LenelS2 has introduced a range of new features and capabilities within the LenelS2™ Elements™ platform, its native cloud-based access control solution. Additionally, as part of its commitment to providing exceptional customer experience, LenelS2 is offering new, cost-effective ways to transition to its Elements cloud-based solution. LenelS2 is a part of Carrier Global Corporation (NYSE: CARR), global leader in intelligent climate and energy solutions.
HID has achieved SOC 2 Type 2 certification for its HID Origo Mobile Identities solution, demonstrating the company’s ability to maintain a highly secure, cloud-based physical access environment. HID Origo Mobile Identities is a cloud-based platform that enables technology partners to build integrated access control solutions.
LenelS2 will showcase new and upcoming product and service innovations, with a focus on cloud-based solutions, at the annual International Security Conference & Exposition (ISC West 2023), in Las Vegas on March 28 – 31. LenelS2 is a part of Carrier Global Corporation (NYSE: CARR), the leading global provider of healthy, safe, sustainable and intelligent building and cold chain solutions.
ProdataKey announced an update to its PDK Cloud Node software that introduces two new features: Credential Self-Help and Controller Continuity. Credential Self-Help will be available to all PDK users who rely on mobile credentials, and Controller Continuity for all sites using PDK Red controllers. Mobile credentials are unique to each smartphone and cannot be shared across multiple devices.
The public preview of Microsoft’s Florence foundation model, trained with billions of text-image pairs and integrated as cost-effective, production-ready computer vision services in Azure Cognitive Service for Vision. The improved Vision Services enables developers to create cutting-edge, market-ready, responsible computer vision applications across various industries.
Portnox announced the general availability of the first cloud-native IoT security solution to help mid-market and enterprise businesses address rising Internet of Things (IoT) security threats. Now available via the Portnox Cloud, Portnox’s new IoT fingerprinting and profiling capabilities empower organizations to easily and accurately identify, authenticate, authorize, and segment IoT devices across their network to ensure an effective zero trust security posture.
WatchGuard Technologies announced four new endpoint security modules in WatchGuard Cloud including WatchGuard Patch Management, WatchGuard Full Encryption, WatchGuard Advanced Reporting Tool (ART), and WatchGuard Data Control. This integration further strengthens WatchGuard’s Unified Security Platform™ and gives solution providers and customers centralized access to all WatchGuard endpoint solutions, with the ability to layer on additional security services such as network security, MFA, and secure Wi-Fi.
Videoloft is bolstering its presence in the United States by hiring new U.S. based sales staff and integrating with established brands in the US market, including Digital Watchdog, exacqVision, Vivotek and Lorex. Videoloft focuses on transforming traditional professional surveillance systems into cloud connected solutions via the Videoloft Cloud Adapter. The company was born from the innovative technology created for the Manything app in 2012, which turned old smartphones and tablets into ad-hoc DIY home-monitoring cloud cameras.
Siemplify announced Siemplify Cloud, the industry’s first cloud-native security operations platform. Reimagined for cloud delivery, Siemplify Cloud enables end-users and MSSPs to hit the ground running and derive value from SOAR faster than ever before, removing much of the complexity involved in deploying, maintaining, and operating a SOAR platform. Built using cloud-native technologies, Siemplify Cloud also makes it easier than ever to secure hybrid and multi-cloud environments.
Aren’t these the same? No, but they are related. Innovation is taking an existing product or concept and building something new and different that meets a customer’s need, whether they knew they had the need or not. Disruption completely changes how a product or service’s value chain is consumed and displaces an existing market. Clayton Christensen has put a lot of thought and research into the concept of how true disruption occurs.
Access control and the overall physical security market continue to grow at a rapid pace with no signs of slowing down. Market research expects the access control industry to grow to over $10B by 2022 which is about 9% CAGR. So, what’s driving this growth? There are several trends and disruptive technologies that are driving acceleration in a category that has traditionally been slower to migrate.
Arcules will host an Open House at the company’s headquarters in Irvine, Calif., to provide security and IT leaders, and resellers with the opportunity to learn more about the company. Attendees will have the chance to explore the Arcules cloud-based video service offering, gain insight into its ideas for future technological developments, and meet with key members of the leadership and sales teams.
Johnson Controls has announced that it has acquired Smartvue, a leading IoT and video provider which empowers cloud video surveillance and IoT video services. The addition of the Smartvue cloud-based video platform will enhance Johnson Controls’ offering of an end-to-end, smart cloud based solution that can provide superior business data and intelligence to customers and added value to partners.
The world of physical security has undergone seismic changes in the last 10 years in video, analytics, and the utilization of security technologies for business intelligence. Technology that once was considered science fiction has now become a reality. In the education market, these technologies have come at a very opportune time with constrained budgets, administrative staff reductions, and tragic incidents requiring lockdowns and video observations reaching an all-time high. One of the greatest advancements that has come to market during this time has been cloud-based access control.
Temperatures here in Montreal have once again settled into the low negative 30s. Rather than complain, we embrace the cold and head outside. And this year, it’s with the added benefit of getting ready for the 2018 Winter Olympics in Pyeongchang, South Korea. To be fair, we are not all Olympic athletes able to compete in bobsledding, skeleton, or moguls. But we do feel like winter sports are an essential part of our everyday lives. We feel personally connected with the event, and, for me, this extends to issues of security. A few years ago, I had the opportunity to talk with Juliette Kayyem, a professor who teaches on homeland security at the John F. Kennedy School of Government at Harvard University. At the time, she said something that has stayed with me ever since: “If you want to have a perfectly safe Super Bowl, don’t have a Super Bowl.”
One of the major challenges that comes with cloud computing, especially for security professionals, is protecting sensitive data that’s stored in the cloud. Consideration also has to be given to various regulatory compliance requirements that have to be met. The most common way to secure this data is via encryption, but the question arises as to who should be responsible for maintaining the encryption keys. With SaaS solutions, it can be difficult to separate encryption key management from the provider, so it’s up to each customer to explore available options. One of the main challenges is to implement encryption that doesn’t hamper user experience or performance. This, coupled with encryption key management, makes the situation very complex.
More companies are moving towards cloud technologies for lower costs, faster time to market, and increased employee productivity. However, the vulnerability of common cloud servers creates many new security challenges, the full impact of which we are just starting to determine. Spohn Security Solutions offers advice on catching vulnerabilities and proofing your company against cloud attacks.
Galaxy Control Systems, a leading provider of integrated access control and security solutions, is featuring its recently launched Cloud Concierge Access Control solution this week at their booth (#2241) at ASIS 2017. Galaxy Cloud Concierge is a complete turnkey, cloud-based, fully hosted and managed access control and monitoring solution that includes professional 24/7 management and supports industry standard access technologies. Available in three configurations, Cloud Concierge provides users and integrators alike with unrivaled versatility and efficiency.
S2 Security, the leading developer of complete enterprise security solutions, announced S2 Cumulus. This new cloud-based service is a major step in connecting the S2 ecosystem, enabling administration and monitoring of S2 products as well as critical communication between people, devices, and third-party systems. S2 Cumulus currently supports S2 NetBox series access control and event monitoring systems, S2 NetVR series video management systems and the S2 Magic Monitor unified client.
Eagle Eye Networks, Inc., today announced that it has launched its first phase of video analytics, which includes line crossing, intrusion detection, and object counting within the Eagle Eye Cloud Security Camera VMS. This is the first analytics-based release, empowering customers to easily and instantly activate analytics on their cameras without having to install additional hardware or software. No on-site technicians or system upgrades are needed.