You are at : Search > Articles Search Results

Articles Search Results

110 Articles and 7 related Products found for Cisco

IDIS appoints John Psyllos DirectIP Project Manager

IDIS appoints John Psyllos DirectIP Project Manager

Editor / Provider: IDIS | Updated: 8/28/2014 | Article type: Security 50

IDIS has appointed John Psyllos to the role of Product Manager reporting to Brian Song, Managing Director, IDIS Europe based out of the Korean manufacturer's European headquarters in Brentford, London.

John joins IDIS to lead DirectIP™ product management across Europe and the Middle East. His appointment strengthens the IDIS commitment to further develop third party integrations, which deliver powerful off-the-shelf functionality to increase the flexibility and cost effectiveness of DirectIP™ surveillance solutions. John will work closely with IDIS technical support as well as the sales and marketing team to increase sales of the DirectIP™ line up by developing and maintaining high levels of product value, quality and industry recognition.

John brings with him extensive security industry experience across technical design, engineering, project and account management. An electronic and IT network engineer with a deep understanding of IP surveillance technology, John spent over ten years with leading UK security systems integrator, First City Care. In his most recent role as a technical design consultant, John oversaw the implementation and maintenance of tightly integrated security solutions at London headquartered corporate enterprises.

Commenting on his appointment, Brian Song, Managing Director at IDIS Europe, said, “I am confident John will further strengthen our DirectIP™ integration capability and rich functionality, to meet the growing demand for seamlessly integrated security solutions from across a range of markets. I'm delighted that John is already a fantastic addition to our team, and will ensure IDIS continues to be the partner of choice for our customers.”

John Psyllos, Product Manager, IDIS Europe, added, “We will continue to work closely with our system integration partners and end users customers to develop ground-breaking innovation to lead the market and extend our enterprise offering.”

John holds a Higher National Diploma in Electrical Engineering from the Tshwane University of Technology in South Africa as well as Cisco and Microsoft certifications. He has also held various engineering and training roles at Siemens Telecoms.

IDIS offers DirectIP as an end-to-end solution, comprising a range of cameras, monitors, NVRs and comprehensive video management software. DirectIP™ delivers prominent plug-and-play simplicity, combined with highest-quality performance and industry-leading pricing levels.

Axis secures sport center with modern and integrated HDTV IP solution

Axis secures sport center with modern and integrated HDTV IP solution

Editor / Provider: AXIS | Updated: 8/26/2014 | Article type: Commercial Markets

The one and only task the client set for the installer was to create an integrated security system at the new Ice Arena site in Yuzhno-Sakhalinsk. Like any sports complex, the ice arena has a large number of people continuously moving throughout the site. For this reason, the main requirements for the system were: full video camera coverage, high image detail, precise analytics and integration with the entry monitoring system.

The set objectives demand that the video has high definition, which is why the installer used three Axis HDTV network camera models when designing the system: AXIS Q1604 and AXIS Q1604-E Fixed Network Cameras and the AXIS Q6034-E Dome Network Camera. A total of 140 cameras were installed, both inside the facility and outdoors. A reliable back end using Cisco equipment was needed to process data from so many cameras. Intellect software from ITV was chosen to analyze images.

The project is now completed. The client received a modern security video surveillance system integrated with the access monitoring and ticket sales systems. Although the arena is new, the video surveillance system has already repeatedly helped law enforcement authorities find people who have committed crimes at the facility.

Site description
Sakhalin's Kristall Ice Arena was built as part of the region's long-term program for “Development of Physical Education and Sports in the Sakhalin Region for 2010– 2018” with support from off-budget sources: funds from Gazprom Transgaz Tomsk LLC. The ice arena has a 60x30-meter ice rink with stands for 1,526 spectators, aerobics and general exercise halls, a fitness center, canteen, as well as auxiliary and utility rooms. The ice arena is primarily aimed at children. The arena hosts classes for local youths in all types of sports: hockey, figure skating, boxing, weightlifting, gymnastics, competitive ballroom dancing and chess. However, children's sports are not the only use of the new complex. The ice rink hosts performances on ice, concerts, regular-season and Sakhalin Region championship hockey games, as well as Russian championship volleyball games.

Project parameters
Like any sports complex, the ice arena has special security. The large number of visitors, excited crowds during games or concerts, numerous small auxiliary rooms — all of this requires heightened attention from the security service and law enforcement authorities. For this reason, an integrated arena security plan was developed when the facility was still under construction.

The three key objectives of the video surveillance system at the facility are: general observation, tracking selected targets and facial recognition.

Toward these ends, 98 AXIS Q1604 Network Cameras were installed in enclosed rooms and 27 outdoor AXIS Q1604-E Network Cameras (for observation) and 15 high-speed AXIS Q6034-E Dome Ntwork Cameras were installed outdoors. In addition, the ice arena has clearly delineated access zones, which can be changed depending on the current event. For example, visitors to a concert or game should not go further than their seating areas; athletes should not enter service rooms for the arena's administration, and so on. This division requires an easily adjustable multi-level access monitoring system, as well as full integration of the access monitoring and control system with the video surveillance system. Another argument in favor of Axis cameras here was the high integrability of cameras using standard open protocols.
One hundred and forty video cameras create a serious load on the network, which is why a separate structured cabling system was installed for the video system to transmit data and to power the cameras via PoE. This helped avoid extra expenses for routing electrical cables to the camera installation sites.


The facility's high traffic requires significant computer capabilities from the analytical back end of the video surveillance system. Furthermore, equipment reliability and dependability are important. For these reasons, the installer and client chose to use Cisco server equipment. Intellect software with analytical functions from ITV was selected as the video management system. The Sakhalin Region government paid meticulous attention throughout the entire construction of the arena. As a result of the very first system tests, the region's internal affairs authorities approved Axis equipment for use within the “Safe City” program. The outdoor cameras installed at the site will be included in the internal affairs administration's network this year.

Milestone amps up with new sales director and managers

Milestone amps up with new sales director and managers

Editor / Provider: Milestone | Updated: 8/22/2014 | Article type: Security 50

Milestone Systems aims to continue its position as the market leader for open platform IP video management software (VMS): the company has recently hired more strong players for managing sales in North America, Austria, Germany and Switzerland and the UK. A new Finance Manager has also come on board in the US and the fast-growing Bulgarian office has a new HR Manager. The Danish headquarters has hired a Product Manager and Marketing Manager, too.

Mike Taylor is now the Director of Sales, North America, for Milestone Systems. Since July, he has been responsible for driving new business, tasked with expanding the local, regional and national integrator base and building out the consulting and Architects & Engineers (A&E) Program. Mike Taylor has been in the security industry for over 18 years in key roles that include Brivo Systems Senior Director of Sales and AMAG Technology Vice President of Sales, having started his career with ADT Security Systems.




 Peter Grubauer is Milestone Country Manager DACH (Germany, Austria and Switzerland) since May. He has extensive experience in selling and managing sales teams, from previous positions with Novell, Polycom, Tandberg, Cisco Systems, and Vidyo. He works with a motivational management style from a proven history of building, guiding and retaining high-performance teams to develop and implement strategies for accelerated growth.




 Ava Parissay joined Milestone Systems at the Danish headquarters in June as Senior Products Manager in the Professional Business Unit. With a B.A.Sc. Computer Engineering and M.B.A. from Simon Fraser University, she has worked more than ten years in the high-tech industry, most recently as Product Manager at Avigilon in Canada where she was responsible for the device portfolio and integration program. Prior to this, she was a Product Manager and Head of User Interface Design at Macdonald Dettwiler and Associates.

“Ava will support our team in a number of activities across R&D, Sales and Marketing. She will take ownership of the strategic three-year roadmap for the Professional Business Unit,” says Janne Jacobsen, VP Professional Products, Milestone Systems.



Axis cameras bring zoo live web-streams to the living room

Axis cameras bring zoo live web-streams to the living room

Editor / Provider: Axis | Updated: 5/20/2014 | Article type: Commercial Markets

The Zoological Society of Milwaukee provides support for the Milwaukee County Zoo in southeastern Wisconsin. The zoo features a wide variety of animals including brown bears, jaguars and penguins. To expand its reach, the zoo wanted to stream live video of its most popular and charismatic animals. Yet, each animal enclosure was a unique environment due to the diversity of needs presented by different species. The zoo needed a flexible camera solution that could work in a range of habitats.

Digital Design Services, Inc., along with Axis partner Camera Corner Connecting Point, recommended Axis network cameras due to their easy, plug-and-play installation capabilities and versatile product line. Outdoor-ready AXIS P5512-E PTZ Dome Network Cameras were used in the low temperature penguin exhibit and high definition AXIS Q6035 PTZ Dome Network Cameras were used to give intimate HDTV-quality views of animals such as brown bears.

An AXIS M5014 PTZ Dome Network Camera was fitted with a custom underwater mount for an exhibit featuring local fish. The high degree of customization was made possible by Power over Ethernet features enabling the ability to plug directly into the network without additional hardware.

The web-streams became a hit, and the zoo continues to bring more animals online. After a landing page was created, the zoo was averaging 24,000 views per month. Following the birth of two jaguar cubs, the zoo used the cameras to give fans a behind-the-scenes view of the first months of their lives. The jaguar stream received 100,000 views over two days following a newspaper article. Zookeepers also use the footage to help them monitor the animals remotely and discover critical information should an animal become sick or injured.

Curling up on the couch with a tiger
The Milwaukee County Zoo is home to over 2,500 animals including tigers, lions, jaguars and bears on 200 acres in southeastern Wisconsin. To reach a wider audience, the zoo wanted to stream videos of their most charismatic animals on the web. “We wanted to bring the animals we have here to people at home or further away from our region who aren't able to attend,” said Dominic Schanen, Director of Technology and Membership Services. But with a variety of enclosure environments, the zoo needed a flexible camera solution to address a range of needs. Based on past experience, Digital Design Services, Inc. knew the ease of installation offered by Axis network cameras would be the perfect fit.

“The zoo and I agreed that the Axis products made it much easier for us to set them up on the zoo's system,” said Joe Rugowski, president of Digital Design Services, Inc. “They are plug-and-play easy, and they work.”

Up a pole, underwater and in the cold
The ease-of-install features allowed Digital Design Services, Inc. to design custom mounts and enclosures to meet the unique requirements of each animal holding area. To stream video of local fish from the “Lake Wisconsin” exhibit, Digital Design Services, Inc. engineered a custom underwater enclosure for an HDTV 720p-quality AXIS M5014 PTZ Dome Network Camera. They selected outdoor-ready AXIS P5512-E PTZ Dome Network Cameras for the chilly Gentoo and Rockhopper penguin exhibit because the construction could withstand the constant 40 degree temperatures. For the brown bear exhibit, the zoo wanted a crisp, intimate view of the massive animals, so Digital Design Services, Inc. attached an HDTV 1080pquality AXIS Q6035 PTZ Dome Network Camera onto a ten-foot high steel pole at the edge of the exhibit. “We mounted the camera so that we are looking almost into the eye of the bear,” Rugowski said. The various feeds are connected to a Dell PowerEdge 2900 rack mount server by fiber through Cisco 3500-CG switches. They also use Ubiquiti wireless access points to connect to the polar bear camera. For streaming, they push the video out to a Dell PowerEdge 2950 server running streaming software.

Keeping watch after dark
The Zoo uses AXIS Camera Station software to record on motion detection, and footage is saved for two weeks. Zookeepers often use this footage as a resource to monitor the animals or verify incidents. The cameras also perform well in low-light situations, so zookeepers can check in with their charges at night. “I've been surprised by the zoo's interest in using it more as a monitoring device to remotely observe the animals' behavior,” Schanen said. The zoo also utilizes cameras for security purposes.

Jaguar cubs meet the world
The most popular web channel they opened documented the birth and development of a pair of jaguar cubs. When the feed went live, the cubs were not ready to be put on public view, so the web streams provided a rare behind-the-scenes look at the first months of their lives. Following a news article, the live stream received nearly 100,000 views in a two day period. To deepen the connection with fans, the zoo added a link to an online store with a list of toys and enrichment items for the cubs. The zoo then placed purchased items in the enclosure, so the buyers could see the cubs play with their new gifts.

In the two years since their launch, the streams have become a web hit. The zoo is averaging 24,000 views per month, and they continue to open up new channels on a regular basis.

“We get a lot of feedback with people saying, ‘Thank you for providing the cameras and allowing us to be able to view these animals at home,'” Schanen said.


Paul Smith retail stores upgrade to Milestone IP Video solution

Paul Smith retail stores upgrade to Milestone IP Video solution

Editor / Provider: Milestone System | Updated: 2/26/2014 | Article type: Commercial Markets

Milestone XProtect Corporate open platform IP video management software (VMS) with XProtect Smart Client and network cameras from Axis Communications are being deployed across all of Paul Smith's 45 stores as part of the UK-based retailer's first comprehensive, company-wide IT refresh. Initially the new digital video system is being used for loss prevention but once it is fully implemented worldwide by the end of 2015, Paul Smith plans to use it for business intelligence to assist retail operations management.

Paul Smith is an early adopter of IP and cloud-based services. In 2001 it was the first large UK-based company to migrate to IP telephony, installing a Cisco IPT network. Embracing the latest IT management approaches (including use of open-architected and Microsoft-based systems), the company has been able to maintain a relatively small network services team despite very rapid growth. Paul Smith has a retail presence in 35 countries.

This approach means that when new IT challenges present themselves, Paul Smith's Head of IT, Lee Bingham, looks for standards-based solutions that are capable of scaling quickly and effectively. He specifies that new systems and services must last a minimum of 10 years because he simply does not have the manpower or budget to support continual replacements of devices and software.

Paul Smith's legacy CCTV had grown organically as the group expanded around the world. When the IT department was asked to take over running Paul Smith's video systems, Lee Bingham insisted that it must be moved to IP video and be visible on the corporate network: "If it's not IP then it's not IT, and therefore it made no sense to move it from our Facilities Management team over to the IT department unless the CCTV system was going to be accessible on the network by authorized managers from their desktops."

The company backed the IT department's three-year global migration plan from CCTV-to-IP video surveillance. The installation and networking of the new video platform is being carried out as part of a global IT infrastructure upgrade, along with new retail Point of Sale (POS) and Enterprise Resource Planning (ERP) systems.

Paul Smith's IT department researched the market for robust, scalable IP video hardware and software. After a painstaking evaluation process, they chose Milestone XProtect Corporate video management software and Axis network cameras. Axis video encoders were selected to bring some existing analog CCTV cameras onto the corporate network ahead of the full IT and IP video upgrade.

Lee Bingham said: "The fact that Milestone XProtect is built on an open platform architecture using Microsoft Active Directory makes rapid roll out possible, as well as cost-effective maintenance and support. Selecting Milestone enables us to migrate the whole CCTV estate onto a single platform to establish uniformity and consistency."

"Milestone fits our model perfectly. The open platform allows us to scale and add new services. We can control which managers can see cameras from which stores through our standard IT technologies. We can log in via the Milestone XProtect Smart Client front-end to view live and recorded video from all the cameras anywhere in the world. If there is a problem, we can generally fix it via the network from Nottingham without getting on a plane. This saves management time and reduces our company's carbon footprint.

In the future Bingham expects different managers in specialist areas like Visual Merchandising will want to proactively access the cameras to assess whether agreed store layouts are being observed and working well for customers. There will also be a higher demand for mobile device access to the video which Milestone Mobile can provide.

"Our objective, as the Milestone-based video systems have been rolled out globally, will be to build on this investment by extending its value beyond loss prevention," concludes Bingham. "We plan to work closely with our retail management team to explore the power of the new IP video system - potentially deploying techniques such as facial recognition, heat mapping and dwell-time analytics that enable us to better understand and serve our customers."

Europe's first security consultant to graduate from Axis Certification Program

Europe's first security consultant to graduate from Axis Certification Program

Editor / Provider: Axis Communications | Updated: 10/22/2013 | Article type: Security 50

The newly qualified Axis Certified Professional is based at CornerStone GRG, an independent global and UK-based security consultancy, and becomes the inaugural Axis architect and engineering partner to successfully complete all the rigorous requirements of the Axis Certification Program; the global industry standard to validate IP video expertise.

Commenting on the achievement, Jon Roadnight, director of CornerStone commented: “Axis certification has really helped us to set ourselves apart from our competitors by validating our expertise to prospective clients – not only with Axis cameras – but also with network video in general. It's the global industry standard in the network video world, very much like the Cisco certification of the IT world – a real unique selling point for us.

Axis has been keyed in the continued drive toward the convergence from analogue to digital video surveillance and has recognized that IP technology offers different challenges to consultants and installers in the surveillance and IT industries.

It recognizes that there is a need for professionals with these skills to be able to validate their credentials across the industries, making it easier for specifies to source the right expertise and reassuring end users. It has therefore added the Axis Certified Professional program to its learning academy.

Atul Rajput, regional director, Northern Europe at Axis Communications explained: “In a similar model to Microsoft and Cisco's certified professionals in the IT world, Axis is keen to help individuals and companies prove their competence and skills in network video surveillance and help them validate this advanced level of knowledge.

Data centers: Security without compromise

Data centers: Security without compromise

Editor / Provider: Tevin Wang, a&s International | Updated: 9/19/2013 | Article type: Commercial Markets

Digital information is becoming ubiquitous while connected devices proliferate with ever-faster transmission speeds. These factors continue to influence rising demand for data centers. Cisco forecasts global data center traffic to grow fourfold and reach a total of 6.6 zettabytes annually by 2016 and global cloud traffic to grow sixfold with a 44 percent combined annual growth rate (CAGR), to reach 4.3 zettabytes by 2016. The growth does not stop at data traffic.


According to IDC Research, the size of US data centers will increase significantly, growing from 611.4 million square feet this year to more than 700 million square feet in 2016. Data center security has become one of the highest network priorities. Companies that operate their own data centers will spend an average of US$17 million on security products in 2013, according to Infonetics Research.


Main concerns

The main concerns of a data center are the intentional acquisition of personal or corporate data by unauthorized people, according to Kenneth Mara, President and CEO at World Wide Security. Sabotage, theft, and uncontrolled access to a data center's assets pose the most immediate risks.


Patrick Lim, Director of Sales and Marketing at Ademco Far East (an Ademco Security Group Company) agreed. “The main concern is the amount and variety of people that access the data center. In an Internet Data Center (IDC), there are many different customers, each with their own staffs accessing the data center and racks. To make matters more complex, some of these data centers have their own contractors for equipment and technical support. All these varieties of activities and visitors create massive access control challenges.”


Another primary concern for a data center is the upstream and downstream fiber, which must be protected as well as the protection of the environmental systems which support the data center such as power, backup power, heating and cooling systems, added Jeff Slotnick, CSO at OR3M.


Perimeter security

The primary goals of the outer layer of data center protection, perimeter security, are the three D's: deter, detect, and delay. As an example, a perimeter fence equipped with sensors can serve as the first detection point for intrusion. This perimeter fence detection system can be integrated with intrusion alarms, limited access control points, high-definition video surveillance, and motion-activated security lighting. Security personnel will then be able to pinpoint an intrusion and immediately access the network's security system.


Vehicle and personnel barriers are adopted to prevent physical access to the data center while personnel barriers can be used to prevent unauthorized entry, including tailgating, added Benjamin Butchko, President and CEO at Butchko Security Solutions. For instance, retractable crash barriers can be used at vehicle entry points. In situations when extra security is needed, barriers can be left up by default, and lowered only when someone has permission to pass through.


Besides site-hardening strategies, a perimeter video surveillance system can also be used to detect potential threats and intruders. Cameras can be installed around the perimeter of the data center, at all entrances and exits, and at every access point throughout the building. Motion detection technology, for instance, can trigger alarms, while video content analytics can identify objects left behind to quickly spot potential threats. These technologies make the surveillance system more proactive to detect potential security breaches. Furthermore, video footage should be digitally recorded and stored offsite.


Security inside Data Centers

Although data centers house the data, applications, and access critical to many businesses, the layout of most large data centers is similar. “There is a security/reception area that the user enters to gain access to their system. Upon check-in, they go to the lobby. From there, they go through a sally port to get into the secure common area,” said Emily Flink, Marketing Manager, Biometrics, Ingersoll Rand Security Technologies. “What this means is that, at the end of the lobby, they must be identified as authorized to enter the sally port room. Upon entering it, the door is closed. At the end of the sally port room, there is another identification authorization performed before they can go through that door to the secure common area. At this point, they can go to their own cage or vault, where they will again be identified as authorized before going through.”


If a breach has occurred at the perimeter or from inside, the layer of protection for facility control is created to prevent further access, “Data centers typically have a large number of infrequent users. This is especially true of independent data centers which have large numbers of customer users who only occasionally visit the site. Therefore, the system has to be easy to use but cannot rely on cards which can be easily transferred from person to person,” added Flink.



A solid visitor management system compliments and is a precursor to the physical access control system. “Visitor management includes all workers and visitors being issued badges that have

built in access codes for various doors and areas on each badge. This prevents accidental access to areas,” Mara said. “It is very important to have those working in the facility pass background checks prior to employment.”


Mere access control is not enough. Indoor surveillance for identification and monitoring, as well as multiple ID verification methods are a must. Surveillance deployment and integration with access control can inhibit illicit activities and provide an extra layer of security. An integrated system can rapidly verify tripped alarms, which allows for a speedier response. “Integrated video is a standard demand now for data centers,” Lim said. For example, video surveillance can verify the identity of a person entering an unmanned access control point by capturing video as the person swipes his access card. It can also account for instances of tailgating.


Computer Room and Cabinet Control

While the physical security layering makes unwanted entry from “outside” a data center facility more and more difficult, inner layers are often ignored. “Personnel security programs are generally not robust in private industry for employees or contractors. Gaining data center insider access is a fundamental strategy for industrial espionage attacks,” Butchko said.


The insider threat is huge, especially in areas such as government or corporate espionage. A survey by Cyber-Ark showed some stunning numbers:

*  85 percent of employees admit to knowing that downloading corporate information from their employer is illegal.

*  25 percent of employees say they would take the data anyway, regardless of penalties.

*  41 percent of employees admit to having taken sensitive data with them to a new position.

*  26 percent of employees say they would pass on company information if it proved useful in getting friends or family a job.


Although the insider threat can be the most elusive, security within the inner layers of data centers, such as the computer room and cabinet controls, can help secure the core of data. This starts with people recruiting. “Good internal security starts with hiring the right people. This requires a strong Human Resources program working in conjunction with the Chief Security Officer to insure proper and complete background checks are accomplished on all employees, contractors, and laborers which have access to sensitive areas of the facility. In my opinion, a good upfront background check, in most cases, will prevent a majority of internal breaches,” Slotnick said.


“Another area of consideration when dealing with the internal threat is how the Human Resources Department and the Security Department work together to insure terminations with dignity to prevent workplace violence or a malicious system attack. Part of the process for a quality access control program is to know which employees, contractors, and service personnel are no longer employed so their access permissions can be removed or modified. This includes the return of all access control and identification cards. In my opinion, this is a significant communications gap in most organizations where someone's status has changed and the security personnel have not been informed or kept in the loop.”


Enhanced Security with Multi-Factor Authentication

Inadequate authentication methods lead to sensitive information being compromised. Ultimately, the primary concern of core data center security is access control to the server farms. “The large halls which contain the servers need to be closely monitored to ensure only authorized individuals are permitted entrance and then only at authorized times” Slotnick said. “This requires a

complex system of easy-to-use access control features.”


“At data centers, assured authentication begins by accepting the reality that no one single form of authentication by itself is 100 percent. Even biometrics (including DNA matching) is not perfect,” said Phil Scarfo, VP of Worldwide Sales & Marketing at Lumidigm. “Statistical error rates, however, are substantially reduced when multiple forms of authentication are employed. The use of biometrics as an additional tool or second factor greatly enhances the ability to get closer to 100 percent in the continuum to assured authentication. The reason for selecting biometrics as one of the two factors is clear. Knowing ‘who' is the goal of assured authentication and biometrics is the only form of authentication that is focused on the identification of the individual, not something they have or something they know.”


Lightening Up

Preventing a fire is crucial in a data center. “There should always be a business contingency plan for emergencies. Advanced fire systems, which detect heat and smoke, long before a fire breaks out should be part of a company's fire safety plan. These advanced warning systems can reduce the overall cost of repairs and downtime,” Mara said. “Backup servers off-site at multiple locations will help to protect against a fire which could not only pose a threat to overall operations but also to an operational shut down for periods of time.”


Technological advancements in security devices, such as surveillance cameras, video management and recording platforms, and intelligent access control hardware and software have enhanced the possibility of a totally secure data center. However, successful implementations of a central management system rely not just on subsystem integration, but also on effective communication throughout an organization.


Market dynamics urging differentiation on business models and products

Market dynamics urging differentiation on business models and products

Editor / Provider: a&s Asia | Updated: 9/12/2013 | Article type: Hot Topics

No market is too small. That seems to be the talk of the year amid the reincarnated financial and economic uncertainty. Markets that were once overlooked are now back on some solution providers' plates.

Take enterprise access control specialist Pacom Systems for example; the U.S. and Europe used to be the focuses. This year, the company has hired a Cisco veteran to expand activities in the Southeast Asian region. “The financial sector is our forte, with more than 20,000 reference sites to back our claim,” said Giri Ramamoorthy, Director of Sales and Business Development for Asia. The company's network-centric solution designs are particularly well-suited for multisite enterprises that require centralized yet easy-to-use security management, and the new banks and commercial real estate boom in Southeast Asia, China and India are Ramamoorthy's business development targets.








Home security specialist Chuango Electronic from China, on the other hand, is shifting its ODM approach to focus more on solution design and market expansion in North America and Western/Northern Europe. “We are participating in more consumer electronics shows to show that solutions from China can be different and of great taste,” said Ken Li, CEO.

The same goes for distributors. Viewtech in Malaysia and Facility Management (FM) in Thailand, for example, are both in search for solutions that can do wonders and are better designed and reasonably priced. “Adding smart home and cloud capabilities to our portfolio is a must,” said Alex Ng, MD of Viewtech. Pichai Sihsobhon of FM is also diversifying his distribution-only model and looking to add solutions and services through joint ventures.

At the end of the day, “differentiate to survive” rings true.



IT-centric players on the rise

IT-centric players on the rise

Editor / Provider: Hayden Hsu, | Updated: 2/26/2013 | Article type: Hot Topics

Advances in physical security technologies and system migration to IP networks have ushered in a new breed of IT-savvy distributors and system integrators, while blurring the distinction between the two at the same time. With a more in-depth understanding of network capabilities and software development and deployment, these “new players” are offering more possibilities in terms of solution offerings, applications and business models, which are particularly appreciated in times of uncertainty and slow growth. This feature looks into one such player that is able to bring more to the table — and perhaps something to be modeled after.

An IT systems integrator and managed services provider in Germany and a value-added distributor worldwide, Controlware made physical security part of its portfolio since 1997 when owner Helmut Woerner invested in a German company called VCS. VCS was a developer of IP video products known for Videojet encoders, network cameras and Vidos management system, so this was a natural progression for the company. IT security and communication solutions are still the core of Controlware; the introduction of physical security solutions was more of an extension to the core products and services than a transitional move, since both sit happily side by side.

Adding value to both worlds is the ultimate goal. Controlware is not a “box mover,” but with value-added services and support engineers. The Controlware ethos is about helping integration and installation partners deliver advanced systems that meet customer expectations on all levels. It is all about assisting partners as much as possible and making them look good in the eyes of their customers and end users. Dedication to IP-based security systems and the specialist IP knowledge and experience developed over the course of more than a decade set Controlware apart from the others. It does not have its own branded product range like some distributors, which allows it to be more agile and provide independent, best-of-breed solutions for installers and integrators.

Not only does Controlware provide products from well-known names such as Axis, Bosch, Cisco, Genetec, JVC, Samsung, Sanyo, Siqura and more, but it also adds value with system design and support services. Controlware also has IT specialists for networks, security, IT management, applications, operation and service.

Riding the Wave
Controlware's internal strategies and policies are highly flexible and constantly adapted to meet actual business requirements and conditions. Inventory levels have not had to be altered as a consequence of the recession, since agility in the back end of the business has been a fundamental ingredient for Controlware from Day 1. Continuity and long-term customer loyalty, as well as varied/extensive know-how in information and communication technologies, are crucial to ensure that it has the flexibility to meet challenges head on.

Building long-term relationships with customers and understanding user requirements allow Controlware to identify the products and solutions that are truly needed. This is achieved chiefly through its value-added services that include design and consultancy. By working alongside installers and integrators and adding value and support services, Controlware gains a better understanding of the solutions that users require than traditional distributors and box movers. Controlware also maintains close relationships with suppliers, by understanding what its solution partners' products can do and how they fit into the overall project while meeting customer needs.

Controlware bench tests hardware and software rigorously in order to understand them thoroughly and identify their strengths and weaknesses. This enables the company to identify at what level to position the products and specify the correct product for clients. It often arranges hardware “shootouts” or soak testing in challenging environments to prove or disprove manufacturers' claims. It actively tests and retests equipment in different scenarios to see how equipment performs and what the limitations are.

Ironing out the Kinks
Obviously, adoption differs from region to region. In high-density markets, such as the U.K., which have large amounts of legacy analog equipment, adoption is slower due to equipment churn. In real life, IP-based systems are not for everyone. For very low camera counts, there is still room for cost-effective DVRs or recent HD-SDI products; but for the majority, IP-based systems and the benefits they bring are the way to go. A couple of years ago, one manufacturer claimed that IP surveillance systems are expensive and unreliable compared to analog/hybrid CCTV systems. According to its marketing material, an IP-based system for 750 cameras would cost US$2.9 million, and the hybrid system proposed would only cost $1 million. Controlware put these claims to the test by developing a new system based on the components and products specified in the article. The result was a much more cost-effective IP system than the proposed hybrid system, with a new control room fit-out on top.

That is not to say everything with IP is fine and dandy. Too often, we have manufacturers blaming the bit of kit that does not have that manufacturer's name on it, like the switch for instance; so, we would like to see more interaction between complimentary manufacturers such as switches and servers/storage on one side and camera manufacturers on the other, for approved/certified compatibility. Also, IP-based video surveillance must become more plug-and-play as sometimes manufacturers make products too complex or add too many features, and they think that is the only way to make the products stand out from the crowd. There should be more interaction with other IP devices, as too often security systems drop into silos of their own fields rather than thinking about how they can work together to better alleviate end-user headaches.

Winning Combo
After 2009, the company has seen a few projects put on hold, but continued growth in the physical security sector is still anticipated as the market continues to move to IP-based systems. Positioned with the right business model, the right skills, and the right people and experience, Controlware will continue to incorporate new ways and hardware/software to help installers and integrators take advantage of the benefits of converged technologies.

Revenues are expected to grow in line with the general growth of the IP market share. Users are starting to see the benefits of IP but are not being given clear guidance and direction due to a massive knowledge gap in the industry from some consultants, system integrators and installers. The Controlware IP product line will also be expanded through the additions of IP access control and other IP-enabled technologies, such as ALPR, VCA, intrusion detection and unified management systems, so that it continues to ensure that the needs of its customers and its customers' customers are met.

10 under 40: security unlocks next generation of excellence

10 under 40: security unlocks next generation of excellence

Editor / Provider: a&s International | Updated: 1/24/2013 | Article type: Hot Topics

a&s salutes young leaders in security for our inaugural “10 Leaders Under 40” feature.

Security attracts people from all walks of life. We recognized 10 up-and-coming security professionals under age 40 who are in executive positions, either in manufacturing, distribution or system integration. They were invited to share their experience as well as secrets for success.

Our coverage spans the globe, with an average age of 31.1 years. This list is by no means exhaustive, as there are many qualified young people in the field. The youngest person was 25, while the oldest person turned 40 in February. While most did not study about physical security, at least two start-ups — Fluidmesh Networks and Keeneo — were founded as a result of graduate research. Both companies have since been acquired, while retaining the original leadership.

Physical security may not be a formal academic discipline, but it certainly doesn't hurt to have top marks. The Class of 2012 is dominated by engineering majors, along with finance, business and oceanography. Most were unaware of the security industry before graduation, but this is changing with more internships and college recruitment. As IP blurs the line between IT and security, the industry is ready for new blood.






Andrew Martz, Former COO
Age: 28
Family: Married
Education: High school degree, studied three years at the University of British Columbia
How you got involved in security
I met Avigilon's CEO, Alexander Fernandes, while working at a company he started prior to Avigilon. I put university on hold and joined Avigilon as a developer in 2005. I am responsible for the product development, manufacturing and customer service departments. I stayed in the security industry because I believe in Avigilon's mission and get the opportunity to work with incredibly talented and passionate people in a dynamic, high-growth environment that provides exciting new challenges every day.

Has your age ever been an issue?
Youth brings a fresh perspective. What I have found in my career is that age won't matter if you perform and deliver great results.

Worst business move to date and what you learned from it
There have been small mistakes along the way, but there is no single move I would take back.

Best professional decision
The best decision I ever made was taking a risk to help start Avigilon while I was completing my postsecondary education. It was a big risk but it has been an incredibly rewarding experience.

How you want to be remembered
When Avigilon becomes No. 1, I would be happy if I am remembered for being an important part of making that happen.

Ways to attract more young people into security
The security industry is on an exciting path, which will attract more talent. Young people are drawn to industries where they can work with cutting-edge technology, create change in the world and enjoy the rewards that come along with that.






Evgenia Ostrovskaya, Global Business Development Director
Age: 31
Family: Divorced with a child
Education: Master's degree in mathematics and mechanical science from Moscow State University, studying for a master's degree in business administration at Vienna University
How you got involved in security

Right after university, I was a developer and programmer, then entered ITV. It was spun off as a new company under Murat Altuev, AxxonSoft President. I started in 2003 as quality assurance engineer. Now, I handle global business development, including sales, technical support and presales service.

Has your age ever been an issue?
No. Even if you're young, age isn't an issue in conversations. The experience and the expertise are what really count.

Worst business move to date and what you learned from it
I worked on expanding into a new market for nine months, only for the local partner to walk out. What I learned is before you start a business relationship, you need to understand the partner's mentality, attitude and background. It helped me to be careful in countries where you don't know the native language or traditions.

Best professional decision
The people I hire would be the best decisions I make. Creating a team with transparency and an inspiring atmosphere is the base of the company's success.

How you want to be remembered
As a successful top manager of the world's leading IT company in security management.

Ways to attract more young people into security
As we continue to move toward IP, more young people will be naturally attracted to the security industry. Besides, it's fun to work in the industry of James Bond!






Fluidmesh Networks (CarrickBend)
Cosimo Malesci, VP of Sales and Marketing
Age: 29
Family: Single
Education: Master's degree in ocean engineering from MIT
How you got involved in security

Malesci and his brother Umberto Malesci started the company while studying at MIT in 2004. We were able to create a niche. It was good timing and there was a need for it.

Has your age ever been an issue?
Age was actually one of our strong skills. We're promoting an innovative technology and people expect us to be young and know about it.

Worst business move to date and what you learned from it
One mistake was not dreaming big enough. If I had to do it again, I would have risked it all in the beginning to achieve growth. It's the only way to make the company successful.

Best professional decision
The best thing is to stick your neck out. When we threw wireless into the security industry, people were skeptical. They said the video looked crappy and the network could only support five cameras. Now we have hundreds of cameras and HD. If we had listened to the guys in the first place, we wouldn't have developed these things.

How you want to be remembered
We can be remembered as guys who decided to revolutionize security with wireless for video and voice. We want to be a professional wireless company that makes it reliable and affordable for people.

Ways to attract more young people into security
If you like technology in security, that will bring young people and help speed things up. [NextPage] 







IP Vision (a Hymatom company)
Nicolas Jdanoff, Sales and Marketing Director
Age: 31 Family: Married with a son
Education: Master's degree in international business from Jean Moulin University Lyon 3

How you got involved in security
I entered electronic security in 2004 after graduation and a three-month internship at Sorhea. Sorhea's CEO offered me the position of regional sales manager to cover a third of France's territory. I've been with IP Vision since 2009. I'm based in Morocco and manage a team of four salesmen in the development of our system integrator activity.

Has your age ever been an issue?
Age has never been an issue, once the ice was broken with customers.

Worst business move to date and what you learned from it
I've made mistakes in delivering a quote to a customer, forgetting an item, ordering a noncompliant product on a specific project, but every time I learned a valuable lesson, which evens it up for me.

Best professional decision
The best decision I've ever made was not to compromise myself, my company and my set of values to gain a project, even though pressure was sometimes high.

How you want to be remembered
People who know me can attest I'm a dedicated individual with integrity.

Ways to attract more young people into security
Attracting young talent will be done naturally, as managers reach retirement age and need to be replaced with younger people.






Johnson Controls
Brandon Arcement,Security Products Sales Manager
Age: 30
Family: Married with a daughter and another child due in July
Education: Bachelor's degree in mechanical engineering from the University of Texas at Austin
How you got involved in security

I was originally introduced to the physical security industry while being recruited by Johnson Controls as a college senior. I accepted a sales representative position. After a few years in integrator sales, I transitioned to manufacturing.

Has your age ever been an issue?
I recognize that a young face makes people question experience and credibility. I address lingering questions by dressing conservatively for business. And I establish credibility virtually by phone or WebEx prior to an in-person meeting.

Worst business move to date and what you learned from it
Early in my career, I did not invest in developing my skills, aside from the training that was made mandatory by my supervisor. Now, I always set aside time at the beginning of the year to evaluate my career development path and select activities which will enhance my development as a business professional and leader.

Best professional decision
The best decision I've made professionally has been to grow within Johnson Controls. I've developed relationships that make me a more credible colleague, a more impactful leader and a more valuable asset.

How you want to be remembered
I'd like to be remembered as someone who leads with integrity and a steady focus on the customer.

Ways to attract more young people into security
The best way to attract more talented young people to the security industry is through college and university recruiting programs.






 Digital Barriers
Benoit Georis, France MD, CEO of Keeneo until acquired in 2011
Age: 34
Family: Single
Education: Doctorate in computer vision, Inria (National Institute for Research in Computer Science and Control)

How you got involved in security
When I was a Ph.D. student, I found a good technology that no one had commercialized. I've always been interested in transforming this industry into a modern industry.

Has your age ever been an issue?
It could have been, but I managed to surround myself with a team of older people.

Worst business move to date and what you learned from it
Two years after incorporation, we decided to address the Chinese market. However, we were too young and couldn't support distant customers. Thanks to this experience, we made our software compliant with Chinese characters.

Best professional decision
The best decision was to have sold my company Keeneo. Digital Barriers was the perfect match between a technological company and a strong financial institution.

How you want to be remembered
As the guy who introduced intelligent analytics to the industry. Our main asset was customer service. Simplicity of use is another asset, because there is no setup of parameters.

Ways to attract more young people into security
The most important thing for me is making every effort to attract students for a six-month internship. The second thing is to make security attractive to young people. With super resolution or 360-degree cameras, it's exciting stuff.






Vivek Bagri,CEO
Age: 31
Family: Married
Education: Bachelor's of engineering in computer science, University of Mumbai
How you got involved in security

I founded Livedarshan while I was still in college. Initially the company was just me, and we specialized in webcasting solutions for temples and mosques. After I graduated, I diversified into physical security with a project from the Municipal Corporation of Greater Mumbai. We set up cameras and software to monitor truck movements at Mumbai's dumping grounds.

Has your age ever been an issue?
Yes. My father Prakash Bagri handled relations with senior officials, while I provided technical solutions and service.

Worst business move to date and what you learned from it
My worst business move was when I relied heavily on the success on a single government project. I learned the hard way that one should not invest everything in a single opportunity and should keep working with an open mind on multiple projects.

Best professional decision
The best decision I ever made was to become an entrepreneur, found Livedarshan, and not give up when things were difficult initially.

How you want to be remembered
I want to be remembered as an honest, hardworking person who contributed to the betterment of the security industry.

Ways to attract more young people into security
Education is an important part of any industry and I feel security has a dearth of an organized education programs to train young talented people. Security companies should also have internship programs, where young graduates can get firsthand experience in the industry. [NextPage] 






Mark Hsu, Director of Overseas Sales
Age: 32
Family: Married with a child
Education: Master's degree in business management from California State University-Los Angeles
How you got involved in security
Merit LILIN is a family business. My father is C.C. Hsu, President. I went into R&D and studied management While LILIN is a family business, I wasn't pressured into joining the company. It was a match for my interests.

Has your age ever been an issue?
If you work hard and improve your professional expertise, you will prove yourself.

Worst business move to date and what you learned from it
As I manage overseas branches as the president's representative, I sometimes find an imbalance between what the president wants and what the branch office wants. At first, I noted their concerns but did not truly manage these offices. Now, I will respectfully listen to their opinions. If they say I don't know their market, I will go there to learn.

Best professional decision
The best decision I've made is to shake up LILIN internally.

How you want to be remembered
My dream is for Merit LILIN to be internationally recognized. We're well-known overseas, but we could become even greater. We want our brand to be identified by high-end quality solutions.

Ways to attract more young people into security
The fastest way to attract young talent is for security companies to work with universities. Once you train interns, the best ones will join your company.






Brian Lohse, Cofounder and VP of Business Development Age: 25
Family: Single
Education: Bachelor's degree in economics, Loyola College in Maryland

How you got involved in security
My background is in investment banking. I was approached by Eugene Szatkowski, cofounder and VP of Operations for Secure-I. I took a leap of faith and left banking. It was the best decision I ever made.

Has your age ever been an issue?
In the Mark Zuckerberg generation, new technology is expected to come from young, ambitious talent. Persistence and industry participation have allowed me to succeed despite my age.

Worst business move to date and what you learned from it
Before, I was focused on the technology, product and features. That was a mistake. What I learned was to sell the business model. You have to understand the customer's business.

Best professional decision
The best thing I learned was to trust my employees to do their jobs. When we started, it was just the three of us. Now, we've got a larger team. When they have ownership, they feel good about it.

How you want to be remembered
I would like to be remembered as an innovator and a thought leader.

Ways to attract more young people into security
I think it's a good industry that's not going anywhere and is bound to get much bigger in a short amount of time. The biggest and most successful security companies don't have fancy offices. But people are happy, and the ownership can make good money.






Samir Samhouri, President and CEO
Age: 40
Family: Married with three children
Education: Bachelor's degree in electrical engineering from McGill University and executive education in business administration from the University of Pennsylvania

How you got involved in security
I left a public company in the U.S., after doing a company turnaround from a low valuation to a high valuation. Once you do that, you get interest from companies. One of the companies was Xtralis. I thought it was an amazing company that protected almost every important infrastructure in the world.

Has your age ever been an issue?
My age has not been an issue for me since I became a CEO four years ago. I was promoted to be a GM of multimillion dollar division in Lucent Technologies at 28. I hope to provide such opportunity for young people in my business.

Worst business move to date and wha t you learned from it
The biggest mistake many business leaders made 10 years ago was that we did not prepare for tough economic times. The lesson is to always prepare for the worst and plan for the best.

Best professional decision
Never compromised our core capability. Removed everything else and focused on what differentiates Xtralis. That resulted in much stronger position after the market collapsed and came back a little bit.

How you want to be remembered
My dream and hope is to make Xtralis the Cisco of security. It's not so much I want it to be a multibillion-dollar company, but it's to change how business is done in the safety and security niche.

Ways to attract more young people into security
No industry is too old to grow, as long as you have a niche and differentiation.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 >Next >Last Page