COVID-19
DHL Express, a global pioneer in logistics and transportation, prioritises safety across its operations. Faced with increasing demands, including those tied to TAPA certification, the company sought reliable solutions to protect its infrastructure, employees, and customer parcels. In September, shortly after the inauguration of a new logistics site in Caen, France, the Hanwha Vision team met with Fabien Vimont, DHL Express Security Director. Needs of DHL Express According to Vimont...
Trade Show Executive (TSE) has named ISC West as The Greatest Trade Show of 2023 at the 2024 TSE Gold 100 Awards & Summit. This prestigious awards program recognises trade shows across various industries that were the largest and most ahead of the curve in innovative approaches in 2023. The event celebrated not only the winners but also the robust recovery of the trade show industry since the pandemic. Innovative programming “The ISC West team is honoured to be recognised as The Gre...
An attention-grabbing exhibit at GSX 2024 in Orlando involved a robot dog that could open a door. Boston Dynamics robot dog ASSA ABLOY impressed attendees with the robotics demonstration, featuring the Boston Dynamics robot dog that could open a door using either an HID credential or a mechanical grip. This innovation represents a shift toward more autonomous security solutions and is suitable for environments where human access may be limited. ASSA ABLOY impressed attendee...
Global security manufacturer, Gallagher Security has a proud history of delivering its solutions to the world with uninterrupted movement and the assurance they can ship 95% of purchase orders the next day, worldwide. On the eve of World Manufacturing Day on October 4, Gallagher, a frequent award-winner for its manufacturing prowess, acknowledges its vertically integrated manufacturing and engineering capabilities which are backed by more than 86 years of entrepreneurial spirit. Emerging chal...
Axon, the global public safety technology pioneer, launched a new generation of body cameras designed for frontline workers in retail stores and healthcare facilities. Axon Body Workforce adapts the same life-saving technology trusted by more than 2,000 law enforcement agencies around the world for enterprise organisations, helping them protect their most valuable resources — people. Axon Body Workforce Available for purchase in the U.S., Australia, Canada, EU, and U.K., Axon Body...
ASIS International, the world's largest association for security management professionals, opened its annual conference—Global Security Exchange (GSX) 2024 in Orlando. The event will continue through 25 September and feature more than 200 education sessions and approximately 500 exhibitors. This year GSX featured two days of pre-conference events on Saturday and Sunday, including Secure Horizons: An Immersive Experience for Senior Security Executives, ASIS Volunteers’ Day, the...
News
Thales, the cybersecurity pioneer that protects critical applications, APIs, and data, anywhere at scale, releases the “Economic Impact of API and Bot Attacks” report. The analysis of more than 161,000 unique cybersecurity incidents uncovers the rising global costs of vulnerable or insecure APIs and automated abuse by bots, two security threats that are increasingly interconnected and prevalent. The report estimates that API insecurity and bot attacks result in up to $186 billion of losses for businesses around the world. Automated API abuse The report is based on a study conducted by the Marsh McLennan Cyber Risk Intelligence Center which found that larger organisations were statistically more likely to have a higher percentage of security incidents that involved both insecure APIs and bot attacks. Enterprises with revenues of more than $1 billion were 2-3x more likely to experience automated API abuse by bots than small or mid-size businesses. The study suggests that large companies are particularly vulnerable to security risks associated with automated API abuse by bots because of complex and widespread API ecosystems that often contain exposed or insecure APIs. Digital services Data from the Imperva Threat Research team finds that the average enterprise managed 613 API endpoints Enterprises rely heavily on APIs to enable seamless communication between diverse applications and services. Data from the Imperva Threat Research team finds that the average enterprise managed 613 API endpoints in production in 2023. That number is growing rapidly as businesses face mounting pressure to deliver digital services with greater agility and efficiency. 30% of API attacks Due to this increased reliance and their direct access to sensitive data, APIs have become attractive targets for bot operators. In 2023, automated threats generated by bots accounted for 30% of all API attacks, according to data from Imperva Threat Research. Automated API abuse by bots costs organisations up to $17.9 billion in losses annually. As the number of APIs in production multiplies, cybercriminals will increasingly use automated bots to find and exploit API business logic, circumvent security measures, and exfiltrate sensitive data. Holistic approach “Businesses across the world must address the security risks posed by insecure APIs and bot attacks, or they face a substantial economic burden,” says Nanhi Singh, General Manager of Application Security at Imperva, a Thales company. “The interconnected nature of these threats necessitates that companies take a holistic approach, integrating comprehensive security strategies for both bot and API attacks.” Report trends Some of the key trends identified in the report include: Increased API adoption and usage are growing the attack surface: The rapid adoption of APIs, the inexperience of many API developers, and lack of collaboration between security and development teams have led insecure APIs to result in up to $87 billion of losses annually, a $12 billion increase from 2021. Bots negatively impact organisations’ bottom line: The widespread availability of attack tools and generative AI models has enhanced bot evasion techniques and enabled even low-skilled attackers to launch sophisticated bot attacks. Up to $116 billion of losses annually can be attributed to automated attacks by bots. API and bot-related security incidents are becoming more frequent: In 2022, API-related security incidents rose by 40%, and bot-related security incidents spiked by 88%. These increases were fueled by a rise in digital transactions, the expanding use of APIs, and geopolitical tensions like the Russia-Ukraine conflict. In the following year 2023, as digital traffic began to stabilise and the pandemic-driven surge in internet activity subsided, the frequency of these incidents moderated. API-related security incidents grew by 9%, while bot-related security incidents jumped by 28%. The overall upward trend in attacks highlights the growing persistence and frequency of these threats. Insecure APIs and bot attacks pose a significant threat to large enterprises: Companies with revenue of at least $100 billion are most likely to suffer security incidents related to insecure APIs or bot attacks. These threats constitute up to 26% of all security incidents experienced by such businesses. Countries around the globe are vulnerable to API and bot attacks: Brazil experienced the highest percentage of events related to insecure APIs or bot attacks, with the threats accounting for up to 32% of all observed security incidents. This was closely followed by France (up to 28%), Japan (up to 28%), and India (up to 26%). While the percentage of events attributed to API and bot-related security incidents was lower in the United States, 66% of all reported events related to vulnerable APIs or automated abuse by bots occurred within the country. Generative AI applications “Reliance on APIs will continue to grow exponentially, driving connections to generative AI applications and large language models,” adds Singh. “At the same time, generative AI will also empower cybercriminals to create sophisticated bots at an accelerated and alarming rate." "As API ecosystems expand and bots become more advanced, organisations should anticipate a significant rise in the economic impact of automated API abuse by bots unless proactive measures are taken.”
With cybercrime rising and new cybersecurity legislation tabled by the UK government, BM TRADA is encouraging businesses to achieve ISO 27001 certification sooner rather than later to safeguard information security and avoid non-compliance. Cybercrime has risen significantly in recent years, with 32% of businesses in the UK now attacked at least once a week, according to statistics gathered by The Independent. Phishing and ransomware attacks have had a particularly disruptive impact, with 61% of businesses in the UK reporting staff having received fraudulent emails or accessed fraudulent websites. Effects of a cyber breach The long-term effects of a cyber breach on businesses and the economy have led to the UK Government to recently announce the Cyber Security and Resilience Bill, aimed to strengthen the UK’s cyber defences. Amongst other intentions, the Bill is set to expand the remit of the existing regulation, put regulators on a stronger footing, and increase reporting requirements to build a better picture of cyber threats in government. BM TRADA launched a white paper on ISO 27001 Information Security Management Systems certification Following the announcements, BM TRADA, part of the Element Materials Technology group, has launched a white paper on ISO 27001 Information Security Management Systems certification. The paper from the pioneering management systems certification provider introduces the internationally recognised ISO 27001 standard, what the certification process entails, and the benefits of achieving the certification. Information security Lee Horlock, Head of Technical & Approvals – Management Systems at BM TRADA, said: “In today’s technologically evolving world, information is now one of the most valuable assets for any organisation. Protecting this information is critical, not just from an ethical point of view but also to comply with regulations such as GDPR and the UK Data Protection Act 2018." “We urge all businesses and those in control of information security to become ISO 27001 certified, if they are not already. Doing so offers a number of benefits, from being able to outwardly project trust and confidence in your information security, reducing the risk of financial and reputational loss, to being able to demonstrate compliance, which is now often also needed for business tenders.” BM TRADA’s white paper Within BM TRADA’s white paper, readers will find a case study on how the certification provider helped NHS Greater Manchester Integrated Care achieve ISO 27001 standard, not long prior to the outbreak of the COVID-19 pandemic. Pioneering the project was Phil Scott, IT Security Manager for NHS Greater Manchester Shared Services, who had the following to say: “We knew ISO 27001 certification would make us pioneers in our field, but we didn’t realise what a difference it would make as we faced a global pandemic. Our staff and customers could work from home quickly and easily, while other parts of the healthcare system were struggling months later. Feedback from customers was overwhelmingly positive, boosting team morale at an incredibly difficult time.”
Over the last several years, cyber security, a crucial component in any servicer's operation, has taken on an increasingly visible role due to numerous high-profile data breaches impacting various industries. According to the cyber security research firm Check Point Research, the average number of cyber attacks per organisation per week rose 38% in 2022 from 2021, and increased by 28% in the six-month period ending March 31, 2024. The average number of weekly events has also grown year over year. They look at the importance of cyber security for U.S. and Canadian servicers and discuss how they assess a servicer's program in the evaluation review process. High cost of corporate inaction Inaction against preventing cyber attacks can come with a high cost and remediation actions. For example, International Business Machines Corp. (IBM) noted in its Cost of a Data Breach Report 2024 that the average cost of a corporate data breach in 2024 was $4.88 million, a 10% increase from the prior year and the largest yearly increase since the start of the COVID-19 pandemic. Additionally, it was noted that 70% of organisations experiencing a breach indicated it was a significant or very significant disruption. Moreover, IBM said that 63% of organisations are planning to increase their security investments as compared to last year when the figure was 51%, focused mainly on employee training as the top investment area. Remediation actions Servicers have had to enforce corrective actions, including certain customer-facing activities As a result of cyber attacks and breaches, servicers have had to implement various corrective actions, including suspending certain customer-facing activities (website access, payment processing, etc.) and halting internal operations until an investigation determines the method of attack, the impact on systems, and how to stop the attack. Remediation actions, in addition to addressing the source of the breach, generally include notifying affected customers and offering credit monitoring services for a predetermined period of time. It is also not uncommon for litigation to be initiated on behalf of the affected parties, alleging inadequate cyber security procedures as the cause of the breach. Assessing a servicer's cyber security program While servicers have implemented various cyber security tools and programs, hackers continue to design increasingly sophisticated malware with the potential to penetrate companies' defence systems. Though not all companies have been impacted by cyber breaches, hackers are increasingly using AI and other tools to develop malware that can infiltrate even the most cutting-edge applications, so a servicer's cyber security program becomes even more important as hackers evolve. S&P Global Ratings' servicer evaluation group recognises that a sound cyber security program is a significant factor in the overall analysis of a servicer's operations. When conducting an operational assessment of a servicer, they ask the company to describe its overall cyber security program. The general topics they discuss include the following: Its information security program and management team (e.g., the CEO, chief information officer, and chief information security officer); Staff resources dedicated to monitoring company systems to triage and address potential cyber security threats; Frequency of phishing and/or smishing testing programs, overall click rates, and remediation actions; Timing of vulnerability scans and what internal and external tools are employed to assist in monitoring and identifying potential threats; The incorporation of AI into the servicer's preventive tools and systems used to combat attacks and secure systems; Frequency of external penetration tests and the vendor's rotation schedule, along with a discussion of the latest results; Frequency of internal penetration testing and the results of the last test; The servicer's data storage backup routines, including how data is backed up (i.e., the cloud, tapes, or both) and whether data is stored on air-gapped mediums; Recovery time and recovery point objectives for the servicer's data and business units; Frequency of a servicer's recovery exercises, including data backups to validate their restoration ability; Data encryption practices at rest and in transit; Plans to address potential ransomware attacks and the frequency of tabletop exercises; Employee training on cyber and information security, including social engineering; System and organisation controls (SOC) 2 certification or other evaluations or tools used to assess the company's cyber security posture; and The process to evaluate third-party vendors' cyber security posture. Staying ahead of the curve Sustained investments in cyber security will be crucial for any business entity, especially servicers, as they will continue to experience ever-evolving threats requiring additional expertise, capital, and technology to stay ahead of the curve. Despite servicers' significant expenditure on cyber security staff and systems to support their programs, these preventative measures are only effective if the program is successfully implemented and maintained. Notwithstanding, even the best preventative measures will be continuously challenged by the ever-increasing sophistication of attacks. Event-reporting regulations New privacy and event-reporting regulations and compliance needs from California and New York A key focus for servicers will be whether they can keep up with the malicious actors who try to penetrate their systems and obtain non-public information, thereby disrupting operations, affecting customers, and posing significant financial harm to the company. New privacy and event-reporting regulations and compliance requirements from the states of California and New York impacted various industries including servicers, among others. Although not directly affecting servicing, the Securities and Exchange Commission has also stated that cyber security is one of its 2024 priorities when conducting examinations of broker-dealers and investment advisors. New government regulations As servicers navigate ever-increasing cyber threats and the rollout of new government regulations, their dependence on the digitisation of information and processes should be balanced with comprehensive and preventative cyber security controls in order to effectively combat the risks that lie ahead. While this article focuses on the impacts of cyber security for the Servicer Evaluation ranking process, S&P Global Ratings has written additional articles that relate to cyber security across other industries and the potential credit impacts that they may have (see "Cyber Risk Insights: Navigating Digital Disruption Booklet Published," published July 9, 2024, and "Digital Booklet Published: Cyber Risk Insights," published Feb. 22, 2023). The analysts would like to thank Marilyn Cline for her contribution to this report.
To further develop effective and customised solutions for Seek Scan™, one of the most affordable thermal temperature screening solutions meeting FDA guidelines during the COVID-19 public health emergency, Seek Thermal announced it has made APIs available for access control, VMS and other integrated network capabilities. The Seek Scan thermal imaging system (MSRP 1,995) is specifically designed and calibrated to quickly automate body temperature screening using skin temperature as a proxy, while enabling social distancing protocols. In a few seconds, the system automatically detects a face for measurement and displays an alert if the readings are warmer than the customisable alarm temperature. The thermal scanning system follows FDA guidelines by meeting the accuracy specification, including a reference heat source (black body), and by being made for single-person screening at a fixed distance. New API capabilities New API abilities allow Seek Scan to be free anywhere on a network, enabling access control systems The new API capabilities allow Seek Scan to be accessible anywhere on a network, enabling access control systems, video management systems, integrators, and business owners to manage and access their Seek Scan systems and solutions. Now, integrators can implement Seek Scan temperature screening to send alarm events, trigger access control and video management systems as well as pull and present historical data to integrate multiple Seek Scan units into one enterprise solution. Specific integrated functionality could include: Accessing entry doors following scans Triggering access control and video management systems Allowing custom-designed solutions utilising Seek Scan hardware Sending pass/fail scan messages and alarm events Flagging video when a scan occurs New and expanded integration capabilities “The demand for temperature screening and integrated API solutions has been growing rapidly,” said Mike Muench, CEO and President of Seek Thermal. “As businesses, institutions and organisations seek to provide safer environments in an increasingly uncertain time, we recognise the needs of our customers don’t stop with the contactless screening technology itself - the new and expanded integration capabilities of Seek Scan offer additional control, convenience and confidence.” JSON-based APIs Whether the desire is to unlock a door with a temperature scan, capture an image or flag a video when a scan occurs, or send email alerts, Seek Thermal has made it easy for integrators to connect temperature screening to their network using its JSON-based APIs to do all that and more. With Seek Scan, the company has developed customer relationships with a diverse group of pioneering organisations, including manufacturers, government institutions, hospitals and medical facilities, office buildings, hotels and hospitality providers, schools and universities, first responders and professional sports organisations. Seek Thermal will continue to release features, capabilities and protocols to enhance its API offering.
Magenta Security Services has launched a programme to provide mental health and general well-being support to staff. As a long-standing champion of ethical behaviour, human rights, and social responsibility, Magenta takes mental health seriously. Free services Partnering with a care and metal heath consultancy, an employee assistance solutions provider, the security firm is offering an array of free services to staff members. These include one-to-one counseling sessions and practical advice sessions on a range of matters from debt and finance to relationships and general anxiety. Mental health issues With mental health issues originally exacerbated by the pandemic and by the current cost of living crisis With mental health issues originally exacerbated by the pandemic and by the current cost of living crisis, mental health provisions for staff are vital. But, as Abbey Petkar, Magenta’s Managing Director explains, mental health awareness and support are vital, particularly in the security sector, "I cannot express how strongly I feel that managers and directors within the security sector have responsibility for the lives of our dedicated workforce of professional guards and other team members." Cultural stigma and ethnic diversity Abbey Petkar adds, "The ethnic diversity of our workforce comes with its challenges when providing mental health support." He continues, "Speaking from experience amongst our team, BAME men — who make up a large proportion of our workforce — are both less likely to open up about their mental health issues due to cultural stigma, as well as being more likely to encounter barriers when trying to access support. This is why we’ve launched an internal support programme." Addressing mental health challenges Abbey Petkar stated, "For the BAME men of Magenta Security, and anyone else reluctant to seek help, we also encourage them to speak to their most direct colleagues, with whom they often feel more comfortable." He adds, "What we never want is for anyone to feel isolated, so we regularly reassure staff that we will always respond with kindness and understanding if they come forward about their mental health challenges." Staff wellbeing Magenta made clear its stance on fair pay after speaking out about the prevalence of modern-day slavery This isn’t the first time Magenta has demonstrated its commitment to staff wellbeing. In 2020, Magenta made clear its stance on fair pay after speaking out about the prevalence of modern-day slavery in the security sector. Abbey Petkar explained that “Magenta lost tenders against low-cost security providers that charge workers out at less than £10 an hour," which he believes is commercially unsustainable. Staff turnover As such, Magenta uses the London living wage as a baseline with additional rewards for long-term or exceptional employees and offers career-progressing training programmes. As a result of these policies, the business has seen a staff turnover of just 11% (the industry average being 30%). Work-life balance The company also strives to promote a healthy work-life balance. "The security industry is notorious for long shifts and low pay, compounding mental health issues by depriving security officers of the free time they need to recoup and connect with loved ones," explains Abbey Petkar. He continues, "We make sure we work closely with individual security officers to fit their shifts around their commitments. We also keep commuting times down by ensuring staff sites are close to home." Security Minds Matter Security Minds Matter is a campaign to improve the mental health and well-being of security professionals Magenta Security is involved in Security Minds Matter, a campaign to improve the mental health and well-being of security professionals, especially those on the frontline. The campaign is supported by the SIA and will engage with industry stakeholders and mental health professionals to deliver projects with tangible outcomes. Mental health awareness and support Abbey Petkar also uses his position on the Advisory Board of IFPO to advocate for greater support and awareness for mental health and well-being in the security industry. He says, "We owe it to the people who give their time and energy to look after others to look after them as well. If we don’t, the industry will never attract and retain the talent it needs."
iDenfy, a Lithuanian-based RegTech company best known for its identity verification tools, has announced a new partnership with SetFreaks, the world’s first pre-release service for DJs in the dance music industry. This collaboration will enhance regulated compliance and automate user identity verification on the SetFreaks platform while adding an extra layer of security to internal fraud prevention measures. SetFreaks, the world’s first pre-release service for DJs in the dance music industry, offers its growing audience of DJs the unique opportunity to play tracks exclusively in their sets for a minimum of eight weeks before the official release. Thus helping DJs stand out with fresh, unreleased music while maintaining integrity value for producers and labels, and creating a buzz of anticipation for the upcoming release. However, piracy is a significant concern in the music industry, with countless tracks leaking onto pirate sites. Biometric and face recognition algorithms Latest reports indicate that global film piracy increased by 33% during the COVID-19 lockdown The 18-24 age group has the highest number of people downloading music without paying, which hurts not only artists but also creators, publishers, and distributors, impacting the entire media industry. Every year, online video piracy leads to the loss of 230,000 to 560,000 jobs in the United States, resulting in an estimated annual revenue loss of $29.2 billion. Additionally, the latest reports indicate that global film piracy increased by 33% during the COVID-19 lockdown, and it can be expected to grow depending on cultural behaviour. Recognising these challenges, SetFreaks has taken a proactive stance in safeguarding its tracks by partnering with iDenfy and its identity verification solution, which is able to recognise, verify, and extract information from over 3,000 identity documents using advanced biometric and face recognition algorithms. Currently, iDenfy will work with SetFreaks to ensure support with secure login methods complemented by expert reviewers who oversee all automated processes, mitigating potential errors, fraud attempts, or failures. iDenfy’s identity verification solution SetFreaks creates an only affair for DJs, allowing them to stand out and elevate their performances SetFreaks’ mission is to restore the value of music for producers and labels while providing DJs with the opportunity to incorporate unique tracks into their sets before the rest of the world gains access to them. By offering limited edition pre-releases, SetFreaks creates an exclusive experience for DJs, allowing them to stand out and elevate their performances with rare and unique music. This not only enhances the DJ’s set but also builds anticipation and excitement for the wider release of these tracks. In the meantime, iDenfy’s identity verification solution ensures that customers who purchase limited edition pre-releases will experience a secure and rapid verification process to protect tracks from unauthorised distribution and maintain exclusivity. iDenfy’s identity verification service SetFreaks wanted a simple onboarding process and minimal time spent on manual verifications Additionally, SetFreaks wanted a simple onboarding process and minimal time spent on manual verifications. Manually gathering documents in the extensive databases and ensuring that compliant data was provided would be a hassle for its internal team. Without automation, the platform risked losing customers due to an inefficient Identity verification process. iDenfy’s identity verification service has already improved verification times and rates compared to manual processes. Partner with SetFreaks “We chose iDenfy because we needed a simple and fast way to perform identity checks for our customers. The user experience had to be seamless, and the verification process needed to be quick. iDenfy provided exactly what we were looking for, ensuring a smooth, efficient, and accurate verification process,” commented Onnik Tavitian, the CEO of SetFreaks. Domantas Ciulde, CEO of iDenfy, added: “We’re excited to partner with SetFreaks, an innovative platform in the dance music industry. Our identity verification solution will help to protect the exclusivity of pre-release tracks, allowing DJs to elevate their performances with rare and unique music.”
Expert commentary
In the early stages of childhood education, kindergarten imparts foundational principles that shape future behaviour. Today, you can think about cloud computing in a similar manner: it has become a fundamental element in the architecture of modern technology. The cloud now plays a critical role in digital interaction, security, and infrastructure development. Far from being just another tool, the cloud is a cornerstone, providing essential support for the intricate network that supports today's digital ecosystem. Vomplex digital systems Much as kindergarten lessons lay the groundwork for cognitive development, the cloud offers base capabilities that are vital for constructing and operating complex digital systems. Recent advancements in cloud-based security — particularly in access control and video surveillance — emphasise the importance of cloud computing. It has been instrumental in unifying fragmented security systems, similar to how basic social principles taught in kindergarten help diverse children come together as a unit. The role of cloud computing in our technological world is multifaceted and continuously growing The role of cloud computing in our technological world is multifaceted and continuously growing. It has evolved into a space where innovation is cultivated and security commitments are maintained with vigilance. The fusion of artificial intelligence and analytics into cloud services signifies a concerted effort toward a future that is more cohesive, intelligent, and secure. Significant technological progress As we delve deeper into this topic, it will become evident that cloud computing, like the pivotal lessons of kindergarten, is indispensable. It quietly enables significant technological progress, mirroring the foundational principles taught in our formative years in both its essential nature and its growing influence. Play Fair: Technological Developments in Cloud-Based Security The past year has been a period of significant innovation in cloud-based access control and video surveillance. Cloud computing has evolved into a robust platform that fosters the creation of integrated security systems. These systems consolidate access control and video surveillance into a unified experience, demonstrating the cloud's potential to seamlessly combine disparate systems. Substantial industry progression The advent of edge computing has boosted bandwidth efficiency and accelerated data processing The incorporation of artificial intelligence and analytics into cloud services marks a substantial industry progression. This development provides businesses with advanced tools for in-depth analysis and intelligent decision-making, enabling them to not only gather comprehensive insights but also strengthen their security measures. The cloud has eased the transition to new technologies and emphasised a commitment to cybersecurity, with encryption protecting data integrity in transit and at rest. Simultaneously, the advent of edge computing has boosted bandwidth efficiency and accelerated data processing, highlighting a consistent drive to refine and adapt. The trend of integrating cloud security systems with other business platforms help create unified ecosystems, reflecting a broader narrative of security professionals’ pursuit of progress and enhancement. Potential future disruptions Wash Your Hands: Pandemic-Induced Transformation in Cloud Services As we all know, the COVID-19 pandemic necessitated a swift transition to remote operations, with cloud computing forming the backbone. i The urgent need for cloud solutions was apparent as businesses adopted remote collaboration tools, work-from-home policies, and virtual workspaces. This transition increased the demand for cloud services and prompted more adaptable and cost-effective pricing models. Recognising the critical role of cloud services, organisations enhanced their investment to safeguard operations against potential future disruptions. The pandemic fundamentally altered the perception and valuation of cloud computing, emphasising its critical role in sustaining business operations. Scaleable digital infrastructures The growing demand for SaaS has led integrators to create scaleable digital infrastructures Share Everything: Systems Integrators and the Adoption of Cloud Systems integrators have done much to realise the cloud’s potential. The growing demand for Software as a Service (SaaS) has led integrators to create scaleable digital infrastructures tailored to specific business needs.. The use of the cloud for data backup has improved efficiency and increased organisations’ ability to cope with disruptions. Although there has been a gradual shift among integrators toward cloud solutions, effectively marketing and supporting SaaS business models remains a challenge. But the possibility of continuous revenue streams through managed services is promoting broader adoption of cloud technologies. Cloud-based security solutions Live, Learn, Think: Enterprise-Level Cloud Adoption There is an increasing trend among large enterprises to adopt cloud-based security solutions. The shift toward VSaaS indicates a move towards subscription models that offer financial and scalability advantages. This transition is more than a mere operational change. Rather, it represents a commitment to the expansive potential for growth and innovation that the cloud offers. But let’s face it: the ‘cloud’ journey is accompanied by challenges, particularly concerning data security. Providers must deliver robust data protection measures to ensure the success of cloud-based security services, which depends not just on technological progress but also on fostering trust with clients. Addressing cybersecurity concerns The hybrid model offers a balanced solution for businesses looking to merge these two environments Baby Steps: Hybrid Cloud and On-Premises Infrastructure The hybrid model, which combines cloud with on-premises infrastructure, continues to be a strategic choice for many organisations. While the cloud provides flexibility and ease of access, on-premises solutions offer control over data security and comply with regulatory demands. The hybrid model offers a balanced solution for businesses looking to merge these two environments. Be Trustworthy: Cybersecurity Measures and Communication Transparent communication is key in addressing cybersecurity concerns with customers and partners. Companies that are transparent about their security protocols, including encryption and regular updates, build trust. Certifications such as SOC 2 Type II affirm a dedication to security, and proactive educational resources ensure that users are well-informed about best practices. Decision-making processes Cloud computing has become the cornerstone of modern security strategies Look: The Future Outlook for Cloud-Based Security Solutions Looking forward 5-10 years, cloud-based security solutions are expected to become even more central to organisational decision-making processes. The cloud is poised to become the hub for predictive decision-making, using AI algorithms and extensive data to proactively manage security risks. This vision of an intelligent, integrated approach to security, with the cloud enabling swift, collaborative responses to threats, is almost at hand. Cloud computing has become the cornerstone of modern security strategies, moving beyond its initial role as a digital transformation tool. As we look to the future, the cloud is set to redefine security paradigms and anchor a new era of intelligent, predictive security operations.
When a bomb detonated in the Port of Beirut, I had hundreds of employees under my care inside the blast zone. Within just two hours, I was able to determine who was impacted, understand their safety conditions, and share resources for on-the-ground support—all thanks to mobile technology. For Chief Security Officers, receiving calls like these launches a variety of protocols and necessary decision-making with the safety and security of people and assets as a top priority. And these calls are only becoming more common. Dependence on threat intelligence Mobile phones have dominated the post-COVID environment where people work from anywhere Threats ranging from natural disasters to geopolitical conflicts are becoming more frequent and complicate the responsibility organisations have in keeping their people safe. To meet these needs CSO’s are staying ahead of negative outcomes through creating a greater dependence on threat intelligence. In these times, effective, real-time risk management depends on hyper-local data from technology that is accessible, portable, and dynamic–such as cell phones. Mobile phones have revolutionised the way people live and work. They allow us all to walk around with a computer in our pocket, bringing the world to our fingertips and eliminating digital borders for over 90% of the world's population. Mobile phones have dominated the post-COVID environment where people work from anywhere and have geographically distributed teams but are also more vulnerable to threatening events. Mobile-friendly risk management platforms Mobile technology assigns workers with easy entry to data that can help keep them and their teams safe As we approach 2024, many organisations are adopting comprehensive risk management tools that empower personnel across the organisation with the intelligence and knowledge they need to stay safe wherever they are. Mobile-friendly risk management platforms, such as Crisis24 Horizon, provide always-on awareness, on-hand threat intelligence, and immediate communications and distress signalling through location monitoring. Users receive location risk assessments and push notifications directly to their devices about nearby issues and threats no matter if they are on or off the job. While only select risk managers have complete control of the platform and all sensitive employee data is protected through encryption, the app distributes critical intel to foster a culture of shared awareness and responsibility. Thus, mobile technology empowers employees with easy access to information that can help keep them and their teams safe. Creating a culture of mobile technology adoption In the last few years, the world has proven the importance of being well-informed of risks and mitigation plans to minimise harm. However, psychological barriers tend to trump physical barriers when it comes to accessing the vast array of tools our mobile devices offer. World has proven the matter of being well-informed of risks and relief plans to minimise harm Adopting this technology and establishing a culture that enforces risk management across an organisation is a daunting challenge that demands substantial commitment from leadership to be successful. Some companies have tackled this challenge by positioning security technology as part of the organisation’s employee benefits package, such as commuter benefits and health insurance, to encourage people to take advantage of these resources and learn how to use them. Cohesive risk management culture Technology is only as effective as the people whose actions it informs, which is why adoption and integration are so important. When a cohesive risk management culture meets a powerful technology platform, individuals are enabled to receive threat alerts and counter their impacts, letting others know when and how to take the necessary precautions to protect themselves and their team. For more information on mobile technology and other security trends, check out the Global Risk Forecast, an annual report by Crisis24 that provides a comprehensive analysis of key events around the world most likely to affect operations in the coming year.
If you were to ask people outside our industry what door and access security entails, chances are their answers would reflect their common encounters with locks, security guards, cameras, and maybe metal detectors, badges, or automatic doors. But if they were curious enough, they’d probably be astounded to learn how extensive, intricate, and interesting the business can be and, of course, how vital it is to life safety, physical security, and cybersecurity. Integrated, interoperable solutions They’d also discover that it’s not just about levers, deadbolts, and other products. Instead, it’s a system of many systems, integrated, interoperable security solutions that cover everything from access control, video surveillance, fire alarms, and communications to server rooms, IT networks, energy efficiency, and more. Partnerships to keep up with changing needs A manufacturer’s support of their customers is how prepared they are to respond with high-quality advice Integral to the future success of the openings solutions industry is how well manufacturers and security experts keep up with the changing threat landscape and their customers’ evolving needs. Part of a manufacturer’s support of their customers is how prepared they are to respond with high-quality advice, service, and innovations that address the questions and concerns that arise. That’s why more developers, designers, and end-users alike are leaning on partnerships with visionary manufacturing companies and systems integrators who proactively keep their ear to the ground and an eye on the future. Caution: curves ahead As we look toward that future here in North America, there will always be forces of change to contend with and the accompanying impact on people’s safety, security, health, and livelihoods that our industry will need to address. The forces range from the incessantly unfolding threat scenarios in our country and the world’s geo-political dynamics to climate change and a host of other shifting factors, including the ways we want to work post-pandemic. Bypassing tailored approach Commoditisation poses risks to customised systems integration, good design, the environment Like many industries, ours has seen a change in the level of commoditisation in recent years. While this may give some customers access to cheaper door products in the short term, it usually means bypassing a tailored and more effective approach to security solutions that better meet risk assessment needs for the long haul. It can also get in the way of fulfilling a customer’s forward-thinking requirements for sustainable and aesthetic building materials. In other words, commoditisation, with its tendency toward “sameness” and dependency on less sustainable, corner-cutting materials and processes, poses risks to customised systems integration, good design, the environment, and potentially security itself. Change for the better Fortunately, change has its upside, especially as it applies to innovation, the counterforce to commoditisation. It’s the primary reason why progressive architects, integrators, and security professionals in North America keep gravitating to manufacturers with the instincts and resources to make bold investments in people, new ideas, and processes that produce advanced, planet-friendly solutions. From our view of the door security industry, sustainability will be a central component of innovation from here on out, where the development of new solutions and products is guided by practices and values that reduce their environmental footprint and increase their positive impact. Sustainably-made solutions Transparency in the form of documentation and third-party certifications to back up sustainability claims Along with being a top-down priority for certain manufacturers, sustainably made solutions and products are in higher demand than ever from the design, building, security, and end-user communities. They want to know about the carbon footprint and health impact of product ingredients, their recyclability, and how responsibly things are being made, packaged, and delivered. And they expect transparency in the form of documentation and third-party certifications to back up sustainability claims. Resilience Along with sustainability, a greater focus on resilience has emerged. Climate change is being looked at as a key contributor to the increase in wildfires and the intensity of windstorms and flooding. There will continue to be an expanding need moving forward for FEMA-rated storm shelters, fire- and water-resistive doors, and even blast-resistant openings for certain locations. On the near horizon Facial recognition has long been in use in government and other high-security applications The door security industry is also seeing a fusion of technologies, including newer touchless/contactless opening solutions that incorporate improved biometric access credentials like facial recognition. Facial recognition has long been in use in government and other high-security applications, and we’re starting to see more adoption and willingness to use advanced biometrics devices for door access. Video sensing data and analytics Fortunately, there are new strides regarding the transparency of the algorithms relating to facial recognition. Reassurances about the prevention of bias will help further that adoption. Voice and video will also soon become more prevalent for building and security management by using video sensing data and analytics to inform door security solutions. These developments often stem from the convergence of application engineering and systems integration. Application engineering It also advances the de-commoditisation of security and access control solutions Openings solutions innovators and manufacturers receive vital feedback and insight from both channel partners and customers about the characteristics of a vertical market and/or region. Not only does this partnership require trust and close working relationships, but it yields near and longer-term advantages to all participants. It also advances the de-commoditisation of security and access control solutions. Serving underserved communities Smaller businesses need to manage the security and safety of their personnel and assets just as larger operations do. The challenge has been how to offer the right fit of robust door security solutions that also fit these organisations’ budgets. Historically, they’ve been caught between having to choose an enterprise system that would provide the security they need but comes with a high price tag or settling for mechanical locking doors and a fire alarm system that will at least satisfy a certificate of occupancy requirement. Smart lock system Many small business owners want technology that’s simple to install, even DIY in some cases Many small business owners would like to add a smart lock system to enhance their company’s security which also gives them the flexibility to issue mobile credentials and manage employee and visitor access remotely. Ultimately, they’re looking for a higher level of functionality than what’s available at the low end but something with far less infrastructure and at a lower cost than what’s inherent with higher-end solutions. They also want technology that’s simple to install, even DIY in some cases. Scalable electronic access control Supporting these underserved customers requires developing scaled solutions to match the fewer doors, employees, and amount of space that smaller businesses need. This unique approach to electronic access control is new, but it’s already proving to be successful in helping organisations better manage their time, resources, and security. Training The need for expanded solutions awareness, product knowledge, and installation training is also growing The need for expanded solutions awareness, product knowledge, and installation training is also growing. Retirements and other changes within the locksmithing, systems integration, and facilities management sectors continue to affect how our industry needs to recruit, develop, and retain talent. So do technological advancements in electronic access control and door security hardware overall. Change, innovation, and learning A manufacturer or organisation that can offer comprehensive training led by seasoned professionals will go a long way toward expediting the onboarding of new hires and providing continuing education for experienced professionals at all levels and from all disciplines connected to safety and security. Ultimately, door security experts and companies who embrace change, innovation, and learning will gain the extra edge customers are always looking for to add value to their investments in security.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Well attended and generating levels of excitement not seen since before the pandemic, ISC West may provide just the shot of adrenaline we need to drive industry success through the uncertain economic times ahead. Buzzwords like artificial intelligence (AI) and the cloud were still prevalent at the conference and exhibition in Las Vegas, but the hype of yesteryear seemed more subdued. Rather than breakthroughs to be celebrated, AI and cloud were discussed more as ways systems can realise even greater potential. Rampant cybersecurity attacks Rather than hype, discussions seemed much more practical and down-to-earth, encompassing shifting customer needs and how to address pain points. There was more discussion of the shift of security from a cost center to a profit center, where industry technologies can contribute to an enterprise’s bottom line. More companies seemed to be vigorously addressing the challenges of cybersecurity More companies seemed to be vigorously addressing the challenges of cybersecurity, although perpetually an obstacle. The industry seems more devoted than ever to protecting physical security systems in an age of rampant cybersecurity attacks. But more than in years past, it was the ISC West event itself that generated the most buzz. The crowded aisles of the exhibition seemed both reminiscent of the pre-covid past and prescient of the industry’s even brighter future. From booth to booth and attendee to attendee, the enthusiasm was both conspicuous and contagious. Everybody was thinking: ‘Wow! What a show!’ Pushing technology to the edge “The practice of physical security is about more than understanding threats, and end users are thinking now about the bigger picture of security and how networks work in the broader context of the business,” said Andrew Elvish, Vice President, Marketing at Genetec. Problems of latency and miscommunication are elements pushing technology to the network edge, he says. For example, in an access control scenario, decision-making should be as close to the door as possible to avoid network congestion, delays, or failure. Andrew Elvish, Vice President, Marketing at Genetec, displays Axis network door controller ‘powered by Genetec’ Elements pushing technology Reflecting the philosophy is a new collaboration introduced at the show called ‘Axis Powered by Genetec,’ an enterprise-level access control offering that combines Genetec Synergis software with A1210 and A1610 network door controllers by Axis Communications. Elvish says lines are blurring when it comes to edge versus cloud technologies. Rather than choosing ‘either-or,’ a blending of approaches is optimum, always ensuring that “Decision-making is close to the point of actuation,” he says. On-premise versus cloud systems Elvish also points to changing assumptions about the industry roles of on-premise versus cloud systems Elvish also points to changing assumptions about the industry roles of on-premise versus cloud systems. Historically, the assumption was that on-premise systems are most appropriate for enterprise customers, while the cloud is the best approach for small- to medium businesses (SMBs). Depending on the end customer’s needs, a system can be either or both at the same time. Rather than debate cloud versus edge, customers should consider the outcomes they seek, and how technologies can be merged to provide those outcomes. “They should consider a solution where they do both, with the gradation of controls provided at their fingertips,” says Elvish. Combining security into one platform Unifying security and related functions on a single platform was a widely evident trend at ISC West. An example is Verkada which now offers a unified platform that includes video, access control, and intrusion detection, as well as other functions such as air quality sensors, visitor management, and a door intercom. David Tsang, Product Director of Verkada, predicts demand to combine technologies into a single platform will grow in the industry. Furthermore, as data is collected in the single system, enterprises will find new ways to ‘connect the dots’ to provide better business intelligence. Air quality sensors Verkada’s cloud-based system enables fast deployment of the single platform “Our approach to building products is based around the idea that every company has different needs, and they want technologies to integrate seamlessly and operate off the same platform,” says Tsang. In addition to seamless integration, each product must also be able to stand on its own. Tsang manages Verkada’s various product categories, including access control, air quality sensors, intercoms, etc. Verkada’s cloud-based system enables fast deployment of the single platform, and the company works with dealers to ensure delivery of a 'better partner experience.' What happens after a binge of acquisitions? Acre Security unveiled a new corporate ‘identity’ and a big booth highlighting the technology brands the company has acquired over the last several years. Brands such as Feenics, ACTMobile, Comnet, Razberi, and others reflect Acre’s acquisition of these companies but are now being promoted as technology choices under the ‘one Acre’ approach. Don Joos, CEO of Acre Security, looked ahead to the future of the company at ISC West Visitor management product categories Change is in the air, and the booth’s unified visual design signifies the new direction for the company, says Don Joos, Acre’s CEO. Various technologies can be delivered via the cloud, through an on-premise installation, or using a hybrid approach Acre is highlighting ACTMobile’s mustering capability, useful in the K-12 market In tying technologies together, the ACTMobile product will play a key role in two major verticals -- command-and-control and K-12 schools. Acre is highlighting ACTMobile’s mustering capability, useful in the K-12 market, which was adapted from a technology used in the cruise industry. The Acre approach is to embrace the variety of opportunities available in the access control, intrusion, and visitor management product categories within a broad definition of ‘security’ that embraces both core capabilities and ‘adjacencies,’ says Joos. Acre seeks to enable customers to protect people, facilities, and critical assets. They manage customers’ security data and provide the insights they need. Ensuring a cohesive security system A challenge in the industry is combining various single products into a cohesive whole. “There are many products that do one thing well, but it’s harder to build a cohesive security platform,” says Ryan Schonfeld, Founder and CEO of Hivewatch. Hivewatch is a software platform that performs the functions previously associated with a ‘PSIM,’ which is a physical security information management system. The term PSIM has earned a questionable reputation in the industry, plagued by added costs and the perpetual challenges of integrating with ever-changing software platforms. Information management system Hivewatch seeks to bypass other software systems and to integrate as closely as possible with devices Hivewatch seeks to bypass other software systems and to integrate as closely as possible with devices on the edge, thus avoiding the impact of software system changes. They integrate with data in a ‘different way’ that eliminates the need to conform to other software systems. In today’s climate, the term ‘security’ could be seen as limiting when it comes to the various functions our industry’s systems can perform in the broader enterprise, says Schonfeld. Traditional enterprise reporting structures that have physical security reporting to the facilities or real estate department are limiting the broader role security can play in the enterprise. Positioning physical security Changing norms are positioning physical security to report to the CIO or CISO, thus reflecting physical security’s role in collecting and analysing data. Higher visibility within the enterprise can help security expand its influence and impact. “Security is too limiting, and it can keep us from getting a seat at the table,” says Schonfeld. “We need to shift from being a cost center to generating revenue and/or driving business — and data is the key. Rather than leading by fear, we need to show the value security can drive.”
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Case studies
In Japan nearly two in five office workers work from home a minimum of once a week, particularly if they work in IT or consultancy, according to Nikkei research undertaken in 2023. When a global IT company announced they would be leasing out four floors in their Tokyo office last year, in response to changing working habits following Covid, G4S approached them to be their security provider. They had already been doing access control and meet and greet at the eight-storey building for the last 10 years. New access control systems Eiki Hata, Representative Director of G4S Secure Solutions Japan, says: “The security requirements for a multiple tenancy building are quite different from a single occupancy. You have more people coming and going, companies have different requirements – more sophisticated and robust protocols are needed.” After being awarded the new contract, G4S doubled its headcount onsite and configured new access control systems for each floor; some of the new tenants wanted to keep their existing passes, which G4S was able to accommodate. Health and safety Security officers are also trained in first aid, which includes administering CPR and using a defibrillator Eiki says that 40% of G4S’s remit is health and safety and they will provide support during natural disasters, such as earthquakes or flooding. This includes checking if there is any damage to the building alongside the facilities team and offering assistance to local residents who may take refuge there. They will also hold regular evacuation drills for the whole building. Security officers are also trained in first aid, which includes administering CPR and using a defibrillator. They will also call for an ambulance if required and direct them once onsite. The officers are also responsible for ensuring everyone shows their ID at reception and all guests are booked in, as per the company’s global policy. Customer service skills Eiki explains: “Japan is one of the safest countries in the world: if you leave your wallet somewhere, it’s likely that you’ll get it back without losing any money." "However, that also means that Japan has a very low awareness of risk and our security officers need to be able to explain why these protocols are in place when questioned. When you just have one company in a building it’s easy to enforce operational rules, but with multiple tenants that’s less easy to do - customer service skills are really important.” Flexibility and adaptability The company is one of a number of multinationals spanning sectors that G4S provides security This company is one of a number of multinationals, spanning various sectors, that G4S provides security for in Japan. Other business lines include close protection and risk consulting. Eiki explains that part of the appeal is that G4S can more readily recruit staff that speak English than local companies, which many multinationals require. He says: “Less than 5% of the Japanese population speak English, we are not like Hong Kong or Singapore which are international hubs in APAC.” Smallest business within G4S Eiki continues: “Another advantage that G4S has is that we can speak to other countries and ask them to share their experiences, helping us to create a seamless security consultancy for our clients.” Eiki says that flexibility and adaptability are other trademarks: “We are the smallest business within G4S; we are growing the business and want to fulfil our clients’ requests even if it’s difficult or not straightforward.”
Take a walk to the local high street. Compared to a few years ago, they may notice many more “To Let” signs in empty shop windows. It comes as no surprise given the number of shocks to the economic system over the last five years, ranging from COVID-19 to international conflicts, all of which have led to various consequences, such as energy price hikes, interest rate increases, and a general shift in many people's work patterns and consumer behaviour. Vacant retail space The total number of void private-sector commercial properties stands at approximately 165,000 According to Savills Research, the overall footfall of vacant retail space in the UK is around 14.5%, while the total number of void private sector commercial properties stands at approximately 165,000. Additionally, an estimate of 7,000 commercial and business properties owned by Local Governments in Great Britain have been unoccupied for over 12 months. Net Zero ambitions Furthermore, a recent BBC article points out that business tenants are more inclined to search for smaller, newer and more energy-efficient office spaces to rent, are willing to downsize owing to hybrid working, and seek buildings that complement their Net Zero ambitions. This might be interpreted as an indication that a number of long-standing commercial premises would become vacant in the near future, forcing owners to update and repurpose empty spaces to meet the demands of a changing market. A costly asset that requires extra protection Insurance companies charge higher premiums for void property and require regular security While the property market and customer demands are shifting, some truths remain unchanged: commercial property should generate money, not drain it. However, void sites imply outgoing costs and no profit, so it only makes sense that any vacant space should be flipped as soon as possible. Unoccupied premises can become an alluring target for squatters, vandals, thieves and trespassers, which is one of the main reasons why insurance companies charge higher premiums for void property and require regular security and fire safety checks too. Enhanced security measures Such properties must be protected by enhanced security measures. This often involves the installation of steel doors and screens, perimeter protection, vigilant surveillance and prompt alarm response. After all, any break-in can cause far greater financial damage than the costs of protection; and the owner is legally liable for any injuries sustained by trespassers. Meanwhile, legit access is very much required by contractors to upgrade and renovate the site in preparation for the next business occupier. Any delays or missed visits result in further charges on an asset that is essentially nothing but another bill while vacant. Access issues: Fetch the keys For every contractor visit, property check or viewing, a key must be obtained offsite and then returned A minor but, consequently, very important issue might arise when accessing a site that is unmanned 24/7. For every contractor visit, property inspection or viewing, a key must be obtained offsite and then returned. This takes time, implies unnecessary travel and, potentially, may result in additional missed visit fees and rebooking arrangements in instances when a contractor is unable to gain entry. As a result, it may slow down the void property turnaround time. Keyholding arrangements Furthermore, complex keyholding arrangements can also slow down the security alarm response time. More and more security companies are moving away from the traditional keyholding model, in which keys are stored at the central location or in heavy key lockers in vans during patrols. While reaction time is critical, time is frequently wasted collecting keys or waiting for a keyholding patrol (rather than the nearest one) to arrive on site. Lock up and leave the keys. Securely. Keyholding solution must be more robust than doors or other means of entry to stop opportunistic intruders What about storing keys at the point of entry? This may be controversial, but it is a solution that has gained popularity in void property management with implementation of secure range key safes and lockboxes. The primary concern in such an approach is security. Even though property is void, the keyholding solution must be more robust than doors or other means of entry to prevent opportunistic intruders from taking advantage of the new keyholding arrangement. Smart key management solutions Stuart Wheeler, Managing Director of Keynetics, a company that offers smart key management solutions with security-certified key safes, comments, “Over the years, we have developed strong relationships with the top void property management companies in the UK and Europe. These clients require a keyholding solution that enables efficient FM service provision for vacant properties while also providing a high level of security.” “Storing keys at the point of need enables quicker alarm response times and allows approved contractors to enter the premises without any delays, but security must not be compromised; in that respect, our SentriGuard key safes are suitable for commercial properties and certified to LPS 1175 (Loss Prevention Standard) C1 and C3 security ratings, which is unrivalled by any other supplier.” SentriGuard key management system Stuart confirmed that in addition to security, the SentriGuard key management system is highly praised for its innovative technology. First, it incorporates a bespoke cloud-based platform that allows customers to manage access to multiple properties remotely and generate various audit reports that can also serve as a proof of service delivery. Second, assigned individuals may gain access to premises either using the mobile app or a time-restricted code. He added, “The ability for clients to access real-time data of site visits with a solution that does not break the bank and is secure has been the key to the success here in the U.K. and now across mainland Europe.”
In response to the increased demand for oxygen supplies following the 2020 pandemic and subsequent rise in respiratory-related conditions, Jacksons Fencing completed a key project in 2024 to safeguard vital oxygen storage facilities at a pioneering UK hospital. Addressing the demand The pandemic highlighted the critical role of oxygen in treating patients, causing a surge in its use across hospitals. Some facilities even declared major incidents due to oxygen shortages, prompting a significant government investment of over £15 million to upgrade oxygen supplies and prevent future disruptions. As part of these improvements, many larger hospitals have started to feature on-site liquid oxygen storage facilities, where vast industrial tankers convert liquid oxygen to gas as needed. Securing essential resources Jacksons Fencing provided and installed a comprehensive security solution for a new oxygen storage compound Given the stringent safety requirements associated with liquid oxygen due to its extremely low temperatures, precise pressure needs, and related fire and explosion risks securing and managing these supplies is paramount. To address these needs, Jacksons Fencing provided and installed a comprehensive security solution for a new oxygen storage compound. Robust fencing solutions with invisible screen The installation includes 38 metres of Securi-Mesh® fencing, standing at a robust height of 2.4 metres. This fencing is mounted on concrete hardstanding and is complemented by two cantilever sliding gates and a single-leaf pedestrian gate with a push pad exit and key entry. Securi-Mesh fencing features a tightly woven mesh pattern designed to deter climbing attempts, and its small apertures significantly improve resistance to cutting. Additionally, the mesh provides an ‘invisible screen’ effect that allows for effective surveillance without obstructing views, facilitating quick issue identification. Space efficiency and secure gating Unlike traditional swing gates, these gates slide parallel to the fence line, requiring minimal space The cantilever sliding gates installed are particularly well-suited for the restricted space in front of the facility. Unlike traditional swing gates, these gates slide parallel to the fence line, requiring minimal space both in front of and behind the fence. This design not only maximises space efficiency but also enhances security with quick operational cycles, allowing for faster vehicle and goods transit, reducing the time the gates remain open, and minimising security risks. 25-year guarantee with reduced maintenance Furthermore, the absence of ground tracks for the cantilever gates reduces maintenance needs by preventing issues related to debris or track damage, causing fewer repairs, and reduced downtime. In addition to these features, the fencing and gates are backed by a 25-year guarantee, ensuring long-term durability and minimal maintenance. Barbican® vertical bar fan panel The green polyester powder coating chosen for the fencing provides extra corrosion resistance The green polyester powder coating chosen for the fencing provides extra corrosion resistance and contributes to lower long-term costs for the hospital. Sections of the fencing, installed at varying heights, are further secured with a Barbican® vertical bar fan panel, which offers both a physical barrier to intrusion and a visual deterrent. Oxygen storage facility security Peter Jackson, Managing Director, of Jacksons Fencing comments on the success of the project, "Contributing to this vital project, enhancing the security of oxygen storage facilities at a UK hospital, is a significant achievement." "The pandemic highlighted the crucial role of oxygen, we must safeguard these resources effectively." Securi-Mesh® fencing and cantilever sliding gates "The integration of our Securi-Mesh® fencing and cantilever sliding gates reflects our commitment to providing both superior protection and operational efficiency." "By addressing the specific security needs of these vital resources, we help ensure that hospitals can focus on delivering high-quality patient care without disruption.”
About 20 miles northeast of Battle Creek, Michigan, and 30 miles southwest of the state capital of Lansing lies the bucolic city of Olivet, population 1600. Olivet may be small as far as municipalities go, but it knows how to think big when it comes to protecting the safety of the 1250 students enrolled in its three Olivet Community Schools. Schools of Choice programme That may sound like a large student body for a town its size until they realise that the district serves a geographic area of over 100 square miles and communities that rely on an economy based primarily on farming, light industry, and the area’s two largest employers – the University of Olivet and the schools themselves. As a participant in the state’s Schools of Choice programme, the district can accept pupils from neighbouring areas, which make up roughly 33% of the Olivet Community Schools population in addition to the city’s resident students. John Mertz Mertz's career has progressed from teaching to roles such as Director of Instructional Services Guiding school operations is Superintendent John Mertz. With 33 years of public education experience in Michigan, his career has progressed from teaching to roles such as Director of Instructional Services, Assistant Superintendent, and now Superintendent. This is his fifth year in Olivet. “The interesting thing about being a school superintendent is that there are several things I didn’t know were going to come with the job and never received training on,” says Mertz. “And one of the biggest ones is school safety and security.” Video monitors He recalls a Saturday night when he was doing some work in his office while his daughter was attending a school event that evening. When he happened to look up at the large video monitors behind him displaying the schools’ camera feeds, he was surprised to see a lot of people coming and going during that hour. “I thought, who are all these people? Where are they going?” Mertz says when he looked a bit closer, he saw there were kids with backpacks and baseball bats who were all heading to the middle school gym, where they held practice. “I didn’t have any idea how they got in,” he says. “It turns out the coaches had a key that they used to unlock doors whenever they needed to after regular hours.” Unfortunate events He adds that it’s an unfortunate but common fact that many school districts have far more keys in circulation than have been officially issued. “It can be difficult to figure out where the keys are coming from." "Are they being shared, or copied? For me, that was a huge aha moment. I found myself saying we’ve got to do something about this; we’ve got to make sure we’re controlling who is getting into our buildings, for what purpose, and when.” Communication and transparency Mertz and the district to push for major improvements in the school’s safety and security system That’s what compelled Mertz and the district to push for major improvements in the school’s safety and security system. But Mertz says that before the district could even consider who to work with and what to purchase and install, his team had to make its case to the schools’ stakeholders – the staff members, the board of education, and parents. “The community needed to understand the rationale that warranted the upgrades. It’s all about communication and transparency.” Updating the access control systems “The biggest changes we identified meant replacing our outdated and often grainy security cameras with sharper, more advanced units and stepping up the capacity and capabilities of our access control system so we could better schedule and manage access at perimeter doors and for activity spaces." "But what was especially crucial was adding digital access control to our classrooms, which was a priority for further enhancing student and teacher safety.” Fiber connections and wireless networks Mertz adds that before deploying advanced cameras and access control, upgrades to fiber connections and wireless networks also had to be made. “So, we started reaching out to security system integrators and experts in access control like ASSA ABLOY to start figuring out what technology was out there that would be the most advantageous for our district. It was quite a journey.” Relationship, reliability, and response time Ultimately, Mertz says the district issued an RFP. “Along with assessing what we needed and increasing our knowledge of the solutions available, we were also concerned about the kind of partnerships we were going to form with the companies that would be awarded the upgrade project." "We talked about the importance of the relationship, reliability, and response time. We wanted companies that could continue to provide support and be accountable if issues arose after the project was done.” Three key solutions Olivet Community Schools ended up choosing PDT of Byron Centre, Michigan to be their systems integrator Upon completing their thorough vetting process, Olivet Community Schools ended up choosing People Driven Technology (PDT) of Byron Centre, Michigan to be their systems integrator. PDT Account Executive Charlie Booth explains that gaining a full understanding of Olivet Community Schools’ requirements helped narrow the decision to three key solutions and organisations. Integrating cameras, access control, and analytics “We brought Genetec™ in and did a demo of their Unified Security Solutions platform that integrates cameras, access control, and analytics to make everything work seamlessly together,” says Booth. At the same time, he started talking with ASSA ABLOY Integrated Solutions Specialist David Hood who then facilitated a demo of the SARGENT IN100 Aperio® Wireless Lock. SARGENT IN100 Aperio® Wireless Lock “We chose the Aperio line because the Olivet classroom doors always needed to be online and communicating with Genetec in case global actions were needed to secure doors, like in a lockdown,” explains Booth. “Having IN100 electronic access control locks at each door means the facilities department now just issues keycards to staff instead of brass keys, making it much easier to manage credentials. For the video surveillance upgrade, we specified state-of-the-art i-PRO cameras.” 24/7 door monitoring Superintendent Mertz says, “The integration of the new cameras and access control solution with the Genetec platform and AI analytics allows us to monitor door activity 24/7." "It gives us a keen understanding of who is in the building and when.” He says that along with ensuring only those with card credentials have access, the system also alerts staff if a door has an issue such as a card reader/lock battery that needs replacing. ZeroEyes AI gun detection Mertz adds, “We also incorporated weapons detection software. We received a grant from the state for ZeroEyes AI Gun Detection." "And in a partnership with the City of Olivet, we obtained a grant for our first school resource officer. None of this would have been possible without upgrading our infrastructure, cameras, access control technology, and analytics nor without the support of our school and community stakeholders.” Complement security features Technology features i-PRO cameras district-wide, over a hundred SARGENT IN100 Aperio wireless access control locks Olivet Community Schools’ complement of security technology features i-PRO cameras district-wide, over a hundred SARGENT IN100 Aperio wireless access control locks for classrooms, and the Genetec Security Centre unified platform. Christopher Dunn, Public Sector Account Executive for Genetec, further explains the value of his company’s solution, “One of the largest challenges Olivet faced was moving away from the fragmented system of the past where there was one platform for video and a separate one for the limited access control system they had." Human, vehicle, and threat detection "They needed to be able to harness the power of the technology at the edge that the new cameras offer and utilise it with applications that can detect things like the differences between human beings, vehicles, and potential threats.” He adds, “Because of how Genetec is structured and integrates so perfectly with other products, we’re able to bring everything into a ‘single pane of glass’, including analytics. That single pane of glass provides a dashboard that combines video and data feeds from multiple sources into a unified view.” Curb-to-core approach Dunn says that bringing everything together in one platform also eliminates the need for training on multiple systems, which was another highly important priority for Olivet Community Schools. According to David Hood, “ASSA ABLOY takes a curb-to-core approach when working with school districts, starting with the perimeter and then working inwards. Olivet Community Schools has followed that same approach. They have the perimeter protected with access control on every door along with video surveillance, and working inward to offices and classrooms, they now have integrated solutions throughout.” People Driven Technology Hood adds that collaborating with People Driven Technology and Genetec has been outstanding. “People Driven Technology understands our solutions and hardware, and they’re certified on our products." "That’s made installation and integration with i-PRO, Genetec, and analytics applications a seamless process for Olivet Community Schools.” An automatic classroom lockdown “It's all about student safety, staff safety, and community safety,” emphasises Mertz. “When you have people in your facilities, putting in these extra measures buys extra time." "So, heaven forbid, if there ever is an incident, you're prepared for it, ready to react, ready to swing into action with the systems in place that are going to help you do that, including activating an automatic classroom lockdown if necessary. Safe and secure building “When you look at success, it all comes back to the district and the kids. Now I determine success on whether our kids are safe. Are they happy? Are they healthy? Are they in an environment where they feel comfortable? That's really what it's all about now, especially coming out of COVID." "You need to have kids feel like they're in a place where there are trustworthy adults around them, where the building is safe and secure, and where they feel comfortable to learn.”
Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partners, like suppliers and vendors. Honeywell's customer, a global pharmaceutical company, realised that potential vulnerabilities like these might be in its partner ecosystem. Therefore, the pharmaceutical company wanted to get ahead of a potential breach so they trusted Honeywell to do a thorough assessment of its suppliers’ operational technology (OT) cybersecurity gaps. Why did the customer choose Honeywell? First, Honeywell's OT cybersecurity experts took the time to understand the customer’s processes at more than 100 sites around the globe. Second, Honeywell experts used their knowledge and experience along with the customer process insight to conduct assessments that met their unique needs. Many of the competitors are simply IT vendors dabbling in the world of OT. Honeywell, however, has the knowledge and the experience to better meet the demands of OT. The pharmaceutical company chose Honeywell over the competitors based on the quality and wealth of OT knowledge the experts provided. Spreading security The Cybersecurity Vulnerability Assessment is part of a global two to three-phase project that covers over 100 sites This was not to be a small or limited undertaking. This Cybersecurity Vulnerability Assessment is part of a global two to three-phase project that covers more than 100 sites. The first assessment was completed for the company’s site in India with other sites being covered in later phases. Vulnerability assessment Honeywell’s OT cybersecurity experts conducted the vulnerability assessment to help capture the customer’s control system vulnerabilities and potential weak spots. The assessment performed was a holistic technical review of the ICS infrastructure. It focused on analysing their cybersecurity processes, procedures, and safeguards to better protect their industrial control systems(ICS) from internal and external threats. Because Honeywell focuses on OT as opposed to IT only, Honeywell experts are skilled in considering the entirety of an ecosystem. This means including people, processes, and any technical issues that can impact the ICS cybersecurity posture. Digging in to reduce risks The Honeywell team was able to holistically assess the customer’s ICS environment, documenting observations The Honeywell team has deep expertise across IEC 62443 standards and other industry-specific guidelines, as well as invaluable experience with control systems. Because of this expertise, the Honeywell team was able to holistically assess the customer’s ICS environment, documenting observations and recommendations to help reduce cybersecurity risks. Physical site review Honeywell team first conducted a physical site review to assess to uncover issues such as control room doors left unlocked, passwords in the line of sight, and other security compliance violations. The team also reviewed the customer’s network equipment from third parties such as switches, routers, and firewalls; reviewed the infrastructure configurations; and checked installation processes. Site-specific recommendations The report detailed best practices and site-specific recommendations to help the customer help mitigate and prioritise All the vulnerabilities, severity levels, and remediation details were included in the Cybersecurity Vulnerability Assessment report. The report also detailed best practices and site-specific recommendations to help the customer help mitigate and prioritise any identified threats or vulnerabilities and notes regarding how and where each step can serve as a foundation for the best practice architecture. Challenges and successes Honeywell experts remained diligent in exceeding the customer’s expectations despite the shutdown in India due to the pandemic and the unexpected need to assess and remediate assets. Honeywell also had one secret weapon: one of the OT cybersecurity experts had real-life experience in the pharmaceutical industry. This made it possible for the team to better tailor the assessment (and recommendations) to this particular customer.
Overview: Due to the pandemic and Delta cases in Israel, the first hospital in Israel for treating coronavirus patients was established. The hospital needed to offer more beds and create more special wards for the infected patients. The head of the hospital requested for an advanced system that could monitor patients on-site or remotely to protect the doctors and nurses from cross-infection in the hospital. Non-contact communication Challenges: Lack of devices for contactless communication: The hospital did not have enough equipment to realise non-contact communication between staff and patients, which could have increased the risk of cross infection. Insufficient remote surveillance: The hospital needed to build larger wards for infected patients, which a 24/7 monitoring system must cover. Installing the right cameras for such a large space could be very challenging. Video intercom solution Highlights: Video intercom solution: The patient’s bed is equipped with Dahua's VTO. Once an emergency occurs, the patient can directly call the VTS management device at the nurse’s station through the VTO. At the same time, through the real-time preview function of VTO, the staff in the nurse station can remotely monitor the patient's condition and communicate with the patient in real-time to provide necessary care. Monitoring & management system: Through Dahua's DSS management platform, the entire CCTV monitoring system and video intercom system in the hospital can be unified and managed. For the hospital managers, it not only improves the efficiency of monitoring and management, but also provides additional security for hospital workers to a great extent! Professional CCTV devices Significance: Dahua provided the hospital with video intercom products and Dahua professional CCTV devices that greatly helped them prevent direct contact with patients to reduce cross-infection inside their premises. With the help of Dahua’s solution, the hospital was able to centralise all their surveillance systems for easy management.
Round table discussion
Inflation, the rise in prices of goods and services over time, can result from a multitude of factors. It happens when there is more money chasing a limited supply of goods. It happens when the cost of producing and transporting goods increases. It can even happen because expectations of future inflation heighten current demand to avoid higher prices. During and after the COVID pandemic, supply chain disruptions, shifting consumer demand, and government stimulus all contributed to higher inflation throughout the broader economy, including the physical security marketplace. Energy price shocks, particularly oil price spikes in late 2021, also increased inflationary pressures. But what is the situation now? We asked this week's Expert Panel Roundtable: Has price inflation ended (or slowed down) in the security market?
The economic fallout of the COVID-19 epidemic was felt in supply chain disruptions, higher prices, and shortages of certain goods. The physical security industry was not spared, although the epidemic also presented opportunities for security companies. Changing access control trends triggered by the pandemic are still reverberating throughout the industry, for example. Four years later, the impact of the pandemic is still being felt in the security market, lingering like the symptoms of "long COVID." We asked this week's Expert Panel Roundtable: Four years after the start of the COVID-19 pandemic, what is its lingering impact on the physical security industry?
Frictionless systems provide access to a building without interfering at all with a user’s entry experience. Frictionless access means you can automatically pass through a gate without showing a credential or otherwise engaging, and with the system recognising who you are and allowing you to pass. In true frictionless access, everything works seamlessly, with unauthorised people obviously barred. But how close are we to realising frictionless access control? We asked this week’s Expert Panel Roundtable: Is frictionless access control a reality or an empty promise?
Products
White papers
The wireless access control report 2023
DownloadSchool security moves to the cloud
DownloadCloud-based access control and occupancy management to safeguard workplaces
DownloadDelivering a smart, secure and healthy workplace with cloud
DownloadThe role of access control in a safe return to the workplace
Download5 security lessons for navigating COVID-19
DownloadHow end-to-end video security solutions can help your organisation with social distancing
DownloadHow doorhandles and levers with antimicrobial treatment reduce disease spread
DownloadBuilding a safe ecosystem for visitors post COVID-19
DownloadThermal cameras: Can they accurately detect body temperatures?
DownloadPalm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download