Electronics

Security Products – Electronics

Redvision previews fast, accurate, silent PTZ and customisable camera housing ranges

Video surveillance Redvision gave its customers and industry professionals a sneak preview of its latest innovations with the help of a top magician last night. The UK-based manufacturer of high-end video surveillance cameras unveiled the Valant, a PTZ camera that Redvision says moves faster, more accurately and more quietly than anything else on the market. It also gave invited guests a first look at Vega, its customisable camera housing.

Both ranges will be launched officially at IFSEC International 2017 between 20-22 June (get your free badge now ). Apart from hors d oeuvres and prosecco, attendees were treated to some impressive tricks by entertainer and magician Nick Einhorn. The cameras were even deployed as Einhorn s assistants, with a thermal camera helping him avoid a nail through the hand in one audacious trick. In another, a Valant swiveled stealthily and picked out from among many playing cards stuck to the walls about 30 feet away the very cards chosen by members of the audience (the identity of which they had obviously kept to themselves). Popular with high net worth individuals and critical national infrastructure, Redvision cameras are very much pitched at the premium end of the market and last night you could see why. The clarity of the images and accuracy of the movement were both evident, as was the complete absence of motorised sounds when they swivelled into position. The Valant even remembers and reverts to its correct position if knocked out of position. The Valant will be available in standard, adaptive IR and adaptive white light models. In a market with so little aesthetic variety, Redvision s rugged, customisable housing is an intriguing innovation.

The Hampshire-based company plans to customise the housing to specifications by customers in a wide range of markets. Guests were also shown a special feature video that showcased the cameras capabilities. The innovation that accounts for the quietness has more than just an auditory benefit. Infinity motors, which are magnetically driven, could also reduce total cost of ownership because there is less contact between moving parts and therefore less wear and tear. The event took place at headquarters of IFSEC International s parent company, UBM, in Southwark, central London. The Valant and Vega ranges will be launched and on display at IFSEC International, 20-22 June 2017, London ExCeL. You can find Redvision on stand D1150. Get your free badge now. Visit Europe s only large-scale security event in 2017 Taking place in London, 20 22 June 2017, IFSEC International gives you exclusive hands-on access to over 10,000 security solutions, live product demonstrations, and networking with over 27,000 security professionals.

Covering every aspect of security, from access control and video surveillance to smart buildings, cyber, border control and so much more.

Time is running out, register now to avoid missing out

Physical security professionals: do you really need to care about cybersecurity too?

So we all know that cybersecurity is important. It s mentioned in the national news on almost a daily basis, whether it be about the government vulnerabilities, cyberterrorism, or major retailers letting criminals steal millions of customer s credit card details. But, like securing physical spaces, it s one of those things that only becomes newsworthy when it fails.

For a long time, physical security was strictly analog, and it s only connection to the IT network was at its end point. And therefore, those responsible for physical security didn t need to concern themselves with worrying about network security, while at the same time, the IT department didn t need to be concerned with any undue exposure from cameras etc. Game-changer Sure hacks have always occurred even in analogue systems (the prototypical breach through a baby monitor or garage door opener being well known examples). But now that IP-based security systems are becoming the norm, with all the associated benefits, both sides need to be aware that the game has changed. The challenge, as we see it, is that the physical security team and the IT team have, on the face of it, very different outlooks and priorities, and often don t really understand each other. Physical security is from Mars and the IT department is from Venus! Often it can simply be a language/jargon barrier, where neither side truly gets what the other one is talking about. But in many cases, it can also be more akin to a border dispute, or a custody battle for an unwanted child: the physical security team don t consider cybersecurity to be part of their job, and the IT department may not even be aware of the potential vulnerabilities from a variety of devices that appear to have no obvious users or owners. One phrase stuck in my head after a recent conversation about cybersecurity with a customer: We are glad Axis is thinking about this stuff, and it s interesting, but we are pretty relaxed about it right now, they said.

And if they haven t been attacked (or at least don t know if they have been attacked), then that response is often followed by Cybersecurity is something that the IT department is worried about I just have to make sure this building is secure. At the same time, when I have talked to the IT department, they have sometimes been unaware of the potential exposure of unsecured IP cameras. So, how do we, as an industry, get the physical security manager to take IT security seriously? And conversely, how do we help the IT security team to talk to their physical security colleagues in a language that they understand? Actually, it s not that complicated. The best way is to use the terminology that they are both familiar with: IT Team Physical Team Don t use default passwords, make them hard to guess and change them often Install decent locks and make sure the keys are hard to copy Make sure to have proper user management tools in place Don t give out more keys than you absolutely have to instead put in some access controls Make sure devices lock themselves if not being used Lock the doors! Detect network breaches Detect intruders Don t leave any backdoors open, just in case Don t prop open that fire escape just in case Put up a firewall around your network to stop people casually wandering in Put a fence up around your perimeter to stop people casually wandering in However, not all organisations and businesses are the same, and some already have good communication between these two departments, and a good awareness of the threats they need to tackle together. What I have seen is that organizations tend to fit into one of three broad categories depending on their understanding of the threat they face. From enterprise-level to small businesses: how cybersecurity approaches compare At the top are those whose brand, business or credibility is based around trust and security for example banks.

By and large, they place security very high up their list of priorities, be it physical or computer-related, and it is ingrained within their corporate culture. They are often cautious about embracing new technologies until they can be sure that their security won t be compromised. This is especially true of new devices being connected to their network, such as cameras, access control points, etc. So their IT departments are highly unlikely to allow any new IP-based equipment to be connected without ensuring they have been properly sourced, tested and set-up. Next there are those who are aware that they may be vulnerable to cyber-attacks, but may not have the specific expertise in-house to properly analyse their risks, nor how to mitigate them. However, they are at least willing to get advice, even if it s not a critical priority for them. These companies probably are the most at risk with enough complexity in their networks to make management a full-time job, but possibly without sufficient resources to properly police every device that gets connected. Lastly, there are those, usually smaller businesses, who have very little understanding of cybersecurity at all, and even less idea that devices such as cameras need to be properly secured before being connected to a network. They rarely have a full-time IT manager, let alone a person with sole responsibility for physical security.

For these businesses, a very simple, automated set-up is ideal, with all security being taken care of out of the box. For example, the Axis Companion provides cameras, recorders, memory cards and a video management system all in one package. Lessons from major camera hacks In the end, though, both the IT and physical security departments need to care about the problem enough to want to engage with each other, and not just pass the buck back and forth until an attack actually happens. So how to do that? Unfortunately, the case has already been made for us, on several recent occasions. It was only a few months ago, that the Mirai BotNet attack demonstrated how vulnerable IoT devices can be, how ubiquitous they are, and how these two facts make for a highly attractive opportunity for hackers. Over several months, cybercriminals infected multiple millions of devices, including IP cameras, DVRs, home routers, etc. Then, in September 2016, it was first used to run a massive DDoS (Distributed Denial of Service) attack on the website of a prominent security journalist, KrebsOnSecurity.com. A month later, it was followed by the largest DDoS attack in history, going after Dyn.com, one of the key parts of the US internet backbone, upon which services such as Netflix, Spotify and Amazon rely.

Now, some may say that not being able to watch the latest episode of Orange is the New Black may not be a huge threat to Western civilization, but this just goes to show the potential of what can be done with physical security devices that haven t been properly hardened against cyber-attack. The majority of the devices infected had easy-to-guess default passwords that had never been changed or even worse, could not be changed at all. Or there were the devices with backdoors built into them to make it easier for the manufacturer to debug them during development, but were never closed again before production. In December 2016, 80 plus cameras from a major manufacturer were found to have backdoor accounts. A month later, it was reported in the Washington Post that for three days the Washington DC Police were unable to record video from their security cameras due to 70% of their storage devices being hacked. So, we know that this won t be the last time. The internet of things is currently an easy target, and even more so because there are very few human beings in the loop, so there is almost no-one to notice when an attack has occurred until too late. As the Mirai BotNet attack showed, an attack might not even directly affect the host, so there is even less chance of spotting an infection unless you are paying close attention. Attend IFSEC International 2017 to stay protected As systems and software become increasingly connected, the consequences of a cyber-attack become greater every day, with the average breach costing businesses up to $3.8 million, do not leave it until tomorrow to act.

Visit and see the latest product developments from leading suppliers, live hacking demonstrations, and education from the best in the industry, Cyber & IT Security at IFSEC is an area you can t afford to miss.

Register right now.

Milestone Systems ties up partnership with Soliton Systems

mobile streaming Soliton Smart Telecaster Milestone Systems, the global leader in IP video management software (VMS), is partnering with mobile video streaming specialist Soliton Systems. Headquartered in Japan, Soliton develops live video streaming solutions for the public safety market. Its Smart telecaster range can stream real-time video over 3G and 4G LTE networks from remote locations via body-worn and other forms of mobile video cameras.

Cameras can live stream from fast-moving vehicles such as ambulances, fire trucks, police cars, motorcycles and helicopters or from a static location, such as a video surveillance van. The lightweight units are easy to carry on a person. Software that facilitates live streaming from a smartphone to a command centre, including GPS information can be downloaded from the App Store. H.265 encoding technology The Smart telecaster range uses H.265 encoding technology, which compresses real-time video for streaming over multiple 3G and 4G mobile networks simultaneously. More effectively than its predecessor, H.264, it can successfully operate even when mobile signal weakens. Founded in Denmark in 1998, Milestone Systems is one of the biggest players in the the global VMS market. Milestone, whichwas acquired by Canon for an undisclosed sum in 2014, was ranked as the number one global video management software provider by revenue in 2014. It is a great privilege for Soliton to work with Milestone, says Mogens Jensen, managing director at Soliton Systems Europe. Many of our public safety and emergency service customers already have Milestone so by partnering, this will allow them to manage their mobile video feeds from a central management console from the leading manufacturer of VMS solutions.

Says Henrik Sydbo Hansen, group manager of devices and integrations at Milestone Systems: Many of our integrations to date have been from static type cameras. Given Soliton s strength in live streaming from a mobile device, we see this as a natural extension of our own offering and something that many in the Milestone community have been requesting. VMS solutions from Milestone, whose architecture is open platform, can remotely manage a wide range of surveillance cameras, using event or alarm-based, continued or selective video streaming. Video can be secured for law enforcement and evidence storage. Thanks to Milestone s certification plan, third-party video surveillance systems and devices are readily integrated with Milestone platforms like XProtect. Soliton s H265 technology which is in line with our roadmap, and their commitment to ONVIF, a standard for video surveillance, gives us a synergy that not only works now, but provides a road-map in an industry that is constantly evolving, continues Hansen. We look forward to a successful and long partnership. Soliton Systems will be presenting at Milestone s upcoming MIP partner event in Dubai from 8-10 May 2017. Check out security solutions from Milestone Systems at IFSEC International, 20-22 June 2017, London ExCeL.

You can find Milestone Systems UK & Ireland on stand E750. Get your free badge now. Europe s only large-scale security event in 2017 Taking place in London, 20 22 June 2017, IFSEC International gives you exclusive hands-on access to over 10,000 security solutions, live product demonstrations, and networking with over 27,000 security professionals.

Furthermore, take advantage of discounts up to 30% available exclusively at the show.

Ensure you aren t the one left out register now

Video surveillance for todays seniors

The lifespan of the average man and woman has increased over the years, due to advances in medicine and improved nutritional standards. Seniors who would have been considered elderly only decades ago, are now still vibrant and living independently. Even senior citizens who live at home with the assistance of a nurse or in home care aid, can live life to the fullest.

Of course, this doesn t mean that family and friends don t worry about them. On the contrary, people in their 80s and 90s and those individuals lucky enough to live past the 100 mark may need guidance. Any lack of balance or simple fall can cause a hospital stay, with a broken hip likely to create further medical issues. Forgetfulness and hearing loss makes otherwise diligent seniors forget to take their medicine or hear the ring of a doorbell. Seniors and technology Teens and young adults have no problem living their lives in front of the camera. Their generation enjoys being videotaped whenever and wherever they may be. However, this is generally not the case for senior citizens. Many older people still fear technology and feel uncomfortable with video equipment in their homes, no matter how unobtrusive these cameras may be. Young adults try to explain to their parents how crucial a camera may be to their senior loved ones health, security and well-being.

It s always important to discuss the subject thoroughly, before making any purchases. Surveillance monitoring equipment is not only a definite investment, but at no time do you want a parent or grandparent to think that they are being spied on unnecessarily. Less invasive forms of video monitoring You never want to make anyone uncomfortable in their own home. This is especially true of those people who believe that someone will be watching them in various stages of undress or when using the bathroom. Luckily there are monitors which function as sensors, simply alerting a loved one that something is amiss in the household. Monitoring systems do use traditional video cameras, so no footage is obtained from the home. These wireless and diminutive sensors are placed where they can detect motion or a change in normal patterns of activity. When this occurs, a contact is immediately notified. You can choose how messages are sent confidentially via telephone, email, text message and mobile app.

Wireless motion sensors An excellent example of how these sensors are employed, concerns their usage in determining if someone has taken their daily medicine or meals. Sensors are small enough to attach to regular household items like pillboxes and television remotes. You can additionally attach sensors to the refrigerator or interior door, alerting a loved one that their senior is home and on schedule. Let s say that a senior has opened a front or back door at an unusual hour of the night. Their family member or guardian would be alerted at once. This information is particularly urgent when seniors are completely alone or live with a spouse yet suffer from dementia. Once alerted, a loved one can contact the police, a neighbor or rush over on their own if possible. Home surveillance videos Video technology is routinely used to monitor homes, schools, shopping centers and commercial buildings. More than one person has discovered that their pet was running amuck through their house or that an employee has been stealing from their place of business.

In severe situations, acts of child abuse and crimes committed in bright daylight have been uncovered. Today s video cameras are stylishly small and easily set up around the home. All that s required is an on-site wi-fi system so images can be sent directly through the Internet. The capability of your chosen video equipment will vary greatly, depending upon its cost and complexity. However, newer home based surveillance systems will operate with amazing accuracy. Real-time video monitoring saves lives Instead of spying on seniors, loved ones are now able to see and hear if an emergency is happening in real-time. Night vision cameras allow for surveillance during the night and early morning hours when illnesses often take lives. Sound detection features let loved ones hear if a senior is calling out for help or someone else is prowling the premises. More complicated video surveillance systems come with a variety of other options.

These include motion based sensors and audio components that give viewers a chance to speak directly to the subject under surveillance. You can additionally record videos and save them to the Cloud, so they can be reviewed more intensely later. Peace of mind and security Using simple mounts with adjustable angles, monitoring equipment literally blends in with any d cor. Seniors can go about their lives in their own home, with the knowledge that a medical emergency or act of crime will be reported as it plays out. Should a senior citizen not remember exactly what happened, the video feed can replay to catch the incident in its entirety. For those seniors who require a caregiver or housekeeper, video surveillance cameras provide an ongoing record of their employment. Should an act of abuse or theft take place, it is likely to be captured in full view of the cameras. This aids families and the authorities. Just as Nanny Cams have revolutionized child care, home video surveillance can transform how seniors live.

While some people might find the presence of a video camera intrusive, the eye of the camera is really their friend. Better yet, family members can now monitor these video feeds right from their mobile devices giving them a chance to advocate on behalf of their loved ones. Europe s only large-scale security event in 2017 Taking place in London, 20 22 June 2017, IFSEC International gives you exclusive hands-on access to over 10,000 security solutions, live product demonstrations, and networking with over 27,000 security professionals.

Furthermore, take advantage of discounts up to 30% available exclusively at the show.

Ensure you aren t the one left out register now

How content marketing is boosting web traffic and engagement in the security industry

Data analysis With 88% of B2B marketers having a content marketing strategy, how is the security industry responding? And which manufacturers are getting the best results? A recent report by TFM highlighted that in B2B, content now ranked second only to marketing strategy and planning as the most important skill for modern marketing teams.

Why has content become so important to marketing? One explanation is how quickly the media landscape has changed over the last decade. Print has fallen as customer behaviours have changed, with budgets and attention shifting online. The transition from print to online isn t straightforward shifting of advertising. In 2016 some 615 million plus consumers were using ad blockers and programmatic advertising has introduced further uncertainty about the return clients get for banner ads. In response to this, savvy brands have developed their own content to build relationships directly with customers. Content marketing is the major driver of website traffic growth, with content marketing leaders experiencing 7.8 times the year-on-year growth of non-leaders (Source: Aberdeen). Content marketing is often cheaper than traditional marketing methods (62% cheaper according to DemandMetric) and is three times more effective at generating leads. It is also one of the most sustainable and measurable forms of marketing.

Content often continues to deliver leads for many weeks and months beyond initial publication and distribution/promotion. This focus is prompting a shift in budgets. According to TopRankBlog, the most effective B2B marketers are spending 39% of marketing budget on content marketing. Content marketing in the security industry To understand how content marketing is being used in the security industry, we have have taken overall website traffic for several major vendors and compared it to the volume of shares the website generates on social networks. This is one of the strongest indicators of how engaging an audience finds the content. From an analysis of 30 manufacturer websites, we found significant variability in both traffic size and social engagement. Most of the 30 security websites analysed are clustered in the bottom left corner, which indicates fairly low traffic and social engagement. The rest, conversely, are leading the way with their content marketing: FLIR are leading the way with social media engagement, with their website responsible for 26% of shares in the market. Honeywell has the largest website in the market and a high level of social engagement with their content Axis Communications sophisticated content marketing encompassing regular articles, videos and infographics Hikvision and Dahua stand-out as brands with high levels of traffic driven by search (particularly in the case of Hikvision, which is the most searched for brand in video surveillance) but with low levels of social engagement when they get onto the website.

Methodology: Traffic estimates are from SimilarWeb, based on the month of March 2017. Social sharing stats are based on Buzzsumo analysis of the last 12 months. The analysis excludes websites that are are also used to service markets outside of security, including Panasonic, Canon, Seagate or Sony. How content is shared in security Looking deeper into the social data using Buzzsumo, we can see that Linkedin is the most popular social network for sharing security-related content, followed by Facebook and a little sharing on Twitter. Neither Google+ or Pinterest feature at all. The most shared content from these websites was longer form articles of between 2000-3000 words. The best performing content types were how and list articles, suggesting that practical advice is the most valued content in this sector. Sharing of videos is significantly lower on average than in other industries, suggesting that the video being produced by the security industry is less engaging than it might be. The best days of the week to publish appear to be Wednesday and Thursday, with the lowest number of shares coming from content published over the weekend.

Four content marketing case studies To understand what works well in the security industry, here are four case studies from the manufacturers leading the way in content marketing. FLIR content hubs and local heroes FLIR is dominating in social due to a two-pronged approach to content marketing. First, they have created a visual, information-rich content hub about their biggest products. The Flir One landing page provides comprehensive information anyone finding out about the product, and contains video, quotes, user reviews, and questions and answers. Particularly effective at positioning the FLIR One as a desirable consumer electronics product, the design is more akin to a page promoting a smartphone launch than one promoting a traditional security product. It has clearly worked, with this single page generating 3,000 shares on Facebook alone and more that 130 inbound links. An example of one of the videos that form part of the hub: embedded content Taking a different approach, FLIR has also created a successful series of articles celebrating Local Heroes . Every month, we recognize a heroic act by the customers who use FLIR s technology. For example this popular article about how Firefighters in Oregon rescued of a victim from a burning house in September using FLIR technology.

Combining human interest stories with how the product was used, the series is proving a popular way of spreading the word. Honeywell Newsroom The Honeywell.com Newsroom is a resource that combines factual news releases about the brand with interesting content that showcases their deep expertise in engineering. Clearly signposted on the main website and presented in an interesting tiled style, it is a great example of how content can form part of a corporate website. Along with big press release announcements, top performing content from the Newsroom includes articles that demonstrate Honeywell s expertise in engineering such as How to Tell if Someone Works in Aerospace and What Do Engineers Really Do . Axis Secure Insights Axis have a sophisticated approach to inbound marketing. They regularly produce extremely well designed videos, infographics and ebooks, many gated to bring them in a regular supply of new business leads which can then be nurtured as part of their marketing automation efforts. Axis publish their content on their Secure Insights microsite, a content website they have built in WordPress, with articles published in both English and German. Axis have also developed a suite of online tools, including Axis Site Designer, which bring together 20 time-saving tools and installation guides. embedded content Assa Abloy Future Lab Future Lab is part of a content marketing initiative from ASSA ABLOY aimed at observing and analyzing the trends and the future of the security arena.

The website takes a similar approach to Axis, with a content site built in WordPress. Visitors can sign up to become a member and opt-in to regular communications from the brand. The Future Lab has its own Twitter account and Youtube playlist embedded content Content marketing represents a big opportunity for the security industry, with the relatively few manufacturers adopting these techniques currently getting first mover advantage seeing significantly increased reach and lead generation. If you would like to discuss how content marketing can be applied to your business then please get in touch. Visit Europe s leading security event in June 2017 Register to attend IFSEC International where you will be able to network with over 30,000 of your industry peers, meeting new suppliers and gaining access to the latest and best security products to hit the market, helping you gain a competitive advantage over your competitors. You will also be able to get hands on to test and trial the latest technology at the Installer World Zone, which is sponsored by Risco Group , so that you can select not only the best priced products but you will be confident that it works for you. Click here to register your place now to join us at London Excel on 20 22 June 2017.

Hanwha Techwin targets AI innovation through global partnership with GPU pioneer NVIDIA

Security news The security business division of Hanwha Techwin has entered into a global partnership with Nvidia, an artificial intelligence (AI) developer, to commercialise intelligent video analysis products. US-based Nvidia develops and makes graphic processing units (GPUs), chips that are used in gaming and 3D applications due to their ability to manipulate and alter memory to create images rapidly. In 1999 the company marketed the GeForce 256 as the world s first GPU .

Applications Nvidia has developed its GPUs for include computers, healthcare technology, robots and self-driving cars. Through the global partnership, Hanwha Techwin and Nvidia will collaborate on an intelligent video analysis platform which the AI firm is developing. Nvidia s video analysis platform will be used with security devices, such as cameras and storage media. The technology enables fast and accurate video analysis data. Customers benefit from better quality information, with which to base insights and actions upon, than simple video data is able to provide. Hanwha Techwin will focus on developing AI cameras and storage devices that can autonomously detect abnormal movements and situations by using Nvidia s AI video analysis platform. The platform can also be applied to various security-based services from Hanwha Techwin, including city surveillance, retail security and traffic, potentially leading to the integration of AI-based solutions. Hanwha Techwin plans to evolve into a security specialist with hardware and software capabilities, alongside future-oriented technologies and competitive AI. Hanwha Techwin recently announced dates for its UK Wisenet roadshow.

Check out security solutions from Hanwha Techwin at IFSEC International, 20-22 June 2017, London ExCeL. You can find Hanwha Techwin on stand G800. Get your free badge now. Visit Europe s leading security event in June 2017 Be the first to see the very latest in security tech for 17/18 at IFSEC International, where around 600 manufacturers will be attending, including this year s new additions to the show; OSI Electronics, Redvision, L3, ABLOY, Cisco and Meraki to name just a few. Not only that, in a constant strive to offer our visitors the best ROI possible, IFSEC this year is launching a brand new discounts programme. We are able to offer discounts averaging 20% across a large range of products at the show. Click here to register your place now to join us at London Excel on 20 22 June 2017.

A brief history of the transformative effect of innovation on the physical security industry

Photo: Closed circuit TV monitoring at the Central Police Control Station, Munich, Germany, in 1973 When considering the role of technology in security, it s easy for those outside the industry to think about the cyber side of things. Of course, more traditional and physical security services have changed profoundly through technological innovation over the decades too. Keeping buildings and personnel secure historically depended on the use of eyes and ears, people looking and listening for intruders and potential threats.

However, technology has now evolved to a point where they don t work alone. CCTV CCTV is perhaps the prime example of this. A staple of physical security, it catches things that may be missed by patrolling eyes. It s come a long way since its inception too. Initially developed during the Second World War, closed-circuit television became commercially available in 1949 and a domestic version was granted patent in 1969. There was one big problem, though: there was no functionality for recording so constant monitoring of the playback screen was required to render the system useable. CCTV 1980s style Things got easier in the 70s with the emergence of the VCR. Video surveillance and security were boosted dramatically. Monitors could be left unattended, safe in the knowledge that nothing would be missed.

Concrete proof of anything happening could be attained and criminals caught on the back of captured video. Further advancements in technology allowed CCTV to further tighten security. The VCR, which wasn t exactly renowned for its image and video quality, was supplanted by superior digital technologies throughout the 90s and noughties. Better resolution, more efficient storage and easier retrieval made for the basis of new innovations. In modern times, high-definition display and cloud-based systems have made for further improvements including an ability to monitor larger areas and provide clearer views of perpetrators if required. Walkie-Talkies Affectionately known as walkie-talkies, handheld transceivers play a pivotal role in many security setups, particularly larger ones. Offering instant communication, they are used by the likes of the police forces and military units around the world. They have helped to secure some of the toughest climates it the world and continue to do so. The initial eyes and ears model of physical security is toughened up with findings being able to be reported immediately.

This is of particular use when findings are time sensitive, for example, a thief running from the scene of a crime. A very able deterrent, walkie-talkies provide the link between seeing and doing that is so often need when it comes to security. Lighting So simple yet powerfully effective, security lighting illuminates an area making it easier for potential wrongdoers to be seen. Whilst it may seem pretty straightforward on the surface, many elements of lighting have had to change over the years to make them it as competent as it is today. Whilst bright lights have always been used, lighting that is overbearing can actually make it harder to see from the outside. On top of this, mismanaged lighting setups can result in glare, which again has an impact on the ability to see what is going on. There are also considerations needed for the processes for monitoring the illuminated area human eye or CCTV. With this in mind, lighting has been crafted to stand in line and not potentially be obstructive to security. Illuminated glows that highlight areas are likely to deter criminals, boosting surveillance.

Alarms Visual and audible deterrents in equal measures, security alarms are incredible at their job. The usual sensors used in these systems are PIR sensors will trigger an alarm when a person walks past. They ve stood the test of time for sure but more advanced technology is making for a new level in alarm security. There are a whole host of alarm triggers and actions that can be used to further strengthen and safeguard premises. Modern triggers may include: Glass or windows breaking Vibrations, such as those in building attacks Increased soundwaves, sometimes ultrasonic Photo-electric beams, laser alarms In most cases, security is strengthened thanks to the high-pitched sound that is made when one of these is triggered. More modern approaches can use a number of alternative actions based on a specific environment. Doors can be slammed shut, CCTV can begin rolling and services halted to protect anything of value. Biometric Recognition Technology Limiting access to certain areas can sometimes be tricky. Recognition software, however, takes all of the difficulty away whilst simultaneously improving security.

There are three main types facial, iris and fingerprint. All three provide stronger protection than a key. Without pre-cleared fingerprints, iris patterns or facial features, entry is impossible. These systems generally work very well. Fingerprint identification is impossible to clone or fool so is mightily secure. Early versions of facial and iris recognition software came in for criticism as they were sometimes able to be manipulated by using photos of somebody with authorisation. Later and more modern versions have been developed with a view to eliminating such problems. Advanced technology means that it is much harder to crack these systems, tightening security significantly. Shut Down Rooms In a similar way to light sensors detecting no movement and turning lights off, some people have implemented whole rooms based on such technology.

The benefits of this from a security viewpoint are huge. Where rooms are keeping sensitive information and valuable possessions, it is often imperative that strong security measures are in place. Timers can be set to manage closing and locking windows, powering down electronics (which may require a password to turn on again) and locking doors. Rooms can also be shut down manually or remotely offering controlled security for any situation. An Evolving World Although physical security still has somewhat of a dependence on eyes and ears, technology has played a huge role in its advancements over the years. There are literally thousands of ways in which security has benefitted from advancements made in tech and will surely find even more further on in the future. Chris Perry of NVC Security works to make more secure environments a reality. From outdoors to indoors and commercial to domestic, he believes tech can help in all areas of security. Visit Europe s leading security event in June 2017 Be the first to see the very latest in security tech for 17/18 at IFSEC International, where around 600 manufacturers will be attending, including this year s new additions to the show; OSI Electronics, Redvision, L3, ABLOY, Cisco and Meraki to name just a few.

Not only that, in a constant strive to offer our visitors the best ROI possible, IFSEC this year is launching a brand new discounts programme. We are able to offer discounts averaging 20% across a large range of products at the show. Click here to register your place now to join us at London Excel on 20 22 June 2017.

What a qualification in fire detection and alarm systems might look like

There is so much talk about the need to have a formal qualification for fire alarm technicians and installers. The lack of skilled fire alarm technicians is explained with numerous reasons, including very few young people entering the industry, companies left, right and centre struggling to hire and keep hold of more experienced technicians, and other companies just jostling for that one extra cherry on the top of the cake that might tip the balance in their favour and pull in extra customers. But no one so far has actually considered what a formal qualification in fire detection and alarm systems might look like.

With so many different job roles, there are many areas that must be covered. Think about it for a moment. What does a fire alarm maintenance technician need to know compared to a system designer? What about an installer, or a commissioning technician? These are all different areas with a significant amount of overlap, yet also with a different knowledge requirement for each job function. Is it feasible to have a one-size-fits-all approach to fire detection and alarm? What would each person in each job role need to know? I m glad to say that after getting the results back from a survey we sent out to members, we have a much clearer insight into this question. We also held a Voice of the Customer day, where members were invited in to tell us what areas would need to be covered for each job role.

In addition, members also considered the lack of a career path for joining the fire industry. The results of the survey state what the top areas of learning would need to be for each job role, whilst the Voice of the Customer day allowed members to voice their opinions and help suggest the paths of study. Here s a quick run-down: The maintenance technician 15 topic areas were revealed to be important in this job role. A basic grounding in electronics may be required, as unfortunately this is not a required subject at school any those joining the industry don t always have first-hand knowledge. Ninety-eight percent of those surveyed stated that understanding BS 5839 was necessary (no surprise here), but a qualification would have to give a good solid foundation in the whole standard, as well as cover the maintenance standards in greater detail. Other areas such as waste management, communication and sales skills, simple design principles, and BS 6266 (Fire Protection for Electronic Equipment) were also highlighted. Additionally, other areas that are not covered by the current FIA training were pointed out by members at the Voice of the Customer Day, with 87% stating the Health & Safety at Work was important. The survey also revealed some other topics documentation/certification (91% said this would be required); testing methodology (90%); fire detection & alarm technology (75%); and a strong grounding in current fire legislation such as the Fire Scotland Act and the Regulatory Reform (Fire Safety Order) 2005 (67%). Installation technician The Voice of the Customer Day revealed some useful insight that it should not be a requirement to be a maintenance technician prior to being an installation technician.

In fact, it was revealed that installers often moved into maintenance later. As such, the level of knowledge should still be high, but less topic areas were required. For the installer, 8 topic areas were compiled compared to the 15 topic areas for the maintenance technician. Again, no surprises here the survey revealed that 96% voted that both a broader understanding of BS 5839 was required, as well as a focus upon the installation and testing standards, which should be covered in greater detail. Eighty-eight percent felt that Health & Safety at Work were important; members attending on the Voice of the Customer Day also confirmed this, stating that an awareness of asbestos and working at height would be needed. As with the maintenance technician, a need to cover system documentation and certification was also going to be necessary for a qualification for this role. Other areas included electrical competency (77% said this was important in the survey), understanding BS 76761 17 th Edition (67%), understanding current legislation (58%), and building regulations (56%). In order to be completely up to date with current technology, electrical competency should also cover Electronic principles and data communications, possibly as separate areas. Communications is changing; installation engineers in our sector need to have an idea of IT infrastructure and data connections such as Ethernet/fibre optics, said one survey responder.

The system designer The role of the designer was assumed to be a much more advanced position by the group at the Voice of the Customer Day not just standards relating to fire safety systems, but also current legislation, current fire guidance, and building regulations. A system designer needs to know a lot more than an installer or maintainer and therefore the amount of study required would be considerably more. Ninety percent of respondents to the survey said that understanding building design was essential to the role, along with 83% stating that understanding building regulations were important. Clearly a working knowledge of the built environment is vital to the role and therefore that aspect would need to be studied. But there were also many other additional skills such as an ability to use and understand CAD (Computer Aided Design), an understanding of the Equality Act, as well as a need for soft skills such as communications and sales and Heath and Safety. A qualification for this career path would need to cover a wide range of areas and be robust enough to give the designer a starting point for his or her future projects. The commissioning engineer There were a number of different opinions expressed about whether a commissioning engineer would have been an installer or a maintainer prior to becoming a commissioning engineer. Those at the Voice of the Customer Day felt that this would not be a job role taken upon entering the industry; most would have been a maintenance technician or installer prior. However, one responder to the survey was keen to point out that it is possible that commissioning engineer comes from a different trade, e.g.

communications, so would have to be trained sic . Skills for this role are likely to be similar to the maintenance technician or installer, but with a few slight differences. The results of the survey were very clear 100% of respondents said the BS5839 commissioning standards would be required; 95% felt that there was a need to have a foundation level understanding of the whole of BS5839; 94% though fault finding was a necessary skill; 87% thought false alarm management and simple design principles respectively were important; whilst another 80% wanted their commissioning technician to have instructional techniques. Electronic knowledge here was not seen as quite so vital at 62%, but this was still more important to the commissioning technician than the maintenance technician of which only 47% thought electronics was an important skill. Looking forward The future of the fire industry certainly does seem to hinge on the need for those working in fire detection and alarm systems to be more comprehensively educated. There also needs to be a pathway for new people to join the industry. Whilst the new apprenticeship scheme (launched last month) is a great start for those coming straight from school, there is still a huge need for those already of working age to find a way to join the industry and the only real way is through a qualification. What we discovered during the process of conducting the Voice of the Customer Day and the survey is that a qualification is something that the industry wants and needs. And a blanket one-size-fits-all qualification is not going to be sufficient for the fire industry.

We need one for each of the different disciplines within the fire alarm and detection sector, since being a designer is so different from being a maintainer or installer, and so on. However, as the survey has revealed, there is an overlap of knowledge bases between the different job roles, so it seems that to a certain extent, every job role needs at least a solid foundation in BS5839. As for the future? A qualification might be just the thing to open the door, but it is up to the industry to walk through it. Click here for an infographic detailing the key facts and stats about the fire industry skills crisis. Visit FIREX International for cutting-edge solutions, essential knowledge and the ability to grow your business by getting direct access to the whole fire safety industry. It is the perfect place to get your product in front of thousands of buyers, across a multitude of featured areas.

From the brand new Drone Zone, the ARC Village, ASFP Passive Protection Zone, the Engineers of Tomorrow competition and more, it s all under one roof so you ll never miss a beat.

Click here to register your place now to join us at London Excel on 20 22 June

Panasonic to take new direction at IFSEC

IFSEC International 2017 Panasonic Business is set to launch a new direction for its European security business at IFSEC 2017, asking the industry to change how CCTV is perceived and procured. Panasonic proprietary technology such as rain wash coating, dehumidification and smart coding technology reduce the overall cost of maintaining and operating CCTV technology. In order to place a value on this, the company has commissioned an ROI calculator, which it will present at IFSEC, which compares the lifetime cost of security cameras from leading manufacturers to determine which provides best long term value.

The calculator examines the cost of data storage and transmission, maintenance and cleaning, the potential risks associated with poor cyber security as well as the revenue generative potential of people counting and age and gender recognition technology. For a couple of years Panasonic has been talking about how its unique embedded camera technologies reduce the total cost of ownership, said John Boyle country manager for Panasonic UK. In addition, our ability to offer end to end cyber security protects organisations against data breaches and prepares them for forthcoming changes to data protection law. So, the traditional approach of procuring on the cost of the camera doesn t do us any favours and we need to change the way the market views the buying of security technology. This year at IFSEC, we want to initiate some new discussions with some system integration partners, who recognise that the cost of the box is only the start of the journey. As a platform for exposure at IFSEC 2017, Panasonic have invested in exclusive sponsorship of the Security Management Theatre, at the same time as partnering with organisers UBM to provide a Panasonic branded meeting space. Through the IFSEC Meetings Service, key security markets such as city surveillance, banking and retail will be able to book meetings directly with Panasonic at the event. The company will also present seminar topics on cyber security, maintenance free city surveillance and smart compression technology across the event at London s ExCeL Centre. We want to take a more consultative approach.

We want to understand the challenges that our SIs have and chat through how Panasonic s uniquely wide technology portfolio can meet their increasingly complex needs, added John Boyle. For more information on Panasonic Security Solutions please visit the website. About Panasonic System Communications Company Europe (PSCEU) Panasonic System Communications Company Europe s (PSCEU) goal is to improve the working lives of business professionals and help their organisations efficiency and performance through world leading technology. We help organisations capture, compute and communicate all sorts of information: image, voice, and textual data. Products include security cameras, PBX telephone switches, document printers, Broadcast & ProAV and Industrial Medical vision cameras, projectors, large visual displays, rugged mobile computers and enterprise fire alarms. With around 350 staff, engineering design expertise, global project management capability and a large European partner network, PSCEU offers unrivalled capability in its markets. PSCEU is made up of five product categories: Communication Solutions , including professional scanners, multifunctional printers, telephony systems and SIP terminal devices. Computer Product Solutions helps mobile workers improve productivity with its range of Toughbook rugged notebooks, Toughpad business tablets and electronic point of sales (EPOS) systems. As European market leaders, Panasonic Toughbook had a 70.1% revenue share of sales of rugged and durable notebooks and Panasonic Toughpad held a 57.1% revenue share of sales of rugged business tablets in 2014 (VDC Research, March 2015).

Professional Camera Solutions offers excellence in image quality with its Broadcast & ProAV product range and solutions as well as Industrial Medical Vision (IMV) technology. Security Solutions , including video surveillance cameras and recorders, video intercom systems, access control, intruder alarms and fire alarm systems. Visual System Solutions , including projectors and professional displays. Panasonic offers the widest range of Visual products, and leads the European high brightness projector market with a 43.9% market revenue share. (Futuresource > 5klm (Jan-March 2015) excl. D-Cinema) About Panasonic Panasonic Corporation is a worldwide leader in the development and engineering of electronic technologies and solutions for customers in residential, non-residential, mobility and personal applications. Since its founding in 1918, the company has expanded globally and now operates over 500 consolidated companies worldwide, recording consolidated net sales of 7.72 trillion yen (55.5 billion Euros) for the year ending March 31, 2015. Committed to pursuing new value through innovation across divisional lines, the company strives to create a better life and a better world for its customers. For more information about Panasonic, please visit the company s website. Visit Europe s leading security event in June 2017 Visit IFSEC International for exclusive access to every security product on the market, live product demonstrations and networking with thousands of security professionals.

From access control and video surveillance to smart buildings, cyber, border control and so much more. It is the perfect way to keep up to date, protect your business and enhance your career in the security industry. Click here to register your place now to join us at London Excel on 20 22 June 2017.

Internet of things bubble will burst in 2017, predicts Wired Magazine

Internet Of Things Bubble Will Burst In 2017, Predicts Wired Magazine

IoT trends Wired magazine has prophesied the demise of the internet of things (IoT) in 2017. As predictions go it s pretty bold given sales of internet-connected devices already number 12 billion worldwide and are projected to grow to about 30 billion by 2020. On the face of it, the tech bible has really stuck its neck out on this one.

Except Wired hasn t actually forecast the demise of internet-connected devices per se ; rather, it s the IoT term itself it believes is on borrowed time, along with an assumption associated with it: that no object, however mundane, cannot be improved with a computer chip. The Internet of Things was a made-up term to begin with, says the article in question. And now this bit of marketing nonsense carries a sheen of ineptitude, danger, and other shit. The upshot: the term will die in 2017, kinda like Big Data before it. Visitors to CES 2017 in Las Vegas test out some VR headsets The success of a Twitter account called the Internet of Shit, which tweets disparagingly about the myriad IoT devices being launched to more than 100,000 followers, augurs ill for the IoT, says Wired. To test out just how widely the IoT concept was being applied to everyday things , I drew up a list of the most mundane objects I could think of and Googled them with the prefix smart . Of the seven I Googled, four had already been enhanced with a computer chip and Wi-Fi connection (in the IoT camp: toilet roll holder, duvet cover, cushion and mirror; still stuck in the analogue age are sofas, breadbins and shoehorns). Yeah baby shove my smartphone in a 20lb bottle of water with a speaker or whatever #CES2017 pic.twitter.com/4yjkvXPPR6 Internet of Shit (@internetofshit) January 7, 2017 The other problem and one exacerbated by the sheer volume and range of IoT products is the cyber threat. If the media has played its part in hyping up the IoT, then it will also play a key role in facilitating its decline thanks to the slew of stories about the security risks posed by connecting your home.

Long focusing their fire on corporations albeit it s consumer data that is usually stolen tech writers and security experts are now warning of a frightening new spectre: that criminals will turn their attention to smart homes that lack the enterprise-grade security enjoyed by Fortune 500 companies (which is still shown to be lacking in so many cases). Wired noted that in September, nearly 1.5 million IoT devices (mostly surveillance cameras) were hijacked and that the following month, the same piece of malware rendered large swaths of the internet inaccessible to many people. The IoT has also been damaged by bricked devices, irritating outages, bankrupt startups, an international emissions testing scandal, and a viral story about a Brit who spent 11 hours trying make tea with a needlessly high-tech kettle. Aware of this perception the IoT industry has been scrambling to remedy vulnerabilities such as the widespread use of default usernames and passwords that hackers can easily find by trawling Google. At CES 2017 Symantec Norton unveiled what it claims is the most secure router in the world and is certainly one of the most aesthetically interesting. A geodesic orb, it looks like it could be an object of portentous power in a sci-fi fantasy film. Symantec Norton s Core Router Securifi, meanwhile, launched a mobile app that highlights vulnerabilities like easy to guess passwords or open ports and shows users how to remedy them. The next-generation of Bitdefender BOX was launched in Las Vegas too. Bitdefender s IoT security hardware protects against malware, hackers, ransomware, phishing and other online threats with data anonymization, malware scanning, machine-learning algorithms and network intrusion prevention technology.

Clearly, the IoT has been on the well-worn path followed by so many tech crazes. First, there s a lot of hype, but also considerable teething troubles where products malfunction or work less effectively than promised. Developers don t yet know what customers want from the tech, so there s a lot of trial and error and dud technology (that people later mock with the benefit of hindsight). Eventually, issues around usability and compatibility and cyber security will be remedied to a large degree and a clearer picture will emerge of what the IoT or whatever it is called by that time is for and what kinds of things can really benefit from internet connectivity. As Wired writes: The Internet of Things or whatever you want to call it has the potential to save precious resources, spot and fight pollution, and help people lead healthier, safer lives. But adding internet remote control to every single product on the market won t necessarily help us get there. What we need are thoughtful, affordable, durable devices that actually, y know, make our lives better. A new name, and a renewed sense of purpose, could be just what the Internet of Things needs. Click here to read the original feature in Wired, which also makes another four tech predictions for 2017.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.