Corporate Security
Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, announces its systems and services are deployed and maintained to the highest available level of cybersecurity protections and protocols. As major news stories continue to proliferate about hacks, breaches and vulnerabilities — including the high-profile cyberattacks this past week that crippled CDK Global, which provides management software for t...
{##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##} In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or...
ELATEC Inc., a world pioneer in the development and manufacture of innovative RFID and mobile credential readers, announced that Chris Randall has joined ELATEC as senior business development outreach manager based in Scottsdale, Ariz. Chris brings a wealth of experience and a proven track record in strategic planning, brand management, and lead generation within the security and technology sectors. In his new role, Randall will spearhead the company's go-to-market strategy, focusing on develop...
dormakaba has earned prominent recognition for its sustainability management and is listed as one of the 500 'World’s Most Sustainable Companies 2024' by TIME magazine. The ranking has been developed for the first time by TIME in partnership with Statista with the aim to recognise corporate responsibility and advance sustainable practices. "We have worked diligently to establish a pioneering sustainability program in our industry, and we are delighted to have been recognised by TIME magaz...
Cyberbit, a pioneer in hyper-realistic cybersecurity skill development and readiness, announced its win for Best Enterprise Security Solution at SC Awards Europe. This recognition underscores Cyberbit's commitment to addressing the global shortage of cybersecurity talent. Its innovative platform empowers organisations to significantly enhance the performance of their cyber defense teams. This translates directly to improved organisational preparedness and a stronger ability to effectively respo...
Secure email and file transfer provider Zivver has announced a new strategic partnership with data privacy consulting firm Lex Dinamica, specialising in data protection and AI end-to-end solutions and advisory. Email security is one of the biggest challenges facing organisations now. The UK Government Cyber Security Breaches Survey found that 50% of businesses report having experienced a breach, with phishing emails identified as the most common mode of attac...
News
SAGE Integration Holdings LLC welcomes Katie Krug to their team of security professionals as their Senior Account Executive. Katie Krug has joined SAGE Integration as a Senior Account Executive, bringing over 18 years of extensive experience in sales, marketing, and business development across various industries. Prior roles of Katie Katie led the charge of improving brand visibility and grasp via clever trade plans During her tenure as the AIoT Director at EPIC iO, Katie led the charge of enhancing brand visibility and awareness through innovative marketing strategies, successfully expanding the company's reach into new verticals. Her role involved generating sales prospects using value-based selling and the MEDDIC methodology and developing strategic marketing initiatives for enterprise clients. Addition to the SAGE Integration team Previously, Katie worked at Scylla AI, BodyViz, and Verizon Wireless, where she worked in sales, marketing, and business development, continuously demonstrating her expertise in driving revenue and customer satisfaction. Her diverse background and proven track record of success make her a valuable addition to the SAGE Integration team. "We are confident that Katie's expertise and leadership will contribute significantly to Sage Integration's continued growth and success," John Nemerofsky, Chief Operating Officer.
IDEMIA Secure Transactions (IST) revolutionises the world of digital payments by demonstrating the first ever offline central bank digital currency (CBDC) payments incorporating enhanced security against quantum threats. This major innovation promises to transform financial transactions and pave the way for an era of post-quantum security with IST positioning itself as the leader in this transformation. With quantum computers soon to enter all areas of business and finance, it is vital that companies prepare for all the new threats that will accompany these revolutionary technologies. Most experts estimate that a powerful quantum computer capable of breaking widely used cryptographic defenses could be developed within the next 10 years. IDEMIA Secure Transactions (IST) IDEMIA Secure Transactions (IST) has already demonstrated its ability to adapt to the new threats IDEMIA Secure Transactions (IST) has already demonstrated its ability to adapt to the new threats posed by quantum computers through its crypto agility solution and now takes the lead in the CBDC market with the world’s most secure approach. IST has been committed to this goal for many years, and today demonstrates its feasibility for central banks and financial institutions, offering their citizens ultra-secure, quantum-computer-resistant methods for their offline CBDC payments. The advent of quantum computers must be taken into account as central banks design today their CBDC solutions to ensure long-term security. Offline CBDC payment transactions Offline CBDC allows digital currency transactions without internet, ensuring cash-like secure and seamless payments in areas with limited connectivity. This offline CBDC payment transaction uses quantum-resistant public key cryptography endorsed by the National Institute of Standards and Technology (NIST), a world first leveraging IST’s pioneering leadership in advanced cryptography. The offline transactions demonstrated as part of this quantum-safe solution are performed using two smartphones thanks to NFC. Money is stored inside a secure element fortified with quantum-safe cryptography to guarantee security and prevent the risks of double spending or unauthorised money creation. CBDC transactions are secure For end-users, this means reassurance that their CBDC transactions are secure and seamless independently of the advent of powerful quantum computers. In other words, IST gives citizens access to the most secure methods of payment without having to worry about possible risks. IST calls on central banks and financial institutions to join forces to co-innovate and prepare for future threats Transition to post-quantum cryptography The transition to post-quantum cryptography will require strong and long-term partnerships The transition to post-quantum cryptography will require strong and long-term partnerships between technology providers, central banks and financial institutions to ensure continued trust in the financial system. This pioneering technology offers them the opportunity to work with IDEMIA Secure Transactions to develop their tailor-made CBDC solutions, adapted to the challenges of the post-quantum era. Reliable quantum-safe offline CBDC Jerome Ajdenbaum, Vice President (VP) - Digital Currencies at IDEMIA Secure Transactions, said, "This world first confirms IDEMIA Secure Transactions’ role as a pioneer and frontrunner in today and tomorrow’s payment technologies." He adds, "The quantum threat is real, but the good news is we demonstrated today it is possible to create a reliable quantum-safe offline CBDC. Starting now, we will integrate it from the design phase with our partner central banks."
D-Fend Solutions, the pioneer in radio frequency (RF), cyber-based, non-kinetic, non-jamming, counter-drone takeover technology, announced the expansion of its U.S. team. In response to the rapid growth in demand for the organisation’s solutions, these additions to the company will support the continued advancement of its U.S. presence and operations from its Mclean, Virginia office. The company has appointed Gordon Kesting as Vice President, U.S. Sales and Business Development, and Glenn McArthur as Business Development Manager. With their expertise and experience, D-Fend Solutions is poised to continue developing and leading in multiple C-UAS market sectors through its U.S. operations, sales, partnerships, and implementations. Part of D-Fend Solutions "Gordon and Glenn have tremendous and highly relevant experience and industry presence, and we’re fortunate to have them as part of the D-Fend Solutions team," said Zohar Halachmi, Chairman & CEO of D-Fend Solutions. "The extensive leadership and proven on-the-ground experience of our new hires will be invaluable as we continue to grow and expand our presence in the U.S. market and focus on providing our partners with the most trustworthy technology for their counter-drone challenges," said Danny Rajan, U.S. General Manager, D-Fend Solutions. Prior roles of Kesting Kesting has previously held positions at pioneering defence companies including prime contractors Gordon Kesting joins the team as Vice President, U.S. Sales and Business Development, and he is responsible for the region’s sales, capture management, customer engagement, and business development. Kesting has previously held positions at pioneering defence companies including prime contractors and mid-tier firms such as Hughes Aircraft Company/Raytheon, Northrop Grumman, BAE Systems, and DRS Technologies. In his most recent role at Elbit Systems of America, Gordon led the company's growth into the homeland security and international foreign military markets. Prior roles of McArthur Glenn McArthur joins the team as Business Development Manager, responsible for driving business growth and strategic partnerships in homeland security and other public safety sectors. Prior to joining D-Fend Solutions, Glenn had an extensive career with the U.S. Border Patrol, spanning twenty-five years. During this time, McArthur held multiple leadership positions, most recently focused on C-UAS intelligence and operations within the agency.
Across Europe, security services are on high alert to a potential increase in subversive attacks, following a spate of arson and sabotage strikes on infrastructure and businesses in the Baltics, Germany and the UK. Recent examples include a fire at a homeware store in Lithuania in May, which the Polish Prime Minister suggested may have been started by a foreign saboteur; investigators alleged an arson attack in London showed signs of overseas involvement; an inferno destroyed Poland’s biggest shopping mall and attempted sabotage on a military facility in Germany. G4S’s first-ever World Security Report The threat from subversives is on the increase with almost half (44%) of European Chief Security Officers (CSOs) expecting to be impacted by this group, up from a third in the previous year. 447 CSOs were surveyed in Europe for G4S’s first-ever World Security Report, which surveyed 1,775 CSOs in 30 countries globally. CSOs from Austria were the most concerned in Europe about being impacted (60%). 447 CSOs were surveyed in Europe for G4S’s first-ever World Security Report Noah Price, G4S Academy International Director, said: "The anticipated rise in subversive threats across Europe signifies a critical juncture for corporate security. These threats are becoming increasingly more prevalent, so businesses must adopt a proactive and comprehensive approach to safeguard their operations and assets. Businesses must invest in physical security measures such as AI-enabled surveillance systems, fire suppression systems, and multi-layered access controls. This should be done in conjunction with cybersecurity measures and fostering a work culture of vigilance and security awareness." What businesses need to do to reduce the threat Companies of all sizes can play a crucial role in preventing subversive threats against their organisation, and securing their country’s national infrastructure. Tips include: Enhancing Cybersecurity Infrastructure: Invest in advanced cybersecurity technologies and ensure systems are regularly updated to protect against the latest threats. Implement multi-factor authentication, encryption, and regular security audits. Physical Security Enhancements: In addition to cybersecurity, enhance physical security measures such as surveillance, access controls, and secure facilities to protect against sabotage and espionage. Employee Training and Awareness: Conduct regular training sessions to educate employees about the latest security threats, phishing schemes, and safe online practices. Awareness is the first line of defence against subversive activities. Incident Response Planning: Develop and maintain a robust incident response plan. This should include procedures for identifying, containing, and mitigating security breaches, as well as communication strategies for internal and external stakeholders. Regular Risk Assessments: Conduct regular risk assessments to identify potential vulnerabilities and implement appropriate mitigation strategies. This should cover both physical and digital assets. Supply Chain Security: Ensure that third-party vendors and suppliers adhere to stringent security standards. A compromised supplier can be a weak link that exposes the organisation to subversive threats. Collaborate with Security Experts: Engage with security experts and participate in information-sharing networks. Collaboration with industry peers and security experts can provide valuable insights and enhance threat detection and response capabilities. Concluding, Price said: “Proactively incorporating as many of the above physical and cyber security measures will deter saboteurs and threat actors before they strike. A preventative approach is the best approach and one that all organisations must look to foster.”
LuxTrust, a European specialist in trust services and digital identities, and Shanghai Genyan Network Technology, a pioneering provider of digital identity management, electronic signature and electronic seal solutions in China, announce their partnership and create a unique market offering. This new service - focused on data sovereignty - provides secure and compliant electronic signature solutions for businesses operating under the jurisdictions of the European Union and China. The result? Transcontinental contractual processes are facilitated, accelerated and secured. Addressing international compliance challenges LuxTrust, Shanghai Genyan Network Technology and Whale Cloud, the integrator of Qiyuesuo, joined forces to simplify electronic signature processes in complex legal environments. This partnership enables companies to easily navigate between EU and Chinese regulations, ensuring compliant signatures despite stringent legal processes. The current lack of solutions makes electronic signatures between a Chinese and a European The current lack of solutions makes electronic signatures between a Chinese and a European company overly complex, requiring costly travel and local regulations that are not always straightforward to understand and navigate. Unique in its regulatory coverage, this interface offers a seamless user experience, integrating electronic signature flows into existing business ecosystems. It also spares users the need to switch platforms, improving efficiency and reducing errors. Legal sovereignty and reliability Thanks to this collaboration, companies benefit from jurisdictional sovereignty. For each contract, companies sign within the appropriate jurisdiction: in China for Chinese contracts and in the EU for European contracts. Companies use their usual platform (COSI for the EU, Qiyuesuo for China) to sign, ensuring compliant and legal signatures regardless of location. This partnership is unique as it ensures mutual digital identities for each region This partnership is unique as it ensures reciprocal digital identities for each region - Chinese companies use a LuxTrust digital identity to sign in the EU via Qiyuesuo, while EU companies use a Qiyuesuo digital identity to sign in China via COSI. This approach ensures legal compliance, thereby enhancing the reliability and legality of international transactions. EU and Chinese legal requirements For Fabrice Aresu, CEO of LuxTrust: "This partnership, in collaboration with Shanghai Genyan Network Technology and Whale Cloud, is a real asset for European and Chinese companies. It combines the experience and expertise of pioneering players in their respective fields, addressing a wide range of use cases from the military sector to banking, for small and large enterprises alike." "We look forward to leveraging the professional expertise of both LuxTrust and Whale Cloud through our collaboration to provide electronic seals and contracts that comply with EU and Chinese legal requirements for business interactions between Chinese and European companies. Together, we aim to offer legally valid electronic signature products and solutions to global clients," said Tang Xingkun, CEO of Shanghai Genyan Network Technology. Financial benefits for increased efficiency In addition to operational and legal advantages, the alliance between LuxTrust and Shanghai Genyan Network Technology also offers significant financial benefits for businesses. By streamlining contractual processes, companies can reduce their administrative costs while maintaining a high level of efficiency and security. This profitability-focused approach allows companies to achieve substantial savings while improving their productivity and competitiveness in the international market. "As an expert in digital transformation, Whale Cloud is delighted to drive the integration of Qiyuesuo and LuxTrust in the electronic signature sector, leveraging our technological expertise and industry experience. This collaboration aims to drive global technological innovation and foster seamless integration, setting new standards for digital trust services worldwide," added Wu Pan, General Manager of Whale Cloud for the European region.
Cobb County-based security company, LOUD Security Systems Inc., just got LOUD-er with the recent acquisition of Vytis Security Systems, an Atlanta-based company with a focus on 100% commercial systems. The acquisition will help solidify LOUD Security as a leading commercial security provider. Like LOUD Security, Vytis provides security solutions to business challenges through video surveillance, access control, fire systems and monitored security. The company services all levels of security needs, from small to large and multi-location businesses. 30 years of leadership Sandes left Ackerman in 2021 after the Norcross-based company sold its assets to ADT Along with an array of commercial clients, LOUD will also appoint Vytis CEO, Mike Sandes to Vice President of Commercial Services. He has over 30 years of leadership in the security industry, including 18 as President of Commercial Sales at Ackerman Security. Mr. Sandes left Ackerman in 2021 after the Norcross-based company sold its assets to ADT. In October of the following year, Sandes established Vytis Security, a company with a focus on providing exceptional custom technology solutions to businesses throughout metro Atlanta. Outstanding customer service “Bringing our clients to LOUD was an easy choice,” said Mike Sandes. “The company and its President share a similar vision for offering real business security solutions that align with today’s changing technologies and outstanding customer service. I couldn’t be more proud and excited to be a part of the team at LOUD.” “We are thrilled to have Mike join the team at LOUD Security,” said John Loud, President of LOUD Security. “He is an industry veteran who is well known for having a keen sense for tackling the unique and changing landscape of today’s commercial security challenges." Addition of new clients Loud added: "If ever there was a right time for understanding, growing and providing for the commercial side of electronic security and video solutions, its right now. And with Mike Sandes at the commercial helm, we are poised to continue to be the pioneering commercial security provider in our market.” With the addition of these new clients, LOUD Security Systems, Inc. is certainly one of Atlanta’s fastest-growing security providers, serving over 11,000 customers.
Expert commentary
Changing customer needs can make specifying an alarm system that will continue to deliver in the long term a challenge. However, the latest modular alarm solutions provide the opportunity to build a more individualised system from the outset, as well as offering the ability to up-scale in the future without causing disruption. Martin Wilson, North EMEA Regional Director at Resideo, looks at how alarm specialists can use this style of solution to both benefit customers and build their own business opportunities. Holistic sense of home security In a survey of 1,000 homeowners undertaken by Resideo, the results revealed that, although deterring burglary was still a top priority, consumers were moving to a more holistic sense of home security, wanting to bring convenience, and property and life safety, into the mix. An alarm system no longer needs to function on one level, alerting only to a break-in taking place Indeed, an alarm system no longer needs to function on one level, alerting only to a break-in taking place. The latest modular alarm systems offer the flexibility to create a scalable security and life safety platform for homes and small businesses, as well as giving installers the ability to suggest future update options that can be added as and when budget or requirement allows. Valuable up-scales Finding an alarm that can be scaled over time has the obvious business benefit of ensuring it is easy to revisit and add to as customers naturally expand their existing security. With many modular designs connected via WiFi, this not only means installers can opt for the right mix of sensor options from the get-go but also that any additions can be connected to the panel and system with ease. Many control hubs have winning features in their own right. The ProSeries security panel by Resideo, for instance, has an intuitive touchscreen, easy-to-read, full-colour display to reduce false alarms, plus a built-in camera, speaker and microphone, intuitive icons and even five-day weather alerts. The ProSeries security panel by Resideo has an intuitive touchscreen Natural up-scale opportunities For instance, for those in a property prone to flooding, a flood sensor may be a worthwhile addition For the installer, it has a plug-in power connection, trouble-shooting videos and end-user replaceable batteries to reduce unnecessary callouts. However, to build a scalable system, this needs to be coupled with the right, flexible solutions to tackle customer concerns. Taking the time to find out what is important to the end user is vital here and can lead to natural up-scale opportunities. For instance, for those in a property prone to flooding, a flood sensor may be a worthwhile addition. Similarly, a panic button and even medical transmitters may be of benefit to others. All this, as well as other options, such as glass break detectors, door and window sensors and indoor and outdoor MotionViewers™, are available within the ProSeries range, and can be updated or added to an installation as needed or as a property grows with minimum disruption. Adding life safety The ability to propose an alarm system that can bring together alerts for different threats – for both the home and life – under one platform, also has real appeal. Indeed, in a survey of 1,000 homeowners undertaken on behalf of Resideo, a system’s ability to alert to the dangers presented by fire and CO was mentioned as an important part of the decision-making process by 41% of participants. For many, this increased awareness may stem from the many regulation updates regarding smoke and carbon monoxide (CO) alarms that took place in 2022. In Scotland, for instance, carbon monoxide detectors were required to be fitted in any room with a carbon-fuelled appliance in all homes, rented or owned. Social housing properties In England, smoke and carbon monoxide alarms were required in all social housing properties In England, from the 1st of October 2002, smoke and carbon monoxide alarms were required in all social housing properties, with carbon monoxide alarms now mandatory in the private rented sector. Wales followed suit in December for rented accommodation. The new guidance for England and Wales requires at least one smoke alarm to be installed on each storey of a property, to help alert to domestic fires more quickly, ensuring a quicker evacuation and reduced risk of fatality. For professionals, systems such as ProSeries, can be connected to a series of smoke and carbon monoxide detectors, in a ‘one-go-all-go’ setup that means the alarm will go off if one of these threats are identified. Smart and connected benefits The total Connect 2.0 app gives ProSeries end-users the ability to view and control the security platform remotely. The Resideo Pro app currently gives installers the ability to view the system and connect to the central monitoring system. The platform also supports home automation as it works with Zwave devices. The platform also supports home automation as it works with Z-wave devices. The platform also supports home automation as it works with Z-wave devices There are also extra benefits for alarm professionals too. The AlarmNet 360™platform on which ProSeries is configured gives greater insight to improve business operations, increase efficiency and deliver insights on accounts to identify additional upsell opportunities and ongoing services. Providing the ability to remotely diagnose brings valuable time-saving options and avoids unnecessary callouts. It also means the ProSeries panel and peripherals programming can be accessed anytime, anywhere, using the cloud, allowing ease of programming, troubleshooting and account management on the go. Needs and future possibilities Changing a complete alarm system to apply new functions is never going to feature highly with the end user, nor does it work where longevity and sustainability is concerned. Having the ability to build a modular system and add to this as needed, whether this is at a property or a small business, provides benefits for both customers and professionals when it comes to meeting immediate needs and future possibilities. Add connectivity and remote access to this and you have a platform that can help streamline business operations, putting professionals more in touch with customers, and helping to spot future opportunities.
In the early stages of childhood education, kindergarten imparts foundational principles that shape future behaviour. Today, you can think about cloud computing in a similar manner: it has become a fundamental element in the architecture of modern technology. The cloud now plays a critical role in digital interaction, security, and infrastructure development. Far from being just another tool, the cloud is a cornerstone, providing essential support for the intricate network that supports today's digital ecosystem. Vomplex digital systems Much as kindergarten lessons lay the groundwork for cognitive development, the cloud offers base capabilities that are vital for constructing and operating complex digital systems. Recent advancements in cloud-based security — particularly in access control and video surveillance — emphasise the importance of cloud computing. It has been instrumental in unifying fragmented security systems, similar to how basic social principles taught in kindergarten help diverse children come together as a unit. The role of cloud computing in our technological world is multifaceted and continuously growing The role of cloud computing in our technological world is multifaceted and continuously growing. It has evolved into a space where innovation is cultivated and security commitments are maintained with vigilance. The fusion of artificial intelligence and analytics into cloud services signifies a concerted effort toward a future that is more cohesive, intelligent, and secure. Significant technological progress As we delve deeper into this topic, it will become evident that cloud computing, like the pivotal lessons of kindergarten, is indispensable. It quietly enables significant technological progress, mirroring the foundational principles taught in our formative years in both its essential nature and its growing influence. Play Fair: Technological Developments in Cloud-Based Security The past year has been a period of significant innovation in cloud-based access control and video surveillance. Cloud computing has evolved into a robust platform that fosters the creation of integrated security systems. These systems consolidate access control and video surveillance into a unified experience, demonstrating the cloud's potential to seamlessly combine disparate systems. Substantial industry progression The advent of edge computing has boosted bandwidth efficiency and accelerated data processing The incorporation of artificial intelligence and analytics into cloud services marks a substantial industry progression. This development provides businesses with advanced tools for in-depth analysis and intelligent decision-making, enabling them to not only gather comprehensive insights but also strengthen their security measures. The cloud has eased the transition to new technologies and emphasised a commitment to cybersecurity, with encryption protecting data integrity in transit and at rest. Simultaneously, the advent of edge computing has boosted bandwidth efficiency and accelerated data processing, highlighting a consistent drive to refine and adapt. The trend of integrating cloud security systems with other business platforms help create unified ecosystems, reflecting a broader narrative of security professionals’ pursuit of progress and enhancement. Potential future disruptions Wash Your Hands: Pandemic-Induced Transformation in Cloud Services As we all know, the COVID-19 pandemic necessitated a swift transition to remote operations, with cloud computing forming the backbone. i The urgent need for cloud solutions was apparent as businesses adopted remote collaboration tools, work-from-home policies, and virtual workspaces. This transition increased the demand for cloud services and prompted more adaptable and cost-effective pricing models. Recognising the critical role of cloud services, organisations enhanced their investment to safeguard operations against potential future disruptions. The pandemic fundamentally altered the perception and valuation of cloud computing, emphasising its critical role in sustaining business operations. Scaleable digital infrastructures The growing demand for SaaS has led integrators to create scaleable digital infrastructures Share Everything: Systems Integrators and the Adoption of Cloud Systems integrators have done much to realise the cloud’s potential. The growing demand for Software as a Service (SaaS) has led integrators to create scaleable digital infrastructures tailored to specific business needs.. The use of the cloud for data backup has improved efficiency and increased organisations’ ability to cope with disruptions. Although there has been a gradual shift among integrators toward cloud solutions, effectively marketing and supporting SaaS business models remains a challenge. But the possibility of continuous revenue streams through managed services is promoting broader adoption of cloud technologies. Cloud-based security solutions Live, Learn, Think: Enterprise-Level Cloud Adoption There is an increasing trend among large enterprises to adopt cloud-based security solutions. The shift toward VSaaS indicates a move towards subscription models that offer financial and scalability advantages. This transition is more than a mere operational change. Rather, it represents a commitment to the expansive potential for growth and innovation that the cloud offers. But let’s face it: the ‘cloud’ journey is accompanied by challenges, particularly concerning data security. Providers must deliver robust data protection measures to ensure the success of cloud-based security services, which depends not just on technological progress but also on fostering trust with clients. Addressing cybersecurity concerns The hybrid model offers a balanced solution for businesses looking to merge these two environments Baby Steps: Hybrid Cloud and On-Premises Infrastructure The hybrid model, which combines cloud with on-premises infrastructure, continues to be a strategic choice for many organisations. While the cloud provides flexibility and ease of access, on-premises solutions offer control over data security and comply with regulatory demands. The hybrid model offers a balanced solution for businesses looking to merge these two environments. Be Trustworthy: Cybersecurity Measures and Communication Transparent communication is key in addressing cybersecurity concerns with customers and partners. Companies that are transparent about their security protocols, including encryption and regular updates, build trust. Certifications such as SOC 2 Type II affirm a dedication to security, and proactive educational resources ensure that users are well-informed about best practices. Decision-making processes Cloud computing has become the cornerstone of modern security strategies Look: The Future Outlook for Cloud-Based Security Solutions Looking forward 5-10 years, cloud-based security solutions are expected to become even more central to organisational decision-making processes. The cloud is poised to become the hub for predictive decision-making, using AI algorithms and extensive data to proactively manage security risks. This vision of an intelligent, integrated approach to security, with the cloud enabling swift, collaborative responses to threats, is almost at hand. Cloud computing has become the cornerstone of modern security strategies, moving beyond its initial role as a digital transformation tool. As we look to the future, the cloud is set to redefine security paradigms and anchor a new era of intelligent, predictive security operations.
The importance of data is ever-growing. For every profession, we’re witnessing the increasing reliance on data and its ability to promote efficiency for corporate decision-makers. The security industry is no different. The growing reliance on data and technological tools has allowed for a new breed of professionals with specialised skill sets. This evolution reflects the changing nature of security challenges in the digital age. The new security environment We know one thing from nearly every post-event analysis of a major security incident. Perpetrators frequently leave significant clues regarding their intentions. But identifying these risks is harder than ever. Security teams must manage greater threat data volumes through a wider range of channels. Security teams must manage greater threat data volumes through a wider range of channels Take the manufacturing sector, for example. Before the influx of data and technology, security teams may have been on the lookout for thieves conducting pre-operational surveillance in person at a plant. In the digital age, bad actors use social media to cooperate. In some well-organised theft rings, authorities have indicated that alleged buyers of stolen goods use apps to communicate with prospective thieves to streamline their process. Social engineering attacks In July 2020, hackers infiltrated Twitter's internal systems in a brazen cyberattack. Perpetrators tricked Twitter employees into revealing their login credentials via a social engineering technique called "phone spear-phishing." They compromised over 130 high-profile accounts, including former U.S. President Barack Obama, tech mogul Elon Musk, and Microsoft co-founder Bill Gates. Once inside, they utilised the company's internal tools to gain control of the targeted accounts and posted a series of tweets promoting a Bitcoin scam. The hackers promised to double any Bitcoin sent to a specified address and ultimately stole over $120,000 from unsuspecting users. This incident highlighted the vulnerability of even the most secure platforms to social engineering attacks and underscored the importance of implementing robust cybersecurity measures. Vast digital territories Leaders overseeing security and risk functions must establish a diverse team The rise of hybrid threats and the need to safeguard physical assets and vast digital territories has only expanded the concept of the company's perimeter. Fortunately, this same digital environment that fosters an expanded threat landscape can also enable security professionals with additional tools for identifying and eliminating risks. Leaders overseeing security and risk functions must establish a diverse team with a range of backgrounds and expertise to effectively utilise security tools and uncover hidden threats. As publisher and entrepreneur Malcolm Forbes eloquently stated, "Diversity is the art of thinking independently together." Public sector employees Traditional threats continue to pose a significant challenge, emphasising the ongoing value of experienced corporate security professionals, such as veterans and public sector employees. However, the emergence of contemporary asymmetric risks necessitates teams with a broader skill set. The emergence of contemporary asymmetric risks necessitates teams with a broader skill set The future of security demands a diverse collective of individuals drawing expertise from traditional backgrounds, such as three-letter government agencies, and non-traditional perspectives, such as data analysts. This fusion of diverse experiences and thought processes is crucial for devising holistic solutions to real-world risks. Traditional and contemporary threats In organisations I have been involved in, simply understanding our gaps and covering them with needed expertise was efficient in helping meld discussions about security with the language of business, which was a two-way street. Bringing on a program manager who understood the scrum framework made it far easier to align security's conversation and for security to understand the needs of its internal stakeholders. The security landscape demands individuals who excel in data visualisation, metrics analysis, and the ability to communicate security concepts in the language of business effectively. This blend of technical prowess and business acumen is essential for navigating the complexities of the modern security landscape. By embracing diversity in their security teams, organisations can harness the collective power of independent thinkers working together to address traditional and contemporary threats. This approach will empower organisations to build resilient security teams to safeguard their valuable assets in an ever-evolving threat landscape. Opening the door to new security talent For years, technology and data have grown to play a significant role in how security operates and evolves For years, technology and data have grown to play a significant role in how security operates and evolves. However, there remains a gap between how to effectively incorporate modern technology into legacy security programs. (There’s been some interesting research on this topic, including research out of the University of South California that identifies a lack of knowledge as a big barrier to using data and metrics by security teams.) As we transition into 2024 and the following years, developing analytical capabilities will remain essential for implementing and executing a comprehensive security strategy. Incorporating the expertise of digital natives, individuals who have grown up amidst recent technological advancements, or those with specialised knowledge in data visualisation and metrics analysis will ensure that this technology is utilised effectively, empowering teams to harness its full potential. Proactive risk mitigation Data analysts, for example, with their proficiency in handling large datasets, can play a pivotal role in identifying and mitigating potential security threats by analysing network traffic patterns, user behavior, and other pertinent data points, enabling proactive risk mitigation through predictive measures. These professionals play a critical role in translating complex security data into actionable insights These professionals play a critical role in translating complex security data into actionable insights, measuring the effectiveness of security measures, and aligning security strategies with overarching business goals. Bringing them on board may even create a flywheel effect. When recruiting for new team members, branching out and searching for candidates with non-traditional career backgrounds will open the door for more applicants with diverse and technological skills that fit modern security needs. Creating a holistic security program Fusing modern skills with traditional security expertise forms a holistic approach to security. It is a strategy capable of countering threats and demonstrating the tangible value of security investments to stakeholders in our interconnected world. In the same way that many security programs have shifted toward a centralised view of threats and vulnerabilities, teams composed of leaders from diverse backgrounds with modern skills combined with legacy security leaders will allow for a more comprehensive approach to security. This new security group will break free from the constraints of traditional methodologies and expand its capabilities to encompass a broader spectrum of risks. By combining insights from both seasoned security veterans and innovative digital natives, this team will deliver tangible value to a wider range of departments across the organisation. When security can proactively provide solutions and effectively address risks that arise in all corners of the organisation, it becomes the cornerstone of overall organisational safety. Modern security approaches This collaborative environment will empower the organisation to stay ahead of the curve Fostering a seamless interchange between traditional and modern security approaches will lay the foundation for a robust security program, where knowledge sharing among team members elevates the effectiveness of the entire program. This collaborative environment will empower the organisation to stay ahead of the curve and address the ever-evolving challenges of corporate security in a rapidly changing world. As we witness the future of security teams unfold, we will see a growing number of leaders emerge from the digital realm, bringing with them a deep understanding of risk management, emerging technologies, and data analytics. This infusion of fresh perspectives, coupled with the expertise of legacy leaders, will equip security teams to navigate the complex and ever-evolving landscape of corporate security. In his book "Risk: A User's Guide," Stanley McChrystal observed, ‘Generals who flawlessly fought the last war typically lose the one they're actually in—because conditions have changed and they haven't.’ This is true for leaders within the risk space, too. The security leaders of tomorrow must embrace change, adapt to new realities, and harness the power of diverse perspectives to safeguard their organisations in an ever-shifting environment.
Security beat
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
Active shooter situations grab the most attention, but there is a long list of other threats facing schools, including bullying, vandalism and emergency medical situations. Broadly speaking, a comprehensive approach to school security should prioritise prevention, preparedness and response to all threats. Holistic security approach “Fostering a culture of safety within a school, which involves strong relationships, trust, and communication, is highly effective and does not require significant costs,” says Christin Kinman, End User Sales Consultant with Allegion, a security manufacturer. “It is crucial to educate stakeholders about the unintended consequences of quick fixes, like barricade devices, to ensure informed decision-making and a holistic security approach. The goal should be to promote safety and security for all, every day, in every situation.” Integrated and successful security plans While this might solve a particular challenge, it can also create unintentional conflicts" "Creating an integrated security plan requires a multi-faceted approach," says Kinman. "Too often, security measures are implemented as a reaction to either an event or a specific vulnerability. While this might solve a particular challenge, it can also create unintentional conflicts," adds Kinman. “Creating a successful security plan involves a comprehensive approach,” she says. “An effective, systematic approach begins with assessing, identifying, and valuing assets, identifying threats and vulnerabilities, quantifying the impact of a loss, analysis and prioritisation, and finally, development of mitigation measures.” Safety and security An effective resource is the Partner Alliance for Safer Schools (PASS), which provides a framework to help with school assessments, including identifying and valuing assets, identifying external threats and internal vulnerabilities, assessing the impact of loss, and analysing and prioritising mitigation measures. Safety and security are words used seemingly interchangeably when it comes to schools, but they mean different things. “How we define these terms influences planning and addressing challenges,” says Kinman. “It is easiest to think of these terms as being either external or internal to the individual.” Coordinated security Safety is internal to the individual and relates to the individual’s perception of being free from harm Security is external to the individual and encompasses the protective physical, emotional, and environmental measures implemented in conjunction with policies, procedures, and training, as well as mental health measures and social and emotional learning. Safety is internal to the individual and relates to the individual’s perception of being free from harm or danger. Coordinated security measures create an environment of safety. Four main elements of physical security Kinman lists four main elements to physical security, often referred to as the 4D’s. These elements are deter, detect, delay, and deny: Deter refers to measures implemented to prevent an attack or threat from happening. These are usually visual deterrents that communicate legitimate use. Detect refers to measures that can detect the presence of a threat, such as video surveillance and monitoring. Delay refers to measures that slow down an attack or increase the level of effort needed for an incident to occur. Finally, deny refers to measures that prevent or restrict access to valued assets. Four layers of ground perimeter A layered approach to school security creates “layers” that must be defeated for an event to occur, says Kinman. Typically, the four layers are the ground perimeter, the private grounds around the building, the building perimeter, and the building interior. The ground perimeter layer demarcates public vs private space, and deterrence is the primary objective. The grounds layer allows for identification of legitimate vs illegitimate users and detection is the primary objective. The building perimeter layer prevents illicit users’ intent on harm from gaining access. The primary objectives at this layer are delay/deny. The building interior protects the most valuable assets, and the denial of an unauthorised individual is the primary objective. Report on Indicators of School Crime and Safety The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic “Quantifying loss and assessing risk is one of the most important steps in creating an integrated security plan,” says Kinman, who explains that the two elements that guide this step are probability and impact. Probability is the likelihood that an event will occur, typically rated on a scale of 1-5 ranging from rare to almost certain. The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic. “Probability multiplied by impact equals risk, which has a score ranging from 1-25,” says Kinman. “The higher the score, the higher the risk.” An analysis of vulnerabilities and threats using a matrix yields a systematic approach to prioritise improvements and identify mitigation measures. For statistics on crime and safety in schools, visit the Report on Indicators of School Crime and Safety: 2022. Security improvements “The costs of school security encompass various aspects, including physical measures, personnel, training and policy enforcement,” says Kinman. “While there is no fixed amount, it often involves investments in technology, such as access control and emergency response systems. Many security improvements do not require additional funding, like training staff and students on security protocols and implementing policies to create a culture of safety.” Generally, funding for public school security is a shared responsibility among federal, state and local governments; communities also contribute. “Striking a balance between shared responsibility and ensuring adequate resources is crucial for effective school security,” says Kinman. K-12 school security Community members and parents can donate by being vigilant and noting any suspect activities Various stakeholders play crucial roles in enhancing K-12 school security in addition to schools and communities. Stakeholders include community members, parents, local government, local law enforcement, first responders and non-profit organisations. “Engaging these stakeholders fosters a comprehensive approach to school security,” says Kinman. Community members and parents can contribute by being vigilant and reporting any suspicious activities. Local government can support schools with funding and resources, while local law enforcement and first responders can provide expertise, conduct drills, and establish emergency response protocols. Safe and secure learning environment In addition, non-profit organisations can offer valuable resources, training, and support programmes to address specific security concerns. “By involving all these stakeholders, schools can tap into a diverse range of expertise, resources and perspectives, pioneering to a more effective and comprehensive approach to school security,” says Kinman. “Collaboration and communication among these entities are vital to ensure a safe and secure learning environment for students and staff.”
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
A major European oil and gas company that acquires, explores, produces and supplies chemical and petroleum products had a cybersecurity challenge. Company leadership wanted a better way to quantify and respond to the industry’s increasing levels of cybersecurity risk. Pioneers were looking for a new way to better understand and improve their company’s OT cybersecurity. As part of this effort, pioneers wanted to compare the company’s current levels of protection against a series of hypothetical attacks to identify gaps. With operations in several locations and a supply chain network of over 1,000 gas stations, auditing and improving the company’s cybersecurity would be no small task. Set of analysis and recommendations The Honeywell csHAZOP solution is designed to deliver a comprehensive set of analysis To help overcome these challenges, the company called in Honeywell and, specifically, its csHAZOP services team to perform a detailed design evaluation based on OT cybersecurity risk. The Honeywell csHAZOP solution is designed to deliver a comprehensive set of analysis and recommendations–it goes beyond the standard cybersecurity vulnerability assessment or IEC 62443 compliance audit by adding deeper analysis that is designed to: Investigate a significant amount of what can go wrong, including approximately 500+ attack scenarios – evaluating these for multiple threat actors and different consequences, Address – via risk assessments – both the likely risk reduction through the regular IT type of countermeasures (AV, firewall, hardening, etc.) and the consequence severity reduction through the implementation of safeguards (e.g., hardwiring critical control signals), Estimate residual risk for each hazard, allowing identification and quantification, making mitigation actionable, Focus on process automation cybersecurity risk (csHAZOP stage 1) or production process cybersecurity risk (by adding csHAZOP stage 2 vs. cybersecurity production risk) to add a higher level of cybersecurity analysis from an OT perspective unique in the industry. Send in the csHAZOP experts Honeywell cyber experts also uncovered some high-risk design deficiencies The Honeywell OT cybersecurity experts worked with the Honeywell proprietary csHAZOP method to uncover several concrete recommendations for immediate remediation and technical design recommendations in the company’s ICS, to be considered in upcoming ICS migrations. Honeywell cyber experts also uncovered some high-risk design deficiencies. The Honeywell csHAZOP framework was used to identify levels of residual risk to determine which security hazard was more critical to address versus others. Honeywell provided targeted guidance on several aspects of the study, using experience from real-world cyber attacks in the industry. Honeywell’s csHAZOP service is one of the few cybersecurity assessments available on the market that is designed to apply counterfactual risk analysis. Honeywell’s csHAZOP report This evaluation now links OT cybersecurity to loss prevention and process safety Given a system’s protective measures, this method helps a company evaluate which cyber attacks (based on countermeasures, security protections and type of threat actor) may succeed. This evaluation directly links OT cybersecurity to loss prevention and process safety. Honeywell’s csHAZOP report for this oil and gas refinery was considered successful by the customer because of its well-defined procedure, the tools Honeywell has specifically designed for OT systems and the team’s experience and efforts in OT cybersecurity. Results of the csHAZOP assessment “The results of the csHAZOP assessment from Honeywell went beyond our expectations. We have received a detailed and analytical cybersecurity hazard and operability report concerning both identified risks and realistic recommendations for remediation." "Additionally, the report is a valuable tool for future upgrades of our systems as well as new projects and the development of an incident response plan. We intend to repeat this assessment periodically, as it is a valuable tool in our continuous efforts to improve security for our systems from the ever-evolving cybersecurity threats,” Major refinery in Europe.
Air Power East, a family-run business with over 30 years of experience as a premier distributor of Atlas Copco, specialises in providing high-quality compressed air systems to various industries across East Anglia. Under the leadership of Jason Sewell, the company has established a strong reputation for delivering reliable and efficient solutions. However, they faced a significant challenge in ensuring their systems were completely leak-free, a concern shared by their clients, including an agricultural manufacturer managed by Paul Musgrove. Jason highlighted the issue, stating, "Customers have been asking us to make sure that we can prove something that's completely leak-free." Challenge Musgrove was seeking an effective way to manage and maintain their compressed air systems Concurrently, Paul Musgrove was seeking an effective way to manage and maintain their compressed air systems, with a specific focus on reducing energy waste and operational costs, emphasising the need to "save money where we can, especially with energy prices as they are." This dual challenge called for an innovative approach to maintain Air Power East's commitment to quality and efficiency while addressing the specific needs of their clients. Solution To address the intertwined challenges, Jason reached out to Baseline-RTS, an independent supplier of training and predictive maintenance equipment. They introduced Air Power East to the FLIR Si124 camera, an advanced acoustic imaging tool, capable of accurately detecting air leaks. Jason explains, "We sat down and did a bit of market research on a few different models and then came to the top. So, we contacted FLIR to come along and show us the Si124, and we've loved it ever since." One-handed tool designed to quickly locate pressurised leaks in compressed air systems or detect discharge The Si124 is a lightweight, one-handed tool designed to quickly locate pressurised leaks in compressed air systems or detect partial discharge from high-voltage electrical systems. It is equipped with 124 microphones to produce a precise acoustic image that visually displays ultrasonic information. This image is transposed in real time on top of a digital camera picture, allowing users to accurately pinpoint the source of sound. The Si124 camera can detect issues up to 10 times faster than traditional methods, even in loud industrial environments. Additionally, it is compatible with FLIR Thermal Studio suite for offline editing, analysis, and advanced report creation, and it can help facilities save money on utility bills and delay the expense of installing new compressors. Results The use of the Si124 camera brought about transformative results. Jason explained the camera's effectiveness: "We've managed to walk around with the customer, showing them exactly what we're finding on our screen. And if we do find any small leaks, we can rectify them and then we can prove to the customer that their system is leak-free." This approach not only heightened the efficiency of the compressed air systems but also solidified customer trust in Air Power East's services. Camera enabled the detection of leaks amounting to approximately 100 cubic feet per minute Quantitative results underscore the Si124's impact. The camera enabled the detection of leaks amounting to approximately 100 cubic feet per minute (CFM), which is roughly 50 litres per second. This translates to about 18.5 kilowatts of compressor power, pioneering to substantial energy and cost savings, particularly in light of rising energy prices. Conclusion Air Power East's adoption of the FLIR Si124 camera to address the complex challenges in compressed air systems illustrates the power of innovative technology in industrial settings. The successful detection and rectification of air leaks not only enhanced operational efficiency but also led to considerable energy and cost savings for the agricultural manufacturer. This case study demonstrates the effectiveness of advanced tools in solving intricate industrial problems and highlights the importance of technology-driven solutions in optimising industrial processes.
A highly esteemed private Science and Technology University situated in the Charotar region of Gujarat originated from a parent organisation dedicated to social service through education for over 125 years. Recognising its excellence, the Gujarat Government has designated the university as a "Centre of Excellence." With approximately 1700 faculty members and 8000 students, the institution stands as a prominent hub for education in the region. Modern communication technology This university holds a distinguished reputation among science and technology enthusiasts Challenges - This university holds a distinguished reputation among science and technology enthusiasts. Its enrolment has increased thanks to successful educational approaches, rendering outdated communication technology within its buildings obsolete. Furthermore, there are plans for expansion in the upcoming academic year, incorporating modern communication technology to streamline communication across various buildings and offices. To further delve into the difficulties they face: Outdated and insufficient capacity: The system demonstrated obsolescence and inadequate capacity to handle communication loads within both single and multi-location institutions. Communication issues among multi-location offices: The university was in the process of expansion, establishing a new building situated at a distance that required seamless connectivity with the main building. Lack of modern features: The absence of contemporary features such as Multi-party Conferencing, Unified Services for Mobility, etc., provides them with a motive to modernise their antiquated communication system. Scalability and redundancy: They needed a solution that could easily adapt to future requirements, guaranteeing seamless scalability for upcoming applications. Furthermore, the incorporation of redundancy (backup) was essential to ensure uninterrupted operations. Streamlining communication processes Matrix Comsec meticulously examined the challenges faced by the university authorities Solution - Matrix Comsec, in partnership with Rutvi System, meticulously examined the challenges faced by the university authorities. Collaboratively, they formulated a tailored solution for multiple locations. The proposed strategy concentrated on improving and extending the existing infrastructure through the integration of Matrix Telecom Solutions. This included the implementation of a Hybrid IP PBX and the integration of a Media Gateway to streamline communication processes, preparing them for future requirements. The Matrix solution includes: The Hybrid PBX, known as ETERNITY LENX, with Gateway, was situated within the University complex at location 1. Alongside the digital key phone, analog phones were linked in location 1. Location 1 was linked to location 2 via an IP connection. The ETERNITY LENX, along with SARVAM Gateway ENT, facilitated a setup of PRI Gateway from location 1, assigning an IP connection to ETERNITY MENX at location 2. In location 2, a collection of digital key phones and several analogue phones were interconnected. The Matrix Multi-Location Communication solution seamlessly merged both sites, offering a range of contemporary communication features. This results in enhanced adaptability and flexibility within the organisation, delivering optimal benefits for modern communication needs. Enhancing employee productivity Results - The adopted solution enabled them to experience the benefits of up-to-date communication features while ensuring smooth communication throughout their expanded infrastructure. The Hybrid PBX Systems, namely ETERNITY MENX16SAC and ETERNITY LENX27SDC, offered a user scalability capability of up to 2000 IP Users, positioning them for future needs. Furthermore, the Hot Swappable Card feature guarantees uninterrupted operation and simplified maintenance. The incorporated Redundancy ensured a high level of availability and seamless communication. The SARVAM Gateway ENT Licence empowered them to utilise SARVAM both as a Unified Communication Server and Gateway concurrently, eliminating the need for additional investments. EON510 - Premium Digital Key phone comes with next-gen call amenities like Global Directory Integration, and Advanced Call Routeing. This helped the institution to make the best out of these modern features by enhancing employee productivity and efficiency. Matrix's Multi-Location solution allowed the University to effortlessly link various buildings, and the contemporary communication features made them more efficient and well-prepared for the future.
Drastically worsening thefts from professional gangs on UK construction sites have garnered national outrage and prompted many firms across the country to install temporary CCTV towers to deter ‘stealing to order’, say Kingdom Systems. The company, who protect hundreds of construction sites from theft each year, warns about the rise of ‘stealing to order’- where criminals are given a list of sought-after machinery and equipment to then steal and sell on. Equipment Theft Act Temporary CCTV towers can massively help to prevent ‘stealing to order’ crimes and protect businesses that are at risk of losing £800 million every year, according to insurer Allianz Cornhill. Businesses are also desperately waiting for the Government to address this surgeBusinesses are also desperately waiting for the Government to address this surge, says Kingdom Systems. Last year, the Government brought in the Equipment Theft (Prevention) Act to counteract the problem in the agricultural sector, but it failed to address the issue suffered by construction sites nationwide. Research by CIOB With research by the Chartered Institute of Building (CIOB) revealing that a staggering 92% of construction workers are affected by theft, with 21% saying they suffer from it every single week, it’s an epidemic that largely lies in the hands of individual project managers to prevent until wider governmental changes are made. Often, tradespeople and construction workers have no choice but to leave expensive equipment and machinery onsite overnight, making construction sites a goldmine for thieves looking for opportunities. Temporary CCTV towers CCTV footage from temporary CCTV towers can provide valuable evidence in the event of a theft “The serious risk of theft is a concern for all construction site managers and staff, especially when demand for stolen equipment is so high and the costs of replacing them remain equally astronomical. But installing permanent CCTV towers is expensive, time-consuming, and unlikely to be the best option for temporary construction sites,” says Paul Worsley, Director of Service from Kingdom Systems. “Installing temporary CCTV can be an efficient way to enhance security, deter criminals and safely document any breaches or suspicious activity.” CCTV footage from temporary CCTV towers can provide valuable evidence in the event of a theft, speeding up the time it takes to catch the perpetrators. With 34% of tradespeople saying that the thefts have impacted their mental health, temporary CCTV provides that much-needed peace of mind for the sector. Author's quote “For everyone involved in a project, a theft of a considerable amount of equipment or machinery can cause a lot of stress and worry." "The idea that professional gangs rather than opportunists are targeting sites without proper security means they need to have a more strategic and effective approach to deterring criminals, beyond just the usual lock and key,” says Paul Worsley.
Gallagher Security is proud to be securing the world’s largest commercial office building as India’s Surat Diamond Bourse (SDB) officially opens its doors this week. Described as a ‘one-stop’ destination for over 65,000 diamond professionals, the newly opened SDB is a 15-storey complex, spread across more than 35 acres, and comprising over 7.1 million square feet of floor space. SDB is the world’s largest single complex, consisting of nine towers and containing an independent customs office, international banking facilities, and diamond-testing laboratories, among other businesses. Surat Diamond Bourse features Gallagher Command Centre was the preferred solution for the SDB project, providing encrypted high-end security" Gautham N.V., Gallagher Head of Sales and Marketing India, says, “Gallagher Security’s award-winning site management platform Command Centre was chosen to secure the complex and provide a seamless, integrated security experience that prioritises security, safety, and convenience for staff and visitors. The Surat Diamond Bourse features more than 700 doors, 650 readers, and multiple system integrations specific to this unique project. Gallagher is proud to be securing the world’s largest office building and we congratulate everyone involved in bringing this project to life.” He adds, “Gallagher Command Centre was the preferred solution for the SDB project, providing encrypted high-end security and cyber protection, a streamlined approach to site management, and seamless third-party integration capabilities including our partner IDEMIA’s biometric readers, Verint C41 command application and single sign on and IT management solutions.” Variety of systems and hardware The official inauguration of SDB took place on December 17th and was officiated by India’s Prime Minister, Shri. Narendra Modi. Trusted to protect some of the world’s most critical infrastructure, the Command Centre is designed to integrate seamlessly with a wide variety of systems and hardware, creating a single operating platform that manages total site security.
SwiftConnect, a pioneering provider of connected access enablement, is powering easy, secure, and private access using an iPhone and Apple Watch with the Johnson Controls Software House C•CURE 9000 access control system. The SwiftConnect AccessCloud platform integration with the Software House C•CURE 9000 access control system makes it possible for Software House C•CURE 9000 customers to take advantage of the employee badge in Apple Wallet for physical access. Deployments of employee badges SwiftConnect has met several dozen thriving deployments of employee badges in the Apple Wallet Powered by SwiftConnect, an employee badge in Apple Wallet allows users to conveniently access buildings, turnstiles, amenity spaces, office suites, enterprise resources, and more with just their iPhone or an Apple Watch. To date, SwiftConnect has completed several dozen successful deployments of employee badges in Apple Wallet at landmark buildings in New York City, London, and beyond with customers who use the Software House C•CURE 9000 access control solution. Integration with Software House C•CURE “The SwiftConnect platform integration with Software House C•CURE is reshaping the way people interact with buildings and offices at dozens of our joint customer locations,” said Jason Ouellette, Head of Technology and Business Innovation for Security Products Access Control and Video Systems business at Johnson Controls. “We look forward to a continued successful partnership and helping organisations leverage the power of mobile for convenience, seamless, and secure access.” Integration development packages Validated through the Connected Partner Program from Tyco Security Products, a part of JCI, SwiftConnect has leveraged its tools and robust integration development packages to achieve the functionality and flexibility required for integrating with Software House C•CURE 9000. The integration broadens our ecosystem and extends our global reach to serve" “SwiftConnect and Johnson Controls share a common vision in helping enterprises and commercial real estate organisations transform buildings from traditional offices to more flexible workspaces by delivering on-demand, self-service access with the convenience of mobile credentials in digital wallets,” said Josh Jagdfeld, VP of Partnerships at SwiftConnect. “The integration broadens our ecosystem and extends our global reach to serve more customers looking to create better workplace experiences and automate their access management at scale.” SwiftConnect operational benefits SwiftConnect deploys employee badges in Apple Wallet by serving as the integration backbone between mobile app, credential technologies, access control systems and other business systems. The company’s intelligent centralised backend harmonises access control systems and other sources of truth to automate access management, aggregate access transaction data, and provide insights across platforms. Provides intelligence to administrators for more informed business decisions based on deeper insights from aggregated data. Enables admins to efficiently create and manage multi-location access permissions with any combination of buildings in a portfolio, eliminating manual input of credential data. Allows admins to add, edit and disable cardholder and credential records via Software House’s open API to harmonise lifecycle state with sources of truth, such as user directories. Leverages the automation of access management to edit clearance levels for cardholders based on changes in reasons for access. SwiftConnect’s capabilities are anchored in its open and interoperable approach that has set a new standard in the industry for connected access enablement.
Round table discussion
When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security systems use is minimal when compared to the total energy usage in a typical building. However, as awareness of environmental issues has surged, and as some of the "low-hanging fruit" has been harvested, attention has come back to opportunities for additional, if small, savings. The lifecycles of security products are also being more closely examined, including the environmental impact of using plastics and other chemicals. We asked this week's Expert Panel Roundtable: How can the security industry contribute to protecting the environment?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
In the United States, they are called licence plate recognition (LPR) systems. In Europe, the more common term is automated licence number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle colour, type, make and model. We asked this week’s Expert Panel Roundtable: What's new with licence plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?