europe

How evolving terror tactics have driven advances in perimeter security

Many urban threats used to be seen, at least in the eyes of the public, as things that happened on other shores. However, an increase in urban attacks of late has put pressure on security services to come up with innovative solutions that allow business to continue as normal and the public to enjoy some peace of mind. Amid these new threats, coupled with geopolitical fears and the ongoing refugee crisis in Europe, governments are attempting to make borders more secure and event venues and stewards of high-risk public areas are following suit.

With terrorists now using vehicles as weapons, many existing security solutions need reassessing as they are inadequate at preventing vehicular attack. This month marks the anniversary of the Nice attack and similar incidents have occurred since in Berlin, Stockholm and London. The change in tactics has rendered current security provisions outdated. A proactive, preventative approach is now required if security personnel are to put a stop to such incidents. Mitigating risk While no guarantee can be made about the safety of those attending events or conducting their daily lives in high-risk, crowded public areas, perimeter security does provide an increased level of protection and has seen advancements designed to mitigate the risk and impact associated with today s urban threats. Previously seen on military bases, oil and gas fields and other important infrastructure, perimeter security products have become popular for those looking to secure their event and put public safety firmly back on the agenda. Threats are, of course, unpredictable. However, providing a readily-available solution for areas deemed high-risk due to large volumes of the public passing through, including stadiums or other event spaces, can help deter or reduce the impact of vehicular and some other attacks. The concrete blocks so far installed have actually been found to be near to useless when tested by researchers in Germany While video cameras and security guards are two of the most common security measures that organisations have in place, they aren t always the most effective.

With hostile events increasing in frequency, there has been a reliance on video surveillance to identify perpetrators and ensure that every angle is covered. However, surveillance cameras are mostly effective when the attack has already happened. There s no doubt that the increased threat level has meant that event organisers and those managing security in high-risk areas have had to look at alternative ways in which they can prevent attacks or reduce their impact. Protecting civilian areas has become a higher priority, with perimeter security generating much interest and innovation. In reaction to the London attacks, Metropolitan Police Commissioner Cressida Dick announced that vehicle barriers were to be installed across London in some form or other. Yet while such reactive measures are of course welcomed, it s imperative that everyone involved in public security should take action in the threat against urban terror. The concrete blocks so far installed have actually been found to be near to useless when tested by researchers in Germany, who found that they would be unable to prevent similar attacks. These revelations have prompted the development of barriers that are crash-resistant up to speeds of 50mph and use an anti-climb mesh to prevent further intrusions. As the solutions are flat-packed and can be earth-filled, they are an effective option for event security, minimising installation time and the impact on the surrounding environment.

Units can also be branded, so they remain inconspicuous and in line with an organisation s existing branding. New threats are presenting themselves every day. Organisations and urban spaces are aware they can no longer be just reactive in the wake of a hostile event. Precautionary measures are becoming increasingly advanced and accessible, and where public safety is concerned, you truly cannot put a price on it. Free Download: Securing UK borders: An examination of the implications of leaving the EU for UK border management. Recent tragic events in Manchester and London have, among other things, underscored the importance to national security of getting Brexit right. This report considers the implications of leaving the EU for the management of the UK s borders and making it as easy as possible for international business to thrive and legitimate movement to occur in a post-Brexit UK.

Click here to download now

Converged security management: The key to mitigating cybersecurity risks

Converged Security Management: The Key To Mitigating Cybersecurity Risks

The IoT revolution has come about thanks to falling component prices, global mobile device adoption, improvements in telecoms infrastructure and the rise of application programming interfaces (APIs). Unsecured and therefore vulnerable devices are now easily searchable through online vulnerability search engine Shodan, among many other means. A series of cyber-attacks targeting such devices as conduits to wider corporate networks has exposed the complacency of some manufacturers over cybersecurity.

The consequences of successful breaches the loss of sensitive data and potentially multi-million pound fines levied for breaches of the forthcoming Global Data Protection Regulation (GDPR) mean the issue is finally getting the attention it warrants. The arguably lower standards of security for consumer devices is a problem, as is the use of third-party suppliers who may not take security as seriously as they should. According to the Department of Homeland Security, this inter-connectedness of devices introduces cyber-physical technologies that connect cyber systems to physical systems, thereby removing the barrier between the cyber and physical worlds but the greater connectivity also expands the potential attack surface for malicious actors. Author bios James Willison BA MA MSyI James is founder of Unified Security Ltd and vice chair of the ASIS European Convergence/ESRM committee. James was awarded the Imbert Prize for an outstanding contribution to the Security Industry in 2011 for his work on convergence with ASIS Europe and the Information Security Awareness Forum. He has worked with BP, Loughborough University, Mitie TSM, the EU and AXIS Communications on convergence. He is an ISACA Academic Advocate and a member of the draft ASIS/ISACA/ISC(2) Security Awareness Standard Working Group. Unified Security Ltd provide consultancy to organisations on how to align their physical and information security functions. This encompasses security policy, common reporting processes, converged security risk assessment, training courses and white papers.

Sarb Sembhi CISM Sarb is CTO and CISO at Virtually Informed, and has previously been a CTO and CISO for the Noord Group. A former consultant in risk and security, Sarb has also worked with the London Chamber of Commerce and Industry Defence and Security Committee and its cybersecurity working group. Other roles have included president of the ISACA London Chapter, chair of ISACA International GRA Region 3 Sub-Committee, chair of ISACA International GRA Committee, ISSA UK Advisory Group member and InfoSecurity Magazine Editorial Group member. Sarb has also served on several security standards groups and speaks at risk and security events around the world. Sarb was shortlisted in IFSEC Global s Top 50 influencers in security & fire 2017: Cybersecurity.

l

FIA officially launches new fire engineering qualifications

FIREX 2017 The Fire Industry Association (FIA) officially launched their new qualifications in fire detection and alarms at FIREX 2017. FIA general manager Martin Duggan delivered three presentations about the new qualifications, one on each day of the three-day exhibition. The seminars were very well attended and it was a great opportunity to answer questions directly from visitors at the show, he said.

These qualifications have taken years of development and we are really excited to share with the industry exactly what shape the qualifications will take. We ve taken on new staff and had a small shake-up of the FIA team in preparation for the launch of the qualifications in order to answer all those initial questions and to ensure that the booking process goes smoothly. The FIA said the new courses met with a positive response from attendees working in all areas of the supply chain, as well as interest from beyond the UK. There are four new qualifications: designer, installer, maintainer, and commissioner, explained Duggan. They are equivalent to a level 3 in the UK, so that is the same as an A-Level, but in Europe it is the same as a level 4 qualification on the European qualifications framework. FIA general manager Martin Duggan delivers FIREX 2017 seminar The FIA handed out course prospectuses as well as snacks and drinks on its stand the FIA Lounge which was designed to resemble a pub. The FIA Lounge was very successful, said Kat Schabowska, marketing communications executive at the FIA. We had back-to-back enquiries at the information desk and the bar area was full every day of the expo. We are delighted to be able to say that this year s footfall on our stand was even better than last year.

Martin Duggan says the new courses introduce elements not hitherto available in existing FIA courses. We did a gap analysis of our current training and the new qualifications to discover how much more the new qualifications would offer. The results show us that the courses will at least double in size, explained Martin Duggan during his presentation. We ve developed some units that are completely new, plus we added extra sections that industry stakeholders and employers have asked for. Our members have very much guided us in this direction towards including more content and making the courses longer and more extensive, in order to stretch the learners knowledge further than before. Said Kat Schabowska: We recommend that if you re interested in our new qualifications or courses that you sign up to our email newsletter to find out when our booking system will go live. The new qualifications prospectus is available to download for free from the FIA website, or a hard copy can be requested by emailing [email protected]

Petya/GoldenEye: Cybersecurity experts respond to ransomware attack

The latest ransomware virus to sweep the globe started in Ukraine after users there downloaded a popular tax accounting package or visited a local news site, according to Ukrainian police and cyber experts. Called GoldenEye or Petya, the virus has affected thousands of computers, disrupting organisations in a wide range of sectors, from shipping to manufacturing. US shipping company FedEx, Danish shipping giant AP Moller-Maersk and Russian oil giant Rosneft are among those hit by the attack.

The malicious code locks machines and demands that victims pay a ransom of $300 in bitcoins or lose their data. The hackers motives are still unclear, with some experts speculating that, given the modest sums demanded, a motive other than financial gain might be driving them. A number of cybersecurity experts offered their analyses to IFSEC Global, which you can read below. Eldon Sprickerhoff, founder and chief security strategist, eSentire Attacks are becoming more widespread, are moving faster, and are harder to kill The eSentire threat intelligence team has confirmed one variant associated with this attack, however broadly there are more than 50 different flavours of ransomware variants in the wild. Of those flavours, behaviors prompt the rapid deletion of files and exfiltration of data. Recently we ve tracked a new variant which works to lock down passwords before encryption, making backup restoration particularly tricky. This attack amplifies the rapid evolution of ransomware; attacks are becoming more widespread, are moving faster, and are harder to kill. While this attack is hitting Europe harder than other countries (at the moment), it is moving quickly and businesses worldwide should treat this as the warning siren. Take this as an opportunity to ensure that offline backups and system patches are up-to-date, and tested.

Dr Jamie Graves, CEO, ZoneFox It s not just computer systems shutting down; it s energy grids losing power, ships stopping in their tracks and people not being able to access their money This is further confirmation that we now live in a world where nation-state sponsored cyber-attacks are becoming as routine as real-world incidents. This latest attack reminds us of two crucial facts regarding the current state of cyber security: that attackers now have access regardless of whether they are state-sponsored or independent to military-grade cyber weaponry, hence the fact that the attacks are so successful. Secondly, that digital data is directly linked to physical assets; it s not just computer systems shutting down, it s energy grids losing power, ships stopping in their tracks and people not being able to access their money. Despite the headlines it will create, especially in the wake of the recent WannaCry incident, this is old news. The origin of this attack looks to be a phishing email that delivers a rebranded piece of ransomware, with the only addition being the NSA EnternalBlue exploits that WannaCry used. If you don t have adequate security in place and a seriously security-conscious culture, you re going to get a free penetration test to show just how vulnerable your organisation really is. Marty P Kamden, CMO, NordVPN One way to protect yourself is to disrupt a system before it boots, as the ransomware runs on boot The latest ransomware assault seems to be particularly dangerous. One of the best protection mechanisms are patches, but they might not always work with this new version of Petya. Another way to protect yourself is to disrupt a system before it boots, as the ransomware runs on boot.

After the device gets infected with a ransomware, it will wait for about an hour until reboot. Reboot is required for a malware to encrypt the system, so in certain cases, if the device gets terminated in the encryption process, it gets disrupted and information can be saved. Generally, system administrators are still not well-prepared to protect their networks, and these attacks will only keep getting worse. Matt Kingswood, UK head, IT Specialists The best way to prepare for an attack is to back up data regularly to the cloud The news story on the new variant of the Petya ransomware dubbed PetrWrap exposes just how complex and well evolved cyber threats have become. Researchers from Kaspersky have documented that the group behind PetrWrap created a special module that patches the original Petya ransomware on the fly . While Kaspersky has a signature for this ransomware already, other AV providers are sure to follow soon. Although there are a range of best practices to reduce the risk of a ransomware infection (such as installing an antivirus scanner, utilising intrusion detection services, applying updates as soon as possible and avoiding unsolicited email attachments), there is no failsafe method for preventing ransomware. The best way to prepare for an attack is to back up data regularly to the cloud. Secure cloud-to-cloud backup solutions create another, encrypted version of your data and maintain prior versions ‘ in the case of a ransomware attack, the versions before the attack.

And, of course, this second copy has the added benefit of preventing data loss via accidental deletion. Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape.

Further topics covered include: The network cameras hijack during the 2017 presidential inauguration, updates on the forthcoming EU data protection law (the GDPR), ultra-low light cameras versus thermal cameras and much more.

Click here to Download now

IDIS introduces industry s longest warranty and launches VA in the Box analytics as it marks 20th anniversary

South Korea s largest video surveillance manufacturer has unveiled the industry s longest warranty and several new products during a champagne reception for journalists, partners and customers. Perhaps the most eye-catching of these releases showcased amid celebrations marking 20 years in the surveillance business was a new plug-and-play analytics platform. Aimed primarily at retailers but with applications in other markets, VA in the Box offers a suite of functions such as people counting, heatmaps and analytics reporting to help businesses make better commercial decisions.

Industry warranties typically range from three to five years in length, but IDIS has raised the bar with a new, unparalleled seven-year warranty. Called the IDIS Ultimate Warranty, it is available to all integrators, installers and distributors regardless of partner status. Announcing the bold move which was partly inspired by findings on page 14 of IFSEC Global s IDIS-sponsored Video surveillance report 2017 IDIS PR consultant Benjamin Bryant said the warranty was a reflection of the company s confidence in the reliability, over a long period, of IDIS products. The warranty will comprise a five year warranty as standard, plus an extended two-year warranty across its full range of H.265 network video recorders (NVRs) covering the IDIS DirectIP series and multi-format HD-TVI, DirectCX, TVRs. Read about more product launches from IFSEC 2017 Features People counting. Counts, tracks and analyses shoppers. Also ascertains the gap between the estimated and actual floating population. Useful in high-level security environments such as airports and rail stations. Expected number of visitors can be extrapolated from historic data and appropriate action made in advance.

Heatmaps. Visualise visitor footfall and behaviour such as where people spend time, for how long, and what they interact with. Application in retail, where store managers can optimise location of various products, advertisements and promotional materials. Queue Management. Reduces customer waiting times. Based on how many customers are in line, sales counters can be open and closed to optimise deployment of staff resources and enhance customer experience. Analytics reporting. Graphs and thumbnails generated for time periods set to give customer understanding of data across all functions. Periodical analysis available through the IDS Center video management software VA Report tab.

Customers can check hourly/daily/weekly/monthly data in detail by simply entering a date and time. The data from the people counting, queue management and heatmap functions can be reviewed individually or collectively. IDIS co-founder Dr Albert Ryu (second from right) cuts the commemorative cake with IDIS partners IDIS VA in the Box has now been installed at various sites throughout Europe, and both installers and end users are reaping the benefits, said Jamie Barnfield, senior sales manager for IDIS Europe. Since VA in the Box is plug-and-play with our flagship DirectIP platform, it is fast and simple to both install and maintain, protecting installer s margins. When combined with IDIS Center s intuitive user interface, it s extremely easy for operators to utilise, and delivers IDIS s signature low cost of ownership for end users. Further, the addition of analytics into the IDIS surveillance offering is also making security buying less of a grudge purchase, as not only do customers benefit from security operations, they also enhance marketing, sales, and other departments by delivering a raft of business insights. The company, which was founded in South Korea in 1997, also handed out commemorative awards to valued commercial partners, media partners and customers during the champagne reception. One of the co-founders, Dr Albert Ryu, also made an appearance. Extended warranty IDIS says its Ultimate Warranty is particularly competitive when compared to PC-based solutions that typically handle up to 64-channels and only come with a warranty lasting up to three years.

IFSEC International is the perfect platform to announce the IDIS Ultimate Warranty as we celebrate two decades of innovation with the entire security buying chain all under one roof, said Joon Jun, president of the global business division at IDIS headquarters, during the press briefing on Thursday. As we ve brought every new innovative product to market, each element has been IDIS designed and manufactured in-house with quality and reliability in mind. We still have IDIS DVRs in operation that have required little to no maintenance that customers installed well over 13 years ago. That is a true testament to IDIS quality and reliability and demonstrates how it s not the same; it s IDIS . The IDIS Ultimate Warranty will apply to products shipped globally from July 2017. End users should contact their integrator, distribution partner or local IDIS office to apply for the additional two-year warranty. Read about more product launches from IFSEC 2017 Free download: The video surveillance report 2017 Sponsored by IDIS The Video Surveillance Report 2017 covers all things video surveillance based on a poll of hundreds of security professionals. Specifically looking at topics such as open platforms, 4K, low-light cameras, video analytics, warranties and this year due to the growing threat posed, the cybersecurity landscape. Further topics covered include: The network cameras hijack during the 2017 presidential inauguration, updates on the forthcoming EU data protection law (the GDPR), ultra-low light cameras versus thermal cameras and much more.

Click here to Download now

Video Analytics: Oversold and underutilised but could key to preventing terror attack

Panel of video surveillance manufacturers agree that video analytics has yet to reach its full potential. Atul Rajput, Axis Communications, Stephen Jones, Seagate, Jonathan Rickard, Panasonic, and Andy Coles, Hikvision took part in a lively debate at IFSEC International 2017 about the trends shaping video surveillance over the next few years. Video analytics raises Far too many false alarms, not really performing said Jonathan Rickard but that is going to change as machine learning and processing power in cameras is increasing.

Video analytics can already identify unusual behaviour, if someone in a crowd who is drunk, or walking in an usual way. Analytics can take away the current expectation that a single security guard can monitor 150 cameras, said Rickard. A guard can see one or two cameras maximum. Even if you them screen with 50 cameras, they won t be able to do it. Machine learning is needed to monitor all cameras and then present anything usual to the security guard. ‘The future of video surveillance’ just starting at Security Management Theatre in @IFSEC pic.twitter.com/mrBYDJzyKg IFSEC Global Editor (@ifsecglobal) June 20, 2017 The potential of real-time analytics Andy Coles pointed out that Artificial intelligence is already built into many surveillance products already. Until now analytics have been used to review an incident after it happens. Imagine intelligent analytics that can interrogate behaviour before it happens. That s where security is going. Deep learning will make big impact in the years ahead.

Forensic searches for video analytics are good, but we need to now react in real time. Takes a lot of processing power and technology said Stephen Jones. Preventing terror attacks In many incidents such as the recent Manchester Arena bombing, terrorists conduct a reconnaissance before the bombing. How could video analytics have presented these attacks, asked an audience member. If know suspect was on terror list and you could get your VMS platform suppliers for government and businesses joined up, yes you could spot that. said Andy Coles. The technology is there, but as everyone is using disparate systems you cant do anything like that. In connecting systems Simplicity is key Atul Rajput added. The more complicated systems are the more mistakes can be made on installation.

Visit Europe s leading security event in June 2017 Visit IFSEC International for exclusive access to every security product on the market, live product demonstrations and networking with thousands of security professionals. From access control and video surveillance to smart buildings, cyber, border control and so much more. It is the perfect way to keep up to date, protect your business and enhance your career in the security industry.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

Veracity demonstrates end-to-end command and control system at IFSEC

Veracity is exhibiting a new range of products at IFSEC, spanning IP transmission, storage and display. Following on from the company s acquisition of security Command & Control software manufacturer icomply Ltd, Veracity s IFSEC stand F1050 is built around a control room. The control room promotes the company s integrated security management platform powered by VTAS Pro.

Taking new and legacy third-party video recording systems, VTAS Pro combines them with other security systems such as access control and building management to provide a single coherent system for managing and controlling single or multiple sites. VTAS Pro is fully integrated with Veracity s Trinity direct-to-storage architecture and the Coldstore surveillance storage system. The technology features a full video and media wall display option which can be reconfigured on-the-fly and in response to specific incidents or emergency situations. Live views can be mixed with playback and media streams such as broadcast news, online data streams, maps or other graphical displays. The end-to-end Command & Control solution is scalable and supports a large number of operator workstations, with shared incident management and can handle thousands of remote sites. The system can provide integration with access control, building management, intruder detection, VOIP intercom systems and video analytics including facial recognition. Veracity will also be presenting its new Highwire Powerstar Base 4 encoder replacement kit, containing a Highwire Powerstar Base 4 unit, four Highwire Powerstar Camera units and a 57V DC power supply. The bundle is a simple and cost-effective replacement for legacy analogue video encoders. Customers can upgrade to IP cameras by re-using the coax cable and powering the new IP cameras with POE over coax.

Other examples of Coldstore integrations can be seen on the stand of Veracity s global marketing partner Hanwha Techwin Europe, G800, where the technology will be shown working with SSM and WiseNET cameras. Visit Europe s leading security event in June 2017 Visit IFSEC International for exclusive access to every security product on the market, live product demonstrations and networking with thousands of security professionals. From access control and video surveillance to smart buildings, cyber, border control and so much more. It is the perfect way to keep up to date, protect your business and enhance your career in the security industry. Click here to register your place now to join us at London Excel on 20 22 June 2017.

Security installer training academy: Robox Academy at IFSEC 2017

Manveer Rayit, owner of RoboxAcademy.com, speaks to IFSEC Global about exhibiting at IFSEC International 2017 in the run-up to the show. A former installer, Manveer is now running a training academy which helps installers market and grow their business. Robox Academy is exhibiting on stand C1432.

Get your free badge now. IFSEC Global: What are your plans for the show? Have you exhibited before? Manveer Singh: This is the first time exhibiting. Our plan is to showcase our academy targeted towards installers looking to grow their business. We ll also be handing out some useful marketing information for security installers. IG: What s your background? MS: I learnt about the security industry through my father who left his management role with BT to become a full time security installer in 1990. I was brought up watching him fit security systems and It taught me a lot about the nature of running your own business.

Fast forward 15 years, I left university and could not find a job so decided to become a CCTV Installer and found it incredibly rewarding. I was always fascinated with the products, so after three years I setup as a distributor and began supplying the trade with CCTV equipment. It was through this experience that I learnt how important it was for installers to understand how to manage their business. I think a lot of well qualified installers lose out due to a lack of attention on the marketing and management side. Whether it s advertising themselves, designing a sales system that helps them win more jobs or project management their installations. So many installers I used supply cut themselves short when it came to marketing themselves properly. This is when I had the first idea for an Academy that could teach business skills for installers who were primarily driven by technical expertise. I ve also been reading lots of articles about the shortage of engineers in the trade and our academy is planning on a campaign to help bring more people into the industry. IG: Please tell me about the things you have to offer the market?

MS: Our primary product is a training course which anyone from the trade can register and attend. The courses are specifically targeted towards business skills so you d learn things like: Advertising your business online Managing your projects more effectively Controlling your paperwork and finances We also have a solutions division which has successfully completed a number of business solutions since January. Our solution is company specific so includes Web Design, Branding and Logo Design and implementation of CRM software. We have our business course on 14 July and are offering a 100 discount to all IFSEC attendees from the normal price of 299. It s not too late to visit IFSEC! One day to go . IFSEC International takes place between 20-22 June 2017 at London ExCeL. Robox Academy is exhibiting on stand C1432. Get your free badge now.

Visit Europe s only large-scale security event in 2017 Taking place in London, 20 22 June 2017, IFSEC International gives you exclusive hands-on access to over 10,000 security solutions, live product demonstrations, and networking with over 27,000 security professionals.

Covering every aspect of security, from access control and video surveillance to smart buildings, cyber, border control and so much more.

Time is running out, register now to avoid missing out

Watch Mavili alarm systems at FIREX 2017

FIREX 2017 Interview with Ipek Yavuz Konak, marketing manager of Mavili at FIREX 2017 Manufacturing Mavili, Mavigard, Maxlogic, Maxlogic & Mavigard alarm systems since 1987. Mavili displays its brand-new LPCB- and CE-approved ranges at FIREX 2017. Watch the interview with Ipek Yavuz Konak below.

embedded content Visit Europe s leading security event in June 2017 Visit IFSEC International for exclusive access to every security product on the market, live product demonstrations and networking with thousands of security professionals. From access control and video surveillance to smart buildings, cyber, border control and so much more. It is the perfect way to keep up to date, protect your business and enhance your career in the security industry.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

Axis launches integrated mobile access control with HID Global and upgrades Zipstream compression

IFSEC 2017 Axis Communications, the leading provider of network video recording systems, has launched the integration of HID Global s Mobile Access with its Axis A1001 Network Door Controller and entry manager software at IFSEC 2017. The integrated mobile access control platform supports mobile-enabled workforces and lets smart phones and other mobile devices function as credentials so staff and other authorised personnel can gain access to secured buildings, rooms and areas. Mobile devices and smartphones are ubiquitous and their functionality includes diverse applications, from contactless payments to health tracking.

By integrating HID Global s mobile access technology with its software and door controller, Axis system combines convenience with the levels of security expected by businesses and their employees. The platform is suitable for small, medium or enterprise-sized organisations. The platform stores secure identities on smartphones for opening doors and locks instead of managing traditional printed identity credentials, improving convenience for end users and offering a more cost-effective and simpler way to manage credentials. Axis and HID are both well-known, global brands that are partnering together to develop open, IP-based secure access solutions. Mobile credentials are finally gaining greater acceptance and adoption thanks to an increasingly mobile-first perspective. This mobile access control offering demonstrates Axis innovative solutions to the market in partnering with a leader such as HID. It is an easy-to-deploy, easy-to-use solution, says Stephanie Hensler, Axis Communications director of business development, access control. The platform consists of: AXIS A1001 Network Door Controller, which makes yes/no decisions about who may enter, in which areas and at what times AXIS Entry Manager access control software, which is integrated with HID Mobile Access portal and is used to set up the systems, add new users and manage mobile IDs HID iCLASS SE and/or Multiclass SE readers HID Mobile Access portal HID Mobile Access app Axis Communications has also partnered with Simons Voss Technologies to launch an integrated, IP-based digital locking and access control system to replace physical keys for buildings. SmartIntego battery-powered digital locks come in the form of either cylinders, padlocks or door handles.

They connect wirelessly via a Simons Voss GatewayNode to Axis A1001 door controller and Axis Entry Manager software. Each SimonsVoss GatewayNode has a 16-wireless digital lock capacity and each Axis A1001 manages one GatewayNode. Therefor each A1001 door controller can manage up to 16 Simons Voss wireless locks and a hard-wired door reader. The integrated platform is offered as a standalone setup, with no server, or a fully integrated platform using an Axis software partner for enterprise installations. Online integration between the AXIS A1001 door controller and SmartIntego wireless lock components via AXIS Entry Manager work on an open, IP-based architecture. Also, in time for IFSEC, Axis is enhancing its compression technology to work with new 360 cameras and 4K resolution. The Zipstream technology ensures important forensic details of video footage are maintained, while minimising bandwidth and storage requirements by half. The company has also developed new domes that include the enhanced Zipstream, offering 360-degree, high-resolution coverage, cost-effectively. Combining these new 360-degree domes with the enhanced Zipstream technology really does deliver a cost-effective solution for customers, providing comprehensive coverage while ensuring the detail of that panoramic view is not lost when streaming and storing data, added Petra Bennermark, global product manager, Axis Communications.

The AXIS M3047-P and AXIS M3048-P dome cameras will be available through Axis distribution channels from June 2017 to the suggested retail price $469.00 and $669.00 respectively. The enhancements to Zipstream will be exhibited together with the new panoramic cameras, as well as new 4K cameras, at IFSEC. Visit Europe s leading security event in June 2017 Visit IFSEC International for exclusive access to every security product on the market, live product demonstrations and networking with thousands of security professionals. From access control and video surveillance to smart buildings, cyber, border control and so much more. It is the perfect way to keep up to date, protect your business and enhance your career in the security industry.

Click here to register your place now to join us at London Excel on 20 22 June 2017.