Businesses, large and small, create data which needs protecting, whether in an onsite server room or co-located at a data center. When a business imagines a corporate data breach, they’re probably picturing black-hat hackers pursued by cybercrime investigators. The reality is often more mundane. Only around a half of breaches involve hacking, according to one recent report. Gaps in the physical security, the business’ data and servers are equally important targets. Perhaps the compa...
Allot Ltd., a globally renowned provider of innovative network intelligence and security-as-a-service (SECaaS) solutions for communication service providers (CSPs) and enterprises, has launched Allot BusinessSecure, a new solution that CSPs can offer their SMB and enterprise customers to protect them from emerging cyber security threats, including malware, phishing, ransomware and crypto-mining, while increasing revenue. Allot BusinessSecure Allot BusinessSecure is the newest member of the All...
Marks USA, a division of NAPCO Security Technologies, and sister division of Alarm Lock, is excited to announce the debut of new virtual online and field training classes including new pro courses on architectural-grade hardware, locking and access lock lines, by technology or vertical market. Real-World applications Taught by CRL-locking pros for locking pros, the virtual online classes can be a great tech refresher or new introduction, ideal while quarantined or working from home. Field clas...
Camden Door Controls has announced the market introduction of CM-75 Series Column push plate switches with built-in Kinetic no-battery wireless transmitters. Kinetic by Camden is an advanced 900 Mhz. 'power harvesting' wireless system that uses the energy created by the operation of the switch to power the wireless transmitter. Eliminating the batteries means avoiding annual maintenance charges, along with disposing of hazardous waste in landfill. CM-75 Series Column switches Kinetic by Camde...
Even the most reliable security equipment is never fully protected from false alarms. Most of the time, they occur due to simple oversights, hyperactive pets, or incorrect installation. But when the security companies react to false alarms, they risk getting late in case of a real emergency. Some send security patrols to check the unverified alarms right away. The others count the detector triggerings before responding and lose precious minutes in the result. In any case, false alarms bring str...
CubeWorks introduces the CubiSens platform, the company’s portfolio of fully self-contained smart sensing products, making one of world’s smallest and longest-lasting sensors available to the global marketplace. The world’s foremost organizations may now harness the power of CubiSens to enhance security and provide new insight into production processes and environmental monitoring. CubeWorks, a spin-out of the University of Michigan, leads the smart sensor market with technolo...
The BR1-WTRSB Bluetooth Emergency Pendant is a small wireless panic button that partners with a smartphone application allowing the user to summon help with one simple button press when an emergency arises, inside and outside the home. When the BR1-WTRSB button is press, BR1-WTRSB utilizes its Bluetooth connection with the smartphone app to immediately report an alarm and relay user’s GPS location directly. During sudden, life-threatening situations, users may not have the opportunity to unlock and make a call on their smartphones for help, BR1-WTRSB can send an alarm and GPS location to caregivers and authorities immediately. Increasing response and rescue time This extra level of protection can also significantly increase response and rescue time. The BR1-WTRSB is IP57 waterproof, lightweight, and has a long-lasting battery life. With the BR1-WTRSB, help will always be a button touch away, whether at home, or when user is out for a walk. Feature of BR1-WTRSB Bluetooth Emergency Pendant are as follows: Bluetooth Emergency Pendant reports an alarm and GPS location via smartphone app when pressed Can be worn as a neck pendant or a wrist transmitter IP57 Waterproof standard Reliable signal transmission Low battery detection Periodic supervisory signals check system integrity Comfortable and Stylish design
BX-35ZBS bell box is a battery-operated wireless outdoor siren generating a loud 104 decibel siren sound and strobe lights during an alarm to provide visible and audible alerts. Encased in a durable, IPX5 waterproof design, easy-to-install BX-35ZBS is a premium choice for the modern smart home. The BX-35ZBS is energy saving and environmentally conscious, requiring only two Alkaline batteries, yet still has a long battery life. The BX-35ZBS generates unique alarm sounds for fire and burglary to inform users of the type of danger at hand. In addition to producing audible and visible warnings in the case of emergency, the BX-35ZBS emits beep notifications for arming and disarming of a security system, and of its low battery status. Tamper-deterrent feature Its tamper-deterrent feature protects against unauthorized removal and sabotage. The BX-35ZBS is compatible with other manufacturers’ ZigBee systems and can be integrated into new or existing ZigBee systems. Features Siren output level is 104dB at 1 meter Unique alarm sounds for fire and burglary Lightweight and flexible to install Modern and Elegant design Programmable siren duration of 3/5/10 minutes Sound notifications of arming, disarming, and low battery status Regular supervision signals to check system integrity and trouble shooting Low battery detection Tamper protection prevents unauthorized removal IPX5 waterproof and UV resistant housing Compliant with CE requirement Compatible with other’s ZigBee manufacturers’ ZigBee systems Specifications Communication Protocol - ZigBee Pro Home Automation 1.2 Frequency - 2.4GHz Power Supply - 1.5V, D Alkaline battery x 2 Battery Life - 6 years Siren Output - 104dB at 1 meter Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - 223 x 223 x 68mm
SR-32 is a battery-operated wireless indoor siren, generating a loud 104-decibel siren to alert users to possible intruders, emergencies, and safety incidents. The multi-functional indoor siren can work with the control panel to emit entry and exit delay beeps. The SR-32 generates unique alarm sounds for fire and burglary to audibly inform the user of the type of danger at hand. Encased in an elegant, modish design, the SR-32 will effortlessly fit into the home decor. SR-32 is lightweight and easy to install, giving users the flexibility to install it anywhere in the house. SR-32’s tamper-deterrent feature also protects against unauthorized removal or sabotage. Features Siren output level is 104dB at 1 meter Unique alarm sounds for fire and burglary Lightweight and flexible to install Programmable siren duration of 3/5/10 minutes Sound notifications of arming, disarming, and low battery status Smaller, visually pleasing design Cover tamper protection prevents unauthorized removal and sabotage Regular supervision signals to check system integrity Low battery detection Compatible with Climax F1 Alarm Panels Compliant with CE requirement Specifications - SR-32-F1 Frequency - 433 MHz / 868 MHz Power Source - 1.5V, D Alkaline battery x 2 Battery Life - 3 years Siren Output - 104 dB at 1 meter Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - 212.5 mm x 179 mm x 53 mm
Maximize the effectiveness of the installed security system by providing the family and business with an even higher level of protection. The SVGS Series is a shock, vibration and glass break sensor, designed to provide early warning of an attempted intrusion by sensing forced entry before a burglar actually enters the property. This wireless shock sensor is lightweight and easy to install on any glass window, door, roof, or safety box and capable of detecting two different types of forcible attacks, a single major shock event, or accumulated consecutive minor shock attacks. The SVGS F1 models leverage Climax’s industry renowned RF technology to accelerate the speed of signal transmission and deliver reliable, extensive communication range, allowing users to stay in touch, in control, and provide a peace of mind. Smart home system The SVGS Series is a broadly applicable device ready to make users home or business safer and smarter When the SVGS Series are linked with security or smart home system, it can activate a siren, turn on lights, music, or start video recordings when the glass is tampered with, which is often enough to send an intruder running. The SVGS Series’ discreet design makes it unobtrusive and has three adjustable sensitivity threshold levels to choose for different situations and locations. The SVGS-5 model features two-way signal, allowing for setting configurations to be easily adjusted through the security gateway or control panel. The SVGS Series is a broadly applicable device ready to make users home or business safer and smarter. Features Early detection of break-in attempts of glass windows, doors, roof, or safety boxes Detects major shock attack or accumulated minor shock attacks Adjustable sensitivity threshold levels: Low, Medium, High F1 technology accelerate the speed of signal transmission, reliability, and boots communication range. (F1 models only) LED indicator Setting configuration locally on device (SVGS-3 only) Setting configuration remotely on device via Control Panel (SVGS-5 only) Wireless and lightweight for easy installation Works on glass, plywood and safety box Low battery indicator Regular supervision signals to check system integrity Suitable for residential and commercial security usage Specifications SVGS-3-F1 Frequency - 868MHz / 869MHz / 433MHz Power Source - 3V CR2477 Lithium battery x 1 Battery Life - 5.5 years Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - Diameter ᴓ 44.6mm x 16.3mm SVGS-3 Frequency - 868MHz / 433MHz Power Source - 3V CR2477 Lithium battery x 1 Battery Life - 3.5 years Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - Diameter ᴓ 44.6mm x 16.3mm SVGS-5-F1 Frequency - 868MHz / 433MHz Power Source - 3V CR2477 Lithium battery x 1 Battery Life - 5 years Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - Diameter ᴓ 44.6mm x 16.3mm SVGS-5 Frequency - 868MHz / 433MHz Power Source - 3V CR2477 Lithium battery x 1 Battery Life - 2.6 years Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - Diameter ᴓ 44.6mm x 16.3mm Ordering Information SVGS-3-F1 - Shock / Vibration & Glass Break Sensor, compatible with Climax F1 Control Panels and extensive RF range SVGS-3 - Shock / Vibration & Glass Break Sensor, setting configuration on device SVGS-5-F1 - Shock / Vibration & Glass Break Sensor, setting configuration on Gateway or Control Panel, compatible with Climax F1 Control Panels and extensive RF range SVGS-5 - Shock / Vibration & Glass Break Sensor, setting configuration on Gateway or Control Panel
Antaira Technologies, a global renowned developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications, is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the AGS-7230-AC-T-US. AGS-7230-AC-T-US Antaira Technologies’ AGS-7230-AC-T-US is an industrial dual-radio wireless router with a Modbus gateway which is designed for industrial and enterprise wireless access applications. It boasts a robust network, stability, and a wide network coverage using 802.11a/b/g/n/ac that is selectable 2.4 or 5GHz frequencies. With MiMo technology, the wireless radio supports high-speed data transmission of up to 867Mbps. IoT functions The AGS-7230-AC-T-US is capable of many IoT functions such as MQTT and Modbus Gateway. The gateway feature permits Modbus RS485 networks to connect directly to the device, converting the signal from Modbus ASCII/RTU to Modbus TCP. These units also allow the user to position the wireless antennas in a better signal-broadcasting location for improved wireless coverage and signal strength, or to add external antennas located in an optimized location.
PointCentral, an Alarm.com company, has acquired New York-based Doorport, Inc. With the acquisition, PointCentral will add a unique smart intercom capability to the PointCentral Smart Property Management solution. Doorport‘s innovative smart intercom solution improves building access security and convenience at multifamily properties for residents, guests, property managers, and delivery personnel. The acquisition accelerates PointCentral’s push to provide a complete IoT solution that combines resident wants with property manager needs. PointCentral Smart Property Management From a single integrated platform, PointCentral Smart Property Management will offer mobile device-initiated access to buildings and smart apartment technology along with robust building security, property management and unattended showing capabilities. Multi-family rental properties have widely deployed traditional intercom systems to facilitate visitor access. Doorport’s cellular-based system provides property owners with a simple retrofit solution that smart-enables existing intercoms without needing to extend Ethernet or Wi-Fi to the intercom unit or requiring all-new intercom hardware installations. Building and unit level access management Doorport’s system will be integrated into the PointCentral platform to provide a complete smart property solution PointCentral customers can set up Doorport for their properties at a fraction of what other smart intercom solutions cost. Doorport’s system will be integrated into the PointCentral platform to provide a complete smart property solution, combining building and unit level access management with a best-in-class smart rental experience. “Intercoms play a vital role in helping residents and property managers verify and control who gains access to a building,” said Sean Miller, President of PointCentral, adding “Property managers and residents alike want a seamless curb-to-couch solution that conveniently and securely manages front door access for guests as well as service and package delivery”. Asset protection Sean further said, “Doorport allows us to provide a complete range of solutions in a well-integrated comprehensive product suite. A key strength of the PointCentral open platform is our third-party integrations that give property managers choice. While we see Doorport as a best-in-class solution, especially for retrofits, we will continue to invest in our ecosystem integrations with other smart intercom solutions.” PointCentral helps property managers transform short- and long-term rental properties into state-of-the-art smart apartments and connected communities. PointCentral is backed with onsite sales and service support provided by a nationwide network of smart property service providers. PropTech for residential properties PointCentral’s Smart Property Management platform, powered by Alarm.com, provides building owners and managers numerous benefits including operational efficiencies, asset protection, and enhanced property values through smart resident and guest amenities. “We couldn’t be more excited to join forces with PointCentral and Alarm.com,” said Ben Taylor, CEO of Doorport, adding “PointCentral is a well-known leader in PropTech for residential properties. We’re confident that by bringing Doorport into the PointCentral platform, we’ll be able to realize our mission of delivering a seamless access experience to renters and smart apartment residents across North America and beyond.”
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data center, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. CV-19 means that huge numbers of people are getting access to the same desktop and files, and collaborative communication toolsBut as we know, CV-19 means that huge numbers of people are getting access to the same desktop and files, applications and collaborative communication tools that they do on a regular basis from the office or on the train. Indeed, the new generation of video conferencing technologies come very close to providing an “almost there” feeling. Hackers lie in wait Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical servers. Less than a month ago, we emerged from a period of chaos. For months hackers had been exploiting a vulnerability in VPN products from Pulse Secure, Fortinet, Palo Alto Networks, and Citrix. Patches were provided by vendors, and either companies applied the patch or withdrew remote access. As a result, the problem of attacks died back. But as companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on. That’s because remote desktop protocol (RDP) has been for the most part of 2019, and continues to be, the most important attack vector for ransomware. Managing a ransomware attack on top of everything else would certainly give you sleepless nights. As companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical serversExposing new services makes them also susceptible to denial of service attacks. Such attacks create large volumes of fake traffic to saturate the available capacity of the internet connection. They can also be used to attack the intricacies of the VPN protocol. A flow as little as 1Mbps can perturbate the VPN service and knock it offline. CIOs, therefore, need to acknowledge that introducing or extending home working broadens the attack surface. So now more than ever it’s vital to adapt risk models. You can’t roll out new services with an emphasis on access and usability and not consider security. You simply won’t survive otherwise. Social engineering Aside from securing VPNs, what else should CIO and CTOs be doing to ensure security? The first thing to do is to look at employee behavior, starting with passwords. It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposed. Best practice would be to get all employees to reset their passwords as they connect remotely and force them to choose a new password that complies with strong password complexity guidelines. As we know, people have a habit of reusing their passwords for one or more online services – services that might have fallen victim to a breach. Hackers will happily It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposedleverage these breaches because it is such easy and rich pickings. Secondly, the inherent fear of the virus makes for perfect conditions for hackers. Sadly, a lot of phishing campaigns are already luring people in with the promise of important or breaking information on COVID-19. In the UK alone, coronavirus scams cost victims over £800,000 in February 2020. A staggering number that can only go up. That’s why CIOs need to remind everyone in the company of the risks of clickbait and comment spamming - the most popular and obvious bot techniques for infiltrating a network. Notorious hacking attempts And as any security specialist will tell you, some people have no ethics and will exploit the horrendous repercussions of CV-19. In January we saw just how unscrupulous hackers are when they started leveraging public fear of the virus to spread the notorious Emotet malware. Emotet, first detected in 2014, is a banking trojan that primarily spreads through ‘malspam’ and attempts to sneak into computers to steal sensitive and private information. In addition, in early February the Maze ransomware crippled more than 230 workstations of the New Jersey Medical Diagnostics Lab and when they refused to pay, the vicious attackers leaked 9.5GB or research data in an attempt to force negotiations. And in March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHO and healthcare organizations in general since the pandemic broke. We’ll see lots more opportunist attacks like this in the coming months. More speed less haste In March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHOFinally, we also have bots to contend with. We’ve yet to see reports of fake news content generated by machines, but we know there’s a high probability it will happen. Spambots are already creating pharmaceutical spam campaigns thriving on the buying behavior of people in times of fear from infection. Using comment spamming – where comments are tactically placed in the comments following an update or news story - the bots take advantage of the popularity of the Google search term ‘Coronavirus’ to increase the visibility and ranking of sites and products in search results. There is clearly much for CIOs to think about, but it is possible to secure a network by applying some well thought through tactics. I believe it comes down to having a ‘more speed, less haste’ approach to rolling out, scaling up and integrating technologies for home working, but above all, it should be mixed with an employee education program. As in reality, great technology and a coherent security strategy will never work if it is undermined by the poor practices
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
The next step in the journey of digital transformation, the fifth generation of wireless communications technologies (5G) will have an enormous impact on mankind, and on every industry including security. In short, 5G will disrupt the way we live and work. To discuss the changes, we presented our questions to Benoît Jouffrey, VP 5G Expertise at Thales, which is at the forefront of the transformation with an emphasis on trust and security. Following are his responses. Q: In layman's terms, what is the difference between 4G and 5G ecosystems as they relate to opportunity, flexibility and choice in networking tools? Jouffrey: Compared with largely one-size-fits-all 4G services, the 5G ecosystem will provide organizations with much greater choice and flexibility in the way they communicate over mobile networks. The network slicing capabilities of 5G means that business can have their own independent networks, with each one customized to their unique requirements and backed up by service-level agreements (SLA). Another aspect of 5G will be the ability to drive latency between UE (User Equipment) and network down to below a few milliseconds, which will massively boost the performance and scalability of enterprise applications. Q: How can these capabilities drive a company's digital operations? 5G will allow enterprises to be connected more efficiently Jouffrey: 5G will allow enterprises to be connected more efficiently: they can rely on a higher density of connected devices exchanging more information in a better timeframe. Due to these slicing capabilities, 5G networks allow for much greater personalization than 4G networks. This means that businesses could benefit from this personalized network, tailored to their portfolio of Internet of Things (IoT) use cases, and not be necessarily expected to rely on a one-size-fits-all network. By combining the unique capabilities of 5G with the insights derived from analytics, machine learning, and artificial intelligence, enterprises will be in much better stead to run their operations efficiently and securely. Q: How might 5G impact the use of cloud systems? Jouffrey: 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have a small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate. Q: How can one provide trustworthy 5G lifecycle management for IoT devices? Jouffrey: Trustworthy IoT lifecycle management is an end-to-end approach from the secure provisioning of keys within the devices, to the proper identification of the users, from the authentication on the network or the network slice, to the secure handling of the data either at stored or in motion. Resources need to be invested long before this to qualify the business model, in prototyping, as well as prototype testing. Most organizations don’t have the resources to counter all the security challenges of their 5G IoT deployments. Businesses will often end up choosing between navigating a risk-laden 5G environment, with inadequate or incomplete trust mechanisms, or outsourcing these requirements. When looking at outsourcing, companies must choose a provider with expertise in digital security, ensuring 5G IoT deployments have data protection and connectivity credentials built in, together with end-to-end data protection solutions such as encryption – protecting data in the device, network, and cloud at rest and in transit. Q: How can wireless modules address new 5G IoT use cases? Wireless modules can be expected to play a bigger role than in previous generations of cellular Jouffrey: As IoT considerations are integrated into the 5G ecosystem, wireless modules can be expected to play a bigger role than in previous generations of cellular. 5G modules support different characteristics to earlier generations – the 5G use cases are much more complex, varied, from high-end use cases requiring high data usage and throughput, such as for industrial routers, to low-throughput, energy consumption optimized devices, as required for some IoT sensors. At the end, compared to the largely one-size-fits-all approach that preceded it, 5G will increase the demand for vertical-tailored wireless modules. Importantly, these wireless modules need to support new data protection and security features that go well beyond conventional compliance to 3rd Generation Partnership Project (3GPP) standards. Due to the extent of personalization within 5G networks, wireless modules must also offer providers and customers greater security as well as agility all along the device lifespan. Q: What are the new data protection challenges posed by 5G, and how can they be addressed? Jouffrey: The 5G era presents exciting opportunities, as well as security challenges. The greatest risks to enterprise data on 5G networks – including eavesdropping, man-in the middle attacks, denial of services, loss or compromisation of data – were already known in 4G. The 5G standards have looked at providing answers to these threats and come with some noticeable improvements, such as the encryption of the international mobile subscriber identity (IMSI), otherwise known as the Subscription Permanent Identifier in 5G. But what’s different with 5G is the threat surface area, due notably to the variety of devices that will be used over these 5G networks and the underlying technologies used for the deployment of the networks, such as cloud native virtualization. On top of this, it’s the first generation of cellular to launch in an era of global cyber-crime, funded by organized crime and states alike. So, whilst enterprises should look to the ecosystem of telecom operators and cloud providers, vendors, and system operators to help understand the opportunities presented by 5G – this same ecosystem needs to guide them in countering any new risks that the 5G architecture may pose. The key to securing 5G enabled devices is to build security into devices from the outset using encryption. The key to securing 5G enabled devices is to build security into devices from the outset Q: What new roles can the 5G embedded universal integrated circuit card (eSIM) endorse in network authentication? Jouffrey: 5G is the first generation of cellular to launch in a buoyant eSIM market. The eSIM will be key in supporting network slicing authentication and security, enabling enterprises to leverage their credentials to pre-select network slices. However, to support secure authentication for mobile networks that may require the usage of different authentication algorithms over time, these 5G eSIMs must support this flexibility of usage of multiple authentication and authorization credentials. With this capability built into these eSIMs from the start, mobile operators can remotely swap the authentication algorithm either for a dedicated primary authentication, or in a definitive way, thanks to key rotation management, thus maintaining a trusted environment.
The success of smart homes began with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically. Smart home systems In 2017, there were about 122 million smart home devices shipped globally, according to IHS Markit. The retail channel represented about 62 percent of all device shipments in 2017 and will represent about 70 percent in 2021. Despite the increased demand for professional installation, the “do-it-for-me” approach, most the volume remains with ad-hoc purchases. This includes a consumer video camera or a smart thermostat purchase from a retailer. Data capture form to appear here! When a consumer wants to add devices to an existing professionally installed system, they often will buy products from retail. Flexible service offerings and pricing are already taking shape across smart home offerings. DIY installed smart home systems such as Scout Alarm already offer no contract monitoring. Professional monitoring companies are already offering no contract pricing, and providers such as Comcast are looking to pilot programs for just video monitoring, bundled with Internet for a low monthly fee. Home automation system Connected smart locks can actually act as an extension of a smart hub or controller Options for financing are also going to become commonplace. Smart home equipment is expensive, even when attempting to outfit a modest size home (2,500 square feet). Immediate access to services is becoming more critical. This means consumers should be able to access on-demand service options directly from a mobile device to activate or deactivate professional monitoring. Lastly, pricing still needs to come down for many smart home devices, but there is a threshold. For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to communicate wirelessly with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. Residential security According to a 2018 Residential Security Market Report prepared by Parks Associates, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. For example, with their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchases. There are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” Full-time monitoring DIY products have broken down barriers for additional purchase and installation of professionally installed systems What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Instead of paying for monthly monitoring, homeowners can install a web cam, access from a smartphone or tablet and essentially do their own security monitoring. The downside of this approach is readily apparent. Without full-time monitoring, homeowners can easily miss the break-in or the aged parent who falls and can’t get up. Near-field communication Until they log on and take a look, there’s no central station to send medical aid or call the police. Connecting door locks and other devices to the Internet can also open a door to hackers, if the infrastructure isn’t properly protected. The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household Traditional security features For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market that want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Missed part one of our smart home mini series? Read it here.
Many exhibitors at GSX 2019 saw the show as a success, despite slower booth traffic on the second and third days. According to show sponsor ASIS International, there were more than 20,000 registrants from 125 countries around the world, including those who attended the conference as well as the exhibition. Exhibitors definitely put their best feet forward, enthusiastically promoting their technology breakthroughs, but how convincing were they? The comments from at least one attendee – a large corporate end user who represents a key demographic for show organizers – bluntly suggest that healthy skepticism was on display side-by-side with the promotional energy in play.On this floor, there are some lies being given out. Ask the tough questions, make the exhibitors show you" “On this floor, there are some lies being given out,” said Rudy A. Wolter, CTO, Security and Investigative Services for Citigroup, a financial services corporation. He advised fellow attendees to “listen for them, ferret them out, ask the tough questions. Make [the exhibitors] show you.” “Don’t be afraid to ask these men and women questions,” added Wolter. “Don’t be afraid to challenge them. If you don’t challenge them, they’re not getting any better which means we aren’t getting any better. At the end of the day, they’re the leaders; they’re the ones making change; they’re the ones touching systems; they’re the ones helping integration.” Banking security with Verint At Citigroup, Wolter oversees 1,300 bank branches in North America that use Verint systems, including 23,000 cameras tied into a single command center. Skepticism aside, Wolter also provided evidence that even tough customers can be brought around. Specifically, he is sold on Verint: “When you have a problem, this company listens,” he told attendees at a Verint gathering on the show floor. New at GSX 2019 is the Verint Video Investigator, which is software that empowers investigators to quickly find the data they need to identify security threats in near real-time. In all, Verint serves in excess of 2,300 individual financial institutions, with tens of thousands of branches. Wolter was one of several end users willing to sing their praises publicly. Other GSX exhibitors were also proud to have their own real-world success stories. Placing the emphasis on outcomes At GSX, I heard more than once that outcomes are more important than technologies. Customers don’t want to hear about technologies, but rather about what those technologies can do for them. Avigilon, now a subsidiary of Motorola Solutions, is another company that is focused on outcomes rather than technology per se. “Instead of focusing on megapixels and terabytes, the end user is focused on perimeter security, loss prevention and risk management,” says John Kedzierski, Sr. VP of Video Solutions at Motorola Solutions. “We are working to provide that outcome." The end user is focused on perimeter security, loss prevention and risk management" How operators work to ensure outcomes is another aspect that is changing, says Kedzierski. “Watching video is obsolete,” he says. Using Avigilon’s new system, the operator instead is looking at color-coded hexagons; one color means motion, another means an analytic event. Operators click on various hexagons to view video. Also at GSX 2019, Avigilon featured its new H5A camera line, with expanded object classification analytics, detailed object detection, and tracking in crowded scenes; and focused on the Avigilon Blue cloud system. They are working to make every camera capable of detecting faces, which can be matched to a watch list. How technology addresses marketplace changes Addressing the changing marketplace was another GSX theme. As the workplace changes, ASSA ABLOY Americas is adapting its technology to address new employment practices such as "hot-desking," and remote and mobile workers, says Peter Boriskin, Chief Technology Officer. Systems have to be able both to protect assets and also to provide flexibility to accommodate the changing workforce, he said. Corporate acquisitions are directly expanding the capabilities that ASSA ABLOY brings to the market. For example, they recently acquired Luxer One, a locker company that enables secure delivery of packages without customers needing to stand in line or wait for service. Deliveries can be made in seconds. Peter Boriskin of ASSA ABLOY Americas led a booth tour, including new power capabilities gained in the acquisition of LifeSafety Power Another recent ASSA ABLOY acquisition is LifeSafety Power, which is expanding the company’s capability to provide proactive data on wired systems by tracking power usage. For example, a spike in current might mean a problem with a component. Compiling “intelligent triggers” enables creation of a dashboard to provide analytics of wired systems. ASSA ABLOY has also been devising predictive analytics of wireless locks to predict battery life, for instance, and to address other maintenance challenges. “We want to know what’s going on at a door without visiting it,” says Boriskin. New exhibitors make their mark New exhibitors were part of the GSX mix. One new exhibitor was Vaion. It’s their first trade show after launching at IFSEC in London in June. Vaion combines a small camera portfolio with on-premise servers and software managed through the cloud for an end-to-end solution. Tormod Ree, co-founder and CEO, calls it a “hybrid cloud delivery model”. Vaion is also a “more proactive security model,” said Ree. Video is analyzed for anomalies, and the server “learns” what is normal and not normal. The system provides alerts and notifications, occupancy counting and traffic control, among other features. And “overlays” are employed to present information on a map. Vaion can highlight video that is more likely to be relevant and prioritize feeds that have more activity. Vaion designs the hardware, which is manufactured in Taiwan. Vaion was a first-time exhibitor at GSX 2019 with their end-to-end video system; Tomod Ree is co-founder and CEO Gunshot detection technology EAGL Technology displayed their “Firefly” gunshot detection technology at GSX 2019. Based on technology originally developed for use in the military for sniper detection, the U.S. Department of Energy adapted it to civilian uses after the Sandy Hook School shooting. Boaz Raz, CEO, said the technology is the “most advanced and affordable, wireless for use indoors or outdoors, and it can control doors and cameras”. It doesn’t “listen” for gunshots like some competitors; rather it measures energy for “6 sigma” accuracy (almost 100%). Defining, and redefining, end-to-end solutions End-to-end solutions were all the rage at GSX 2019, but Allied Universal was one exhibitor that pondered what, exactly, is an end-to-end solution? It means different things to different people. For example, a video company’s end-to-end solution would not include access control. When Allied Universal claims to offer an end-to-end solution, they mean it in the broadest definition of the term, including all security systems deployed for a customer as well as the important human element (i.e., manguarding). “The industry’s emphasis on ‘end-to-end’ doesn’t encompass a full solution,” says Mike Mullison, Allied Universal’s Chief Information Officer. “When somebody uses the term end-to-end, you have to ask: What’s at both ends?” The lines between cyber and physical threats are blurring. Clients want full-service solutions" “The lines between cyber and physical threats are blurring,” adds Mullison. “Clients want full-service solutions.” Allied Universal is adding new technology elements to its offering, and Mullison says “the next phase of growth will be fueled by technology.” Allied Universal recently introduced the Heliaus product, a smart phone app that accesses an analytics engine to predict outcomes and prescribe optimum responses. It literally puts technology in a security guard’s hand. One customer has found that use of the technology resulted in a 20% reduction in safety and security incidents. The latest in access control among exhibitors In addition to video, access control had a big profile at GSX 2019, as evidenced by ASSA ABLOY America and many other companies. Another example is SALTO Systems, featuring its new NEO cylinder for wireless access control and the SALTO Virtual Network (SVN); the SVN-Flex extends and increases the number of updating points directly to the door. The SVN-Flex extends and increases the number of updating points directly to the door The compact SALTO NEO Cylinder is designed for doors where fitting an electronic escutcheon is not possible or required and can be installed on standard doors, server racks, gates, cabinets, electric switches, or sliding doors. Low energy consumption results in 110,000 cycles with just one set of batteries. Other SALTO products are SALTO KS (Keys as a Service); SALTO BLUEnet Wireless for Bluetooth RF-driven real-time control of doors; the XS4 One Deadlatch stand-alone electronic lock; and JustIN Mobile, which replaces the need for an access card by securely sending a mobile key Over the Air (OTA) to an iOS or Android device from SALTO’s ProAccess SPACE management software. The next step in integration A new company reflecting the GSX emphasis on integration is Security and Safety Things (SAST), which is still in launch mode but expects to have its first pilot customers in the Q4. The first camera vendors embracing the SAST platform will have cameras for sale at ISC West in the spring. SAST is creating an Internet of Things (IoT) platform for the next generation of security cameras. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphones.SAST is creating an IoT platform for the next generation of security cameras “SAST is a technology platform, but it is also a business platform and a relationship platform,” said Emmanuel Ventadour, VP Sales and Marketing. For app developers, SAST also provides non-technical commercial services (i.e., easing their route to market.) Hartmut Schaper, CEO, emphasizes the “openness” of the company. Even though they are a spinoff of Bosch, they are treating every camera manufacturer equally, he says. For integrators, the use of apps can expand their field of play. Apps will empower integrators to use video for more business processes – not just security – and expand their reach with customers, says Schaper. From skepticism to sales There were plenty of product claims at GSX to feed the skepticism of even the toughest of potential customers. Fortunately, product claims were only the beginning of conversations with attendees at this year’s show. No doubt manufacturers were put through their paces more than once, and a few of them even came out on the other side with potential new business to show for their efforts. That’s the true measure of success at GSX 2019, or any trade show. Click here to read our reviews from Day One and Day Two of the show.
ExcelRedstone is implementing an ambitious integration project, using Maxxess eFusion technology, at the first high-rise residential and hospitality development in the City of London for many years. Currently under construction, the £300m 43-story One Bishopsgate Plaza development will see security and building management technology operating seamlessly together in a setting that includes both new-build and listed conservation area structures. As well as having 160 new private apartments, when completed the development will include a 237-bed five star Pan Pacific Hotel, a public plaza and a Pacific Ballroom, promoted as the Square Mile’s first dedicated banqueting venue. ExcelRedstone selected eFusion for the project because of the flexibility it allows, enabling rapid integration, off-the-shelf, with a wide choice of security, safety and business-critical technologies. Umbrella management system “The customer wanted a seamless, single interface that allows front of house guest services to be linked to back of house functions and give the highest operator efficiency and enhanced customer experience,” says Matt Salter, Director, ExcelRedstone. eFusion provides an umbrella management system for an expanding choice of preferred technologies With its modular, building block approach, eFusion provides an umbrella management system for an expanding choice of preferred technologies for commercial, hospitality and mixed-use settings, including guest check-in, reservation & visitor management, access control, surveillance, and building systems. In use, eFusion drives efficiency and eliminates gaps in security by removing the need for operators to continually switch between systems. Video management system Two of the most important technologies being integrated by eFusion at One Bishopsgate Plaza are the full-featured, Oracle Hospitality Opera property management & guest service system, and a 266 door ASSA ABLOY wireless electronic locking solution. ExcelRedstone is also using eFusion to integrate Zenitel IP intercoms, a KONE elevator system, and the building management (BMS) system using the BACnet protocol, which will enable estate managers to optimize energy efficiency based on usage and occupancy. The eFusion integration also allows a more flexible approach with the surveillance system - for example, making it easy to use a choice of Axis cameras, with specialist mounts, in the listed conservation areas of the site, integrating them with over 350 Mobotix fixed lens and panoramic cameras through the highly-secure Wavestore video management system (VMS). Networking and AV systems ExcelRedstone is also responsible for networking and AV systems at the development The surveillance and other security systems will be monitored live from two separate control rooms, one for the hotel and one for the wider estate. As well as integrating these and fitting out the control rooms, ExcelRedstone is also responsible for networking and AV systems at the development. “Our engineers are pre-staging the entire system off-site,” explains Salter. “This is allowing us to test everything in advance and to reduce packaging waste and environmental impact on site. It also lets us work more efficiently, in step with the ongoing construction schedule, floor by floor.” Providing secure solutions One Bishopsgate is the latest of a growing number of mixed-use developments - including hotels, retail, office and residential complexes - to use eFusion to streamline security, safety and facilities management. “We are seeing a growing trend towards automation and centralized management, and the solutions being deployed at these locations are increasingly sophisticated – but that doesn’t mean they have to be complex,” says Lee Copland, Managing Director EMEA, Maxxess. “Quite the opposite in fact. By keeping things simple and integrating off-the-shelf with the widest choice of technologies, Maxxess is providing secure solutions that are easier to install and to use than traditional alternatives.”
Revader Security has supplied a fleet of rapid redeployable CCTV cameras to Merthyr Valleys Homes, a housing association which owns and manages over 4,200 homes across Merthyr Tydfil, South Wales. The Transit range of mobile cameras are ruggedized outdoor surveillance solutions which have been proven over many years to deter crime and secure the vital video evidence necessary for prosecution. The CCTV team at Merthyr Valley Homes are able to regularly reposition each camera around the locality to respond to the movement of crime hotspots, antisocial behavior, burglary and vandalism. As the units can be installed in virtually any location within minutes, only minimal planning and notice is required. Tackling issues of crime and antisocial behavior Each unit delivers live and recorded footage to the Merthyr Valley Homes control center Each unit delivers live and recorded footage to the Merthyr Valley Homes control center over a combination of wired, wireless and mobile networks and are powered by a variety of sources, including mains and battery. The mobile CCTV products were provided through Caerphilly-based Seren Fire & Security Solutions, an established supplier and installer operating across the region. Merthyr Valley Homes has gradually expanded its stock of Transit redeployable cameras following consistently positive results in tackling long-running issues of crime and antisocial behavior within local neighborhoods. Great build quality and performance Huw Powell, Anti-Social Behavior Officer at Merthyr Valley Homes said: “We have been delighted by our new mobile CCTV capability. The redeployable cameras from Revader Security really are great in terms of build quality and performance – and they have proven to be an invaluable investment.” Revader Security continue to work in partnership with Seren Fire & Security Solutions to support Merthyr Valley Homes and a variety of other clients in the public and private sector.
Around 7,000 people pass through the Luminy faculty’s suburban campus every day. As part of a major project to modernise two buildings, university managers sought a retrofit-ready access control solution to upgrade security. Aperio locks University administrators selected Aperio locks to secure doors in the new buildings. With Aperio, facilities, the staff can deal with lost keys more efficiently. The laborious process of changing locks and reissuing keys — part of the daily workload with mechanical locking — vanishes. Luminy campus is equipped with 372 Aperio Electronic Cylinders & 42 Aperio Electronic Handles with built-in RFID readers The Luminy campus is now equipped with 372 Aperio electronic cylinders & 42 Aperio electronic handles with built-in RFID readers. Locks are integrated seamlessly, wirelessly and online with Luminy’s ARD access control system. One key goal was to deter theft, which was becoming a problem in teaching areas — especially those with computers. “Since we installed Aperio, we have not had a break-in,” says Cédric Lopez, Maintenance Manager at Luminy. Campus security and incident management In addition to theft deterrence, Aperio met broad, stringent criteria for the security upgrade. Staff and students carry individual access smart-cards. Doors and credentials are easily programmed and reprogrammed to accommodate everyone’s changing access needs. Luminy’s security team has complete control over access permissions and campus traffic — in real time. Because their new Aperio devices are integrated online, the staff can see a ‘live’ overview of the campus and respond proactively to incidents. Aperio is trusted to protect the most sensitive areas of the campus. “We have critical premises, including for the storage of chemicals, some with radioactive properties,” adds Lopez. Seamless integration with university’s scheduling system Aperio locks are built on an open platform for easy integration with the university’s scheduling system Aperio locks are built on an open platform, so they are flexible enough to integrate with the university’s room scheduling system. “Teachers are able to reserve their rooms. Students no longer have to wait for the teacher’s arrival, because they have access to the right rooms in defined time slots,” says Cédric Lopez. The credential students already carry automatically opens classroom doors, if they have pre-authorized access rights. For the facilities team, the ARD interface displays scheduling for all relevant rooms in real time. Aperio wireless technology Luminy site managers have already scheduled further real-time access control upgrades built around award-winning Aperio wireless technology. As Luminy staff discovered, the benefits of Aperio extend beyond just enhanced campus safety and student security. The Aperio for Universities Solution Guide explains how you can upgrade and streamline security at your campus. Learn more about Aperio® at https://campaigns.assaabloyopeningsolutions.eu/aperio-university
Around 7,000 people pass through the Luminy faculty’s suburban campus every day. As part of a major project to modernize two buildings, university managers sought a retrofit-ready access control solution to upgrade security. University administrators selected Aperio locks to secure doors in the new buildings. With Aperio, facilities staff deal with lost keys more efficiently. The laborious process of changing locks and reissuing keys, part of the daily workload with mechanical locking, vanishes. The Luminy campus is now equipped with 372 Aperio Electronic Cylinders and 42 Aperio Electronic Handles with built-in RFID readers. Locks are integrated seamlessly, wirelessly and online with Luminy’s ARD access control system. One key goal was to deter theft, which was becoming a problem in teaching areas, especially those with computers. “Since we installed Aperio, we have not had a break-in,” says Cedric Lopez, Maintenance Manager at Luminy. Access smart-cards In addition to theft deterrence, Aperio met broad, stringent criteria for the security upgrade. Staff and students carry individual access smart-cards. Doors and credentials are easily programmed and reprogrammed to accommodate everyone’s changing access needs. Luminy’s security team has complete control over access permissions and campus traffic, in real time. Because their new Aperio devices are integrated online, staff see a “live” overview of the campus and respond proactively to incidents. Aperio is trusted to protect the most sensitive areas of the campus. “We have critical premises, including for the storage of chemicals, some with radioactive properties,” adds Lopez. The benefits of Aperio extend beyond just enhanced campus safety and student security Real-time access control upgrades Aperio locks are built on an open platform, so they are flexible enough to integrate with the university’s room scheduling system. “Teachers are able to reserve their rooms. Students no longer have to wait for the teacher’s arrival, because they have access to the right rooms in defined time slots,” says Cedric Lopez. The credential students already carry automatically opens classroom doors, if they have pre-authorized access rights. For the facilities team, the ARD interface displays scheduling for all relevant rooms in real time. Luminy site managers have already scheduled further real-time access control upgrades built around award-winning Aperio wireless technology. As Luminy staff discovered, the benefits of Aperio extend beyond just enhanced campus safety and student security. The Aperio for Universities Solution Guide explains how you can upgrade and streamline security at your campus.
The campus site near Aix-en-Provence is diverse, with offices, event spaces, kitchens and two accommodation blocks totaling 170 units. The Camp must remain open around the clock, all week, while maintaining security for staff and visitors. Aperio provided locking devices tailored to every door type — interior and exterior. So far, The Camp has integrated 221 Aperio Wireless Escutcheons, 42 Aperio Wireless Cylinders and 10 Aperio Wireless Handles within a TIL Technologies security system. Integrated online with the central system and controlled from the same interface, these Aperio devices effortlessly handle daily staff traffic of around 250 people. Meeting rooms, server rooms, living spaces and kitchens are secured with Aperio wireless locks. Up to 2,000 external visitors arrive on-site when The Camp stages an event — and each must also have credentials issued and access filtered through the site. Aperio makes it straightforward to enable visitor access. Real-time and future-proofed “Many credentials get lost and Aperio enables us to handle this efficiently,” says Benjamin Ciotto, Head of Information Technology at The Camp. Online mode is very important because [access] rights are very often updated for the constantly shifting campus population" A few clicks are all it takes to cancel a lost key-card and issue a replacement. Security staff at The Camp ensures only authorized users to enter offices where expensive video projectors and screens are stored. Their TIL integration enables real-time management of the whole site, with specific profiles created to segment individuals who need fine-grained access to specific areas. “Online mode is very important because [access] rights are very often updated for the constantly shifting campus population,” explains Benjamin Ciotto. “We can also program access to defined time slots, which is essential when we welcome 200 people for an all-day meeting, for example.” Environmental Product Declarations Aperio technology also met The Camp’s need for an aesthetically pleasing, wireless solution. They did not want to compromise their interior or exterior design. The Aperio product ecosystem’s sustainability performance also fits The Camp’s ethos. Because Aperio devices are wireless and battery powered, they are much more energy efficient than traditional wired locking systems, which require an “always-on” mains connection. Multiple Aperio devices have independently assessed Environmental Product Declarations (EPDs). These detail the footprint of each device through its full life-cycle, from production to disposal. “Aperio is a real comfort of use,” Benjamin Ciotto concludes. “And we handle the easy maintenance for ourselves.”
It used to be that when senior Chicagoans could no longer age in place at home, or when they were ready to live in a more social environment, they had to look for options in the suburbs. Today, the majority of Chicago’s high-end senior living communities are in or near Lincoln Park, a picturesque neighborhood, just one mile from downtown Chicago, with manicured gardens and an expansive lakefront green space with sweeping city views. This quaint neighborhood is also home to one of the country’s oldest free zoos and a host of amazing restaurants. Belmont Village Senior Living Belmont Village offers assisted living and memory care, so that as the residents’ needs change, the care can too In 2017, Harrison Street Real Estate Capital bought a building on the former Children’s Memorial Hospital campus (the Nellie Black Building). Harrison Street and Belmont Village Senior Living partnered to tear down the seven-story structure and replace it with a similar brick building, also standing seven stories. Houston, TX based Belmont Village Senior Living is a developer, owner, and operator of 29 properties in seven states. As seniors make the decision to move out of their home and into a community, full continuum of care is an important factor to consider. Belmont Village offers assisted living and memory care, so that as the residents’ needs change, the care can too. 24/7 on-site staff and security The mid-rise building was built to closely resemble the Nellie Black Building with a similar architectural style. Residents don’t want for much in this community, as they have everything they need at their fingertips. The long list of amenities includes elegantly designed common areas for gatherings, a technology center to help stay connected, a professionally managed fitness center with on-site therapy services, a licensed nurse and well-trained staff on-site 24/7, award-winning memory enrichment programs, a full social activity calendar, and a full-service salon. The dining is served restaurant-style with chef-prepared meals and a concierge is on staff to schedule complimentary transportation for personal excursions or appointments. Amenities like these used to be considered over-the-top, but today’s seniors are coming to expect this kind of daily living. The building has no similarities to a retirement home, but rather looks like a luxury condominium. The residents are city-savvy and happy to be near downtown Chicago. Schlage NDE wireless locks The Schlage NDE wireless locks are activated by a fob that each resident is given W.E. O’Neil Construction provided general contracting services for this project. They partnered with American Direct to provide 300 pre-hung doors, 210 bifold doors in residential units, 4 exterior stile and rail doors, 325 hollow metal doors, 90 hollow metal frames, and 215 knock down frames. Locks included Schlage NDE80 wireless intelligent locks for resident entry and common area openings and wall-mounted Mercury readers for the entire exterior area, elevator, and stairwell locks. The Schlage NDE wireless locks are activated by a fob that each resident is given. That fob is unique to the resident’s apartment entry. These locks report back to the main system every 12 hours. If credentials in the system are edited in any way, when the lock checks in with the system every 12 hours, the lock is automatically updated with the most current information. The lock can also report important information, such as who may have requested access, what access was granted, and what access was denied. A benefit to these wireless locks is the minimal installation cost. Basically it is just a matter of mounting the lock with four AA batteries. The battery lifespan is about 1 year. Intelligent electronic locks Belmont Village had already purchased some intelligent locks for the back of house and the general contractor was going to use an electrical contractor for those locks. American Direct Division 8 salesperson, Eric Van Scoy reached out to AccessNsite Security Sales Representative, Heather Rolli for counsel on how to best integrate the pre-purchased locks for back of house and the additional locks American Direct was providing for the resident entries. The AccessNsite Allegion driver is integrated to the WiFi solution that allows communication" Heather Rolli said, “I took off my sales hat, so to speak, and put on my coaching hat to guide the general contractor and owner. I explained that Schlage NDE locks can communicate in a few different ways, one of which is through the lock’s WiFi antenna that goes across the building’s WiFi network. The AccessNsite Allegion driver is integrated to the WiFi solution that allows communication with back of house locks, the resident entry locks, and the Mercury panel common area readers. The original electrical contractor’s solution could not do that integration. If they had continued with their original plan, they would have had to utilise a gateway for every 10 locks for a Bluetooth connection”. AccessNsite integrated access control She stated that continuing on that path would have been very expensive. By using AccessNsite for all of the locks, it eliminated two different layers of physical equipment. With AccessNsite, all the locks communicate via the building’s WiFi network and then information is exchanged as the locks check into the system. “This is part of the service we provide — engineering and consulting to provide the best solution/ service we can,” says Rolli. Rolli was able to consult and guide the general contractor and owner. She further said, “American Direct and AccessNsite were asked to provide not only the Schlage NDE locks for resident entries and back of house, but also wall mounted Mercury readers and intercoms as well. The scope of the project became much larger once the general contractor learned how powerful AccessNsite software actually is. We were able to provide each aspect of the access control without the owner having to use multiple manufacturers. We provided an elegant solution that enabled huge cost savings to the owner on product and labor. I always look for the end user to have a simplified way to manage the facility”. Integrated with AIPHONE security video intercom system Integrated parking for Belmont Village is underground because of lack of space in Lincoln Park. The loading dock is actually across the street with tunnel access. AccessNsite integrated access control with the facility’s AIPHONE (security video intercom system) allowing employees to push a button to unlock the door via a video component. It is critical to know who is gaining access to entry points and AccessNsite will allow them to track that" The Concierge Desk, the Main Desk, and the Head Chef all have AIPHONE access that allows remote opening of garage and overhead doors. When there is a delivery at the loading dock, for example, the person making the delivery pushes the access control button and the Chef, located in the building at the other end of the tunnel access, can see who is at the dock and can grant access if desired. Advanced access control technology W.E. O’Neil’s Project Manager, Brad Garlick stated, “We made great strides with access control on this project that will benefit Belmont Village in the long run. This was their first time to utilise this kind of access control technology and it will provide them with information they have never had before. In today’s world, it is critical to know who is gaining access to entry points and AccessNsite will allow them to track that and so much more.” Belmont Village is a perfect example of how American Direct and AccessNsite not only sell product alongside one another, but also effectively collaborate with each other, the general contractor, and the project owner in order to provide them with the single, most effective, cost efficient openings solution. Belmont Village opened in 2019 and has made great strides in building an impressive reputation for the classy age in place retirement community near downtown Chicago.
Round table discussion
Driven by technology developments such as voice recognition, smart devices and the Internet of Things, our homes are getting “smarter” all the time. Increasingly, we expect our residential environments to be responsive to our voice commands, whether we are adjusting a thermostat, turning on a light, or lowering the window shade. Smarter home integration yields new opportunities and challenges for home security, too, which contributes an element of safety and protection to the convenience aspects of smart homes. We asked this week’s Expert Panel Roundtable: How are new smart home systems impacting security?
A basic tenet of sales is ABC – always be closing. But it's a principle that most professional salespeople would say oversimplifies the process. Especially in a sophisticated, high-tech market such as physical security, the required sales skills are much more involved and nuanced. We asked this week's Expert Panel Roundtable: What unique characteristics are required of salespeople in the arena of physical security systems?
Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload