Institute security
There is much discussion amongst telecommunications companies about the automation journey of networks, and rightly so because artificial intelligence (AI), machine learning (ML), and pressure on carriers to increase margins from connectivity whilst protecting prices, are proving powerful agents for change in their market. Impact of hybrid connectivity However, there’s one other development that is not receiving enough attention, and that’s the impact of hybrid connectivity - the b...
Helitech Expo is excited to announce the return of the business event dedicated to the rotorcraft industry, taking place on the 24th and 25th of September 2024 at ExCeL London. This event is the ultimate destination for rotorcraft professionals seeking to stay ahead of industry trends and innovations. Helitech Expo The 2023 edition of Helitech Expo was a resounding success, attracting over 4,000 key buyers. The event facilitated crucial discussions on the integration of airspace,...
Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, announces its systems and services are deployed and maintained to the highest available level of cybersecurity protections and protocols. As major news stories continue to proliferate about hacks, breaches and vulnerabilities — including the high-profile cyberattacks this past week that crippled CDK Global, which provides management software for...
ODSecurity is thrilled to announce the successful installation of two Soter RS X-ray body scanners at the Cayman Islands Airport for the Customs and Border Control Service. These advanced scanners, developed by ODSecurity, are designed to detect contraband inside and outside the body using a very low X-ray dose, enhancing the airport's security measures. Effective and efficient installation The Customs and Border Control Service has expressed their satisfaction with the performance of ODSecur...
Integrity360, one of the pan-European cyber security specialists announced its partnership with Darktrace which will see Integrity360 act as a reseller for Darktrace’s entire portfolio of IT/OT services and initially offer the Darktrace/DETECT and RESPOND/Network™ solutions as part of its Managed Detection and Response (MDR) offering. Darktrace/DETECT and RESPOND provide threat detection and autonomous response capabilities to address the burgeoning attack surface across the extende...
Innodisk, a pioneering global AI solution provider, has officially inaugurated Phase II of its R&D and production centre in Yilan, Taiwan. In response to the massive market demand driven by the edge AI wave, Innodisk has transformed the manufacturing plant into the group's AI core base. With the increased production capacity, Innodisk is ready to collaborate with global clients to deploy edge AI solutions. At the same time, Innodisk is also inviting global tech talent to join its teams arou...
News
NSI-approved companies had an impressive presence amongst the finalists and winners at this year’s British Security Awards which took place on 3rd July at the Royal Lancaster Hotel in London. The prestigious annual ceremony, organised by the British Security Industry Association (BSIA), celebrates the achievements, acts of bravery and innovations by BSIA members and prospective members in the security systems and guarding services sectors. Highest standards of excellence As a long-term supporter of apprenticeships in the security and fire sectors, NSI was delighted to sponsor the Apprentice of the Year Award for the sixth consecutive year. This year’s winner, Terry McJimpsey of Securigroup, was recognised for his outstanding commitment to learning, professional development, and customer service excellence from his initial steps as an apprentice to his current role as Operations Centre Supervisor. NSI was delighted to sponsor the Apprentice of the Year Award for the sixth consecutive year NSI warmly congratulates all the winners and finalists from this year’s British Security Awards, whose achievements exemplify the highest standards of excellence in the private security sector. With 19 NSI-approved companies shortlisted as finalists and a remarkable 80 nominations among them, they are thrilled to celebrate the success of the following NSI-approved companies and representatives who emerged as winners in the following 13 categories: Best Team: Westgrove Group - Templars Square Shopping Centre Outstanding Act: Martyn Ward - Bidvest Noonan Security Manager of the Year: Tom Meredith–Mitie Gaby Hutchinson Award (Best Newcomer): Caitlyn Turner – Lodge Service Apprentice of the Year: Terry McJimpsey – Securigroup People Property Places - Professionally Protected Recognition Award: Enadeghe Nosakhare – STM Group Mental Wellbeing Initiative: Westgrove Group – Mind over Mountains EDI Champion: G4S – The Million, Securing a Socially Responsible Future SME of the Year: Fenix Monitoring Business of the Year: Mitie Installer of the Year: Securigroup – WH Malcolm Installation Environmental Project of the Year: Securigroup – Securigroup Forest Contribution to Industry: Shaun Kennedy – Securitas UK Additionally, congratulations to Ken Meanwell, Staff Officer NPCC Security Systems Group who received the Chairman’s Award, and to James Goodram of the Post Office, who was honoured with the Industry Bravery Award to a standing ovation. Level of commitment and professionalism Richard Fogelman, NSI Chief Executive, commented: “The British Security Awards are a highlight of the industry calendar and this year’s event was no exception. My congratulations go to all of this year’s winners and finalists, including the NSI-approved companies among them." "For those honoured in front of their peers and industry colleagues, who understand the level of commitment and professionalism required to provide service excellence 365 days a year, it is incredibly rewarding. We wish them continued success in their future endeavours.”
The wait is over! The Cyber Express proudly announces the return of World CyberCon, India Edition, set for September 27, 2024, in Mumbai. Under the theme “Strengthening India’s Digital Frontier: Preparing for Future Challenges,” this prestigious event is not just a conference but an award ceremony and exhibition. It offers a platform for recognition, networking, and showcasing the latest innovations in cybersecurity. Event highlights World CyberCon 2024 promises an enriching agenda with key discussions on: Navigating Regional Cybersecurity Compliance and Overcoming International Barriers The Future of Cybersecurity: AGI’s Role in Threat Mitigation Beyond the CISO Role: Exploring Opportunities in Investment, Leadership, and Advisory Safeguarding National Digital Assets: A Focus on Data Security Why attend World CyberCon 2024? Attendees will delve into strategies for cyber resilience, exploring how organisations can build and maintain robust defenses against an ever-changing threat landscape. Knowledge Sharing: Gain insights from industry pioneers through in-depth discussions and presentations. Networking: Connect with peers, potential clients, and industry pioneers in dynamic environments. Government Keynotes: Hear from prominent government officials on national cybersecurity priorities. Award Ceremony: Celebrate outstanding contributions to the field of cybersecurity. Exhibition Zone: Discover the latest innovations in cybersecurity technology. Business Prospects: Explore new opportunities for growth and collaboration. Post-Event Highlights on TV: Extend the reach and impact of the event's key messages through exclusive post-event highlights featured on a TV news channel. Entertainment: Enjoy a stand-up comedy performance for a light-hearted break. Speakers Some of the esteemed speakers at the conference include: Lt Gen (Dr) Rajesh Pant: Former National Cyber Security Coordinator, Prime Minister’s Office, GOI & Chairman, CSAI. Manoj Abraham, IPS: ADGP (Intelligence), Kerala Police. Kalpesh Doshi: Group CISO, HDFC Life. Dr. Nareshkumar Harale: Vertical Head & Vice President - Cyber Security, ReBIT. Amit Joshi: CISO, Adani Cement - Cyber Security, Adani Enterprises Limited. Deval Mazmudar: Cybersecurity Advisor, TJSB Bank. Harshad Mengle: Group CISO, Tata Chemicals Prianshu Khandwala: CISO - Head Information Security, Sun Pharma Dhiraj Rank: CISO, TATA AIG General Insurance Limited Sunil Nishankar: CISO, Future Generali India Life Insurance Deepak Bhosale: Associate Vice President, Asian Paints Makesh Chandramohan: CISO, Aditya Birla Capital What sets this conference apart? Organised by The Cyber Express, a global pioneer in cybersecurity news with 50K+ registered users and 200k+ monthly website visitors, World CyberCon offers unmatched opportunities to engage with industry experts, discover nationwide prospects, and access exclusive insights. Who should attend? Attendees will also benefit from robust lead-generation opportunities and access to an event app Tailored for CISOs, CIOs, CTOs, security auditors, heads of IT, cybercrime specialists, network engineers, and all stakeholders in internet safety, World CyberCon India Edition 2024 provides invaluable opportunities to gain insights, forge connections, explore business opportunities, and discover innovative solutions. Attendees will also benefit from robust lead-generation opportunities and access to an event app for one-on-one meetings with registered attendees. Join the conference For more information and to register, please visit the World CyberCon 2024 Website. Don’t miss this opportunity to be part of India’s premier cybersecurity event, where visitors can shape the future of cybersecurity, gain valuable insights, and connect with industry pioneers.
On June 26, 2024, high school and college students led the movement to protect their local communities as they showcased their ideas to prevent targeted violence and terrorism during the Invent2Prevent (I2P) Spring 2024 competition finals. Preventing targeted violence Sponsored by the U.S. Department of Homeland Security’s (DHS) Centre for Prevention programmes and Partnerships (CP3), I2P empowers youth to play a pivotal role in preventing targeted violence and creating more resilient local communities. The student teams presented their projects to judges from academia, education, and government sectors to win funds to further their initiatives. Invent2Prevent programme “Preventing targeted violence is a top priority for the Department of Homeland Security, and we are committed to working with and empowering our partners across the nation to do so,” said Senior Official Performing the Duties of the Deputy Secretary of Homeland Security Kristie Canegallo. “The Invent2Prevent programme is a critical part of this work, and this event demonstrates our support for youth-led initiatives to develop innovative, community-based programmes to reduce targeted violence and terrorism at campuses and communities across the country.” Critical thinking skills During the final event, the University of Maryland College Park won at the collegiate level During the final event, the University of Maryland College Park won at the collegiate level, and Penn Manor High School won at the high school level. The University of Maryland’s project, infOasis, equips teens with the media literacy skills needed to engage with digital content thoughtfully, critically, and responsibly. "I’m so thankful for such an amazing opportunity to help enhance our homeland security and make a tangible impact on my peers," said Zoe Cross, a University of Maryland student. "infOasis has such a bright future ahead of it and I can’t wait to continue the mission of empowering teens through critical thinking skills." Prosocial activities Penn Manor High School’s project, Friday Fun, transforms study halls into periods for students and teachers to engage in prosocial activities to decrease stress and social isolation. "I2P not only widened our perspectives, but it was inspiring as young people to be included in the conversation of how to protect our communities," Fatuma Mussa, Penn Manor High School student said. Spring 2024 competition Each team identified opportunities to improve the health and wellness of their schools In total, students from 53 universities and high schools competed nationwide for the Spring 2024 competition. Each team identified opportunities to improve the health and wellness of their schools, campuses, and communities and then developed a relevant initiative to decrease the likelihood of violence. Targeted violence and terrorism "I'm so inspired by the students who participated in the spring competition at a challenging time for schools and universities,” said CP3 Director Bill Braniff. “Targeted violence and terrorism are preventable, and these students showed us and the rest of the nation that by investing in strengths, like coping skills, critical thinking, relationship building, heightened community awareness, and physical and mental wellness we can sow the seeds of prevention.” Sustainment programme Since Invent2Prevent began in 2021, more than 1,200 students have participated, representing 119 universities across 33 states and the District of Columbia, along with 138 high schools from 26 states. The sustainment programme helped to create a nationwide debate competition to combat hate and promote civil discourse Previous I2P finalists have applied for a year-long sustainment programme to build on their projects’ successes. So far, 13 collegiate teams have participated in the sustainment programme. One past winner who participated in the sustainment programme, George Washington University (GWU), won third place with its Talk with Me: Debate to Deflate Hate project in 2023. The sustainment programme helped to create a nationwide debate competition to combat hate and promote civil discourse. DHS CP3 Targeted Violence and Terrorism Prevention As a part of the competition, four educators and approximately 50 college and high school students submitted written arguments for how best to address hateful rhetoric in schools while respecting free speech and academic freedom. During lunch hour of the Spring I2P final, the top two students with the best speeches debated live for prize money on whether social media poses a detriment to national security or protects lives. I2P finalists can also apply for a DHS CP3 Targeted Violence and Terrorism Prevention grant to further increase their impact. So far, more than $2.6 million in grants have been awarded to support and sustain student-developed programmes. Spring 2024 results The following are the complete results for the Spring 2024 final competition: University Competition 1st Place, University of Maryland College Park: InfOasis helps students gain and apply critical thinking skills when consuming or creating media The team developed infOasis to fill the critical gaps in media literacy education. The project created a unique set of online toolkits with interactive modules and fun, modern mini-games to enhance media literacy skills. The toolkit is free and accessible to everyone, but undergraduate college students are the target demographic. Many college students struggle to detect manipulative content due to the volume of information they are exposed to when entering college. Through this hands-on learning experience, InfOasis helps students gain and apply critical thinking skills when consuming or creating media. 2nd Place, Missouri State University: The team created the C.R.A.N.E. Project (Creating Resilient Atmospheres through Natural Exercise) to prevent bullying and social isolation in schools through physical exercise. Research has shown that students who feel lonely can also have an associated increase in aggressive behavior or a lack of inhibition. This tool helps students release anger or negative thoughts more healthily by participating in yoga or martial arts. Teachers received videos of yoga and martial arts by certified instructors to share with their students and were educated on the benefits of mindfulness. The project focuses on 4th-8th grade students because the team found that they are most susceptible to issues like social isolation and anxiety and need effective coping mechanisms. 3rd Place, Ohio Dominican University: SHELVE stands for See, Hear, Evaluate, Learn, Voice, and Empower – a call to action to educate the youth The team’s Shelve the Hate: a Toolkit for Action project empowers librarians to play a pivotal role in the fight against targeted violence and online mobilisation against violence. SHELVE stands for See, Hear, Evaluate, Learn, Voice, and Empower – a call to action to educate the youth and raise awareness about preventing this violence. The toolkit provides resources, ideas, guides, graphics, research, and links to national organisations that share ways to prevent targeted violence. Through a website, middle school, high school, college, and community librarians can share these tools with fellow educators, parents, and students. In this way, the project seeks to empower libraries as a natural gathering place to centralise prevention efforts. High School Competition 1st Place, Penn Manor High School: The team’s Friday Fun project seeks to create positive emotions among students and teachers to reduce stress and social isolation. High school students and teachers engaged in prosocial activities, like group games, friendship-making bracelets, door decorating, “Fast Friends” BINGO, and pet therapy. The project is based on the broaden and build theory in positive psychology, which suggests that when people enjoy themselves, they tend to feel positive emotions, which can increase their well-being and resilience. Through these activities, the team seeks to create connections and a sense of community, protective factors that can decrease the likelihood of violence. They hope to use this as an opportunity to increase awareness of mental health and the importance of checking in on peers. 2nd Place, Urban Assembly Institute of Math & Science for Young Women: The team held a field day event for students and officers where they were able to break down barriers The team’s Bridging the Gap project aims to reduce tension between youth of color and police officers in downtown Brooklyn, New York. A survey of 116 students at the school showed that over 90% did not feel safe in the presence of police officers. To lower this tension, the student team created unique one-pagers and presentations for 500 students and 30 officers that explain the need for improving relationships and how to do so. The team also held a field day event for students and officers where they were able to break down barriers, begin to form relationships and create a safer and more resilient community. 3rd Place, Englewood S.T.E.M. High School: The team created Mind Over Mad-Her as an anti-violence initiative to reduce female-on-female bullying in high school. It seeks to bring young women together by identifying and celebrating their commonalities and differences. The team made zero-cost group therapy available to both victims and perpetrators of female bullying. This therapy supports the development of positive coping skills and empathy that offset negative feelings. The project supports young women to recognise how traumatic experiences can subconsciously influence the way they handle anxiety and insecurity.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced it has secured more than $53M in Series B funding. The oversubscribed round was led by Sorenson Capital, with participation from Intel Capital, BroadLight Capital and existing investors. ZeroEyes is on a mission to stop gun-related violence in the United States. The company offers an affordable end-to-end security solution, from threat detection to situational awareness, focused on proactively identifying guns before shots are fired and providing actionable intelligence to on-site staff and first responders. Gun detection software “ZeroEyes is an unobtrusive force multiplier that helps protect schools, businesses, and other organisations against gun-related violence,” said Mike Lahiff, CEO and co-founder, ZeroEyes. “Our goal is for our software to become the fire alarm of the future. Every building in America has a fire alarm and at some point, every camera in the nation must have gun detection software deployed. We will be that provider.” ZeroEyes’ proactive AI gun detection and intelligent situational awareness software currently protect thousands of buildings for hundreds of customers in 42 states, and demand continues to grow in the education, commercial, transit and government sectors. Dispatch alerts and actionable intelligence ZeroEyes' AI gun detection and intelligent situational software layers onto existing digital security cameras "Effective gun detection technology is difficult. The team at ZeroEyes has paired extensively trained military professionals with the most comprehensive AI-forward software to ensure safety in communities throughout the country," said Rob Rueckert, Partner at Sorenson Capital. “The ZeroEyes team is, without exception, the most qualified team, with many years of collective military training.” ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to first responders and local staff as quickly as three to five seconds from detection. ZeroEyes’ growth strategy "Gun violence has changed the American education system. It’s a looming threat facing students, educators and families on a regular basis,” said Mark Lydon, Managing Director at Intel Capital. “The ability of ZeroEyes’ AI gun detection software to increase physical safety in schools, and beyond, offers a glimpse into a world where AI is leveraged to address the most critical societal challenges." The additional capital will be instrumental in propelling ZeroEyes’ growth strategy, including investments in channel partnership programs, research and development, business expansion, and the company’s Gun Violence Research Centre.
Colt Technology Services, the digital infrastructure company, published its third Sustainability Report. The report tracks progress for Colt Group-comprising Colt Technology Services and Colt Data Centre Services-against targets set for the 12 months ending 31st December 2023 in the areas of Environmental, Social and Governance (ESG), and against longer-term targets to net zero. The past 12 months have seen Colt launch an ambitious new ESG strategy; secure the highest EcoVadis rating for the second consecutive year; and achieve ‘A-' and ‘A’ CDP (Carbon Disclosure Project) ratings for sustainability and supplier engagement. New technologies and geographies Other achievements are highlighted in the report as Colt welcomes 1000 new employees These and other achievements are highlighted in the report as Colt welcomes 1000 new employees and integrates new technologies and geographies following its acquisition of Lumen EMEA in November 2023–a strategic move to provide customers with global scale and technology innovation, and to generate sustained growth for Colt. Keri Gilder, CEO, Colt Technology Services said, “Colt is a company that cares deeply, which is why we focus on sustainability by design. 'We can change the world’ is one of our values and it informs, shapes and inspires everything we do. Nowhere is this better reflected than in our latest Sustainability Report. The passion and tremendous energy we have as a business to do better for our planet, our people and our customers can be seen on every page, in every metric and in every stride towards our goal to reach net zero greenhouse gas emissions by 2045. I’m incredibly proud of the progress we’re making to build a better world.” Key progress Key progress to reach net zero highlighted in the report includes: 34% reduction in CO2e emissions against the 2019 baseline, 6% against the previous year 71.5% reduction in Colt Group's Scope 1 and Scope 2 emissions compared to the 2019 base year; a reduction of 22.5% year-over-year 6% reduction in Scope 3 emissions compared to 2022 78% of the Scope 2 electricity procured for Colt’s global sites is renewable; a 4% improvement since 2022 30% of Colt’s fleet is now fully electric and a further 38% are Plug-In Hybrid Electric Vehicles 89% of suppliers have signed Colt’s Code of Business Conduct 40% of Colt’s Scope 3 emissions are with suppliers that have already set a Science Based Target Colt is now a participant in the UN Global Compact, a voluntary initiative, based on CEO commitments, to implement universal sustainability principles and to take steps to support the UN Goals. Colt has been involved in a Scope 3 emissions workstream through the Global Enabling Sustainability Initiative (GeSI), the cross-industry sustainability initiative to create digital solutions for society’s most pressing challenges. In conjunction with the International Telecommunications Union (ITU) and GSMA, GeSI and its members have developed new guidance specifically for the telecommunications sector on reporting Scope 3 emissions produced by the suppliers. The Scope 3 guidance for telecommunication operators provides an extensive understanding of categories for Scope 3 evaluation and establishes guiding principles for telecommunications operators to allocate, calculate, and report the emissions in their supply chain Further highlights Further highlights from around the Colt business outlined in the 2023 report include: The launch of a Global Social Impact Strategy that aims to empower Colt’s communities through digital education and inclusion A 24% year-over-year increase in employee volunteering days; 867 days given by employees to volunteer at external charities and initiatives in 2023 Flexible First, Connection Days and Culture Buddy programme as positive contributors to inclusive company culture Programmes and plans including Gender Action Plan to improve gender balance throughout the business RISE–programme for emerging talent from underrepresented backgrounds Allyship in Action programme aimed at bringing allyship to life Optimising Accessibility–five-year accessibility improvement plan Neurodiversity research and awareness Menopause Reframed-menopause awareness campaign Pride cross-company collaboration, supporting LGBTQ+ colleagues in tech Participation in TC4RE-the technology community for Racial Equality In 2023, Colt was awarded the ISO27701 certification for its privacy information management system, which is an extension of ISO27001. This Global standard provides the framework for organisations looking to put in a system to support compliance with the EU GDPR and other Data Privacy Requirements. Colt received the highest level of certification under Spain’s Esquema Nacional de Seguridad (ENS), the National Security Scheme. This achievement reflects Colt's commitment to the protection of information and the customers’ security Colt has joined Stop Scams UK, an industry-led collaboration of responsible businesses from across the banking, telecoms and technology sectors who have come together to ‘help stop scams at source’.
Zentra, a brand of Allegion®, and pioneering provider of smart access solutions, has integrated resident keys capability in Apple Wallet for use by customers and their residents. This enables residents to easily and securely add their resident keys to Apple Wallet and unlock their apartment with a simple tap of an iPhone or Apple Watch. With this new capability, residents are able to unlock their building doors, amenity spaces and individual apartment units without contact using their iPhone or Apple Watch — eliminating the need to use a traditional, physical key. Improved security and streamlined operations “This new feature reflects our commitment to prioritising the needs of multifamily property owners and operators,” said Dave Ilardi, senior vice president and president of Allegion Americas. “We are excited to bring an enhanced living experience to residents, bolstered by improved security and streamlined operations.” Benefits include: Seamless, Secure Access with a Tap of an Apple Device: Resident keys in Apple Wallet enable residents to conveniently access all their assigned doors using just their iPhone or Apple Watch. Once a resident key is added to Apple Wallet, residents can hold their device near a door’s NFC-enabled lock to seamlessly access secured areas. With Express Mode, residents don’t need to unlock their device to use their resident key in Wallet. If an iPhone needs to be charged, residents can still use their device to access their apartment with Power Reserve, an Apple feature. Operational Efficiency for Multifamily Properties: Property owners, operators, and managers will benefit from the streamlined operations of Zentra’s solution. Resident keys can be remotely issued and managed, eliminating the hassle of physical key management and replacement. This not only streamlines operations but also enhances the overall resident experience. Secure, Private Access Experience: Resident keys in Wallet take full advantage of the privacy and security features already built into iPhone and Apple Watch. Data is encrypted and protected against tampering and theft, and Apple cannot see when or where a resident uses a resident key in Apple Wallet. If their iPhone or Apple Watch is misplaced, the owner of the device can promptly use the Find My app to lock the device and help locate it. Future of multifamily access control Zentra and resident key in Apple Wallet key is open on the Schlage Control® Mobile Enabled Smart Lock Currently, the Zentra and resident key in Apple Wallet solution is available on the Schlage Control® Mobile Enabled Smart Lock, award-winning Schlage NDE Mobile Enabled Wireless Cylindrical Lock, Schlage MTB Mobile Enabled Multi-technology Reader, and Schlage RC Reader Controller. Zentra has plans to expand its capabilities to the new Schlage XE360 Series later this year. Attendees of Apartmentalize 2024, taking place from June 19-21 at the Pennsylvania Convention Centre in Philadelphia, are invited to experience live demonstrations of the resident key solution in Apple Wallet at Zentra’s booth #366. The Zentra team will showcase the solution’s capabilities, providing a hands-on look at the future of multifamily access control. Innovative technology solutions For those multifamily professionals who are not attending this year’s Apartmentalize, they can contact a multifamily consultant from Zentra to learn more about the solution and how to implement it on their property. Zentra offers unparalleled security and access solutions, backed by Allegion, and designed with operators, residents, and multifamily integrators in mind. Visit the website to learn more and follow on LinkedIn to stay up to date with meet and greet opportunities at Apartmentalize. Zentra is dedicated to enhancing the way people interact with their living spaces through innovative technology solutions. With a focus on resident experience and security, Zentra continues to lead the industry in smart access control for multifamily properties.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
These days, business is more collaborative, adaptable and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid and cloud systems. Good security is built on solid identity governance and administration (IGA) principles. From ransomware to supply chain intrusions, high-profile cybersecurity events frequently take advantage of weak identity and access management procedures. The Identity Defined Security Alliance found that 84% of organisations experienced an identity-related breach during its one-year study period. Robust IGA system Consequently, organisations need to find best-of-breed solutions for each section of the fabric Some of the most well-known cyber-attacks have not been made possible by a nation-state exploiting a remote zero-day vulnerability; rather, they have been made possible by something as basic as a hacked orphaned account. This resulted in lateral movement from an insecure platform to a high-value system, illegitimate privilege escalation or unsanctioned access to a computer system. To safeguard against such attacks, organisations must be aware of who has access to their systems and apps, and guarantee that access is revoked when it is no longer required. Here, a robust IGA system is helpful. It is not the whole picture, though; IGA is part of a larger identity fabric. A report by KuppingerCole noted that “Identity Fabrics are not necessarily based on a technology, tool or cloud service, but a paradigm for architecting IAM within enterprises.” The report pointed out that the paradigm is created using several tools and services. That’s because, contrary to marketing claims, no one vendor has a platform that provides all the needed elements. Consequently, organisations need to find best-of-breed solutions for each section of the fabric. Threats to the new corporate landscape Due to their exclusion from the corporate firewall and the security culture that comes with working on-site, remote employees and third parties are desirable targets for hackers. The transition to online office suites is another vulnerability that hackers are taking advantage of–for instance, through bogus authentication login dialogues. Additionally, hackers are using technologies like machine learning and artificial intelligence to circumvent current security tactics. A cyberattack powered by AI will imitate human behaviour and develop over time. Even publicly available information might be used by this "weaponised AI" to learn how to get past a target’s defences. CISO and the business users Attackers will finally find an entryway, but firms can protect the new perimeter–their identities It's no longer possible to secure the traditional perimeter. Attackers will eventually find an entryway, but businesses can protect the new perimeter–their identities. To defeat these threats, organisations must look again at identity and access management tools and how they are weighed against the impact on the organisation. Should you mandate multi-factor authentication (MFA) more often and earlier? Should only company-owned devices have access to networks, or should access be restricted to specific business hours or regions? Should access to sensitive information and critical systems be given just temporarily or should it be offered on a task-by-task basis? Both the CISO and the business users they assist should be asking these questions. Staying ahead of threats with identity Access control limits decrease dangers but can come with a cost. If you give your users too much access, your organisation becomes susceptible; if you give them too little, productivity suffers. But there are ways to strike a balance with security, compliance and productivity. More CISOs are turning to Zero Trust–which is based on the principle of maintaining strict access controls and not trusting anyone by default–to protect their systems from new attack types. However, Zero Trust is reliant upon having a thorough and baked-in strategy that underpins it. Other actions that companies can take include implementing automation for identity management, such as automating workflows for approval. This would significantly lessen the administrative burden and friction that security solutions like multifactor authentication (MFA) or time-restricted access to critical systems have on business users. This might include restricting access to particular devices, capping access hours during the day or enforcing MFA based on user behaviour. Identity fabric: Putting it all together Make sure your identity architecture is scalable, secure, and provides a seamless user experience These are just two elements of the identity fabric approach. Most organisations today have implemented pieces of an identity fabric, which is basically an organisation’s identity and access management (IAM) infrastructure and typically includes a mix of modular IAM solutions for multi-cloud and/or hybrid environments. Now, organisations need to define, enhance and develop this infrastructure. They must also institute guiding principles for how it should operate, meet current and future business requirements as well as identity-related cybersecurity challenges. In doing so, businesses can move past identity platforms and adopt an identity fabric perspective. The key is to make identity governance the starting point of your identity fabric strategy, ensuring seamless interoperability within your identity ecosystem. Make sure your identity architecture is scalable, secure, and provides a seamless user experience. Aligning security with business Due to the increase in knowledge workers using the cloud and working remotely, attackers are focusing on this group. These employees are easier to compromise, give access to valuable data and offer more attack targets. Knowledge workers also lack an administrator’s level of security expertise. Therefore, as part of their security fabric strategy, enterprises require a scalable IGA system. It is easier to comply with security and access regulations and takes less time for IT teams to do normal administrative activities when they invest in IGA, a crucial tenet of identity security. CISOs and boards, though, are currently looking at more than identity management. IGA is at the centre of the debate about security and governance. Taking an identity fabric-based approach, with a foundation built on modern, cloud-based IGA, will safeguard identities, increase productivity, and make staff adherence to organisational procedures easier.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
Security beat
GSX 2023 has its share of new product announcements, although many of the new products are enhancements to technologies shown at last spring’s ISC West show in Las Vegas. Booth traffic on the first day seemed busy at the Kay Bailey Hutchison Convention Center in Dallas, although one exhibitor complained that it takes some time for the traffic to make its way to the farthest areas of the show floor. Apparent throughout the GSX show is an expanding idea of what constitutes security. Increasingly, ‘security’ technologies offer benefits throughout other parts of a company or institution. Security is also being broadened to encompass ‘safety,’ including emergency response and wider issues of keeping a company safe. Managing multiple systems People look at the systems they have, and they are looking for more information" Manufacturers at GSX are talking about more than new products. Rather, they are offering new approaches to turn products into ‘solutions’ for customers. Among the benefits of new systems is the availability of more data. “People look at the systems they have, and they are looking for more information and data and insights from their systems,” says Kyle Hurt, Genetec’s Area Vice-President of Sales for the US and Canada. “In the past, if I’m managing multiple systems and spending time and resources, I am making sure systems are operational. Today, it’s more like: How do I make my enterprise more efficient? I spend less time on making sure systems are working together but more time on how we can use the information.” Manufacturers at GSX are talking about more than new products Security control room Genetec is enhancing its Security Center 5.11 version with a newly redesigned web client that provides new capabilities related to system audio, including the ability to trigger a public address from a mobile device in an emergency, two-way audio to and from the security operations centre, and the ability to record an incident. The new web client offers new levels of “Security on the go,” says Hurt. A mobile device becomes an extension of the security control room. “Customers want to have more remote capabilities and have their security personnel out and about, not tied to a desk,” says Hurt. The new web client works to unify the four pillars of the Security Centre— video, access control, license plate recognition, and now audio. Single source manufacturer Audio can now be used to broadcast a message, respond to an incident, and notify people" “Audio has taken time to develop legs in our ecosystem,” says Hurt. “We have been developing partnerships and use cases beyond an intercom at the door. Audio can now be used to broadcast a message, respond to an incident, and notify people en mass of what’s going on.” Manufacturers are also fine-tuning how they work to meet customers’ needs. “Customers want one point of contact, a single source manufacturer, and a solution that reflects the manufacturer is listening to the voice of the customer,” says Jerry Burhans, Managing Director of ASSA ABLOY Global Solutions - Critical Infrastructure, which seeks to be a global partner to critical infrastructure industries. The Critical Infrastructure business works across the various product groups of the notoriously siloed company to bring together solutions aimed at meeting each customer’s need. Manufacturers are also fine-tuning how they work to meet customers’ needs Best-in-class technology “We try to have best-in-class technology and collaborate within ourselves to make sure we have what customers need,” says Burhans. Critical infrastructure industries such as water, power and energy, oil and gas are developing standards to help support preparedness of the nation’s infrastructure, and ASSA ABLOY Global Solutions is helping operators secure access and provide audit trails on locking hardware and keys within their security perimeters. Managing customer assets Johnson Controls’ new OpenBlue Service for the security device market seeks to proactively manage customer assets (equipment) as a service. The company’s software platform of connected solutions monitors and manages security devices across vendors and provides remote support services including skilled engineers who can work to ensure that a company’s assets, including cameras and access control readers, operate dependably. Working remotely, OpenBlue analyzes the performance of each system component Johnson Controls estimates that, unfortunately, up to 25% of a company’s security assets may not be working as intended, whether they lack the latest firmware update or are not connected. Working remotely, OpenBlue analyses the performance of each system component and responds to ensure equipment operates as intended. “We believe we can close that gap with our solutions,” says Greg Parker, Vice President, Innovation & Portfolio Management for Johnson Controls. Physical security equipment A big advantage of OpenBlue for security customers is the ability to manage cybersecurity and threats at the edge, which may not currently be addressed by the IT department. The OpenBlue offering includes an embedded ‘air wall,’ which is a zero-trust architecture for physical security equipment. OpenBlue also helps customers manage the ever-changing lifecycles of various assets. Another concept prompting discussion at GSX 2023 is the gap between what a customer expects from a product and what the product can realistically deliver. With endless promotion in the last several years centring on concepts such as artificial intelligence (AI), is it any wonder that customers may sometimes have unrealistic expectations about what a technology can accomplish? The good news at GSX is that, as progress marches on, newer technologies are getting closer and closer to delivering on customers’ most ambitious expectations. The forward momentum of technology development is evident throughout the GSX 2023 show floor, reflecting the promise of even greater product capabilities in months and years to come.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Well attended and generating levels of excitement not seen since before the pandemic, ISC West may provide just the shot of adrenaline we need to drive industry success through the uncertain economic times ahead. Buzzwords like artificial intelligence (AI) and the cloud were still prevalent at the conference and exhibition in Las Vegas, but the hype of yesteryear seemed more subdued. Rather than breakthroughs to be celebrated, AI and cloud were discussed more as ways systems can realise even greater potential. Rampant cybersecurity attacks Rather than hype, discussions seemed much more practical and down-to-earth, encompassing shifting customer needs and how to address pain points. There was more discussion of the shift of security from a cost center to a profit center, where industry technologies can contribute to an enterprise’s bottom line. More companies seemed to be vigorously addressing the challenges of cybersecurity More companies seemed to be vigorously addressing the challenges of cybersecurity, although perpetually an obstacle. The industry seems more devoted than ever to protecting physical security systems in an age of rampant cybersecurity attacks. But more than in years past, it was the ISC West event itself that generated the most buzz. The crowded aisles of the exhibition seemed both reminiscent of the pre-covid past and prescient of the industry’s even brighter future. From booth to booth and attendee to attendee, the enthusiasm was both conspicuous and contagious. Everybody was thinking: ‘Wow! What a show!’ Pushing technology to the edge “The practice of physical security is about more than understanding threats, and end users are thinking now about the bigger picture of security and how networks work in the broader context of the business,” said Andrew Elvish, Vice President, Marketing at Genetec. Problems of latency and miscommunication are elements pushing technology to the network edge, he says. For example, in an access control scenario, decision-making should be as close to the door as possible to avoid network congestion, delays, or failure. Andrew Elvish, Vice President, Marketing at Genetec, displays Axis network door controller ‘powered by Genetec’ Elements pushing technology Reflecting the philosophy is a new collaboration introduced at the show called ‘Axis Powered by Genetec,’ an enterprise-level access control offering that combines Genetec Synergis software with A1210 and A1610 network door controllers by Axis Communications. Elvish says lines are blurring when it comes to edge versus cloud technologies. Rather than choosing ‘either-or,’ a blending of approaches is optimum, always ensuring that “Decision-making is close to the point of actuation,” he says. On-premise versus cloud systems Elvish also points to changing assumptions about the industry roles of on-premise versus cloud systems Elvish also points to changing assumptions about the industry roles of on-premise versus cloud systems. Historically, the assumption was that on-premise systems are most appropriate for enterprise customers, while the cloud is the best approach for small- to medium businesses (SMBs). Depending on the end customer’s needs, a system can be either or both at the same time. Rather than debate cloud versus edge, customers should consider the outcomes they seek, and how technologies can be merged to provide those outcomes. “They should consider a solution where they do both, with the gradation of controls provided at their fingertips,” says Elvish. Combining security into one platform Unifying security and related functions on a single platform was a widely evident trend at ISC West. An example is Verkada which now offers a unified platform that includes video, access control, and intrusion detection, as well as other functions such as air quality sensors, visitor management, and a door intercom. David Tsang, Product Director of Verkada, predicts demand to combine technologies into a single platform will grow in the industry. Furthermore, as data is collected in the single system, enterprises will find new ways to ‘connect the dots’ to provide better business intelligence. Air quality sensors Verkada’s cloud-based system enables fast deployment of the single platform “Our approach to building products is based around the idea that every company has different needs, and they want technologies to integrate seamlessly and operate off the same platform,” says Tsang. In addition to seamless integration, each product must also be able to stand on its own. Tsang manages Verkada’s various product categories, including access control, air quality sensors, intercoms, etc. Verkada’s cloud-based system enables fast deployment of the single platform, and the company works with dealers to ensure delivery of a 'better partner experience.' What happens after a binge of acquisitions? Acre Security unveiled a new corporate ‘identity’ and a big booth highlighting the technology brands the company has acquired over the last several years. Brands such as Feenics, ACTMobile, Comnet, Razberi, and others reflect Acre’s acquisition of these companies but are now being promoted as technology choices under the ‘one Acre’ approach. Don Joos, CEO of Acre Security, looked ahead to the future of the company at ISC West Visitor management product categories Change is in the air, and the booth’s unified visual design signifies the new direction for the company, says Don Joos, Acre’s CEO. Various technologies can be delivered via the cloud, through an on-premise installation, or using a hybrid approach Acre is highlighting ACTMobile’s mustering capability, useful in the K-12 market In tying technologies together, the ACTMobile product will play a key role in two major verticals -- command-and-control and K-12 schools. Acre is highlighting ACTMobile’s mustering capability, useful in the K-12 market, which was adapted from a technology used in the cruise industry. The Acre approach is to embrace the variety of opportunities available in the access control, intrusion, and visitor management product categories within a broad definition of ‘security’ that embraces both core capabilities and ‘adjacencies,’ says Joos. Acre seeks to enable customers to protect people, facilities, and critical assets. They manage customers’ security data and provide the insights they need. Ensuring a cohesive security system A challenge in the industry is combining various single products into a cohesive whole. “There are many products that do one thing well, but it’s harder to build a cohesive security platform,” says Ryan Schonfeld, Founder and CEO of Hivewatch. Hivewatch is a software platform that performs the functions previously associated with a ‘PSIM,’ which is a physical security information management system. The term PSIM has earned a questionable reputation in the industry, plagued by added costs and the perpetual challenges of integrating with ever-changing software platforms. Information management system Hivewatch seeks to bypass other software systems and to integrate as closely as possible with devices Hivewatch seeks to bypass other software systems and to integrate as closely as possible with devices on the edge, thus avoiding the impact of software system changes. They integrate with data in a ‘different way’ that eliminates the need to conform to other software systems. In today’s climate, the term ‘security’ could be seen as limiting when it comes to the various functions our industry’s systems can perform in the broader enterprise, says Schonfeld. Traditional enterprise reporting structures that have physical security reporting to the facilities or real estate department are limiting the broader role security can play in the enterprise. Positioning physical security Changing norms are positioning physical security to report to the CIO or CISO, thus reflecting physical security’s role in collecting and analysing data. Higher visibility within the enterprise can help security expand its influence and impact. “Security is too limiting, and it can keep us from getting a seat at the table,” says Schonfeld. “We need to shift from being a cost center to generating revenue and/or driving business — and data is the key. Rather than leading by fear, we need to show the value security can drive.”
Case studies
A renowned global pioneer in international education services provides various programs and comprehensive support to students pursuing their educational goals abroad. Originating from Australia in 1969, its primary objective has been facilitating educational opportunities worldwide. The company is closely associated with IELTS (International English Language Testing System), and it assists students in studying in English-speaking nations like Australia, New Zealand, Canada, Ireland, the UK, and the US. Company profile In India alone, it has over 70 offices across 61 cities and grew its operations in Southeast Asian nations Situated in Delhi, India, the company’s Indian headquarters serves as a central operational hub, addressing the diverse needs of Indian students aspiring for overseas education. With a team of dedicated experts, the centre offers students personalised guidance, counselling, and support nationwide. In India alone, it has over 70 offices across 61 cities and expanded its operations in Southeast Asian countries. Motivated by a commitment to excellence, integrity, and student success, the company continues to empower individuals, fostering global connections and promoting cultural understanding through international education. Challenges Ensuring the integrity of its assessment process Needed a standard procedure that could be replicated across 61 locations Evidence capturing to confirm the identity of the student appearing for the exam Needed a surveillance solution that ensured compliance at the centre Need to capture footage locally and centralised monitoring The surveillance solution should be dependable, scalable, and interoperable Business scenario The institute sought a wide surveillance solution that captured the details of every student As the co-owner of the IELTS, the institute faced significant challenges in ensuring the integrity of its assessment process for students studying in English-speaking countries. With centres spread across India and other Southeast Asian countries like Sri Lanka, Bangladesh, and Bhutan, they needed a reliable surveillance solution to verify the identity of candidates at their assessment centres. It was crucial for the assessment process to be standardised across 61 locations and easily replicable in new centres. With 11 assessment centres and 49 centres where students arrived for assessment, the institute sought a comprehensive surveillance solution that captured the details of every student entering their premises and cross-referenced them with their system centrally. Additionally, they required a robust recording architecture to store video evidence for future reference as needed securely. In essence, the company faced the distressing challenge of establishing a surveillance solution that was dependable, scalable, capable of capturing essential details, and interoperable. They needed a distributed architecture with centralised control to meet their surveillance requirements effectively. Solution The surveillance solution comprised of: The challenges faced by the institute were swiftly assessed by Matrix experts, who devised a robust surveillance structure to ensure compliance across multiple centres in India and abroad. In all 61 centres, Matrix 2MP PTZ cameras with 25x optical zoom were strategically installed to capture the faces of candidates arriving for tests and match them with their recorded details in the system. The movement of each candidate was meticulously recorded in the system to maintain accurate identity records. The action of each candidate was meticulously recorded in the system to keep real identity records Further, the accuracy was enhanced by adding a secondary layer of surveillance to monitor compliance with the SOP. Matrix PTZ cameras with 25x optical zoom adeptly captured intricate event details recorded in the computer. To meet the needs of each centre, NVRs (Network Video Recorders) with different capacities were installed. This enabled the local recording of details at each centre. Following the client's specifications, the NVRs were configured to store recorded details for three months. Additionally, cameras were installed at the 11 OSM sites to ensure compliance at the places where the papers were assessed. Products offered SATATYA MIBR20FL36CWP: 543 2MP IR Bullet Camera with 3.6mm Lens with Audio SATATYA MIDR20FL36CWP: 264 2MP IR Dome Camera with 3.6mm Lens with Audio SATATYA PZCR20ML25CWP: 76 2MP Pan-Tilt-Zoom Camera with 25x Optical Zoom SATATYA NVR1601X - 8 Nos 16 Channel NVR with 1 SATA Port SATATYA NVR1602X - 8Nos 16 Channel NVR with 2 SATA Port - 8 Nos SATATYA NVR3202X - 1Nos 32 Channel NVR with 2 SATA Port SATATYA NVR3204X - 31Nos 32 Channel NVR with 4 SATA Port SATATYA NVR6404X - 2Nos 64 Channel NVR with 4 SATA Port SATATYA NVR6408X - 7Nos 64 Channel NVR with 8 SATA Port MATRIX LICENCE DONGLE 200 Enterprise VMS: USB Dongle to Run Licence Application SATATYA SAMAS PLT Enterprise VMS: Software for up to 65,535 Cameras SATATYA SAMAS CAM100 - 5Nos Enterprise VMS: 100 Camera Licence SATATYA SAMAS USER3 - 5Nos Enterprise VMS: 3 Concurrent User Licence Benefits Enhanced Assessment Integrity: By implementing Matrix 2MP PTZ cameras with 25x optical zoom across all 61 assessment centres, the company ensured the integrity of the assessment process. These cameras meticulously capture the faces of candidates arriving for tests, allowing them to verify their identities and maintain accurate records. Standardised and Replicable Procedure: The Education Centre needed a standard procedure that could be replicated across the extensive network of centres. The Matrix surveillance solution provided it with a standardised approach that could be easily implemented in new locations, ensuring consistency in its assessment process. Compliance Assurance: The addition of Matrix PTZ cameras with 25x optical zoom and a secondary layer of surveillance helped them monitor and ensure compliance with the Standard Operating Procedures (SOP) at all times. Dependable and Scalable Surveillance: Matrix's NVRs with different capacities allowed the Institute to locally store recorded details at each centre while ensuring reliability and scalability for future expansion. Centralised Monitoring: To streamline the operations, they needed a surveillance solution that allowed seamless central monitoring. Matrix's solution facilitated the cross-referencing of student details with their system centrally and, enhancing efficiency and data accuracy. Interoperability: Matrix's surveillance solution is designed to be interoperable, ensuring seamless integration with the existing infrastructure. This interoperability enables them to adapt to evolving technological requirements while maintaining the integrity of the assessment process. In summary, Matrix's comprehensive surveillance solution not only addressed the immediate challenges but also provided a robust foundation for the assessment process, enabling them to uphold the highest standards of integrity, compliance, and efficiency across all assessment centres.
Koning Willem I College in north-east Brabant, The Netherlands offers various educational and integration programmes. In total, around 18,000 students take 250 courses at its 16 locations. Modern educational institution A new location on Onderwijsboulevard in 's-Hertogenbosch was designed to be a model modern educational institution, including its access control. The imposing new building has modern rooms that provide opportunities for consultation, collaboration in small and large groups, presentations, and individual work. Access to these spaces required a flexible and modern locking solution ideally with as few keys as possible. Employees and students must feel welcome and safe. Need for an easily integrated system Dependable security was needed for all kinds of valuable learning materials and sensitive information Dependable security was needed for all kinds of valuable learning materials and sensitive information. “Easy integration with the existing access control system without additional software,” was the goal, according to Alex te Pas, functional manager of facilities management information systems. Keyless access for improved security and management “Within our organisation, we want to phase out the use of keys,” he says. “Because when employees left, we noticed that people often forgot to turn in keys or tokens. In the event of an audit, we then have a problem." Wireless Aperio locks The college chose Aperio locks which are easy to integrate wirelessly with their existing Nedap AEOS access control system. No additional software is needed: wireless Aperio locks communicate via Aperio Hubs which handle secure, real-time communication between locks and the AEOS system. This way, college security staff have full control over access and can quickly revoke anyone’s access rights. Saves time and costs The ongoing cost of using these battery-powered locks is also much lower than for equivalent wired electronic locks Because Aperio devices run on batteries, rather than mains power, there was no need to make any major adjustments to the doors. This saves both time and cost during installation. The ongoing cost of using these battery-powered locks is also much lower than for equivalent wired electronic locks, which require an ‘always on’ connection to the power grid to maintain secure status. Aperio E100 Escutcheon The college chose the Aperio E100 Escutcheon to secure doors throughout the building. The E100 offers a convenient combination of free exit from the inside with automatic locking on closure from the outside. It comes in a variety of specifications to fit different door security levels or everyday usage, including a version with PINpad which adds another level of control. 2-factor authentication With the additional PIN code, the risk of unauthorised access via a found or stolen pass is minimised. “We wanted to provide our technical rooms with 2-factor authentication. So here we chose Aperio locks with PIN code capability,” adds te Pas. Extending an AEOS system with Aperio wireless devices Nedap’s versatile AEOS access control system integrates seamlessly with a broad range of Aperio Nedap’s versatile AEOS access control system integrates seamlessly with a broad range of Aperio devices. End-users can get even more out of an existing Nedap AEOS system by integrating Aperio cylinders, escutcheons, handles, and more, online and/or offline, giving security managers control over traffic to and through more areas at their premises. Multiple device support Nedap integration supports multiple devices from the Aperio range, including the award-winning wireless handle (H100), escutcheon (E100), cylinder (C100), and security lock (L100). Aperio devices are available for almost any interior or exterior door, including wooden and glass doors, as well as fire doors. Online integration with AEOS can use different interfaces (RS485 / IP), connecting lock and system via hubs that control up to 16 locks. AEOS software A full set of powerful functions and events is made available for any Aperio device within the AEOS interface, including door or battery status and tamper detection. AEOS software manages everything, eliminating unproductive tasks including any need to duplicate data entry saving time, and extending control without hassle for building users or administrators.
When students come to study at the prestigious Les Roches Marbella campus in Spain, they are not just attending one of the world’s major hospitality business schools, they are also enveloped in extraordinary innovation and sophisticated living to mirror the exceptional experiences they are being prepared to facilitate in their future careers. Real-life training site The institution aims to serve up “academic rigor with a twist of innovation and entrepreneurship” to its 1,000+ students from all corners of the planet who collectively represent more than 80 nationalities. This real-life training site for elite hospitality professionals must offer an authentic, hands-on experience to its students — one that reflects the luxurious living and progressive comforts expected from high-end hospitality properties and their employees. Digital badge One particular aspect they sought to enrich was integrating “digital badge” access across the coastal Mediterranean To ensure Les Roches is always ahead of the curve and a model campus when it comes to exemplary learning based on cutting-edge technologies, administrators wanted to evolve its mobile ecosystem. One particular aspect they sought to enrich was integrating “digital badge” access across their coastal Mediterranean property in Spain. Project objective The project’s objective was to migrate to a mobile credentials-based system where a student’s plastic access card is replaced by a digital ID on a smartphone. This would serve as the verification for daily physical access and digital touchpoints (e.g., building access, vending machines, restaurant reservations, etc.). This effort would also allow the school to steer digital transformation and student efficiencies throughout its security and administrative functions. Catering to student experience “Everything here is about the student experience,” said Mano Soler, Director of Student Services and Operations at Les Roches Marbella. “It is our main driver and the reason we embrace and foster innovation because innovation makes our students’ lives easier and supports their well-being through secure technology. The students will eventually leave this campus and, in turn, take that know-how and excellence into the world with them.” Case study challenge The team wanted a mobile solution to fit specific campus requirements such as swift access For 10 years, Les Roches Marbella relied on an RFID (radio frequency identification) card-based system to identify and grant access to students. This was a fundamental tool that nearly 1,000 individuals needed to have with them at all times to validate themselves day in and day out. Supporting their quest for digital transformation, as part of the school’s Spark incubator programme, the leadership team wanted a mobile solution to fit specific campus requirements such as swiftly granting/removing accesses, avoiding disruption when students lose/forget cards, and accommodating a multi-system environment. Need for a mobile credentials-based system Management also wanted to drive improvements through back-office processes and procedures to save time and resources and enhance everyday life on campus through modern technology. One of the most pressing factors for this particular mobile initiative was to achieve higher efficiency around the school’s new student intake registration/check-in process each semester. Loading ID credentials individually onto RFID cards, then printing each of the 1,000+ cards, meant corrections along the way were inevitable. System re-adaptation Yet, the transition to mobile didn’t come without a series of obstacles and serious considerations. Each touchpoint where a card was to be replaced with smartphone technology required deep analysis and complex integration work, specifically involving seven to eight different brands whose products were already deployed throughout the premises (e.g., printers, vending machines, security technologies, door access, laundry facilities, parking garages and more). Les Roches required an access partner with solutions compatible with the many other products already in play within its existing infrastructure, and an ability to successfully address former system re-adaptation. iOS and Android support The mobile technology needed to support both Android and iOS phones, as well as physical card technology In addition, the mobile technology needed to support both Android and iOS phones, as well as physical card technology (the RFID ecosystem would remain intact for non-student purposes and serve as a migration path for other areas not yet mobile). The school wanted a single company to supply both the hardware and software elements. And, as a higher education establishment with upscale expectations and an outstanding reputation, the Les Roches decision-makers required a proven partner of this same ilk. HID solution To transform technologies and reach new degrees of onsite productivity and novel amenities, Les Roches Marbella selected HID for its unmatched mobile access portfolio. As a market pioneer in trusted identification and authentication, and with a network of partnerships that spans the globe, HID’s experts designed a system to meet each requirement from the school resulting in a tremendous collection of 40+ access points featuring mobile identification, app, portal, and reader technologies. Mobile components from HID The integration project was completed within an accelerated time frame to ensure it was in place before students set foot onto campus that fall. HID components that comprise this robust mobile ecosystem include HID OMNIKEY® readers and reader modules (OMNIKEY 5427, OMNIKEY 5127CK Mini, OMNIKEY 5127 Reader Core), HID Signo™ access control readers, HID Seos® mobile credentials, Aperio® locks from ASSA ABLOY and Aero™ X100 door modules. HID access technologies With a slight tap or wave of their smartphone, students interact easily with the mobile ecosystem and via the digital Seos credential to authenticate themselves as they move throughout the property each day. HID access technologies are embedded in: Parking garage systems Building entrances Vending machines Laundry facilities Printers Point-of-sale at restaurants/on-campus eateries Restaurant access control Class attendance tracking Dorm room door locks Mobile-first world “You cannot discount the value of mobile when it comes to today’s student populations,” said Soler. “It is their way of life. They were ‘born digital’ and they have an expectation when it comes to smart living, for them, it’s a mobile-first world. We get it. We embrace it. And, we intend to attract and retain students by offering them an unparalleled educational experience while here in Marbella.” Efficiencies and integration “We not only transformed our campus with epic mobile access technology but also drove important efficiencies and integration into everything we touched." "The value and inventiveness HIDexperts contributed to constructing this complicated mobile ecosystem is completely in line with our ongoing quest to ensure that innovation is at the heart of the Les RochesWay of Life," said Carlos Diez de la LastraGeneral Manager Les Roches Marbella. Results achieved HID credentials available via a smartphone make scaling individual access up and down significantly easier Tying back to one of the original reasons for this mobile initiative, registration check-ins are streamlined, and Les Roches Marbella has gained immediate improvements around this important event that takes place each semester. 100% of students use the mobile access system on campus. Students register digitally with the option to do so in-person, ahead of time, or remotely with no human interaction. HID credentials available via a smartphone make scaling individual access up and down significantly easier for IT, faculty, and students. A unique, homegrown handheld tool On a case-by-case basis, Les Roches Marbella is already finding ways to apply its in-house ingenuity to foster disruptive thinking. The school used 3D printers to design a customised case to house phones/tablets alongside HID access modules creating a unique, homegrown handheld tool that easily allows campus security personnel to check IDs as required. This safety support tool came about when there was no suitable offering available on the market to meet the school’s specific needs for security checkpoints. Automated student attendance tracking The flexibility and power of HID components enabled the team to re-imagine and invent an original Les Roches security product to, as always, improve the student experience. Many new use cases are in the works to fuel future “wins” across the premises. Automated student attendance tracking is already at the beginning of each class period and serves as another way to further support and protect students. Mini computers and readers were installed in each classroom so students could use their mobile ID (via their smartphone) to mark attendance. API-based interfaces, Aero door module When students go back to their dorm rooms any time, each door loc is integrated with the Aero door module All is handled by a web application running on the mini-computer that pushes and pulls data to/from the Les Roches Absences application in real time through API-based interfaces. And, when students go back to their dorm rooms any time, each door loc is integrated with the Aero door module, providing them with a seamless experience across the entire campus. Mobile authentication and verification “Our eyes are wide open to all the possibilities afforded by the marvelous world of mobile authentication and verification, and each week we come up with new ideas for the continued transformation we have in motion on our campus,” said Juan Luis Velasco, IT Manager at Les Roches Marbella. “Our students love this newfound convenience, and our staff members are reaping the benefits of this technology overhaul.” Best-in-class mobile access system Les Roches Marbella has a best-in-class mobile access system that squarely aligns with the school’s wider objective to be an example of innovation and excellence in global hospitality training both within its own brand family, as well as within the broader realm of higher education. Beyond elevating the student experience through the convenience of mobile IDs and strengthening security when it comes to student safety and mobile ID verification, Les Roches Marbella has an extremely efficient, flexible, and scalable solution that can grow with them as technologies evolve and digital trends continue to transform and connect us all to an international degree. Benefits of digital transformation “This is a story about the value of mobile and any size campus in any sector of education can benefit from the digital transformation angles when it comes to campus business,” said Velasco. “But the most rewarding aspect truly is connecting to our students in a way that’s important, convenient, and meaningful to them keeping them connected and secure via a device that’s already an extension of their existence.”
In the rich tapestry of Chigwell School's heritage, dating back to its founding year in 1629, 2013 marked a vibrant thread with the unveiling of a gleaming new pre-Prep School. Fast forward to now, and the campus expands further with its largest project to date, a state-of-the-art Sport and Wellness Centre. Alongside these updates, the school recognised the need for increased security around the Drama Centre. Situated in leafy Essex, Chigwell School, renowned for its nurturing environment, commitment to lifelong learning, and extensive 100-acre site, wished to enhance its site security without disrupting the daily school activities. After careful planning and collaboration with a trusted contractor, a phased approach was taken. Initial installations of timber Playtime® fencing and gates were completed in October 2022. A great performance Jacksons Fencing has installed its EuroGuard® Regular fencing and Flatform gates Jacksons Fencing has installed its EuroGuard® Regular fencing and EuroGuard® Flatform gates. Made from high-quality steel and galvanised to prevent rust and wear, these durable barriers provide long-lasting protection. The EuroGuard Regular fencing provides an unparalleled level of security while integrating with the school’s Drama Centre's traditional and modern styles. Guarding creativity The EuroGuard Flatform single and double leaf gates, featuring twin wire construction and a sleek black polyester powder coating, offer secure pedestrian and vehicular access, ensuring the safety and convenience of students, staff, and visitors alike. Installation of new fencing and dedicated entrances not only protects the pupils during school hours The mesh fencing system, with its tamper-proof clips and fixings, forms an impenetrable barrier while providing visibility through to the entrance, ensuring security and surveillance. These gates serve as a testament to Chigwell School’s unwavering commitment to creating a safe and welcoming environment for all. Moreover, the installation of new fencing and dedicated entrances not only protects the pupils during school hours, but also addresses the need for security during use of the Drama Centre outside of school hours and for after-hours events in the Sport and Wellness Centre. Scene change With a steadfast dedication to sustainability and quality, Jacksons Fencing’s EuroGuard fencing and gates come with the assurance of a 25-year guarantee, reflecting the school's focus on sustainability and quality. These security solutions also support the school’s goal of making positive changes by using high-quality, sustainable products. Commenting on the project, Peter Jackson, Managing Director of Jacksons Fencing, said: "The meticulous planning and implementation of these security fencing and gates, in collaboration with our trusted contractor has helped set up security solutions that meet Chigwell School’s current and future needs.” He continues: “This project is about creating a place where everyone feels welcome and secure. By investing in high-quality, sustainable products, the school not only enhances security but also aligns with its values of environmental stewardship and lifelong learning.”
Hackers gain control of a chemical plant’s furnace control system. They tamper with the temperature settings and cause an explosion. The consequences of an incident like that can be catastrophic, especially since 9.3 million people reside within a 10-kilometre radius of the average chemical plant in the US. Targeting operational technology (OT) systems has become a typical tactic for bad actors. Cybercriminals and nation-state actors see these critical assets as an open invitation to disrupt operations, cause physical damage and even put public safety at risk. Average cost of Cyber breach OT environments require greater connectivity to realise the advantages of an intelligent production environment. “With increased connectivity comes the increased risk of bad actors gaining access to a network. They want to use it as a launching point to deploy malware and cripple the ability to produce products or provide services,” says Chase Carpenter, Chief Security Officer at Honeywell. Attacks are also costly. According to the Ponemon Institute, the average cost of a cyber breach in critical infrastructure is now $4.5 million. Moreover, 75% of OT organisations experienced at least one intrusion in the past year. OT cybersecurity starts with visibility Unfortunately, the solution didn’t provide the visibility required to efficiently identify cyber threats Honeywell needed to improve security for its own manufacturing environment. Every one of its over 400 facilities depend on OT to function, and in turn, those OT environments depend on cybersecurity programs and solutions to help improve their defences against malware and other cyber attacks that could disrupt or, worse, shut down its manufacturing sites. Before they can implement a good security program for the OT assets, they need to know what they are and where they are. Honeywell started by using an off-the-shelf cybersecurity solution to monitor OT networks at its various manufacturing locations. Unfortunately, the solution didn’t provide the visibility required to efficiently identify cyber threats. Specifically, the tool could not correctly detect numerous network assets, which might vary between workstations, test devices, control systems, CNC devices and more, depending on the manufacturing site. Advantage of the situation Honeywell would have to shut down a factory every time the site was threatened “Over 49% of our assets were left unclassified,” says Mukesh Saseendran, Director of Cybersecurity at Honeywell. “To get an accurate inventory, we needed an individual to walk down to every single workstation and document everything manually, which in itself is labour intensive and prone to human error.” If an asset is undocumented, it’s a blind spot. It could present a gaping hole for attackers to infiltrate, and no one would know about it until it’s too late. Without the right cyber tools in place, Honeywell would have to shut down a factory every time the site was threatened, resulting in serious revenue leakage. “If I don’t know about a particular asset, I can’t protect it and that’s a terrifying scenario,” Carpenter says. “There could be bad actors taking advantage of the situation to stage an attack.” Honeywell taps in-house experience to fight threats Around the same time that Honeywell realised its commercial off-the-shelf solution was inadequate, the company launched its own OT cyber solution. This software solution – Honeywell Forge Cybersecurity+ | Cyber Insights – came from years of internal development in Honeywell’s OT cybersecurity business, which serves multiple industries with products and services designed to help organisations reduce their industrial cybersecurity risk. Honeywell tested and evaluated dozens of OT cybersecurity software products in its labs The reality is that, over the years, Honeywell tested and evaluated dozens of OT cybersecurity software products in its labs – for itself and its customers. The company gained profound insight into what is considered a best-in-class solution and applied that insight as it developed Cyber Insights. Inventory of assets on the network Carpenter says he had three must-haves before removing the previous cyber tool and replacing it with Cyber Insights. First, the solution needed to be capable of accurately determining the inventory of assets on the network. Second, he and his team needed the capability to be able to passively detect any malicious activity happening on the network. Third, the solution should be designed to accurately identify the version of the operating system or firmware on each asset and when it needs to be patched or updated. “Cyber Insights delivered on every one of those must-haves,” says Carpenter. “Honeywell now has far greater visibility into all the assets on the network that manage, monitor and control its industrial infrastructure.” OT-centric environments In addition, Cyber Insights is designed to provide a layer of vulnerability defence “Having this visibility also means that, in case there is an adverse situation, we should have the ability to respond more quickly to the threat,” says Saseendran. In addition, Cyber Insights is designed to provide a layer of vulnerability defence. If an unauthorised system is trying to communicate with another asset, Cyber Insights is designed to raise flags and send alerts about the potential threat. Cyber Insights is also capable of significantly reducing unnecessary noise, particularly in OT-centric environments. “The previous product discovered 200,000 to 300,000 assets and networks across all our sites, and we didn’t understand why it was discovering so many,” explains Saseendran. “We later realised it was looking at the data and traffic incorrectly and, as a result, generating a lot of noise. When we switched to Cyber Insights and did the audit correctly, we were down to 67,000 assets across those sites. Honeywell now has far greater visibility into all the assets and networks that manage, monitor and control its industrial infrastructure.” Deployment of Cyber Insights Cyber insights are designed to make the implementation process easy Carpenter is the process of deploying Cyber Insights to 120 of Honeywell’s vital manufacturing sites Another major downside to that original off-the-shelf tool was that it was very difficult and time-consuming to implement. At each site, it took Honeywell four to six months to get up and running with the solution. “There are over 400 factory sites at Honeywell,” says Saseendran. “We simply cannot invest six months per site to implement the solution. That’s why efficient implementation is so critical.” In contrast, Honeywell implemented its first Cyber Insights site in less than a month, with seven sites implemented in two months. Carpenter is now in the process of deploying Cyber Insights to 120 of Honeywell’s most critical manufacturing sites. Honeywell’s experience indicates that a typical single-site deployment of Cyber Insights takes about 33% less time than the previous solution utilised by Honeywell. In addition to ease of implementation, Cyber Insights’ clear and straightforward representation of the network landscape simplified asset configuration and viewing, which is crucial for asset discovery without resorting to manual audits. Since going live with Cyber Insights, Honeywell observed an 18% to 20% increase in asset discovery within the Honeywell-deployed sites. This is a significant benefit that eliminates the need for manual workstation audits, which are often error-prone and unreliable. The Honeywell difference Reality is that OT cybersecurity is lazing because it needs specialised tools and knowledge Cyber teams have become skilled at implementing solutions, practices and procedures designed to improve security for IT systems; however, the reality is that OT cybersecurity is lagging because it requires specialised tools and knowledge. Organisations simply can’t use the tools they have in the IT space when managing their OT environment Honeywell has approached this challenge by leveraging its vast experience in the OT world to develop Cyber Insights. “We have a very complex environment, including small sites, large sites and sites around the world,” says Saseendran. “If Cyber Insights works for us in our manufacturing sites, it will very likely work for our customers as well. There is no silver bullet to fully secure your OT environment,” says Carpenter. “However, Honeywell currently offers one of the most complete sets of products and services that can help organisations improve their protection of their critical OT assets.” Robust cybersecurity solution for the OT environment Implementing Cyber Insights is like getting a good pair of glasses for the first time – everything becomes clear, and with that clarity comes new speed and efficiency. If there is an attack, Cyber Insights is designed to help cyber teams identify the source and know where to focus, which can help their organisations save valuable time and resources. It is not an install-once and-walk-away solution, but rather a constant companion in the battle against cybercrime. If they are looking for a comprehensive and robust cybersecurity solution for the OT environment, look no further than Honeywell Forge Cybersecurity+ | Cyber Insights. This solution can help them improve the visibility, control and resilience of the OT network, and help to improve their ability to protect it from cyber threats that could harm the business and reputation.
A distinguished nonprofit organisation recently launched a cutting-edge 1000-bed Multi Super Specialty Hospital and Research Centre in Surat, Gujarat. This initiative aims to address medical gaps, especially in highly specialised fields. To date, the hospital has served over three million outpatient (OPD) cases and performed surgeries for 800,000 patients. Renowned for its advanced amenities, the hospital attracts patients from local and international communities. It prioritises serving low-income groups and beneficiaries of the Ayushman Bharat Yojana. Moreover, the hospital delivers comprehensive services, including consultations and diagnostics, adhering to global standards. The NABH accreditation further solidifies its position as a pioneering healthcare provider in India. Challenges Despite their efforts to boost operations through day-to-day communication efficiency The client was previously associated with a brand of foreign origin. However, despite their efforts to boost operations through day-to-day communication efficiency, they encountered no improvements. Instead, their investment turned out to be an expensive affair. Their challenges can be summarised as follows: Advanced Functionality: The current brand could not offer advanced IP features. Recurring charges: An annual maintenance cost of almost 80 Lacs was proving a headache for the authorities. Safeguard existing investment: The existing devices had to be integrated and enhanced with new, but more advanced solutions. Solution The VoIP communication solution by Matrix was seamlessly integrated, with a gateway from another brand, incorporating an embedded IP PBX and premium Standard SIP desk phones. Below is a detailed description of the solution: The gateway allows an IP connection to a network switch, which enables two IP phone connections. An IP connection from the network switch extends to SPARK200 (Active and Standby). SPARK200 enables connection to multiple IP Phones. Results Additionally, the scalability ensured the solution's readiness for future requirements The diverse needs of the multi-specialty hospital were carefully addressed with a Matrix VoIP communication solution. These solutions enabled effortless communication throughout the facility, thanks to a range of contemporary features embedded within the system. Additionally, the scalability ensured the solution's readiness for future requirements. Let's explore how this VoIP communication solution notably improved the hospital's operations. End to recurring charges: The Matrix Solution resolved their most pressing issue, providing a more sensible licencing structure to prevent any recurring costs, effectively conserving their resources. Safeguarding existing investment: The Matrix Solution seamlessly integrates with the current network infrastructure, optimising existing resources while simultaneously upgrading communication capabilities with advanced features offered by Matrix devices. Modern features: The hospital now benefits from a modern array of features provided by the Unified Communication solution. Features such as Auto Call Back, Scheduled Call Forwarding, and Department Group Call Forwarding, among others, have been integrated to enhance operational efficiency. Operational efficiency: The VoIP communication solution facilitated a smooth flow of information, significantly enhancing workflow efficiency. Consequently, the hospital is experiencing a seamless exchange of information.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Institute security: Manufacturers & Suppliers
![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Artificial intelligence](https://www.sourcesecurity.com/img/emagazines/612/artificial-intelligence-magazine-security-technology-trends-international.jpg)
Artificial intelligence
Download