalborg, Denmark, around 3,000 citizens in home care have programmable locking cylinders installed at their front door. This replaces a cumbersome mechanical master-key system. Aalborg’s installation was tailored to meet the needs of this vulnerable group of city residents. Certified technicians simply replaced each old cylinder with a programmable cylinder If a home care resident loses their key, its access rights can be deleted from the system without the need for a lock replacement — keeping the keyholder’s home safe and saving the city time and money on rekeying. Managing Aalborg’s system is straightforward. Lock installation was quick and easy: certified technicians simply replaced each old cylinder with a programmable cylinder — with no wiring and no major alterations to the door. Aalborg’s fire brigade quickly took over the maintenance process. Brigade staff now grant or revoke access, and tailor permissions for different users or locations according to defined needs. In Skellefteå, Sweden, electromechanical locking has given local firefighters faster, safer access to any building. To speed up emergency response times and improve firefighter safety, the local service fitted houses with secure façade key cabinets.More rapid response means a better chance to prevent a fire spreading Property keys are stored inside the cabinets, so authorised firefighters get rapid building access if there is a fire. When the emergency call comes, firefighters update their individual, programmable key at the station or while on the move, using a remote key updater kept in the fire engine. There’s no longer any need for fire stations to hold multiple sets of keys or for off-site firefighters to divert to the station to collect the right key. More rapid response means a better chance to prevent a fire spreading. Safety is improved for everyone, Skellefteå residents at home and firefighters at work. Clear workflow bottlenecks in public housing With crime against empty properties on the rise, public authorities in the English city of Rotherham aimed to minimise the time a council house stands vacant. However, workers from multiple departments require access to prepare a property for a new tenant. Passing keys securely between all relevant staff members was a major cause of delay. Security managers issue the precise permissions which every staff member needs At Rotherham Metropolitan Borough Council (RMBC), intelligent key technology helped streamline these workflows, upgrading security and saving money at the same time. RMBC identified physical key handover as a major bottleneck in their workflow. They needed a solution to speed up the process. Now, each relevant RMBC staff member is issued with their own programmable key. Using simple online software, security managers issue the precise permissions which every staff member needs. The access rights of any key can be amended or revoked at any time. Physical handover of mechanical keys, and the time and money spent coordinating this process, has been eliminated. Preserve the fabric of historic buildings, and the design integrity of new spaces Building type can make a big difference to the access control one chooses. Public spaces inside protected heritage buildings often cannot opt for card- and reader-based access control. Here, wireless electronic cylinders which simply replace existing mechanical locks solve the problem, preserving doors which may be centuries old. Intelligent key security is hardly noticeable for the library’s many visitors The issue of aesthetics also affects modern public spaces, albeit differently. In Stuttgart, innovative design was a key element of the city’s new library building. Door security should be discreet and not disrupt the vision of Korean architect, Eun Young Yi. This was the first public building in Stuttgart’s Europaviertel, a unique creation with a double façade with glass bricks, a brightly lit atrium four storeys high, and public entrances on all four sides. Almost as soon as it opened, the building was declared an architectural icon — “instantly one of the world’s most beautiful libraries.” Intelligent key security is hardly noticeable for the library’s many visitors, yet critical for protecting Stuttgart’s precious public heritage Save time and money managing keys for a mobile workforce Many public services involve managing and directing a mobile or contractor workforce. Mileage expense mounts up when workers must return to base to collect keys or update their access rights. With a Bluetooth-powered solution, everyone carries their own programmable key Mobile workers use more fuel and increase a carbon footprint. One makes a business more sustainable quickly if one reduces the mileage one travels. Reducing miles while maintaining security is not easy, if one relies on mechanical keys to secure remote or dispersed sites. Bluetooth-enabled intelligent keys eliminate the need for workers to return to headquarters to collect or return a mechanical key. With a Bluetooth-powered solution, everyone carries their own programmable key and keeps its access rights up to date on the move, simply by making an encrypted connection to a secure smartphone app — meaning fewer miles driven and less money wasted on unnecessary fuel. One technology powers all the solutions All the installations referenced above — and many, many more across the full spectrum of public services — run on the same technology: CLIQ® from ASSA ABLOY. CLIQ combines electronic and mechanical security in a range of wireless cylinder applications, including a full range of mechatronic and electronic cylinders and padlocks. CLIQ locks are installed without wires: every cylinder’s power is supplied by a battery inside the CLIQ key. These keys are physically identical and programmable by a system administrator using a desktop updater; by keyholders with a portable programmer; or in the case of CLIQ Connect Bluetooth-enabled keys, via an encrypted connection to a secure smartphone app, minimising both wasted journeys and unnecessary social contact between workers and office staff. Intuitive software makes it simple to manage access rights, enable and disable keys and customise access schedules, on site or on the go. To learn how you can put CLIQ® intelligent key technology to work in agile, flexible, secure public services, download a free introductory guide at https://campaigns.assaabloyopeningsolutions.eu/eCLIQ
Vera Cadillac, a renowned automotive dealer in the Fort Lauderdale area of the US State of Florida was looking to install an advanced security system to counter the growing threat of sophisticated thieves - sophisticated enough to know how to circumvent the current security system and steal parts, tires and in some cases, complete cars. Vera’s current security system included inexpensive CCTV cameras with video motion sensors that proved ineffective in deterring theft at the dealer’s showroom. The sensors were installed on the outside of the fenced perimeter, making them susceptible to being vandalized. When the sensors were disabled, the thieves were able to penetrate the perimeter and strip cars for parts. The speed in which the thieves were stealing car parts and accessories was another tough obstacle to overcome. Tyco - Optex integrated security solution Vera chose Tyco Integrated to come up with an improved, flexible system that takes into account the many obstacles within the perimeter. This includes wildlife, vegetation and other physical obstacles. In addition, the system needed to be as vandal proof as possible. Tyco Integrated and Optex teamed up to provide a flexible, effective system of detection that would use high-mount, zone detectors as trigger devices for the American Dynamic Illustra IP400 CCTV system. SIP infrared sensors - Inovonics wireless network integration The team created a design that would easily integrate Optex’s REDWALL Wireless SIP infrared sensors into Vera’s current Inovonics wireless network (used for building automation systems). The Redwall sensors would trigger PTZ dome cameras that are fixed within the area of detection The Redwall sensors would trigger PTZ dome cameras that are fixed within the area of detection. The result will capture and record any intrusion within the sensor’s zone. The intrusion event is now tracked by ADT’s Central Monitoring Station and alerts the authorities along with a Vera contact. Masking of surrounding obstacles The REDWALL SIP sensors allowed Tyco Integrated to easily adjust and account for wildlife, vegetation and other physical obstacles by simply masking those areas. Masking deletes these obstacles within the protected perimeter of the detector. Because the old system was susceptible to vandals, the team had to address this. The team installed the sensors behind the fence and over 9 feet high on the side of the building in accordance to specification. Effective intrusion detection All-in-all, the plan included 12 SIP units mounted on four buildings, which were installed in a single day. Vera Cadillac effectively maintains a secure perimeter that detects intruders from stealing auto parts and other property. In addition, the system was easily integrated into Vera’s current wireless network and is vandal proof. It provides Vera Cadillac peace-of-mind that a system is in place to prevent such incidents from happening during the night-time and can respond with quick efficiency to catch criminal activity.
Round table discussion
Driven by technology developments such as voice recognition, smart devices and the Internet of Things, our homes are getting “smarter” all the time. Increasingly, we expect our residential environments to be responsive to our voice commands, whether we are adjusting a thermostat, turning on a light, or lowering the window shade. Smarter home integration yields new opportunities and challenges for home security, too, which contributes an element of safety and protection to the convenience aspects of smart homes. We asked this week’s Expert Panel Roundtable: How are new smart home systems impacting security?
A basic tenet of sales is ABC – always be closing. But it's a principle that most professional salespeople would say oversimplifies the process. Especially in a sophisticated, high-tech market such as physical security, the required sales skills are much more involved and nuanced. We asked this week's Expert Panel Roundtable: What unique characteristics are required of salespeople in the arena of physical security systems?
Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload