business

Satel Interview at IFSEC 2017

Watch the full interview with Jaroslaw Zurawik, Export Manager from Satel about the products they are showcasing at IFSEC 2017. embedded content Visit Europe s leading security event in June 2017 Visit IFSEC International for exclusive access to every security product on the market, live product demonstrations and networking with thousands of security professionals. From access control and video surveillance to smart buildings, cyber, border control and so much more.

It is the perfect way to keep up to date, protect your business and enhance your career in the security industry.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

IndigoVision interviewed at IFSEC 2017 Video

IFSEC 2017 Watch the full interview with Dean Brazenall, Regional Director from IndigoVision about the products they are showcasing at IFSEC International 2017. embedded content Visit Europe s leading security event in June 2017 Visit IFSEC International for exclusive access to every security product on the market, live product demonstrations and networking with thousands of security professionals. From access control and video surveillance to smart buildings, cyber, border control and so much more.

It is the perfect way to keep up to date, protect your business and enhance your career in the security industry.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

Video Analytics: Oversold and underutilised but could key to preventing terror attack

Panel of video surveillance manufacturers agree that video analytics has yet to reach its full potential. Atul Rajput, Axis Communications, Stephen Jones, Seagate, Jonathan Rickard, Panasonic, and Andy Coles, Hikvision took part in a lively debate at IFSEC International 2017 about the trends shaping video surveillance over the next few years. Video analytics raises Far too many false alarms, not really performing said Jonathan Rickard but that is going to change as machine learning and processing power in cameras is increasing.

Video analytics can already identify unusual behaviour, if someone in a crowd who is drunk, or walking in an usual way. Analytics can take away the current expectation that a single security guard can monitor 150 cameras, said Rickard. A guard can see one or two cameras maximum. Even if you them screen with 50 cameras, they won t be able to do it. Machine learning is needed to monitor all cameras and then present anything usual to the security guard. ‘The future of video surveillance’ just starting at Security Management Theatre in @IFSEC pic.twitter.com/mrBYDJzyKg IFSEC Global Editor (@ifsecglobal) June 20, 2017 The potential of real-time analytics Andy Coles pointed out that Artificial intelligence is already built into many surveillance products already. Until now analytics have been used to review an incident after it happens. Imagine intelligent analytics that can interrogate behaviour before it happens. That s where security is going. Deep learning will make big impact in the years ahead.

Forensic searches for video analytics are good, but we need to now react in real time. Takes a lot of processing power and technology said Stephen Jones. Preventing terror attacks In many incidents such as the recent Manchester Arena bombing, terrorists conduct a reconnaissance before the bombing. How could video analytics have presented these attacks, asked an audience member. If know suspect was on terror list and you could get your VMS platform suppliers for government and businesses joined up, yes you could spot that. said Andy Coles. The technology is there, but as everyone is using disparate systems you cant do anything like that. In connecting systems Simplicity is key Atul Rajput added. The more complicated systems are the more mistakes can be made on installation.

Visit Europe s leading security event in June 2017 Visit IFSEC International for exclusive access to every security product on the market, live product demonstrations and networking with thousands of security professionals. From access control and video surveillance to smart buildings, cyber, border control and so much more. It is the perfect way to keep up to date, protect your business and enhance your career in the security industry.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

Calls for greater collaboration as security industry faces blended threat

Recent cyber-security threats underscore the need for physical and information security teams to work more closely together. The threat is blended so the teams need to work together, said Ellie Hurst, Marcomm and Media Manager for Advent IM at IFSEC International. Hurst cited numerous attacks where hackers exploited vulnerabilities found in physical systems.

For example, in December, two individuals hacked into the Washington DC CCTV camera network days before Donald Trump s inauguration. Meanwhile in October, Hangzhou Xionmai Technology, a vendor behind DVRs and internet-connected cameras, inadvertently played a role in a wide-scale DDOS attacks against PayPal, twitter, Spotify and other platforms. While physical and information security professionals typically work in different departments, they need to find a common language, said Hurst. Do you know what you have? Do you know what they are built on? What is the life-cycle management of these products and are they patched? said Hurst. From there you can decide whether to accept the risk. Though rare, some organisations have merged the physical and information security teams, said James Willison, Founder of Unified Security Ltd.

Symantec has merged their team and Barclays is building one SOC for both cyber and physical security, he said. All is not lost if your organisation is behind. There are measures every company can take to mitigate the risk, said the presenters at IFSEC. Ninety percent of breaches are due to people s mistakes, poor configuration and maintenance, said Steven Kenny, Business Development Manager Architecture & Engineering (A&E) Program, Axis Communications. Creating a documented internal policy and increasing employee awareness is important, said Kenny. Training and education is also important. You need to find a training course suitable for those in physical security, added Hurst. At the end of the day, the threat isn t going to go away. You ve got to do the training.

Visit Europe s only large-scale security event in 2017 IFSEC International is taking place at Excel London, 20 22 June 2017, here are 5 reasons you should attend: Exclusive hands-on access to over 10,000 brand new security solutions Network with over 27,000 security professionals Discounts of up to 30% exclusively for IFSEC 150 hours of seminars, workshops and keynote speeches A 1-2-1 meetings service to pre-book face to face meetings.

Time is running out, register now to avoid missing out

Security installer training academy: Robox Academy at IFSEC 2017

Manveer Rayit, owner of RoboxAcademy.com, speaks to IFSEC Global about exhibiting at IFSEC International 2017 in the run-up to the show. A former installer, Manveer is now running a training academy which helps installers market and grow their business. Robox Academy is exhibiting on stand C1432.

Get your free badge now. IFSEC Global: What are your plans for the show? Have you exhibited before? Manveer Singh: This is the first time exhibiting. Our plan is to showcase our academy targeted towards installers looking to grow their business. We ll also be handing out some useful marketing information for security installers. IG: What s your background? MS: I learnt about the security industry through my father who left his management role with BT to become a full time security installer in 1990. I was brought up watching him fit security systems and It taught me a lot about the nature of running your own business.

Fast forward 15 years, I left university and could not find a job so decided to become a CCTV Installer and found it incredibly rewarding. I was always fascinated with the products, so after three years I setup as a distributor and began supplying the trade with CCTV equipment. It was through this experience that I learnt how important it was for installers to understand how to manage their business. I think a lot of well qualified installers lose out due to a lack of attention on the marketing and management side. Whether it s advertising themselves, designing a sales system that helps them win more jobs or project management their installations. So many installers I used supply cut themselves short when it came to marketing themselves properly. This is when I had the first idea for an Academy that could teach business skills for installers who were primarily driven by technical expertise. I ve also been reading lots of articles about the shortage of engineers in the trade and our academy is planning on a campaign to help bring more people into the industry. IG: Please tell me about the things you have to offer the market?

MS: Our primary product is a training course which anyone from the trade can register and attend. The courses are specifically targeted towards business skills so you d learn things like: Advertising your business online Managing your projects more effectively Controlling your paperwork and finances We also have a solutions division which has successfully completed a number of business solutions since January. Our solution is company specific so includes Web Design, Branding and Logo Design and implementation of CRM software. We have our business course on 14 July and are offering a 100 discount to all IFSEC attendees from the normal price of 299. It s not too late to visit IFSEC! One day to go . IFSEC International takes place between 20-22 June 2017 at London ExCeL. Robox Academy is exhibiting on stand C1432. Get your free badge now.

Visit Europe s only large-scale security event in 2017 Taking place in London, 20 22 June 2017, IFSEC International gives you exclusive hands-on access to over 10,000 security solutions, live product demonstrations, and networking with over 27,000 security professionals.

Covering every aspect of security, from access control and video surveillance to smart buildings, cyber, border control and so much more.

Time is running out, register now to avoid missing out

Axis launches integrated mobile access control with HID Global and upgrades Zipstream compression

IFSEC 2017 Axis Communications, the leading provider of network video recording systems, has launched the integration of HID Global s Mobile Access with its Axis A1001 Network Door Controller and entry manager software at IFSEC 2017. The integrated mobile access control platform supports mobile-enabled workforces and lets smart phones and other mobile devices function as credentials so staff and other authorised personnel can gain access to secured buildings, rooms and areas. Mobile devices and smartphones are ubiquitous and their functionality includes diverse applications, from contactless payments to health tracking.

By integrating HID Global s mobile access technology with its software and door controller, Axis system combines convenience with the levels of security expected by businesses and their employees. The platform is suitable for small, medium or enterprise-sized organisations. The platform stores secure identities on smartphones for opening doors and locks instead of managing traditional printed identity credentials, improving convenience for end users and offering a more cost-effective and simpler way to manage credentials. Axis and HID are both well-known, global brands that are partnering together to develop open, IP-based secure access solutions. Mobile credentials are finally gaining greater acceptance and adoption thanks to an increasingly mobile-first perspective. This mobile access control offering demonstrates Axis innovative solutions to the market in partnering with a leader such as HID. It is an easy-to-deploy, easy-to-use solution, says Stephanie Hensler, Axis Communications director of business development, access control. The platform consists of: AXIS A1001 Network Door Controller, which makes yes/no decisions about who may enter, in which areas and at what times AXIS Entry Manager access control software, which is integrated with HID Mobile Access portal and is used to set up the systems, add new users and manage mobile IDs HID iCLASS SE and/or Multiclass SE readers HID Mobile Access portal HID Mobile Access app Axis Communications has also partnered with Simons Voss Technologies to launch an integrated, IP-based digital locking and access control system to replace physical keys for buildings. SmartIntego battery-powered digital locks come in the form of either cylinders, padlocks or door handles.

They connect wirelessly via a Simons Voss GatewayNode to Axis A1001 door controller and Axis Entry Manager software. Each SimonsVoss GatewayNode has a 16-wireless digital lock capacity and each Axis A1001 manages one GatewayNode. Therefor each A1001 door controller can manage up to 16 Simons Voss wireless locks and a hard-wired door reader. The integrated platform is offered as a standalone setup, with no server, or a fully integrated platform using an Axis software partner for enterprise installations. Online integration between the AXIS A1001 door controller and SmartIntego wireless lock components via AXIS Entry Manager work on an open, IP-based architecture. Also, in time for IFSEC, Axis is enhancing its compression technology to work with new 360 cameras and 4K resolution. The Zipstream technology ensures important forensic details of video footage are maintained, while minimising bandwidth and storage requirements by half. The company has also developed new domes that include the enhanced Zipstream, offering 360-degree, high-resolution coverage, cost-effectively. Combining these new 360-degree domes with the enhanced Zipstream technology really does deliver a cost-effective solution for customers, providing comprehensive coverage while ensuring the detail of that panoramic view is not lost when streaming and storing data, added Petra Bennermark, global product manager, Axis Communications.

The AXIS M3047-P and AXIS M3048-P dome cameras will be available through Axis distribution channels from June 2017 to the suggested retail price $469.00 and $669.00 respectively. The enhancements to Zipstream will be exhibited together with the new panoramic cameras, as well as new 4K cameras, at IFSEC. Visit Europe s leading security event in June 2017 Visit IFSEC International for exclusive access to every security product on the market, live product demonstrations and networking with thousands of security professionals. From access control and video surveillance to smart buildings, cyber, border control and so much more. It is the perfect way to keep up to date, protect your business and enhance your career in the security industry.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

Watch: Highlights from day one of FIREX International 2017

Check out some of the action on the show floor from a busy, eventful opening day at ExCeL London. For more news, video and images from Europe s largest annual fire show, click here. Watch more videos from IFSEC and FIREX 2017.

embedded content Visit FIREX International for cutting-edge solutions, essential knowledge and the ability to grow your business by getting direct access to the whole fire safety industry. It is the perfect place to get your product in front of thousands of buyers, across a multitude of featured areas. From the brand new Drone Zone, the ARC Village, ASFP Passive Protection Zone, the Engineers of Tomorrow competition and more, it s all under one roof so you ll never miss a beat.

Click here to register your place now to join us at London Excel on 20 22 June

Aviation laptop ban the threat is real and requires new response

Aviation Security The proposed ban on all electronic items larger than smartphones is required because the threat is real . That s the view of Ian Hutcheson OBE, security advisor at airport security giant L3. Hutcheson said these complex IEDs which can be disguised as such devices require more advanced technology than is currently available, also revealing that L3 is currently working on new computed tomography machines to tackle the threats.

However, he also claimed that simply detecting threats is not enough for the role of technology. He said: It is much easier to measure detection capability than deterrents, but mitigating future risks will require technologies that both deter and detect. Despite this technology can produce real deterrent value such as PWM scanners at Heathrow. Many people discarded drugs and other contraband because they didn t understand the capabilities of the scanner. Hutcheson also noted the potentially negative impact that increased response to threats could have to the global aviation industry s core business getting passengers from origin to destination. How do we improve security while keeping business moving? That is it we need to find out. Visit Europe s leading security event in June 2017 Visit IFSEC International for exclusive access to every security product on the market, live product demonstrations and networking with thousands of security professionals. From access control and video surveillance to smart buildings, cyber, border control and so much more.

It is the perfect way to keep up to date, protect your business and enhance your career in the security industry.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

Man and machine: How to team up to meet cybersecurity challenges

In today s cybersecurity landscape, the pressure is on. CISOs and other executives are suffering security insomnia : attack surfaces are growing exponentially, their security teams are receiving overwhelming numbers of alerts, real threats are masked by false positives, and the numbers of serious breaches are reaching new records the list goes on and on. To protect their organizations, a paradigm shift is required, a new holistic approach that cuts detection-to-response time and provides complete visibility across network, endpoint, and payload.

The systems must offer continuous, round-the clock incident monitoring, detection, and investigation, all while reducing operating costs and addressing the ever-expanding cybersecurity skills gap. The Answer: Automate the analyst Driverless taxi cabs in major cities are becoming a reality. If you can automate something that complex, why not automate cyber investigations? Automating investigations frees up valuable human analyst time so he/she can focus on tasks that DO require human judgment and intuition. Automating the complex work of incident investigation slashes dwell time and makes security operations vastly more efficient. Verint Systems is exhibiting at IFSEC International, which runs from 20-22 June 2017 at London ExCeL. You can find them on stand G375. Get your free badge now. Here s why.

The automated analyst: Thinks just like a human investigator Virtual investigators gather evidence, extract leads, create an intelligence map, build hypotheses, and then verify or refute said hypothesis, just like an analyst would. Unlike humans, though, it can analyze thousands of leads per day, providing analysts with clear, visual incident storylines that accelerate detection and response. Combines the best of man and machine In a great example of teamwork, the machine documents workflow and rationale for the human analyst. When the analyst adds new evidence, the machine re-evaluates the incident. The machine also learns from the analyst how to improve future investigations. Collects the right information Automated investigation ensures that analysts get the big picture when complex threats are detected the complete information that is necessary to resolve the threats. Automation gives analysts total visibility of the attack surface from attack chain to the attack vectors; from network, endpoints, and files to the organization s ecosystem gleaning insights as sensors share the data. Blends detection with proactive forensics Automated forensic analysis, using a full set of network and endpoint forensics tools, helps incident response teams identify the root cause, trace the attack storyline, and contain attacks before data is exfiltrated. Combined with intelligence from other sources, it allows analysts to connect the dots among seemingly unrelated events and understand how the attackers entered, what systems are compromised, and what and how to contain, remediate, and prevent future incidents.

Transforms alerts into actionable intelligence Automated investigation can extract essential information from every piece of evidence, build linkage and context, visualize for immediate response, and update the intelligence map in real time. Man, machine or both? Cyber attacks are getting more and more sophisticated. Due to the volume and complexity, man cannot fight them alone. Human analysts are no match for today s advanced threats, which vigorously act to avoid detection, often lying undiscovered for months. This is where virtual analysts come in, to perform the grunt work, including: Gathering, analyzing, and prioritizing information Sifting daily alerts, and synthesizing them to create a forensic timeline for an incident Documenting every step of the investigation and facilitating information sharing Continuously reviewing evidence to confirm or refute attacks, transforming thousands of leads into a handful of prioritized incidents that tell the attack story Streamlining the process and improving SOC efficiency By freeing up human analysts of routine and repetitive tasks, and eliminating human errors, the human pros can more effectively handle the work that require human experience and insight, including: Dive deeper into incidents, for example, by analyzing the content of suspicious network traffic Check open source intelligence for additional information on detected threats Run additional forensic investigations on endpoints and network for additional evidence collection Suggesting how to respond, remediate, or contain the threats/attacks With automated investigations, companies can now stop scrambling to put out cyber fires. Visit Europe s leading security event in June 2017 Visit IFSEC International for exclusive access to every security product on the market, live product demonstrations and networking with thousands of security professionals. From access control and video surveillance to smart buildings, cyber, border control and so much more. It is the perfect way to keep up to date, protect your business and enhance your career in the security industry.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

London Fire Brigade: Every day we see unsuitable fire risk assessments

FIREX 2017 Andy Jack, Head of Regulatory Enforcement at London Fire Brigade spoke to a packed audience at FIREX 2017 about the inadequate fire risk assessments he sees every day of the week . Taking pains to mention that he is not commenting on Grenfell Tower, which is currently under criminal investigation, Andy Jack spelled out the role of responsible persons in fire risk assessment. It is twenty years since fire risk assessment came in and ten years since reg 38 (or 16B) packs were introduced but has it made any difference?

he asked the audience. Responsible for what? The law spells out the needs for responsible persons, but responsible for what ? Article 9 from the Regulatory Reform (Fire Safety) Order 2005 explains that: The responsible person must make a suitable and sufficient assessment of the risks to which relevant persons are exposed for the purpose of identifying the measures they need to take to comply with the requirements and prohibitions imposed on them by the Order. However the law doesn t explain what responsible persons are responsible for and the suitable and sufficient assessment in article 9 means, very broad said Andy. Are these fire risk assessments suitable and sufficient? Andy Jack explained a number of assessments that, as an enforcer, he sees coming across his desk every day There are many cases where the fire risk assessor did not go to all parts of the building e.g. a locked manager s office or false ceilings, leaving areas of the building unchecked.It is common for assessors to ignore basements or top floors. Excuses can range from difficulty accessing the building to safety, but these things are are simply wrong.

In other cases, Andy sees assessors completely misconstruing what building is made of The assessment tells us that the premises are of brick and concrete constructuion, when it s actually made from timber frame with studwork. Too often Fire Information Packs don t get passed to the fire risk assessor who is missing out on a whole wealth of information . What have London Fire Brigade have learned? It is clear there is an inconsistent views on who is responsible and liable for fire risk assessments but you can t get rid of the duty, you can t saw it s nothing to do with you, or to mitigate your responsibility . Co-operation and co-ordination between the responsible person and their fire risk assessor is often is not all it might be and causing problems. Jack s advice to the industry is: Get co-operation working to get a better fire risk assessment, reduce risk to relevant persons, and reduce risk of litigation from the likes of me. I d rather I didn t have to do it at all, to be honest. There are plenty of things I d much rather do with my time than litigating. Visit FIREX International for cutting-edge solutions, essential knowledge and the ability to grow your business by getting direct access to the whole fire safety industry.

It is the perfect place to get your product in front of thousands of buyers, across a multitude of featured areas.

From the brand new Drone Zone, the ARC Village, ASFP Passive Protection Zone, the Engineers of Tomorrow competition and more, it s all under one roof so you ll never miss a beat.

Click here to register your place now to join us at London Excel on 20 22 June