sia licence training

Eagle Eye Networks acquires Panasonic Cloud Management Services Europe BV

Cloud-based video surveillance Eagle Eye Networks has acquired Panasonic Cloud Management Services Europe BV (PCMSEU), whose flagship products are Panasonic Cameramanager and Panasonic Nubo. The two companies operate in the same market cloud-based video surveillance with Eagle Eye Networks the dominant force in North America and PCMSEU the clear European leader. PCMSEU operates more cloud-recorded cameras than any other company in Europe by some distance.

The acquisition of CMSEU gives Eagle Eye Networks a bridgehead into the European market and creates a truly global player in a still nascent cloud surveillance market that is growing at a much faster rate than the conventional DVR/NVR segment. Panasonic Cloud Management Services Europe BV will be renamed Eagle Eye Networks BV. Serving as the European headquarters for Eagle Eye, the European giant will now sell and support the expanded Eagle Eye product line. Our dealers in Europe have responded with overwhelming support for this acquisition. It will greatly enhance our sales and support efforts in the European market, said Dean Drako, CEO of Eagle Eye Networks. The strong and experienced team in cloud video surveillance at our new Eagle Eye EMEA headquarters will make it possible for us to provide a tremendous level of support to all of our dealers in the region. Eagle Eye Networks are exhibiting at IFSEC International between 20-22 June 2017 at London ExCeL. You will find th em on stand C1025 . Get your free badge now.

The Eagle Eye NuboCam All PCMSEU employees will be retained following the deal. Cameramanager co-founders Rishi Lodhia and Tijmen Vos will remain with the company as managing director and technical director of Eagle Eye Networks EMEA respectively. Said Rishi Lodhia: This is a unique opportunity to bring two pioneers in cloud video surveillance together and deliver a broad portfolio of innovative cloud surveillance solutions. Eagle Eye and Cameramanager dealers worldwide will now have a wider selection of cloud video products to meet their customers needs. Panasonic Cameramanager, on which small and medium businesses can watch and manage live and recorded surveillance footage from their smartphone, will be renamed Eagle Eye CameraManager. Eagle Eye plans to expand global sales of CameraManager to meet demand for direct camera to cloud connectivity. CameraManager cloud surveillance products boast optional storage methods, motion detection, push notifications and cloud based video analytics. Lacking the onsite bridge device of the Eagle Eye Cloud Security Camera VMS, the CameraManager solution can be more cost-effective for smaller camera counts per location. Eagle Eye Cameramanager Eagle Eye Networks BV will continue to sell Eagle Eye Cloud Security VMS in Europe to customers that prioritise camera interoperability and have high camera counts.

Eagle Eye Cloud Security Camera VMS supports more than 1,000 different digital cameras, over 10,000 different analogue cameras, up to 10 years of video retention and very large camera counts. Panasonic Nubo, which becomes Eagle Eye NuboCam, is an LTE camera and was the world s first mobile video monitoring surveillance camera when it launched in 2015. Datacenters Eagle Eye Networks operates datacenters in California, Texas, Canada, Japan (two), the UK and thanks to the acquisition two in the Netherlands. Eagle Eye Networks are exhibiting at IFSEC International between 20-22 June 2017 at London ExCeL. You will find th em on stand C1025 . Get your free badge now. Visit Europe s only large-scale security event in 2017 Taking place in London, 20 22 June 2017, IFSEC International gives you exclusive hands-on access to over 10,000 security solutions, live product demonstrations, and networking with over 27,000 security professionals.

Covering every aspect of security, from access control and video surveillance to smart buildings, cyber, border control and so much more.

Time is running out, register now to avoid missing out

Security Companies in Watton, Driffield

Disclaimer: The opinions expressed within Reviews are those of the author and not the views or opinions of Yell Limited. Registered Office: 3 Forbury Place, Forbury Road, Reading, Berkshire, RG1 3YL. Registered in England and Wales No.

4205228 VAT Number: GB 765 346 017. Yell Limited 2017. All rights reserved.

Yell, Yellow Pages, hibu and other are trademarks of Yell Limited.
Privacy policy, Cookie policy & Conditions of use123

References

  1. ^ Privacy policy (www.yell.com)
  2. ^ Cookie policy (www.yell.com)
  3. ^ Conditions of use (www.yell.com)

Blue light warning: How the false alarm epidemic continues to resist all remedies

More than 50% of the 600,000 callout incidents attended by fire and rescue services annually (FRS) are false alarms, according to the latest statistics from the Fire Service. The cost of this wasted time for both business and the fire service is estimated to be well in excess of 1 billion per year, in part as a result of downtime from groundless evacuations. In the last five years this position has not appreciably changed.

What s more, false fire alarms from automatic alarm systems due to poor maintenance are on the increase. As to the ratio between real fire emergencies and false alarms, regrettably in England a sustained trend for the past five years shows the number of false alarm call outs actually exceeding real primary fire call outs by a significant margin, which is in itself a damningly cautionary finding. In London this ratio is, exceptionally, two to one (and currently reflecting a slight increase in unwanted calls against target aims). These blue light responses, then, to automated unwanted fire alarm signals (UFAS) represent a grave menace, hindering services that could be needed at a genuine emergency or even interrupting critical front-line training for first responders . Beyond such considerations as this needless burden on the FRS authorities, business disruptions that lead to a loss of productivity, the reduced confidence of the general public, and even the environmental impact of inessential emergency appliance movements all need to be taken into account. Hospitals have been identified as responsible for the vast majority of the false alarms that the capital s firefighters are called out to And this persistent malfunctioning of fire alarms is even more glaringly highlighted when you stop to consider the recent deliberations by the UK government on the creation of multi-agency Strategic Command Centres embracing the blue light emergency services Fire, Ambulance and Police. In the view of some analysts, this new configuration of the services is likely to spark debate about multiple call outs and the cost implications of all three services responding to incidents, when so very often a reported event can be a false alert. Tri-Service Control Centres It s a concern foreseen and amplified by the Chief Fire Officers Association, one of whose chief officers comments: Until an event is attended and confirmed as a false alarm it will always be treated as an emergency and responded to by the appropriate service or services. The National Police Chiefs Council also anticipates an enhanced collaborative response arising from the Tri-Service Control Centres: We welcome any opportunity to enable the blue light services to work more effectively together in the public interest . . .

They can concentrate expertise, save money, help deal with crises and share best practice. So, in short, this proposed drive towards a more joined-up response to emergencies intends to coordinate front-line services to yield more efficiencies in time-savings and management of personnel, with joint decision-making aimed to prioritise blue light call outs concentrated on inter-operable control rooms. Yet the question remains, will these new efficiencies be reciprocated by risk management in a renewed commitment to defeat false alarms in their communities by improving the functional integrity of the Automatic Fire Detection and Fire Alarm Systems (AFDS) on which the public rely? Hospitals Since the London Fire Brigade (LFB) introduced its penalty charging scheme for excessive false fire alarm call outs in January 2014, the potential for the LFB to collect millions in penalties from the worst culprits in the capital has remained a possible outcome (at present, for 2017, the scheme is suspended for review). Hospitals have been identified as responsible for the vast majority of the false alarms that the capital s firefighters are called out to. The LFB s figures from before the scheme s inception show that firefighters were called out, overall, to over 400 locations annually (each more than ten times) in response to false fire alarms, costing the brigade about 800,000. This frequency equates to a false alarm every 15 minutes in London. Overall, false alarms from automatic systems still account for around 40,000 call outs for the LFB every year, set against call outs of around half that number to real fires. The very latest LFB figures for cost recovery for non domestic premises generating 10 or more calls a year, continue to record a potential recovery value on average of approaching 500,000 in charges every 12 months.

Crying Wolf Unwanted Fire Signals that cry wolf in this manner place a vast burden on Fire and Rescue Services by unnecessarily tying up fire engines and firefighters on needless call-outs, when they may be needed at a genuine emergency. Sophisticated predictive technology reduces the problem by resolving potential problems before they arise That is why the pressure on risk management and, more particularly, Responsible Persons to cut the risks of false alarms is intensifying. What s more, by tolerating a norm of frequent needless fire alarm annunciations, negligent premises management can create a dangerous mood of apathy among staff that could very easily lead to widespread irresponsiveness should a real fire break out. Intelligence convergence for remote troubleshooting For responsible risk management, current best practice conditioned by ecological concerns seeks to reduce the impact on the environment that potentially arises from the life cycle of a fire system. Today, fire prevention is an essential element of Building Management Systems (BMSs) integrated with an IT infrastructure purposed to fully exploit Intelligence Convergence, allowing direct integration into intelligent buildings via any device capable of establishing an internet connection, granting risk management instant access to review the system, including the status of fire detection devices in real time. Current solutions encompass smart security systems such as access control/ID systems, video surveillance/analytics, intrusion detection, and life safety . . . all extending the capability for remote diagnostics that confer the ecological benefits of increased efficiency yielded by fault-free systems. For example: servicing, maintenance and false call outs all contribute to increased CO2 levels in the atmosphere leading to changes in global environmental conditions. These hazards can be significantly reduced by the use of sophisticated predictive technology, reducing the need to travel by allowing potential problems to be resolved before they arise.

Predictive technology can include the management of fire and security servicing inspection routines, false fire alarm interrogation and diagnosis, or the scheduling of system maintenance call-outs. At the same time, these examples of Intelligence Convergence can benefit users with the capability to support a full audit trail for traceability and regulatory compliance.

10 practical steps towards combating the false alarms menace As the latest statistics suggest, a number of remedies to stimulate behavioural change can be derived from analysis of common shortcomings at malfunctioning sites: Enhanced maintenance routines are evidently a priority, and certainly they re a key requirement embedded in any regular review a fire risk assessment in compliance with the Fire Safety Order Troubleshooting for predictive maintenance is facilitated by comprehensively monitored configurable Automatic Fire Alarm systems to ensure integrity of alarm device functionality, supported by EN 54-2 approved Analogue Addressable panels. Specification of sensing devices that further reduce susceptibility to false alarms by their embedded intelligence to discriminate between spurious fire events and genuine ones. Multisensors are the considered choice when replacing problem detectors; or the changing of devices from smoke to heat in certain locations when necessary. Specification of high-integrity fire data communications via accessible configurable networks whose performance to minimise false activations is defined by the highest reliability in resistance to outside interference. Constant reviews should be maintained as to change of use within premises because such changes can affect the sensitivity of detectors, requiring appointed fire alarm maintenance personnel to update/upgrade the system. Improved training of responsible risk management. Advise users of fire detection systems that these lifelines are connected to an ARC (Alarm Receiving Centre) and emphasise the gravity of an UFAS (automated unwanted fire alarm signal) resulting in a costly call out, endangering genuine call outs. More rigorous supervision of negligent testing of the system where the routine to take it off-line is persistently disregarded thus triggering a UFAS at the ARC.

Incorrect positioning of sensing/detecting devices contrary to specification s installation data. Unregulated misuse of premises: toasters, cigarette smoking, steam from kettle in office, even aerosol sprays (used by cleaning staff) near smoke detectors can cause false alarms. Arising from recommendations that both BS 5839-1:2013 and BS 9999:2017 lay emphasis on, accurate up-to-date Zone Plans for rapid orientation for building occupants and the emergency services alike are cited as key aids. Such plans should be adjacent to the control & indicating equipment and, as may be imagined, their prominent depiction of fire alarm zones that accurately match the physical layout within the building hasten the identification of the location of alarms in an emergency, whether real or false. Visit FIREX International for cutting-edge solutions, essential knowledge and the ability to grow your business by getting direct access to the whole fire safety industry. It is the perfect place to get your product in front of thousands of buyers, across a multitude of featured areas. From the brand new Drone Zone, the ARC Village, ASFP Passive Protection Zone, the Engineers of Tomorrow competition and more, it s all under one roof so you ll never miss a beat.

Click here to register your place now to join us at London Excel on 20 22 June

Door Supervision – Security Train

Course: Level 2 Award in Door Supervision

Course Duration: 4 Days

Course Assessment: Multiple choice exams and Practical assessment.

Teaching Method: You will be taught in a classroom using a mixture of group and pair activities and practical activities such as role-plays.

Entry Requirement: There is no specific entry requirement to attend Door Supervision course. But you need to have a good level of spoken and written English.

Course Overview: Under the Private Security Industry Authority Act 2001, anyone wishes to be employed in the private security industry must undertake a recognized SIA licence training before applying for a SIA licence.

You need to have right level of training and qualification through SIA compliant course from an approved training provider in order to obtain SIA door supervisor licence. To get this qualification, four training modules are to be completed and pass three written exams and one practical assessment

Our trainers have real life experience in conflict management. We ensure that all the learning takes place in a simulating and engaging environment. Due to nature of the course, it s every aspect is covered in great detail.

The responsibilities of a Door Supervisor are very demanding so it is vital that you receive the best quality SIA Door Supervisor Training before you begin your new career.

After successfully completing your Door Supervisor course you will be able to apply for a SIA Door Supervisor Licence.

Course Content

Working in Private Security Industry (Unit 1)

  • Session 1: Awareness of the Law in the Private Security Industry
  • Session 2: Health and Safety for the Private Security Operative
  • Session 3: Fire Safety Awareness
  • Session 4: Emergency Procedures
  • Session 5: The Private Security Industry
  • Session 6: Communication Skills and Customer Care

Door Supervisor Specialist Module (Unit 2)

  • Session 1: Behavioural Standards
  • Session 2: Civil and Criminal Law
  • Session 3: Searching
  • Session 4: Arrest
  • Session 5: Drugs Awareness
  • Session 6: Recording Incidents and Crime Preservation
  • Session 7: Licensing Law
  • Session 8: Emergency Procedures

Conflict Management Module (Unit 3)

  • Session 1: Avoiding Conflict and Reducing Personal Risk
  • Session 2: Defusing Conflict
  • Session 3: Resolving and Learning from Conflict
  • Session 4: Application of Communication Skills and Conflict Management for Door Supervisors

Physical Intervention Skills Module (Unit 4)

  • Session 1: Introduction to Physical Skills
  • Session 2: Disengagement Techniques
  • Session 3: Escorting Techniques

Security Center 5.6 launched with new HTML5-based web client

Genetec Inc Security Center 5.6 includes a new HTML5-based web client for better web viewing, integrations for access control and video technologies, license plate recognition as a credential, as well as more cybersecurity measures. According to Montreal-headquartered Genetec, the main enhancements to the latest version of Security Center, a unified security platform, include the integration of SimonsVoss electronic locks and the Mercury Security MS Bridge. With Genetec s automatic license plate recognition high definition camera system, AutoVu SharpV, it is also possible to enrol license plates as access control credentials.

Security Center 5.6 is available globally, with Genetec s Advantage subscribers able to receive the update. Genetec s Assurance customers can contact Genetec Inside Sales to buy an upgrade. Version 5.6 is consistent with Genetec s ongoing cybersecurity commitment and measures designed to tackle the changing nature of cyber threats and hazards. The platform includes advanced authentication, authorisation and encryption technologies. Security Center Web Client has been redesigned with HTML5 to provide a more fluid and modern web experience that enables the platform to be accessible from any device or browser. Features include the ability for operators to monitor the live status of intrusion areas. As a Mercury Security Platinum Elite partner, Security Center 5.6 integrates with the Mercury MS Bridge to enable end users to go from proprietary or integrated access control systems to a fully unified security platform. AutoVu lets end users to extend their security coverage beyond the physical building and to their parking lots, parking decks and property perimeters. Its function as an access control reader allows operators to monitor vehicles without impacting traffic flow.

By assigning a license plate to a cardholder as a credential, users can define specific access rights, control vehicle access to their parking lots, and run vehicle activity reports. Genetec has been confirmed as sponsor for Borders & Infastructure Expo, which debuts at IFSEC 2017 in June. They will also showcase the latest version of Security Center and their other security solutions on stand F500 at the show, taking place 20-22 June 2017, London ExCeL . Get your free badge now. Visit Europe s leading security event in June 2017 Register here to attend IFSEC International where you will be able to take advantage of our meetings service, allowing you to select and meet with the manufacturers you want to see and with 600 companies exhibiting you are not short on choice. There are also discounts of up to 20% across a large range of products at the show, helping you to get the best value for your money. Click here to register your place now to join us at London Excel on 20 22 June 2017.

Apollo to showcase new VADS and debut Apollo Test Set

FIREX 2017 Apollo Fire Detectors, a manufacturer of fire alarms and detection products, will be returning to FIREX International in 2017 to demonstrate its latest product ranges. These include the company s latest red-flash and sounder visual audio devices, for fire alarm systems, all of which are compatible with the XP95 and Discovery Apollo ranges. FIREX visitors will also get to see Apollo s new portable testing kit that supports on-site commissioning and fault finding across all three Apollo analogue-addressable protocols CoreProtocol, Discovery and XP95.

Ed Browning, Apollo s EMEA sales and marketing director, says: We always look forward to meeting with our customers and partners at Firex to discuss developments in the fire safety market and how Apollo products can address their needs. All our products are developed in close collaboration with fire safety professionals, underlining the importance we place on designing products which address technical needs in the global fire detection market. Apollo recently gained CPD accreditation for EN54-23 and fire detection training courses. Check out Apollo s latest products in the flesh at FIREX International, 20-22 June 2017, London ExCeL. You can find them on stand G100. Get your free badge now. Visit FIREX International for cutting-edge solutions, essential knowledge and the ability to grow your business by getting direct access to the whole fire safety industry. It is the perfect place to get your product in front of thousands of buyers, across a multitude of featured areas. From the brand new Drone Zone, the ARC Village, ASFP Passive Protection Zone, the Engineers of Tomorrow competition and more, it s all under one roof so you ll never miss a beat.

Click here to register your place now to join us at London Excel on 20 22 June

If you can t beat them, recruit them: enlist young hackers to fight cybercrime, says infosec chief

Cybersecurity A poacher-turned-gamekeeper approach is needed to encourage younger hackers to turn use their skills for positive impact and help companies tackle cybercrime, a cybersecurity chief has suggested. Dr Jamie Graves, CEO of cybersecurity firm ZoneFox, says: At a time when cyber-crime continues to cripple companies and over two-thirds of businesses can t find enough talent to defend their company against cyber-threats, we should be asking how we can get these talented young hackers to fight crime, not contribute to it. His comments are in response to recent research by the National Crime Agency (NCA), which has found that peer respect and popularity are motivating factors for young cybercriminals.

According to the study, some offenders begin by participating in gaming cheat websites and game modification forums before progressing to criminal hacking forums. While Graves agrees that targeting and removing the free tools that exist online that allow hacking to take place must be a focus, more innovative approaches are needed. Such is the global shortage of cybersecurity skills, professionals can command huge salaries He says: We live in a country where technology encompasses every inch of our daily lives especially the younger generations. The report details that criminal hackings are considered cool and done to impress peers. Now is the time for the UK to really focus on tackling this by putting an emphasis on trying to flip young people s attitudes on cyber-security from bad to good . As well as avoiding the risk of getting a criminal record, so-called ethical hacking offers a powerful financial incentive. Such is the global shortage of cybersecurity skills, professionals can command huge salaries. The global cybersecurity workforce is expected to have 1-2 million jobs unfilled by 2019. The report, titled Pathways into Cybercrime , which is based on debriefs with offenders and young people on the fringes of criminality, explores why they are assessed as unlikely to commit more traditional crimes get involved in cybercrime.

According to the report, financial gain is not necessarily a priority for young offenders. The sense of accomplishment at completing a challenge, and proving oneself to peers in order to increase online reputations are the main motivations for those involved in cyber criminality. One offender, who was jailed for Computer Misuse Act and fraud offences, told officers, it made me popular, I enjoyed the feeling I looked up to those users with the best reputations . The report also highlights that there is no socio-demographic bias, with people across the country from different backgrounds among offenders. However, the average age of cybercriminals is much younger than other crime types. In 2015, the average age of suspects in NCA cybercrime investigations was 17 years old, compared with 37 involved in drugs crime cases. Ensure a solid security strategy at Borders & Infrastructure Expo Join other high-end security professionals at the launch of Borders & Infrastructure Expo, in conjunction with Europe s most renowned security event, IFSEC International, addressing your critical needs for large-scale security projects.

By attending, you ll access leading security providers showcasing the latest advancements in both physical and cyber solutions.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

The security of security is our top priority in the IoT era

With data protection laws being tightened and internet of things hacks proliferating, physical security vendors are talking a lot more about cybersecurity than they used to. For Genetec, whose systems are popular in the enterprise space and installed in 70% of airports in the Middle East, safeguarding systems against cyberattack is a particularly urgent priority. We spoke to Simon Cook, sales engineering manager EMEA and APAC, about the company s defining mantra: the security of security.

Genetec has just been confirmed as sponsor for Borders & Infastructure Expo, which debuts at IFSEC 2017 in June. IFSEC Global: Why is cybersecurity such a big priority for Genetec right now? Simon Cook: The security of security should be high on every physical security professional s priority list. A large part of this is the recent growth in DoS, or denial-of-service, attacks that took place last year, targeting internet of things devices from cameras to campus vending machines. But these things aren t new; DoS attacks have been happening since the start of the internet and cybercrime. The 21 st Century has been characterised by a large growth in the IoT. This is great for business efficiency and personal communication, but the more devices that come online, the more vulnerabilities there are for cybercriminals to exploit, especially seeing as pretty much everything can be connected to the internet these days even fridges! What we want to do is be sure that whatever is connected to our solutions via our customers networks is pure , or safe It s pretty terrifying when you think about the potential of DoS attacks, which is only growing with the number of connected devices. Think about it: when you get 1.5 million devices generating over 600-odd gig of traffic, aimed at a handful of organisations, the result is going to be quite a serious attack.

The world that Genetec operates in seems, on the surface, to be largely physical as we deal with CCTV, access control and automatic number plate recognition (ANPR) to name a few. But, it s important to recognise, which we do, that crime is moving away from the physical world and into the cyber. This is why the surveillance market should be thinking more carefully about security from a cyber threat angle, rather than purely from the physical. (Check out the latest solutions from Genetec at IFSEC International, 20-22 June 2017, London ExCeL. You can find Genetec on stand F500. Get your free badge now.) This issue is also now consumer as well as commercial. More and more we see people with cameras at home that can be turned into a node and hacked, which in a way is even more worrying as they will lack the awareness and training to ensure their devices are protected that professionals in the security industry have. What we want to do is be sure that whatever is connected to our solutions via our customers networks is pure , or safe. The vital thing is to work to continuously build up that level of security in response to the rapid development of cyber-crime. We call this the security of security .

We have a lot of high level enterprise customers so a lot of banks, airports, big businesses etcetera so access into their networks could open up some critical issues for customers. We need to make sure that whatever connects to our system does not open a door for potential attacks. embedded content IG: So what measures do you take to ensure connected systems are as robust against cyber-attacks as Genetec solutions? When we develop our software we ask ourselves the important questions from the outset to ensure our tech is secured against anything which may try to attack it. Penetration testing, regression testing, adding devices and having them tested is all part of the development of the software rather than relying on just reacting to cyber-crime by retrofitting after an attack. We ve done a number of regression tests on our software so we know our platforms are as secure as they can be. But, the cleverer you make the tech, the more sophisticated the attackers become so it is a constant battle. Another problem for us is that we want to be more open platform, so we don t just connect cameras but access control, body-worn cameras, other third-party systems. So, in the unified space, when we try to build up one holistic platform, we have to do a lot of testing to ensure we can still call ourselves secure.

The way we counter this is through authorisation, authentication and encryption. We start by using certificate-based authentication. This may sound complex, but if you use online banking, you have a certificate between yourself and the third-party so the browsers share certificates to verify you are who you say you are, and the banks are who they say they are. Some hardware we work with has a good level of security built in; some of the more traditional stuff is more legacy, and we have to compensate for these devices In terms of encryption, we used to use SSL. But, a quick google will now tell you that SSL can be hacked quite easily. There are even wiki pages about how to hack SSL within 20 minutes! So we had to evolve and now use TLS, or transport layer security, which is a cryptographic protocol that provides communications security over a computer network , which is much more advanced. The thing with hacking, it is company to company, person to person, government to government, and it can be used in many ways. It s not always just the case that cybercriminals want to break in and steal your information or credit card.

Sometimes DoS attacks aim to bring websites or companies down for a period of time. In the 50s, 60s and 70s we wanted to protect against bank robberies and attacks on people and property. But these days you can bring a company down without leaving your house. So, we have to get smarter. Some hardware we work with has a good level of security built in; some of the more traditional stuff is more legacy, and we have to compensate for these devices. I m sure you can see now why the security of security is something that always has to be top of mind for Genetec! The industry already has to collaborate to make sure these devices connect to each other presumably collaboration is just as important where cyber is concerned Absolutely. And it s not just between manufacturers. Whether it s end users, integrators or consultants, to a lot of our customers we are trusted advisors.

We don t just sell kit and software and then move on to the next customer, and there is a gap of knowledge in the industry for this level and kind of security. So we are trying to work with other manufacturers to collaborate with our systems integrators, consultants and end users so that best practice is followed. Genetec has always been very IT-focused and we work with IT departments too. We want everyone that works with us to know that they can trust our solutions to be secure, and that we can offer them advice on security if they ever feel any confusion or worry about the security of their technology. Many of our customers are more enterprise level, so you can see how a breach could not only put company data at risk, but even people s lives in some instances Is there any trade-off with convenience and the user experience when you tighten up cybersecurity? We try and make the system as user-friendly as possible. When we talk about certificates and TLS, it s all done at installation level. So the customer will work with one of our certified installers, who will be familiar with our product, and the operator shouldn t notice any difference to their user experience. They just type the username and password on their client machine and the security is all done on set up.

Once they are logged in, what they do and don t have access to has already been set up according to company policy. All the clever stuff happens under the hood. Cybersecurity is presumably a particularly high priority in critical national infrastructure? Of course, many of our customers are more enterprise level, so airports, train stations, cities, high end retail, mid-tier retail you can see how a breach could not only put company data at risk, but even people s lives in some instances. Airports, for example, are one of our largest sectors: at last count, 85 of the world s largest airports use Genetec systems, and 70% of all airports in the Middle East one of our fastest growing markets are protected by Genetec Security Center systems. As well as this, when it comes to urban security, we have worked with a lot of blue light services in city centres and they want us to do a lot of regression testing. This is not something we re doing just because it s a buzzword or because of the DOS coverage last year. It s to keep up to speed with developments to make sure we are in line with best practice. It goes back to building this into the core rather than being a retrofit after an event or attack.

And it s equally important to encourage our partners and customers to be vigilant. Now we re starting to look at cybercrime insurance. As more devices come online, there are more data points and we need to be more cautious about what we are adding to the system. We also need to continue our core precautions of regression and security testing to make sure that security devices don t expose holes into our customers networks. Presumably cybersecurity will be a big talking point on your stand at IFSEC 2017? This will all be very much a focus when our customers end users, integrators and consultants visit the booth. See you at stand F500! Check out the latest solutions from Genetec at IFSEC International, 20-22 June 2017, London ExCeL. You can find Genetec on stand F500.

Get your free badge now. Visit Europe s leading security event in June 2017 Register here to attend IFSEC International where you will be able to take advantage of our meetings service, allowing you to select and meet with the manufacturers you want to see and with 600 companies exhibiting you are not short on choice. There are also discounts of up to 20% across a large range of products at the show, helping you to get the best value for your money.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

Exclusive: big news from Honeywell s Xtralis and the chance to win a security solution worth 1,000

Honeywell s Xtralis has some big news to reveal that could add real value to your security operation, or that of your customers. What s more, the market leader in very early detection, visual verification and prevention of fire and intrusion threats is giving you the chance to win a security solution worth 1,000. To find out what the fuss is about and enter the competition, simply complete the short form.

All registrations will be entered into a free draw and the winner will be announced on 22 May. Visit Europe s leading security event in June 2017 Register to attend IFSEC International where you will be able to network with over 30,000 of your industry peers, meeting new suppliers and gaining access to the latest and best security products to hit the market, helping you gain a competitive advantage over your competitors. You will also be able to get hands on to test and trial the latest technology at the Installer World Zone, which is sponsored by Risco Group , so that you can select not only the best priced products but you will be confident that it works for you.

Click here to register your place now to join us at London Excel on 20 22 June 2017.

Care home fire in Hertfordshire kills two elderly residents

Fire News A fire that broke out in a residential home in Cheshunt, Hertfordshire, killed two women, aged 91 and 89. Firefighters called to the blaze at Newgrange residential home, managed to rescue 33 people after flames engulfed the upper floors of the building on Saturday 8th April 2017. Three other residents are in hospital in a serious condition, according to Hertfordshire Police.

Emergency services are continuing to investigate how the fire at the 38-bed facility in Cadmore Lane was started. Hertfordshire County Council said in a statement: Firefighters were faced with an extremely fierce fire, well-established in the first floor and the roof of the building, which has since collapsed. Thirty-three residents were rescued and the firefighters worked closely with police and ambulance colleagues to evacuate them to a nearby emergency reception centre.

Visit FIREX International for cutting-edge solutions, essential knowledge and the ability to grow your business by getting direct access to the whole fire safety industry. It is the perfect place to get your product in front of thousands of buyers, across a multitude of featured areas. From the brand new Drone Zone, the ARC Village, ASFP Passive Protection Zone, the Engineers of Tomorrow competition and more, it s all under one roof so you ll never miss a beat.

Click here to register your place now to join us at London Excel on 20 22 June