SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
A SUPPLEMENT TO
Q1:2016
MitigatingSecurityRiskswithAlarmCommunicationSystemsforMissionCriticalApplications....3
RethinkingPhysicalSecurity....................................................................................................4
MeetingComplianceandRegulationNeedswithVideoSurveillanceintheTransportationMarket...5
GSASeeksProcurementSolutionsforPACSandAnnouncesMASTransformationInitiatives..........6
VideoandAccessControl:ACaseforUnifiedPlatforms...............................................................7
Security Industry Association
securityindustry.org
S A V E T H E D A T E
June 15 – 17, 2016 • Westin City Center, Washington, D.C.
WHY ATTEND
• Learn the latest on legislative and regulatory
matters affecting the security industry
• Gain a better understanding of the market
drivers at work in the government space
• Network with government and private-
sector decision makers
WHO ATTENDS
• Security Executives
• Sales and Marketing Professionals
• Security Practitioners and Policy
Specialists
• Federal and Congressional Staff
Join Us in 2016 at Our New Location,
Westin City Center, Washington, D.C.
securityindustry.org/summit
Q 1 2 0 1 6 3
Q1
By Owais Hassan
T
oday’s cybersecurity landscape is
faced with a wide range of threats
from sophisticated hackers to
malware infections and malicious attacks
that can threaten the delivery of essential
services. These advanced persistent threats
have changed the security industry and
how organizations protect their networks.
Traditional security solutions fail and
security must expand beyond the physical
perimeter when it comes to life safety and
intrusion. Mission critical infrastructure
such as embassies, federal buildings, and
military bases are particularly vulnerable
targets. Cybersecurity attacks also impact
commercial installations at banks,
museums, campuses, and enterprises
that have high-value assets. Physical
perimeter security alone is not enough, it
needs to be supported by the underlying
communicationinfrastructure.Thedelivery
of alarm information must be disseminated
by a trusted source that provides a stable
network in a secure environment.
WIRELESS ALARM COMMUNICATIONS
SECURITY
A typicalwireless alarmcommunication
system consists of various components
connected to the alarm panel, as
illustrated in the network diagram.
Every component of the alarm
communication system needs to satisfy
the following security requirements:
• Physical security (tamper detection)
• Transmission security
• Substitution security (rogue and
stolen equipment)
• Information security (data
encryption and information assurance)
• Real-time mitigation controls
(logging and network management)
PUBLIC VS. PRIVATE
Mitigating Security Risks with Alarm Communication
Systems for Mission Critical Applications
Traditional methods of alarm
communication are exposed to potential
threats, posing serious security risks. The
communication infrastructure starts from
the transport layer security. Some alarm
communication systems utilize the cellular
spectrum where a public service provider is
common knowledge (GSM, 3G, LTE, etc.),
thereforesusceptibletojamming.IntheU.S.
and most countries, it is illegal for private
citizens to jam cell phone transmission.
The fact that its illegal does not prevent
it from happening. Some countries allow
businesses and government organizations
to install jammers in areas where cell phone
use is seen as a public nuisance. There are
plenty of low cost commercial off-the-shelf
handheld jamming devices readily available
overtheInternet.Anyalarmcommunication
system leveraging either unlicensed or
cellular licensed spectrum is vulnerable to
radio frequency interference and jamming.
This issue impacts deployment of alarm
communication networks serving mission
critical needs.
All equipment deployed in high-
value installations need to be designed
to effectively safeguard and protect
information against common security
threats found in wireless networks:
• Loss of data confdentiality
• Data corruption and loss of integrity
• Replay attacks
• Spoofng, substitution, and
masquerading
• Stolen feld equipment
• Denial of services
NEXT-GENERATION SECURITY
Technical solutions are being developed as
a countermeasure to mitigate security risks.
Next-generation alarm communication
technology is evolving and will provide
end-to-end encryption, plus ensure data is
transmitted without eavesdropping, data
tampering, and message forging.
The implementation of this next-
generation security solution will use
advanced authentication techniques such
as dynamic key management, distributed
denial-of-service frewall, and digital
certifcates that require digital signing before
any equipment is authorized to be added to
the network.
The wireless mesh radio technology will
use licensed spectrum, an unknown and
covert frequency band along with frequency
agility, and cognitive radio capabilities to
combat jamming to head-end equipment.
The packet delivery communication
protocol will use dynamic mesh which
is proven to be less disruptive and more
tolerable under jamming or radio frequency
interference conditions. This distributed
architecture is preferable compared to
centralized base station cellular architecture
where localized jamming at the single
cellular base station could impact a large
volume of customer premise equipment or
shut down a substantial territory serviced by
a single base station tower.
NETWORK MANAGEMENT
The high security alarm communication
system installation should be routinely
evaluated to identify any threats arising out
of potential vulnerabilities. The impact of
a security threat should be quantifed with
Mean Time Between Hazardous Events
measurements based on the following
factors:
• Diffculty level of exploiting a threat
• Degree of harm caused by exploitation
of the threat
• Mitigation & Control techniques and
their effectiveness
To rapidly mitigate any security risk
as it unfolds in the real-world, the next-
generation security system infrastructure
must have:
• An encrypted fle system
• Secured executable image and critical
data storages
• Anti-tamper and anti-cloning
capabilities
• A fexible architecture
• Secured software upgrade capabilities
to proactively harden the system
Expert implementation is key and
network management is critically important.
This modern approach to network security
is the most reliable option for protecting the
delivery of alarm information to the central
monitoring station.
Owais Hassan is Vice President of
Engineering at AES Corporation. He can
be contacted at ohassan@aes-corp.com.
4 Q 1 2 0 1 6
Q1
I
n recent months we have seem
an increase in legislative activity
addressing the vexing question
of how best to protect our nation’s
schools. Unfortunately, this follows
numerous active shooter incidents,
both in academic environments and
also in the law enforcement and
civilian workplace.
There is currently thoughtful
and bipartisan work being done by
various members of the House and
Senate, including strong leadership
by Representatives Rick Larson (D -
WA) and Susan Brooks (R – IN), who
are co-chairs of the bipartisan School
Safety Caucus. While policymakers
on Capitol Hill discuss and debate
this issue, including the merits of
H.R. 2667, the School Safety Act, it
is important to also consider a new
paradigm when contemplating the
‘integration’ of security elements to a
facility, whether it is a school, hospital
Rethinking Physical Security
By Jeffrey Isquith and Morgan P. Muchnick
or any physical structure.
Until recently, detection,
surveillance and physical barriers have
been designed to keep possible threats
out of a secured facility. However, this
‘fortress mentality’ does little to deal
with the increasing possibility that a
threat will make it’s way into a ‘secured’
area regardless of the steps taken to
safeguard such an environment. In
addition, there are growing threats
from personnel who already have
access to, or inhabit the ‘secured
environment’ in question. Examples
of this are numerous and include, but
not limited to, the shootings at Sandy
Hook Elementary School, Northern
Arizona University, Columbine High
School, Aurora theatre shooting of
2012, Washington Navy Yard in 2013,
and Ft. Hood in 2009 and 2014.
In order to address and mitigate
such threats, the utilization of physical
ballistic barriers in the immediate space
is imperative. This will enable those
exposed to gun violence to seek shelter
behind objects nearest to them. While
training to seek such protection would
certainly be helpful, human behavior
will also lead us to instinctively ‘duck
and cover’ during such events.
While individuals who inhabit a
physical space want safeguards to
protect them from harm, they do not
necessarily wish to be inconvenienced
or feel as though they are working in
a physically confining environment.
This is particularly true in public
and civic spaces, such as schools and
universities. Neither students nor
teachers want to feel as though they
are pursuing their educational pursuits
in a bunker-like environment. This is
why the seamless integration of well-
hidden ballistic barriers, whether it is
embedded within interior architectural
elements such as walls, door structures
or furnishings, can provide a layer of
protection that is both pervasive and
hidden.
However policymakers decide to
address school security, through
legislation or other means, the
integration of ballistic barriers into
interior environments can be an
essential part of every security plan.
We owe it to the next generation, our
most critical asset, to provide them the
maximum feasible level of safety and
protection.
Mr. Jeffrey Isquith, Founder and CEO,
Ballistic Furniture Systems/Amulet
Ballistic Barriers.
Mr. Morgan P. Muchnick, Director of
Government & Public Affairs, Ballistic
Furniture Systems/Amulet Ballistic
Barriers.
Q 1 2 0 1 6 5
Q1
By Jumbi Edulbehram, Regional
President, Americas, Oncam
T
he transportation market – both
private and public – is heavily
regulated to ensure the safety
and security of passengers and the
general public, and with that regulation
comes specifc needs in regards to video
surveillance. These entities are tasked with
complying with stringent rules in regards
to the security systems deployed, and many
of them maintain a proactive approach to
security in growing urban areas.
The United Nations found that in 2014,
54 percent of the world’s population
resided in urban areas, and by 2050, the
urban population is expected to increase
to 66 percent, or approximately 2.5 billion.
Public forms of transportation are lifelines
for billions of people across the globe
already, and large populations continue
to depend on it each day as a result of
rapid urbanization and globalization. As
the world has watched attacks unfold on
transit systems, such as those that took
place at the end of March in Brussels, it’s
clear these systems – and the people who
operate and use them – are at risk every
day.
360-degree IP video surveillance
technology is increasingly playing a vital
role in protecting public transport because
this technology offers a number of unique
features. The largest advantage 360-degree
cameras have is that there is no moving
Meeting Compliance and Regulation Needs with
Video Surveillance in the Transportation Market
parts and offer PTZ capabilities during
playback, enabling users to capture a full
panoramic view of the area without blind
spots or mechanical delays.
Moreover, the high-resolution
360-degree image captured with a
fsheye lens is “dewarped” at the viewer’s
discretion, and can be processed in real
time or during playback as if the video
were live. These cameras come in a range
of sizes and discreet interior and exterior
designs. In today’s market, where increases
in surveillance need to be balanced with
the public’s perception of privacy, the
discreet form factor of 360-degree cameras
are benefcial.
Transit applications are an ideal
ft for easily adaptable, scalable and
reliable 360-degree camera systems to
provide maximum situational awareness
for any city’s infrastructure, preferred
transportation medium and regulatory
requirements. Train and bus stations,
whether above ground or below, rely on
360-degree cameras to protect platforms at
all hours by panning or zooming into every
corner of a station, eliminating the need
for a large number of traditional cameras.
Airport traffc is also more voluminous
than ever, with some hubs seeing millions
pass through each year and dozens of FAA
or international air regulations always in
fux. In highly metropolitan areas, certain
airports are even connected by rail or bus to
the center of a city, making follow through
of situational awareness even more crucial
as people transfer from one transport
method to the next. These 360-degree
cameras can cost-effectively manage this
network of transfer options by cutting
back on the number of traditional cameras
installed. Though increasing compatibility
with VMS and other third-party screening
systems, security personnel can ensure
the safety and continuity of major
transportation hubs.
Cruise ships, a less obvious form
of travel, carry thousands of people
across international waters to various
destinations, yet face signifcant Coast
Guard compliance requirement hurdles
when it comes to proper video surveillance.
Proactivity toward incident detection is
encouraged on board these vessels, where
360-degree cameras and video analytics
technologies are being installed on decks
and elevators to reduce installation costs,
camera numbers and violent or illegal
activity onboard.
With the threats in urban areas and
to public and private transportation,
security is paramount, and making sure
rules and regulations are followed is an
important factor in keeping the public
safe. 360-degree IP video surveillance
cameras are an intelligent, cost-effective
and effcient investment for transportation
security the world over as they provide
unprecedented fexibility to evolving
regulations without altering the unique
and delicate balance of our world’s cities.
6 Q 1 2 0 1 6
Q1
By Lynn A. de Seve
S
pring is upon us and so are various
GSA security meetings, events and
other forums for industry partners
interested in learning and participating
in upcoming government acquisition
planning and opportunities. The Security
Industry Association (SIA) Procurement
Policy Working Group and Government
Relations Committee is tracking
government initiatives, participating
in events, as well as hosting some
informative sessions on GSA physical
access control systems (PACS) promotion
and other GSA Multiple Award Schedule
(MAS) Transformation implementations.
GSA Schedule 84 offcials continue the
PACS conversation that began at the SIA
ISC East forum and continued during
the SIA webcast with the U.S. General
Services Administration (GSA) on January
15. A key focus of the January webinar
was to discuss planned changes to PACS
and authentication products and services
on Schedules 70 and 84 -- effective per
GSA’s mass contract modifcations issued
on Feb. 4, 2016. The new GSA Special
Item Numbers (SINs) for products and
services appearing on the GSA Approved
Product List (APL) are now offcially
part of the Schedule 84 program. Special
Item Number (SIN) 246 35-7 is in effect
for those companies whose products are
listed on the GSA Approved Products List
(APL), and SIN 246-60 (5) is available
for those companies that have met the
requirements for completing the FICAM
solution training and certifcation.
Additionally, companies must appear
on the APL for integrators. With these
changes in place, GSA is working to
promote their program and to help federal
agencies. As part of their implementation,
GSA expressed a need for industry
expertise and feedback to assist them in
their efforts to move forward to educate,
inform and offer a contracting solution
where the agencies can buy PACS from
the Schedule 84 program. In addition
to improving the program to make
the identifcation of PACS products
and services more visible to agencies
GSA Seeks Procurement Solutions for PACS
and Announces MAS Transformation Initiatives
and bringing standards current, GSA
discussed their interest in creating a
new blanket purchase agreement (BPA)
for PACS to make it easier for agencies
to both understand and procure PACS
through the Schedule 84 program.
On March 2, GSA’s Schedule 84 staff
conducted a virtual industry day to
seek feedback and engage in an open
forum conversation with the Schedule
84 industry partners on PACS solutions
for the federal government. After posting
an RFI in GSA eBuy for Schedule 84
contractors offering PACS products and
solutions to participate in a the conference
call, participants were encouraged to
voice their ideas with anonymity to foster
open communication. With the concept
of creating a ”multiple award” BPA to
enable customers to buy a prepackaged
solution, GSA asked for commonalities
supporting customer requirements in
purchasing PACs. GSA eBuy will receive
written comments and suggestions from
the schedule partners.
Christopher Redmond, Schedule 84
Branch Chief and his staff were available
to continue the discussion on PACS and
answer questions about the 84 program
from Government industry at a meeting
hosted by SIA during ISC West on April 6.
New initiatives are being rolled out
at GSA Industry Days. A key initiative
is Category Management to improve
the acquisition process in assisting
Government agencies with one source for
smarter acquisition. GSA has gone live
with a public view of their Acquisition
Gatewayonlineportal. CategoryHallways
were created at the Acquisition Gateway
which is open for commercial business
to review at this time. To see what has
been posted in the security hallway go
to https://hallways.cap.gsa.gov/app/#/
gateway/security-protection . Security
white papers and other information
on PACS are posted in the Acquisition
Gateway for security.
On May 3-4, GSA Schedule 84 will
hold their Annual GSA Industry Days in
Fort Worth, TX. If you are a Schedule 84
Contract holder, this is an opportunity to
become better informed on GSA common
regulations, requirements, compliance
issues, and upcoming changes to the GSA
Program. The agenda will cover best
practices for submitting modifcations, a
discussion of contractor assessment visits,
tips from a customer’s perspective, break-
out sessions for topics of interest and an
opportunity to meet your contracting
offcer. Furthermore, the conference
will provide invaluable and enlightening
Q & A sessions with the community of
fellow schedule holders and the GSA
management team. This event will be
held at the Federal Building in Ft. Worth,
TX but worth the trip whether you are a
rookie or an experiences GSA contractor.
Several new initiatives will be
announced including GSA’s discussion
on Transactional Data Reporting (TDR).
We have heard the TDR fnal rule may be
posted in the Federal Register as early as
May2016.GSAhasadvisedtrainingwillbe
provided to vendors as well as contracting
offcers on the reporting and the TDR
repository. As the next step and follow
on to the Competitive Pricing Initiative
GSA will roll out their Formatted Pricing
Tool (FPT). The new tool will aid in the
pricing analysis of identical items for new
offers and modifcations for vendors and
contracting offcers. To help improve GSA
processes GSA will also launch Making It
Easier (MIE).
The SIA Government Procurement
Policy Working Group and Government
Relations Committee encourages
security industry professionals to join
our working group to keep up to date
on all of the happenings with Schedules
programs and other Federal, State and
Local Government procurement issues
and initiatives of interest to the security
community.
Lynn A. de Seve is president of GSA
Schedules Inc. and chair of the SIA
Procurement Policy Working Group. She
can be contacted at lynn@gsa-schedules.
com.
Q 1 2 0 1 6 7
Q1
T
ime and money — people are
always seeking ways to save or
gain both, and this is also evident
in enterprise operations. As government
agencies deal with ever tightening
budgets and seek to increase efficiency,
a crucial part is to achieve optimal,
comprehensive security while saving
these two precious commodities.
In terms of enterprise security, a
unified platform accomplishes both
while adding multiple other
benefits that drive return-on-
investment and reduce total cost
of ownership.
A unified security platform
blends various devices and
solutions into a single, intuitive
platform that simplifies
operations, giving the immediate
benefit of greater efficiency.
Users are able to manage many
different systems from a single
interface, saving time because
users are no longer jumping
from one screen to another for
the sake of investigation, or
responding to a situation in real
time. Additional time savings
is achieved by streamlining
workflows and processes,
allowing enterprises to do more
with existing resources, resulting in
additional savings. If the security
department can do just as much
or more with the resources already
budgeted for, there is no need to invest
time or money into training more
personnel, or learning new solutions.
Investing in a security solution
should not be all about saving money.
It is critical to also reduce initial
investment to ensure the enterprise
achieves its security goals while
obtaining, processing and using critical
information as quickly and accurately
as possible is the key.
Integrating access control
Video and Access Control: A
Case for Unifed Platforms
By Mitchell Kane, President, Vanderbilt Industries
technologies with video surveillance
and alarm monitoring via a unified
platform enhances situational
awareness, enabling operators to
see when an alarm is triggered and
immediately view the location of
the alarm trigger with its associated
video. Seeing these events take place
simultaneously, the operator quickly
gathers the necessary information
to make a real-time decision on how
to address the event. These intuitive
functionalities provide enterprises
greater control of overall security.
THE BENEFITS OF NETWORKED ACCESS
CONTROL
In addition to integrating various
security systems together into a unified
platform, end users are finding ways to
streamline the installation process by
introducing wireless or online locks
for better networked access control.
Today’s access control users expect
more of a system than a one-size-fits-all
solution that is cumbersome to operate
and expensive to scale. Integrators
are responding with more customized
solutions that incorporate a blend of
online and wireless locks to better suit
each customer’s specific needs.
Wireless offline locks use a wireless
protocol to communicate with a
system’s central hub, and provide an
added level of flexibility. Additionally,
they can be quickly and easily added
to an access control solution without
the significant financial and time
investment involved with
running wire. Another option,
online locks, which can also
be wireless, and are networked
with the rest of a facility’s
access control system, enabling
decision-making to occur on
the central hub, rather than at
the door. These devices provide
greater capabilities, including
remote management, automatic
alerts and different user access
levels.
Both wireless and online locks
work hand-in-hand to help
provide end users with real-time
reporting capabilities and the
ability to streamline response.
The flexibility of both of these
options gives end users the
ability to design a system in a
way that best suits the facility and the
end user’s budget.
Simplification and unified platforms
save end users time and money by
integrating many security applications
– such as video and access control
data – into a single platform. Going
further, wireless and online locks allow
more and more end users the freedom
and flexibility needed to integrated
more options for their facilities. This
empowers the end user to rapidly
respond to emerging situations based
on various pieces of the event puzzle
coming together to tell the full story.
Theoneandonly security newssource
www.securitysystemsnews.com/subscribe
Sign up for your FREE
subscription today!
• You choose your format—print,
digital or both
• Real news reporting
• Keeping you up-to-date on the
industry

Mais conteúdo relacionado

Mais procurados

Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
Zsolt Nemeth
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile world
WTHS
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
Russell Publishing
 
Beyond top secret
Beyond top secretBeyond top secret
Beyond top secret
gorin2008
 

Mais procurados (19)

14 june
14 june14 june
14 june
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Paper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile worldPaper Florencio Cano - Patient data security in a wireless and mobile world
Paper Florencio Cano - Patient data security in a wireless and mobile world
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
 
Global Maritime Cyber Strategy
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trends
 
Models of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber ConflictModels of Escalation and De-escalation in Cyber Conflict
Models of Escalation and De-escalation in Cyber Conflict
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
 
Sivasubramanian Risk Management In The Web 2.0 Environment
Sivasubramanian Risk  Management In The  Web 2.0  EnvironmentSivasubramanian Risk  Management In The  Web 2.0  Environment
Sivasubramanian Risk Management In The Web 2.0 Environment
 
Disaster Risk Management in the Information Age
Disaster Risk Management in the Information AgeDisaster Risk Management in the Information Age
Disaster Risk Management in the Information Age
 
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental ControlsPACE-IT, Security+2.7: Physical Security and Enviornmental Controls
PACE-IT, Security+2.7: Physical Security and Enviornmental Controls
 
Infromation Security as an Institutional Priority
Infromation Security as an Institutional PriorityInfromation Security as an Institutional Priority
Infromation Security as an Institutional Priority
 
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...IRJET-  	  Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
IRJET- Cloud-Based Optimisation Approach to Joint Cyber Security and Insu...
 
Beyond top secret
Beyond top secretBeyond top secret
Beyond top secret
 
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative Solutions
 
Cybersecurity isaca
Cybersecurity isacaCybersecurity isaca
Cybersecurity isaca
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 

Destaque

Media Economics
Media EconomicsMedia Economics
Media Economics
sumanraj
 
Proyecto "Verde, que te quiero verde". Derechos reservados, por favor respeta...
Proyecto "Verde, que te quiero verde". Derechos reservados, por favor respeta...Proyecto "Verde, que te quiero verde". Derechos reservados, por favor respeta...
Proyecto "Verde, que te quiero verde". Derechos reservados, por favor respeta...
rociohdez1
 

Destaque (18)

Company Profile of Amer Adnan Associates
Company Profile of Amer Adnan AssociatesCompany Profile of Amer Adnan Associates
Company Profile of Amer Adnan Associates
 
475 2015 media effects methods up
475 2015 media effects methods up475 2015 media effects methods up
475 2015 media effects methods up
 
1º a emma blanco book people
1º a emma blanco book people1º a emma blanco book people
1º a emma blanco book people
 
Comida rápida
Comida rápidaComida rápida
Comida rápida
 
¿Cómo se producen los cambios climáticos?
¿Cómo se producen los cambios climáticos?¿Cómo se producen los cambios climáticos?
¿Cómo se producen los cambios climáticos?
 
What is Good Design? - A Research Driven Investigation
What is Good Design? - A Research Driven InvestigationWhat is Good Design? - A Research Driven Investigation
What is Good Design? - A Research Driven Investigation
 
Ficha de Inscrição EUROPA 2020
Ficha de Inscrição EUROPA 2020Ficha de Inscrição EUROPA 2020
Ficha de Inscrição EUROPA 2020
 
Analyzing the Human Gut Microbiome Dynamics in Health and Disease Using Super...
Analyzing the Human Gut Microbiome Dynamics in Health and Disease Using Super...Analyzing the Human Gut Microbiome Dynamics in Health and Disease Using Super...
Analyzing the Human Gut Microbiome Dynamics in Health and Disease Using Super...
 
Competencia tic para el desarrollo profesional docente Competencia Comunica...
Competencia tic para el desarrollo profesional docente   Competencia Comunica...Competencia tic para el desarrollo profesional docente   Competencia Comunica...
Competencia tic para el desarrollo profesional docente Competencia Comunica...
 
474 2015 personality & politics up
474 2015 personality & politics up474 2015 personality & politics up
474 2015 personality & politics up
 
¿Cómo se formaron los continentes?
¿Cómo se formaron los continentes?¿Cómo se formaron los continentes?
¿Cómo se formaron los continentes?
 
6 things to consider before investing in fintech startup
6 things to consider before investing in fintech startup6 things to consider before investing in fintech startup
6 things to consider before investing in fintech startup
 
Media Economics
Media EconomicsMedia Economics
Media Economics
 
The medium is the message
The medium is the messageThe medium is the message
The medium is the message
 
Types of lake
Types of lakeTypes of lake
Types of lake
 
Proyecto "Verde, que te quiero verde". Derechos reservados, por favor respeta...
Proyecto "Verde, que te quiero verde". Derechos reservados, por favor respeta...Proyecto "Verde, que te quiero verde". Derechos reservados, por favor respeta...
Proyecto "Verde, que te quiero verde". Derechos reservados, por favor respeta...
 
Soil profile
Soil profileSoil profile
Soil profile
 
Autobiography
AutobiographyAutobiography
Autobiography
 

Semelhante a SIA-Q1-2016

INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
Christopher Nanchengwa
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
Fahd Khan
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
Asad Zaman
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
amitkhanna2070
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
Aharon Aharon
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
JAYANT RAJURKAR
 
Cyber Sec Project Proposal
Cyber Sec Project ProposalCyber Sec Project Proposal
Cyber Sec Project Proposal
Chris Young
 
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded SystemsDr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
Dr Dev Kambhampati
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
Ivan Carmona
 

Semelhante a SIA-Q1-2016 (20)

Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
Securing Smart Cities
Securing Smart CitiesSecuring Smart Cities
Securing Smart Cities
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
 
Securing Nuclear Facilities
Securing Nuclear FacilitiesSecuring Nuclear Facilities
Securing Nuclear Facilities
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
 
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
ZamanAsad_INFA 670_9041_RPAPER_Cybersecurity-3
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERAWIRELESS DEFENSE STRATEGIES IN THE IOT ERA
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...President Donald Trump - Cybersecurity - National Institute of Standards and ...
President Donald Trump - Cybersecurity - National Institute of Standards and ...
 
Career Opportunities in Cyber Security
Career Opportunities in Cyber SecurityCareer Opportunities in Cyber Security
Career Opportunities in Cyber Security
 
Cyber Sec Project Proposal
Cyber Sec Project ProposalCyber Sec Project Proposal
Cyber Sec Project Proposal
 
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded SystemsDr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devices
 

SIA-Q1-2016

  • 2. Security Industry Association securityindustry.org S A V E T H E D A T E June 15 – 17, 2016 • Westin City Center, Washington, D.C. WHY ATTEND • Learn the latest on legislative and regulatory matters affecting the security industry • Gain a better understanding of the market drivers at work in the government space • Network with government and private- sector decision makers WHO ATTENDS • Security Executives • Sales and Marketing Professionals • Security Practitioners and Policy Specialists • Federal and Congressional Staff Join Us in 2016 at Our New Location, Westin City Center, Washington, D.C. securityindustry.org/summit
  • 3. Q 1 2 0 1 6 3 Q1 By Owais Hassan T oday’s cybersecurity landscape is faced with a wide range of threats from sophisticated hackers to malware infections and malicious attacks that can threaten the delivery of essential services. These advanced persistent threats have changed the security industry and how organizations protect their networks. Traditional security solutions fail and security must expand beyond the physical perimeter when it comes to life safety and intrusion. Mission critical infrastructure such as embassies, federal buildings, and military bases are particularly vulnerable targets. Cybersecurity attacks also impact commercial installations at banks, museums, campuses, and enterprises that have high-value assets. Physical perimeter security alone is not enough, it needs to be supported by the underlying communicationinfrastructure.Thedelivery of alarm information must be disseminated by a trusted source that provides a stable network in a secure environment. WIRELESS ALARM COMMUNICATIONS SECURITY A typicalwireless alarmcommunication system consists of various components connected to the alarm panel, as illustrated in the network diagram. Every component of the alarm communication system needs to satisfy the following security requirements: • Physical security (tamper detection) • Transmission security • Substitution security (rogue and stolen equipment) • Information security (data encryption and information assurance) • Real-time mitigation controls (logging and network management) PUBLIC VS. PRIVATE Mitigating Security Risks with Alarm Communication Systems for Mission Critical Applications Traditional methods of alarm communication are exposed to potential threats, posing serious security risks. The communication infrastructure starts from the transport layer security. Some alarm communication systems utilize the cellular spectrum where a public service provider is common knowledge (GSM, 3G, LTE, etc.), thereforesusceptibletojamming.IntheU.S. and most countries, it is illegal for private citizens to jam cell phone transmission. The fact that its illegal does not prevent it from happening. Some countries allow businesses and government organizations to install jammers in areas where cell phone use is seen as a public nuisance. There are plenty of low cost commercial off-the-shelf handheld jamming devices readily available overtheInternet.Anyalarmcommunication system leveraging either unlicensed or cellular licensed spectrum is vulnerable to radio frequency interference and jamming. This issue impacts deployment of alarm communication networks serving mission critical needs. All equipment deployed in high- value installations need to be designed to effectively safeguard and protect information against common security threats found in wireless networks: • Loss of data confdentiality • Data corruption and loss of integrity • Replay attacks • Spoofng, substitution, and masquerading • Stolen feld equipment • Denial of services NEXT-GENERATION SECURITY Technical solutions are being developed as a countermeasure to mitigate security risks. Next-generation alarm communication technology is evolving and will provide end-to-end encryption, plus ensure data is transmitted without eavesdropping, data tampering, and message forging. The implementation of this next- generation security solution will use advanced authentication techniques such as dynamic key management, distributed denial-of-service frewall, and digital certifcates that require digital signing before any equipment is authorized to be added to the network. The wireless mesh radio technology will use licensed spectrum, an unknown and covert frequency band along with frequency agility, and cognitive radio capabilities to combat jamming to head-end equipment. The packet delivery communication protocol will use dynamic mesh which is proven to be less disruptive and more tolerable under jamming or radio frequency interference conditions. This distributed architecture is preferable compared to centralized base station cellular architecture where localized jamming at the single cellular base station could impact a large volume of customer premise equipment or shut down a substantial territory serviced by a single base station tower. NETWORK MANAGEMENT The high security alarm communication system installation should be routinely evaluated to identify any threats arising out of potential vulnerabilities. The impact of a security threat should be quantifed with Mean Time Between Hazardous Events measurements based on the following factors: • Diffculty level of exploiting a threat • Degree of harm caused by exploitation of the threat • Mitigation & Control techniques and their effectiveness To rapidly mitigate any security risk as it unfolds in the real-world, the next- generation security system infrastructure must have: • An encrypted fle system • Secured executable image and critical data storages • Anti-tamper and anti-cloning capabilities • A fexible architecture • Secured software upgrade capabilities to proactively harden the system Expert implementation is key and network management is critically important. This modern approach to network security is the most reliable option for protecting the delivery of alarm information to the central monitoring station. Owais Hassan is Vice President of Engineering at AES Corporation. He can be contacted at ohassan@aes-corp.com.
  • 4. 4 Q 1 2 0 1 6 Q1 I n recent months we have seem an increase in legislative activity addressing the vexing question of how best to protect our nation’s schools. Unfortunately, this follows numerous active shooter incidents, both in academic environments and also in the law enforcement and civilian workplace. There is currently thoughtful and bipartisan work being done by various members of the House and Senate, including strong leadership by Representatives Rick Larson (D - WA) and Susan Brooks (R – IN), who are co-chairs of the bipartisan School Safety Caucus. While policymakers on Capitol Hill discuss and debate this issue, including the merits of H.R. 2667, the School Safety Act, it is important to also consider a new paradigm when contemplating the ‘integration’ of security elements to a facility, whether it is a school, hospital Rethinking Physical Security By Jeffrey Isquith and Morgan P. Muchnick or any physical structure. Until recently, detection, surveillance and physical barriers have been designed to keep possible threats out of a secured facility. However, this ‘fortress mentality’ does little to deal with the increasing possibility that a threat will make it’s way into a ‘secured’ area regardless of the steps taken to safeguard such an environment. In addition, there are growing threats from personnel who already have access to, or inhabit the ‘secured environment’ in question. Examples of this are numerous and include, but not limited to, the shootings at Sandy Hook Elementary School, Northern Arizona University, Columbine High School, Aurora theatre shooting of 2012, Washington Navy Yard in 2013, and Ft. Hood in 2009 and 2014. In order to address and mitigate such threats, the utilization of physical ballistic barriers in the immediate space is imperative. This will enable those exposed to gun violence to seek shelter behind objects nearest to them. While training to seek such protection would certainly be helpful, human behavior will also lead us to instinctively ‘duck and cover’ during such events. While individuals who inhabit a physical space want safeguards to protect them from harm, they do not necessarily wish to be inconvenienced or feel as though they are working in a physically confining environment. This is particularly true in public and civic spaces, such as schools and universities. Neither students nor teachers want to feel as though they are pursuing their educational pursuits in a bunker-like environment. This is why the seamless integration of well- hidden ballistic barriers, whether it is embedded within interior architectural elements such as walls, door structures or furnishings, can provide a layer of protection that is both pervasive and hidden. However policymakers decide to address school security, through legislation or other means, the integration of ballistic barriers into interior environments can be an essential part of every security plan. We owe it to the next generation, our most critical asset, to provide them the maximum feasible level of safety and protection. Mr. Jeffrey Isquith, Founder and CEO, Ballistic Furniture Systems/Amulet Ballistic Barriers. Mr. Morgan P. Muchnick, Director of Government & Public Affairs, Ballistic Furniture Systems/Amulet Ballistic Barriers.
  • 5. Q 1 2 0 1 6 5 Q1 By Jumbi Edulbehram, Regional President, Americas, Oncam T he transportation market – both private and public – is heavily regulated to ensure the safety and security of passengers and the general public, and with that regulation comes specifc needs in regards to video surveillance. These entities are tasked with complying with stringent rules in regards to the security systems deployed, and many of them maintain a proactive approach to security in growing urban areas. The United Nations found that in 2014, 54 percent of the world’s population resided in urban areas, and by 2050, the urban population is expected to increase to 66 percent, or approximately 2.5 billion. Public forms of transportation are lifelines for billions of people across the globe already, and large populations continue to depend on it each day as a result of rapid urbanization and globalization. As the world has watched attacks unfold on transit systems, such as those that took place at the end of March in Brussels, it’s clear these systems – and the people who operate and use them – are at risk every day. 360-degree IP video surveillance technology is increasingly playing a vital role in protecting public transport because this technology offers a number of unique features. The largest advantage 360-degree cameras have is that there is no moving Meeting Compliance and Regulation Needs with Video Surveillance in the Transportation Market parts and offer PTZ capabilities during playback, enabling users to capture a full panoramic view of the area without blind spots or mechanical delays. Moreover, the high-resolution 360-degree image captured with a fsheye lens is “dewarped” at the viewer’s discretion, and can be processed in real time or during playback as if the video were live. These cameras come in a range of sizes and discreet interior and exterior designs. In today’s market, where increases in surveillance need to be balanced with the public’s perception of privacy, the discreet form factor of 360-degree cameras are benefcial. Transit applications are an ideal ft for easily adaptable, scalable and reliable 360-degree camera systems to provide maximum situational awareness for any city’s infrastructure, preferred transportation medium and regulatory requirements. Train and bus stations, whether above ground or below, rely on 360-degree cameras to protect platforms at all hours by panning or zooming into every corner of a station, eliminating the need for a large number of traditional cameras. Airport traffc is also more voluminous than ever, with some hubs seeing millions pass through each year and dozens of FAA or international air regulations always in fux. In highly metropolitan areas, certain airports are even connected by rail or bus to the center of a city, making follow through of situational awareness even more crucial as people transfer from one transport method to the next. These 360-degree cameras can cost-effectively manage this network of transfer options by cutting back on the number of traditional cameras installed. Though increasing compatibility with VMS and other third-party screening systems, security personnel can ensure the safety and continuity of major transportation hubs. Cruise ships, a less obvious form of travel, carry thousands of people across international waters to various destinations, yet face signifcant Coast Guard compliance requirement hurdles when it comes to proper video surveillance. Proactivity toward incident detection is encouraged on board these vessels, where 360-degree cameras and video analytics technologies are being installed on decks and elevators to reduce installation costs, camera numbers and violent or illegal activity onboard. With the threats in urban areas and to public and private transportation, security is paramount, and making sure rules and regulations are followed is an important factor in keeping the public safe. 360-degree IP video surveillance cameras are an intelligent, cost-effective and effcient investment for transportation security the world over as they provide unprecedented fexibility to evolving regulations without altering the unique and delicate balance of our world’s cities.
  • 6. 6 Q 1 2 0 1 6 Q1 By Lynn A. de Seve S pring is upon us and so are various GSA security meetings, events and other forums for industry partners interested in learning and participating in upcoming government acquisition planning and opportunities. The Security Industry Association (SIA) Procurement Policy Working Group and Government Relations Committee is tracking government initiatives, participating in events, as well as hosting some informative sessions on GSA physical access control systems (PACS) promotion and other GSA Multiple Award Schedule (MAS) Transformation implementations. GSA Schedule 84 offcials continue the PACS conversation that began at the SIA ISC East forum and continued during the SIA webcast with the U.S. General Services Administration (GSA) on January 15. A key focus of the January webinar was to discuss planned changes to PACS and authentication products and services on Schedules 70 and 84 -- effective per GSA’s mass contract modifcations issued on Feb. 4, 2016. The new GSA Special Item Numbers (SINs) for products and services appearing on the GSA Approved Product List (APL) are now offcially part of the Schedule 84 program. Special Item Number (SIN) 246 35-7 is in effect for those companies whose products are listed on the GSA Approved Products List (APL), and SIN 246-60 (5) is available for those companies that have met the requirements for completing the FICAM solution training and certifcation. Additionally, companies must appear on the APL for integrators. With these changes in place, GSA is working to promote their program and to help federal agencies. As part of their implementation, GSA expressed a need for industry expertise and feedback to assist them in their efforts to move forward to educate, inform and offer a contracting solution where the agencies can buy PACS from the Schedule 84 program. In addition to improving the program to make the identifcation of PACS products and services more visible to agencies GSA Seeks Procurement Solutions for PACS and Announces MAS Transformation Initiatives and bringing standards current, GSA discussed their interest in creating a new blanket purchase agreement (BPA) for PACS to make it easier for agencies to both understand and procure PACS through the Schedule 84 program. On March 2, GSA’s Schedule 84 staff conducted a virtual industry day to seek feedback and engage in an open forum conversation with the Schedule 84 industry partners on PACS solutions for the federal government. After posting an RFI in GSA eBuy for Schedule 84 contractors offering PACS products and solutions to participate in a the conference call, participants were encouraged to voice their ideas with anonymity to foster open communication. With the concept of creating a ”multiple award” BPA to enable customers to buy a prepackaged solution, GSA asked for commonalities supporting customer requirements in purchasing PACs. GSA eBuy will receive written comments and suggestions from the schedule partners. Christopher Redmond, Schedule 84 Branch Chief and his staff were available to continue the discussion on PACS and answer questions about the 84 program from Government industry at a meeting hosted by SIA during ISC West on April 6. New initiatives are being rolled out at GSA Industry Days. A key initiative is Category Management to improve the acquisition process in assisting Government agencies with one source for smarter acquisition. GSA has gone live with a public view of their Acquisition Gatewayonlineportal. CategoryHallways were created at the Acquisition Gateway which is open for commercial business to review at this time. To see what has been posted in the security hallway go to https://hallways.cap.gsa.gov/app/#/ gateway/security-protection . Security white papers and other information on PACS are posted in the Acquisition Gateway for security. On May 3-4, GSA Schedule 84 will hold their Annual GSA Industry Days in Fort Worth, TX. If you are a Schedule 84 Contract holder, this is an opportunity to become better informed on GSA common regulations, requirements, compliance issues, and upcoming changes to the GSA Program. The agenda will cover best practices for submitting modifcations, a discussion of contractor assessment visits, tips from a customer’s perspective, break- out sessions for topics of interest and an opportunity to meet your contracting offcer. Furthermore, the conference will provide invaluable and enlightening Q & A sessions with the community of fellow schedule holders and the GSA management team. This event will be held at the Federal Building in Ft. Worth, TX but worth the trip whether you are a rookie or an experiences GSA contractor. Several new initiatives will be announced including GSA’s discussion on Transactional Data Reporting (TDR). We have heard the TDR fnal rule may be posted in the Federal Register as early as May2016.GSAhasadvisedtrainingwillbe provided to vendors as well as contracting offcers on the reporting and the TDR repository. As the next step and follow on to the Competitive Pricing Initiative GSA will roll out their Formatted Pricing Tool (FPT). The new tool will aid in the pricing analysis of identical items for new offers and modifcations for vendors and contracting offcers. To help improve GSA processes GSA will also launch Making It Easier (MIE). The SIA Government Procurement Policy Working Group and Government Relations Committee encourages security industry professionals to join our working group to keep up to date on all of the happenings with Schedules programs and other Federal, State and Local Government procurement issues and initiatives of interest to the security community. Lynn A. de Seve is president of GSA Schedules Inc. and chair of the SIA Procurement Policy Working Group. She can be contacted at lynn@gsa-schedules. com.
  • 7. Q 1 2 0 1 6 7 Q1 T ime and money — people are always seeking ways to save or gain both, and this is also evident in enterprise operations. As government agencies deal with ever tightening budgets and seek to increase efficiency, a crucial part is to achieve optimal, comprehensive security while saving these two precious commodities. In terms of enterprise security, a unified platform accomplishes both while adding multiple other benefits that drive return-on- investment and reduce total cost of ownership. A unified security platform blends various devices and solutions into a single, intuitive platform that simplifies operations, giving the immediate benefit of greater efficiency. Users are able to manage many different systems from a single interface, saving time because users are no longer jumping from one screen to another for the sake of investigation, or responding to a situation in real time. Additional time savings is achieved by streamlining workflows and processes, allowing enterprises to do more with existing resources, resulting in additional savings. If the security department can do just as much or more with the resources already budgeted for, there is no need to invest time or money into training more personnel, or learning new solutions. Investing in a security solution should not be all about saving money. It is critical to also reduce initial investment to ensure the enterprise achieves its security goals while obtaining, processing and using critical information as quickly and accurately as possible is the key. Integrating access control Video and Access Control: A Case for Unifed Platforms By Mitchell Kane, President, Vanderbilt Industries technologies with video surveillance and alarm monitoring via a unified platform enhances situational awareness, enabling operators to see when an alarm is triggered and immediately view the location of the alarm trigger with its associated video. Seeing these events take place simultaneously, the operator quickly gathers the necessary information to make a real-time decision on how to address the event. These intuitive functionalities provide enterprises greater control of overall security. THE BENEFITS OF NETWORKED ACCESS CONTROL In addition to integrating various security systems together into a unified platform, end users are finding ways to streamline the installation process by introducing wireless or online locks for better networked access control. Today’s access control users expect more of a system than a one-size-fits-all solution that is cumbersome to operate and expensive to scale. Integrators are responding with more customized solutions that incorporate a blend of online and wireless locks to better suit each customer’s specific needs. Wireless offline locks use a wireless protocol to communicate with a system’s central hub, and provide an added level of flexibility. Additionally, they can be quickly and easily added to an access control solution without the significant financial and time investment involved with running wire. Another option, online locks, which can also be wireless, and are networked with the rest of a facility’s access control system, enabling decision-making to occur on the central hub, rather than at the door. These devices provide greater capabilities, including remote management, automatic alerts and different user access levels. Both wireless and online locks work hand-in-hand to help provide end users with real-time reporting capabilities and the ability to streamline response. The flexibility of both of these options gives end users the ability to design a system in a way that best suits the facility and the end user’s budget. Simplification and unified platforms save end users time and money by integrating many security applications – such as video and access control data – into a single platform. Going further, wireless and online locks allow more and more end users the freedom and flexibility needed to integrated more options for their facilities. This empowers the end user to rapidly respond to emerging situations based on various pieces of the event puzzle coming together to tell the full story.
  • 8. Theoneandonly security newssource www.securitysystemsnews.com/subscribe Sign up for your FREE subscription today! • You choose your format—print, digital or both • Real news reporting • Keeping you up-to-date on the industry