Manufacturing 2018 Industry NewsGP0|#3795b40d-c591-4b06-959c-9e277b38585e;L0|#03795b40d-c591-4b06-959c-9e277b38585e|Security by Industry;GTSet|#8accba12-4830-47cd-9299-2b34a43444652018-01-01T05:00:00Z, Flora Szatkowski<h4>​AIRPORT CONNECTIONS</h4><p>Oslo Airport, Gardermoen, is Norway's largest and Scandinavia's second largest airport, handling 26 million passengers in 2016. The airport had an analog communication system in the air traffic control tower, and wished to upgrade to an IP system that would provide operational analytics and error reporting of critical communications, redundancy for high availability and reliability, and integrated operational, passenger, and emergency communications capabilities. The communication devices also needed to stand up to dynamic ranges of noise and—outside the terminal—a variety of weather conditions.</p><p>Zenitel had worked with the airport in the past, and stepped up to provide the updated system, including TMIS-1 Turbine Mini Intercoms that plug and play with the airport's IP telephone system, as well as TCIS-4 Turbine Intercom Stations to support intelligibility, interoperability, and reliability standards of the airport. Passengers and airport personnel can easily use the devices for communications. In emergencies, the system provides direct and clear notifications to all parts of the airport.​</p><h4>PARTNERSHIPS AND DEALS</h4><p>Software House, part of Johnson Controls, and Allegion are extending their partnership to include the pairing of Schlage LE and NDE wireless locks with Software House C•CURE 9000.</p><p>Arteco Video Event Management and Video Intelligence Solutions are now compatible with the new Hanwha Techwin Wisenet 5 chipset.</p><p>Top Notch Distributors is stocking an extensive inventory of ASSA ABLOY products, parts, and accessories in four U.S. locations.</p><p>IndigoVision incorporated BriefCam technology as part of its Control Center v15.0 security management solution.</p><p>Dataguise welcomed Computacenter to the Dataguise partner community.</p><p>Nuvias is the sole pan-EMEA distributor for Dtex Systems insider threat solutions.</p><p>ISONAS Inc. integrated its newest software application, Pure Access, with XProtect Access from Milestone Systems.</p><p>The University of Iowa Hospitals and Clinics unified its security operations with the deployment of victor and C•CURE 9000 security management platform from Johnson Controls.</p><p>Just Add Power announced partnerships with Tandem Marketing and Synapse Sales & Marketing to broaden its product support across the United States.</p><p>March Networks and Patriot One Technologies Inc. announced an integration that offers video-enabled covert weapon detection notifications.</p><p>For two decades, Mercury Security and Open Options have collaborated to deliver security systems to customers all over the world.</p><p>MONI Smart Security will provide a professional monitoring service for Nest Secure. </p><p>Nozomi Networks announced a new partnership with FireEye to provide next generation ICS security that extends visibility across IT and OT environments.</p><p>D-Tools, Inc., joined the PSA Business Solutions Providers, offering its estimation, system design, and project management software platform to PSA members and owners.</p><p>Zurich-based Sunrise Communications AG will implement cloud-based security technology from the German firm Secucloud.</p><p>SecuraTrac now integrates with Micro Key Systems and is introducing a version of its Mobile Defender Model S that works on the Verizon network in addition to AT&T and T-Mobile networks in more than 120 countries.</p><p>Setracon Incorporated announced the award of a pilot project providing enterprise security risk management services for General Atomics.</p><p>University of Georgia worked with Spectra Logic to implement a disaster recovery archive strategy, installing Spectra tape libraries, a converged storage system, and a disk solution to protect content. </p><p>V5 Systems was selected by Pelco by Schneider Electric for integration with its V5 Camera Adaptive Platform.</p><p>VIVOTEK formulated an IP surveillance solution for Varun Beverages.</p><p>Our Lady of Perpetual Help in Ellicott City, Maryland, installed a VIZpin smartphone access control system that allows parishioners to enter the building for prayer most times of day.</p><p>Imperial Oil is expanding its use of 3D Perspective scanners from VOTI DETECTION to provide enhanced security and threat detection.​</p><h4>GOVERNMENT CONTRACTS</h4><p>French water utility Eau de Valence chose ASSA ABLOY's key-based access control technology, CLIQ, to replace its mechanical locking system.</p><p>Canon U.S.A., Inc., sold its 300th unit of the RadPRO SecurPASS Full Body Security Screening System to Clay County Jail in Manchester, Kentucky.</p><p>Maldives Immigration worked with DERMALOG to create an ID card that can be used for payments, as a driver's license, as a health and insurance card, and as a passport.</p><p>Daytona Beach Police Department used drones from DJI to conduct pre- and post-storm assessments of Hurricane Irma. </p><p>FLIR Systems, Inc., received an order to deliver Tac Flir surveillance cameras in support of the U.S. Army EO/IR-Force Protection program.</p><p>Frequentis and Hexagon Safety & Infrastructure were selected to supply mission-critical technologies for the ELKOS Austria project, a nationwide, unified command and communication system. </p><p>IDenta Corp. was approved as an official supplier for the European Union. </p><p>ISV Redwall Technologies is working with the U.S. Department of Defense on a project centered around mobile data integrity and confidentiality. </p><p>Janus Global Operations will provide risk management and security for the European Union organization working to help build maritime civilian law enforcement in Somalia. </p><p>Port Hedland in Australia chose the SharpEye SBS-900 X-Band radar system from Kelvin Hughes, which will be installed as part of a complete VTS system by AMS Group.</p><p>L3 Technologies announced that its ProVision 2 advanced passenger screening system has been purchased by the Istanbul Ataturk Airport. </p><p>Orolia, through its McMurdo brand, announced that the U.S. Coast Guard has activated a contract for up to 16,000 FastFind 220 Personal Locator Beacon units.</p><p>SparkCognition is providing collaborative thought leadership on the role of artificial intelligence in future warfare to the British Army.</p><p>UltiSat, Inc., announced that U.S. Defense Information Systems Agency Defense Information Technology Contracting Organization awarded a task order for UltiSat to provide satellite services support for Global Hawk Unmanned Air Vehicle operations. </p><p>The Republic of Zambia awarded Veridos a contract to deliver polycarbonate electronic ID cards to Zambia. The Police Grand-Ducale Luxembourg commissioned Veridos to install ten eGates for automated border control at the country's international airport.</p><p>The U.S. Air Force expanded its partnership with VOTI DETECTION as the preferred security screening system on bases worldwide.</p><h4>AWARDS AND CERTIFICATIONS</h4><p>Agent Video Intelligence holds the largest market share of video analytics software, according to IHS Markit.</p><p>Allied Universal received two Outstanding Security Performance Awards: Outstanding Customer Service Initiative for the UCHealth Patient Watch Program and Outstanding Contract Security Officer for Site Supervisor Zach Ostergren.</p><p>Asurion was honored by Frost & Sullivan with the 2017 North American Product Leadership Award for Mobile Protection Services.</p><p>National Cyber Security Centre—Finland granted approval for the Bittium Tough Mobile LTE-smartphone and related Bittium Secure Suite back-end system to process material that is classified nationally as Confidential.</p><p>Concurrent Technologies Corporation's Johnstown, Pennsylvania facilities have been recertified under the Occupational Safety and Health Administration Voluntary Protection Programs as a Star site.</p><p>ControlScan was approved by the Payment Card Industry Security Standards Council (PCI SSC) to extend its Qualified Security Assessor (QSA) services to companies operating in Canada.</p><p>D-Link announced that its Smart Managed PoE Powered 5-Port Gigabit Switch received the 2017 New Product of the Year Award from Security Today in the Networking Support Solutions category.</p><p>Honeywell's BW Clip4 portable gas detector won the 2017 New Product of the Year in the Industrial Hygiene category from Occupational Health & Safety magazine.</p><p>Janrain obtained Cloud Security Alliance Level 2 (CSA) STAR Certification and ISO 27018:2014 certification for handling personally identifiable information.</p><p>Along with partner Video Analysis Solutions, Oncam won Most Innovative In-store Solution as part of Retail Risk Fraud Awards 2017.</p><p>OutSystems received ISO 27001, ISO 22301, and SOC 2 certifications. </p><p>Attendees at the 2017 ASIS International Annual Seminar and Exhibits voted the Pelco by Schneider Electric VideoXpert Professional Video Management System the ASIS Accolades People's Choice Award winner. The Judges Choice awardee was the Cobalt intelligent security robot from Cobalt Robotics. Find the rest of the winners via SM Online. </p><p>RiskIQ won the Overall Web Security Solution Provider of the Year award from CyberSecurity Breakthrough. </p><p>Vaultive received a new patent relating to its ability to allow organizations to use cloud-hosted email while reducing the exposure of sensitive data.</p><p>Virtual StrongBox, Inc., earned two patents that recognize the way it gathers information from the digital consumer and protects that data.​</p><h4>ANNOUNCEMENTS</h4><p>Acuant acquired the Ozone line of identity products, intellectual property, and talent from Mount Airey Group.</p><p>Akamai Technologies, Inc., entered into an agreement to acquire Nominum, which provides enterprise security solutions for carriers.</p><p>AMG Systems participated in a trade delegation to the Baltic states organized through the United Kingdom Department for International Trade.</p><p>Anixter University offers an array of technical and standards-based information for contractors, integrators, end users and consultants. </p><p>ASSA ABLOY partnered with the USO to provide backpacks loaded with food and personal items for veterans returning from deployment. The 1,000 backpacks were packed on the show floor of ASIS 2017.</p><p>Carleton University, along with Queen's University and Cyberspark, launched Global EPIC, a new international cybersecurity initiative designed to combat growing world challenges by facilitating global collaboration.</p><p>CNL Software is moving its U.K. headquarters to larger premises in Watchmoor Park, Camberley, Surrey.</p><p>Dahua Technology established Dahua Technology Rus as a subsidiary in Moscow.</p><p>Dragos is a National Cybersecurity Excellence Partner with the National Cybersecurity Center of Excellence. </p><p>FirstNet and AT&T launched a developer program to help equip first responders with state-of-the-art communications tools.</p><p>Forensic Logic acquired the COP­LINK suite of products from IBM.</p><p>Gallaher released a new website,, in honor of its 44th year in business.</p><p>Gillmore Security Systems, Inc., acquired four Ohio companies: Digital Security, Courtland Security, Gen-X, Santee Security, and Buckeye Electronics & Security Technology. </p><p>The Institute for Critical Infrastructure Technology introduced the Center for Cyber-Influence Operations Studies to examine the weaponized digital applications used by foreign nation-states for influence operations.</p><p>Iron Mountain Incorporated opened a new information management facility in Mabelvale, Arkansas.</p><p>JLT Cyber Risk Consortium developed a research and thought leadership hub exploring cybersecurity threats.</p><p>Johnson Controls sold its Scott Safety business to 3M.</p><p>Mimecast Limited will expand into Germany with a new office in Munich.</p><p>Pinkerton launched its 2017 Risk Index Report, A World Ranking of Business Risk.</p><p>PRAESIDIAD relocated its corporate headquarters from Ghent, Belgium, to London as part of a global access and communication strategy.</p><p>Pryme opened an Indiana Distribution Center and two satellite sales offices in Nevada and Arizona.</p><p>Safer Places, Inc., opened a new office in Portland, Maine.</p><p>Physical security specialist Safetell revamped its website to help users easily identify their security needs.</p><p>SmartRiskSolutions GmbH published a handbook on crisis management and crisis communications during a terrorist or active shooter attack. Find it via SM Online.</p><p>Stratfor announced a set of joint initiatives with the Clements Center for National Security; the Robert Strauss Center for International Security and Law; and the Intelligence Studies Project at The University of Texas at Austin to engage on geopolitical analysis, national security conversations, and graduate education. </p><p>VOTI DETECTION unveiled a company-wide rebrand including a name change from VOTI Group to VOTIDETECTION, website redesign, and more.</p>

Manufacturing 2018 Industry News 2017 Industry News a Security Transition Course for Corporate Success News May 2017 Model 101 at the Border Review: Port Security Management 2015 Industry News News September 2014 Diverting Practice

 You May Also Like... Course for Corporate Success<p>​Conventional wisdom suggests that businesses have a natural life cycle wherein new solutions, evolving markets, and misguided management play a significant role in the probable failure of the company. According to this model, every firm—from family businesses to the largest multinationals—falls into decline. Even those businesses that come back after one downturn may not prevail in the next one. These organizations are replaced by new companies that are born to meet evolving market needs, new technology voids, or changing business environments, and the cycle repeats. But some notable companies—IBM and Apple, for example—have overcome periods of decline and have emerged with a new focus, strong core values, and a powerful new leadership position. </p><p>There are many possible paths to this success, but for a large technology company, regaining its leadership position after a major decline requires several critical ingredients, including: </p><ol><li>A clear target-market focus with in-depth understanding of the customer</li><li>A strong, complete offering that cannot be easily duplicated</li><li>A clear market position and message</li><li>Strong organizational alignment with outstanding team commitment</li><li>A financial foundation that will support the necessary actions<br> </li></ol><p>While these elements may seem obvious to any start-up entrepreneur, they may be harder for an established, enterprise-level company to achieve. Here's a look at how these five key initiatives can be applied.</p><p><strong>1. Clear Target Market<br></strong>A statement of mission, vision, and values can help an organization create a roadmap of where it wants to go and how it will get there. A basic underlying tenet of the statement is that the organization, regardless of its nature (i.e., school, auto dealership, technology company, etc.) will provide a high-quality product or solution that the market needs. Organizations must also identify the right way to communicate to the defined market that their product or service has value and is the best choice. They must support that communication with a solid foundation in marketing, sales, and infrastructure. It's a broad "pull" rather than "push" approach that benefits not only the organization but the market as well. </p><p><strong>2. Strong, Complete Offering<br></strong>Businesses that have grown and prospered offer a strong, quality product line designed specifically for the defined market. Maintaining that portfolio is an ongoing process that requires both a commitment and a product roadmap that will position the organization not only as a product leader but also as a technology leader. </p><p>Crystal balls aside, listening and responding to a changing industry is necessary to ensure that the portfolio offers solutions as well as products. Offerings today must feature greater intelligence and performance capabilities that will make a difference to the industry. In the physical security market, for instance, some of these solutions include products with increased connectivity, cybersecurity features, and an understanding of the Internet of Things (IoT). The offerings should be positioned to work in combination with the expertise of select technology partners to deliver an integrated system that solves customer problems through meaningful innovation. </p><p><strong>3. Clear Market Message<br></strong>Successful companies have an aggressive integrated marketing program that combines the best of traditional marketing with new social media and digital techniques to get their message to the market. These companies have implemented and will continue to refine consistent and aggressive public relations, new print and digital advertising campaigns, and advanced inbound marketing. This is all in addition to updated websites that include significant support tools and search engine optimization. <strong> </strong><strong> </strong><strong><br></strong></p><p><strong>4. Organizational Alignment<br></strong>The successful business operation must fit the needs of the market as it exists today. Many companies start the restructuring with the sales organization to create a closer, more-direct line to the reseller and customer. This approach serves customers by ensuring more direct contact, feedback, and intervention. By listening carefully, understanding what the market needs, and giving value, the company, in return, will receive value.  </p><p>Along with a restructured sales organization, an updated marketing organization can better engage in highly strategic and integrated marketing efforts that are designed to reshape the company's image and drive new business opportunities. Populating the department with internal and external teams of experienced industry professionals who have proficiency in both traditional and digital marketing further helps in achieving company goals. </p><p>Finally, in any technology-based organization, the restructuring of the engineering organization is critical to meet the continual challenge of developing and delivering mainstream solutions with meaningful innovation. Ultimately, it is the close collaboration and alignment of these three primary functions—sales, marketing, and engineering—that will eventually drive the organization towards its new goals.<strong> </strong></p><p><strong>5. Firm Financial Foundation<br></strong>Although a company may have been profitable throughout its history, change is costly. Strong financial backing allows an organization to move forward with its redevelopment in a manner that better ensures success. As an example, the capability of sustained restructure has been a key component in the success of Pelco's reinvention. </p><p>Even when these five critical elements are implemented, success is still not a sure thing. Economic uncertainty, fast-moving markets, and competition from nontraditional sources can take a toll. Companies with entrenched or outdated business models are particularly susceptible to business failure. As it becomes harder to hit performance targets, virtually all organizations need to consider some type of strategic restructuring if they want to avoid the end-of-life paradigm. </p><p>If this sounds radical, it's likely due to the negative connotations associated with restructuring. For many, restructuring conjures up images of court-supervised negotiations with different classes of creditors trying to reach consensus. But when viewed more broadly, restructuring represents an opportunity for companies to examine their operating models with the ultimate goal of optimizing their business for the long term. Companies that follow this process can remain a dominant force for many years to come.​</p><p><em>Sharad Shekhar is CEO of Pelco by Schneider Electric.</em>​​<br></p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465 Model 101<div><p>​</p><p><img src="/ASIS%20SM%20Documents/1216%20Sidebar%20Graphic%202a.jpg" class="ms-rtePosition-2" alt="" style="margin:5px;width:356px;" /><br></p><p>Maturity models are a tool used a range of business sectors, including​ manufacturing, software engineering, operations, and logistics. The model is often used to help set process improvement objectives and priorities, and it can provide a method for appraising the state of an organization’s current practices. </p></div><p>Researchers at Carnegie Mellon University (CMU) have been developing early maturity model prototypes since the 1980s. In 2002, CMU released the first version of the Capability Maturity Model Integration (CMMI) tool, which was developed by a group of experts from industry, govern­ment, and CMU’s Software Engineering Institute. Updated versions of the tool were released in 2006 and 2010. </p><p>The Ernst & Young (EY) physical security maturity model developed with Caterpillar is based on this CMMI tool, and also on EY’s cybersecurity maturity model.</p><p>This tool uses a level 1 through 5 rating scale to define maturity levels: (1) Initial, (2) Repeatable, (3) Defined, (4) Managed, and (5) Optimized. For a hypothetical example, take the compliance component of a security department. In the Initial stage of a maturity model, processes are unpredictable, poorly controlled, and reactive. Thus, in that initial stage, the security department is conducting its compliance activities in a haphazard way—putting out fires when they flare, with no real established process for doing so. ​</p><p>When compliance reaches level 3, Defined, the compliance process is established and proactive—perhaps with guidelines enforced by a compliance officer. At level 5, Optimized, the process is so well-established, managed, and defined, that the focus is now on process improvements.  </p><p>​​</p>GP0|#28ae3eb9-d865-484b-ac9f-3dfacb4ce997;L0|#028ae3eb9-d865-484b-ac9f-3dfacb4ce997|Strategic Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465 in Shared Spaces<p>​Coworking spaces  are on the rise around the globe. These flexible work settings allow people without a traditional office building to still enjoy many of the amenities that come along with having a dedicated work environment. </p><p><em>The 2017 Global Coworking Survey</em>, conducted by Deskmag, along with, found that there are an estimated 13,800 active coworking spaces worldwide, hosting more than 1 million people. </p><p>This represents a major increase from five years ago, when just 2,070 coworking spaces were used by 81,000 people globally. COCO, a coworking company based in St. Paul, Minnesota, offers several different levels of membership and types of space, so clients are only paying for the amount of time they need and space they require, says Megan Dorn, director of operations at COCO. </p><p>“Our idea in doing that was to be with our clients as they grow—from the beginning of their business, to hiring employees, to maybe needing private offices—which we also have,” she says. “So that’s what makes us a little bit different than your typical coworking space.” </p><p>When the company started in 2010, it had to distribute physical keys to its members, “which is a nightmare as you’re trying to grow,” she notes, and a security concern if a key was ever lost. </p><p>Because COCO normally leases its space in a larger building, it needed a security solution that was as flexible as the working environment it provides. “We usually have to find ways—when we’re opening a space or acquiring a space—to work with the building to find ways to get our security system installed,” Dorn explains. </p><p>When COCO acquired a new space in Chicago last May, the existing security system was a door locked by a PIN code, which the building never changed. The PIN code was distributed to a large number of people.</p><p>“The space got broken into a week before we acquired it. Laptops were stolen, and people were really on edge,” she notes. “So as soon as we came in to the Chicago space, one of our top priorities was to get a really solid access and security system in place.” </p><p>COCO turned to Brivo’s OnAir, a cloud-based access control system that easily integrated into the company’s membership dashboard, called Bamboo. Using Brivo, COCO can easily distribute keycards to its clients and manage membership usage and levels. </p><p>To set up the system, Brivo representatives come to COCO’s space and add card readers to the appropriate doors. They also set up schedules and the different access levels for membership types.</p><p>COCO has one membership accountant who works out of the company’s headquarters and oversees assigning new members a keycard number through Brivo. “It’s all digital, so it can be done remotely,” she notes. </p><p>A community manager at the member’s location—the lead COCO employee for that site—can then log on to Brivo and see which card number has been assigned for that client, add the number to their member profile in Bamboo, and distribute it. </p><p>Changing, granting, and revoking access levels, as well as keeping track of when members come and go throughout the building, are all managed through the Brivo platform. </p><p>“Say you want to upgrade a member from part-time to full-time. We’re able to just go into Brivo and quickly change your access. It’s active the moment that you do it,” she notes. “That’s actually been really helpful for us, given we have all this variability in types of membership.” </p><p>When a member badges in, a wealth of information comes up on the Brivo dashboard for the community manager to see. “Their picture, their name, their membership level, how many times they’ve checked in already that month, it immediately shows up,” she says. “So it tells you in real time exactly who’s in your space and when.”</p><p>The business value of OnAir is immense for COCO, Dorn points out, because the company can tell how often members are actually using the space, and whether they have made payments, as soon as they present their access card to the door reader. </p><p>“Let’s say someone is delinquent on payment. As soon as the member checks in, there’s going to be big red circle with an exclamation point [on the dashboard]–you can’t miss it,” she says. “It’s definitely helped us lower the sheer amount of delinquent payments that we have, and receive that payment.”</p><p>When a member badges in, Brivo also alerts the community manager if that person hasn’t been in the space very often that month. </p><p>“If we can find a member who we consider at-risk, who hasn’t been using the space, and we’re alerted to that we can reach out to them, invite them to an event, or try whatever we can to reengage them,” Dorn says. </p><p>COCO is also in the initial stages of using Brivo MobilePass, which lets COCO staff remotely lock and unlock doors via a smart device, for members who want to access the space after-hours but forget their keycard. </p><p>Because of how easily it can deactivate and reactivate access, COCO also encourages members who leave the company to keep their keycards. </p><p>“The goal is to try to get the member to come back. So if you have that card and you come back, you’re already set up in our system, all we have to do is reactivate the card and then we’ll also waive any setup fees,” Dorn says. </p><p>She notes the combination of security and business insights from Brivo has been tremendous for COCO. </p><p>“Brivo as a security system has helped us go from being a group of people working out of a space to a full-fledged company,” she says. “It really helps us manage all of the different types of membership and the stages of business they’re in.” </p><p><em>For more information: Nicki Saffell,,, 301.664.5242 ​</em></p>GP0|#cd529cb2-129a-4422-a2d3-73680b0014d8;L0|#0cd529cb2-129a-4422-a2d3-73680b0014d8|Physical Security;GTSet|#8accba12-4830-47cd-9299-2b34a4344465