AxisInnovates January 2021

Page 1

#AxisInnovates The latest news & views from Axis in the UK, Ireland and Nordics

Issue 14

Technology trends 2021 Page 4 AXIS Camera Station Secure Entry – an Axis unified solution Page 6

1


Contents Editorial 3 Technology trends 2021 4 Unified solutions 6 Access control 8 Artificial intelligence 10 Open platforms 12 Network audio 14 Retail 16 CNI 18 Smart cities 20 Smart buildings 22 Cybersecurity 24 Customer stories 26 Partner solutions 28 Wearables 32 Highlights 33 Partner survey 34 Online channels 35

Editor Kristina Tullberg kristina.tullberg@axis.com Tel: +46 46 272 1800

Axis Northern Europe

Helsinki

UK office Axis Communications Ltd. 1 Capability Green Luton, Bedfordshire LU1 3LU, UK Phone: +44 (0)1582 283 760 Nordic office Axis Communications Gränden 1 223 69 Lund Phone: +46 (46) 272 1800 Sales: +46 (46) 272 2050 2

Oslo

Stockholm

Gothenburg HQ Lund

Dublin

Luton


EDITORIAL

Innovating to meet the challenges of today and tomorrow Linn Storäng, Axis’ newly appointed regional director for Northern Europe, looks to a year ahead that presents challenges, but also many exciting opportunities. After spending time settling into my new role as regional director, it’s clear that despite the unprecedented disruption, change and many obstacles that COVID-19 has presented, Axis has been able to effectively respond and adapt. Interwoven in the fabric of our company culture is a deep-seated resolve to innovate for a smarter, safer world, developing solutions to meet the needs of customers, and forging ever stronger relationships with our partners. It has also been a time of change internally at Axis, as we see Atul Rajput, the incumbent regional director, move to a new role in Axis’ EMEA management team. With many years behind him in the role as director for Axis Northern Europe sales organisation, his achievements are numerous. Of note, however, is Atul’s contribution to instilling the Axis brand with a purpose beyond profit. Atul was instrumental in developing sustainable operations in accordance with the UN Global Compact, of which Axis is a signatory. In addition, Atul helped to drive the agenda for greater awareness of cybersecurity in the physical security industry, achieving certifications and accreditations to demonstrate to customers and stakeholders that Axis products meet the minimum requirements. We thank Atul for his incredible work and wish him well in his new role. Building on Atul’s great achievements is something that I am very much looking forward to, and I am proud to be working alongside such a dynamic, focused and hard-working team. My own background is in sales, having spent the last 10 years working within the construction business, first at Sandvik where I managed a team of 45 people and then at NCC managing a much larger organisation of over 350. While I am a strategic thinker, I also like to be involved directly in the business and operations side too, and eagerly anticipate working closely with all of you, and when the COVID-19 situation permits, meeting with as many valuable Axis customers and partners as possible .

Working smarter in challenging times Technology has proven time and again that it has the potential to help solve some of the world’s biggest problems, and I feel fortunate to be working in a company that has the power to make change happen. Our recent online events brought together organisations such as Gatwick Airport, Thames Water, IBM and Adidas to discuss their own challenges; we witnessed the positive impact of technology, and particularly the many benefits of smart security solutions across industries and sectors. It is our unique position as the global industry leader in network video that allows us to really make a difference. Our focus on the Smart and Safe City agenda has encouraged the bringing together of teams and technologies to work towards a common societal goal; the health, welfare and security of citizens. Similarly, through helping the retail industry improve store operations and monitor occupancy numbers, retail professionals have been able to continue to provide essential services. Frictionless access control, removing the need to unnecessarily touch shared services, illustrates an innovative use of technology that has unlocked many benefits for businesses in the current climate. Collaborating to develop innovative solutions Through forging and maintaining strong partner relationships, Axis has been able to collaborate across open platforms to create customisable, scalable solutions to better meet customer requirements. Our trusted partners are a key component in our ongoing success. Drawing on their expertise has enabled us to develop connected solutions that are more powerful and more dynamic than would have otherwise been the case. Through innovation in technology there are some very exciting possibilities yet to be discovered.

With many new products coming to market and the capacity to provide our customers with a complete solution, our end-to-end offering allows Axis to confidently cover a range of security requirements, from perimeter protection, IP audio, access control and analytics. With the launch of AXIS Secure Entry we will see the integration of access control devices with Axis software for better control of access points in relation to an overarching security provision. Body worn cameras, another recent development, allow security personnel freedom of movement while capturing real-time video, forming part of a comprehensive solution for high levels of protection. We hope that you enjoy the latest issue of Axis Innovates where we will cover many of these topics in more depth. Above all, Axis Communications is a name that inspires trust. We’re recognised as a highly reputable organisation that values ethical practices and sustainable methods; we understand markets and their related challenges; and we utilize our ability to shape technology for the greater good. While it’s an uncertain time, it is also an exciting time. Each one of us has an important part to play in our ongoing drive to innovate for a smarter, safer world.

3


The 6 technology trends affecting the security sector in 2021 By Johan Paulsson, CTO, Axis Communications It’s useful when looking forward to first look backward: hindsight has a wonderful way of providing context for futuregazing activity. And when looking back over the past year, one insight could understandably be that attempting to predict the future is a futile activity!

Technological advancement continues, however, and as we have seen in recent years, rather than heralding the emergence of completely new technologies, the trends we see for 2021 are shaped by how and why technologies are used, and the associated implications.

While the COVID-19 pandemic had taken hold in Asia before the end of 2019, few would have predicted the enormous impact it would have across the world throughout 2020. Within a short space of time, our way of life, working practices and business operations were upended. Travel restrictions, social distancing rules, increased hygiene requirements and the pressure placed on health services all affected our business and the security sector.

Trust remains at the top of the agenda We’ve mentioned trust in previous trend posts, and it’s become even more critical. There are many factors which contribute to maintaining trust, and the technology sector is under more scrutiny now than ever before. Customers and end users are demanding transparency around how tech is used and how data is managed, especially with increased surveillance. This, together with the need to maintain privacy, will be a key challenge.

In dealing with the impact on our own business and workforce – with employee health and safety at the forefront – we also saw new use cases emerge for our technology and solutions, in addition to new ways of working, that will continue into 2021 and beyond.

4

Renewed discussions around trust will directly impact how organizations in all sectors actively demonstrate why they are trustworthy. Due to its nature, the security sector will be under even more pressure to double down on its efforts in this area.

The world goes horizontal Recent years have seen applications and services largely designed for specific environments, whether server-based, in the cloud or at the edge. Driven by a desire to achieve optimal performance, scalability, and flexibility, along with the benefits of accessing and using data at any time and from anywhere, the next year will see momentum towards horizontal integration between environments. Increasingly intelligent applications and services will be deployed across all three instances – server, cloud and edge – employing the best capabilities of each, improving solution performance and efficiency. For example, edge analytics in a surveillance camera will potentially message an operator with an alert, the operator then accessing the live video feed through a cloud-based application to verify and respond.


TECHNOLOGY TRENDS 2021

This shift to a ‘horizontal’ approach will increase the speed and accuracy of security and surveillance – moving from reactive to proactive, manual to automated – while also reducing bandwidth, energy and cost.

Cybersecurity: the continual trend Such horizontal integration will only increase the focus on robust cybersecurity – a chain, after all, is only as strong as its weakest link – and the constant evolution of the threat landscape cements its relevance year after year. Due to the potential for high financial returns and disruption of critical infrastructure, new capabilities, tactics and threats will continue to emerge and require constant vigilance. AI will be employed by cybercriminals as much as in any sector, strengthening their ability to find and exploit vulnerabilities. Deep fakes will become even more sophisticated and realistic, potentially calling into doubt video surveillance evidence. As a result further developments in methods to verify content, devices and applications in order to maintain trust in their authenticity will be required. Advancements in cybercrime will also extend to tried-and-true methods such as phishing lures which will become more difficult to spot. As a result, employees will be even more susceptible to these types of attacks and constant education and reminders of best practice in cybersecurity will, as ever, be needed. Traditionally, cybersecurity has been based on a ‘perimeter’ model, where the network is protected by a single, hopefully impenetrable wall made up of firewalls, VPNs/VLANs, airgaps, software-defined networks and other technologies. But this model is challenged, and a single breach can result in the entire network being compromised.

The move to zero trust networks will therefore accelerate, where the security profile for each device and application is independently evaluated. Trust will be delivered through device-to-device and/or application-to-application communication through signed firmware, software updates, secure boot, encrypted data/video, and secure identity. It may seem like an indictment of the age we live in, but the only way to trust the security of anything is to trust nothing! The reality of AI: developing the good, addressing the bad and anticipating the ugly We’ve been talking about AI for so long that some might question its validity as a trend. But with Machine Learning (ML) and Deep Learning (DL) now broadly available in surveillance technology, the implications of its use will be a factor in 2021. We now have concrete examples of various use cases for AI in surveillance, but as we have seen in other sectors (e.g. autonomous vehicle crashes) the positive impact of AI can be outweighed by the attention given to specific failures. Narratives tend to focus on the errors of automation, and this will no doubt also be the case in the surveillance sector. However, this shouldn’t act as a deterrent and we must not lose sight on the positive potential use cases of Machine Learning and Deep Learning in surveillance. For example, using these capabilities in edge devices can assist in identifying objects and reducing false positives. As a result, security experts can move to a proactive, event-based way of working, rather than continuous manual monitoring. Low- and no-contact technologies come to the fore Regulations, rules and consumer habits established during this year will become commonplace in 2021. Technology will support in how these are monitored and enforced, driven by hygiene concerns and social distancing. As a result, the implementation of low- or no-contact technologies, especially in areas such as access control, will increase. In addition, surveillance solutions with peoplecounting capabilities will become the norm, to ensure adherence to social distancing regulations.

Sustainability reimagined One concern during the pandemic has been that the focus on the environment and sustainability has been reduced. Several major environmental incidents have brought these discussions to the forefront, and it is expected that in 2021 sustainability regains its position as a primary area of concern. The materials used in products and their length of life remain two of the most impactful areas upon which the surveillance sector can drive environmental benefits. While significant steps have been made in reducing the use of plastics and PVC in products, and in increasing the level that recycled and recyclable materials are used, more progress can be made. Alongside the materials used in products, how long they last will be a critical decision-making factor for customers. Far better for the environment – and economy – to specify a high-quality product with a lengthy anticipated lifetime, than one which requires replacement after a few short years. The only constant is change It’s clear that predictions must be taken with a grain of salt, and the events of 2020 singlehandedly demonstrated the risks of trying to accurately predict upcoming events. However, the trends outlined above are, we believe, broad enough to apply even in the context of a turbulent environment. What will continue to be true is that periods of uncertainty underscore the need for agility and an open approach to problemsolving, whatever the future holds. For more blog posts visit: www.axis.com/blog/ secure-insights/

5


UNIFIED SOLUTIONS

Pet

er C rie ur Jo h n A lle n

Enhancing security through unified video surveillance and access control Introducing AXIS Camera Station Secure Entry to meet growing requirements for video surveillance and access control in one unified solution. By Peter Currie and John Allen, Axis Communications, Northern Europe The physical security of premises, assets and people is of vital importance. Network video cameras are a key part of any modern security provision, with advances in edge processing and analytical capabilities resulting in a solution that can not only improve security but also drive business optimisation. Access control continues to evolve too, with the COVID-19 pandemic presenting new challenges and making it more important than ever to be able to monitor and control exactly who is entering or leaving a building or site. The move to a more frictionless, touch-free mode of operation has enabled a safer customer experience which avoids the touching of shared services, but still maintains high levels of security.

6

The combination of video surveillance and access control has proven to

be a winning formula, providing comprehensive cover for businesses of all sizes across many industries and sectors. While individual security solutions offer high levels of protection, it is the ability to manage them effectively which unlocks real efficiencies and multiple benefits for an organisation. Businesses should not need to compromise on any aspect of security, so implementing an effective solution that will allow full management of their entire system brings complete peace of mind.

The advantages of a unified approach When considering a security solution that will enable today’s businesses to face their challenges, AXIS Camera Station Secure Entry allows for a unified system, in which the whole is certainly greater than the sum of its parts. It’s important for every business to have access to the highest quality video surveillance technology, combined with the best software for monitoring and management.

In response to customer feedback, Axis has launched AXIS Camera Station Secure Entry. This latest edition to the management software unites video surveillance and access control, two of the most critical areas of security, into a unified solution which unlocks additional value.

While individual technologies can deliver related benefits that can be combined when they are integrated, this can be cumbersome, often involving multiple vendors with the logistical and financial headaches that accompany such an approach.


Axis’ unified method, using a single platform, offers an easy to use interface with benefits of security, operational efficiency and cost effectiveness. Providing such comprehensive end-toend solutions built on open platforms not only encourages greater partner collaboration, but also ensures that every element is validated to work together, operating in accordance with the highest principles of cybersecurity. Securing entrance and exit points Axis constantly strives to meet new customer demand, enlarging its IP product portfolio to include audio, radar technology and body worn cameras; all important components in an overarching, comprehensive security solution for protecting premises, assets and people. Axis video management software serves as the hub to control and effectively manage multiple devices, and as it continues to evolve, will increasingly become the command centre through which multiple Axis solutions, together with those from trusted partners, can be unified for an overarching and comprehensive security provision. With three-fold benefits around the live monitoring of access points, assistance in allowing access and post-incident investigation, AXIS Camera Station Secure Entry offers a range of options to suit all businesses and sectors, allowing coverage of small or large numbers of entrance and exit points. The management of cardholders and groups is straightforward, as is the simple creation of access rules, such as schedules, locations and credentials. Beyond this, the system includes door and zone configurations, multi-factor authentication and customisable card formats. Old style cards are now substituted for PVC-free alternatives, in line with the Axis commitment to greener and more sustainable methods and practices. Video verification and incident response Verification using video surveillance allows operators to check that any individual attempting to enter premises matches the credentials held on the system. In addition, for less busy entrances or out of normal working hours, it’s possible to trigger video recording and the playing of pre-recorded

audio alerts and alarms. These can be activated in response to specific predetermined events, such as the length of time that a door is open. In addition, the solution makes it simple to add new users, or remove those who are no longer authorised for access, with a dedicated dashboard allowing users to confirm lock status and assist entry by permitting an operator to control doors. Access points to buildings can, unfortunately, become flash points for incidents. Whether it’s someone attempting a forced entry or an employee becoming frustrated with credentials not working or being rejected, the video recording of access points is valuable in investigating incidents after they have taken place. AXIS Camera Station Secure Entry allows operators to search, find and review video of anyone entering a building, or being denied access; the combination of video and access control logs making it straightforward to investigate an incident, with functionality for simply and quickly packing and exporting video data for the attention of relevant authorities. A comprehensive end-to-end security solution An entire end-to-end solution comprising of many security technologies can be effectively monitored and configured to work together through a single vendorsupported system. Such a solution can support the growth of a company’s security provision as both the business and the technology grow. A trusted partnership with a single provider increases reliability, as the entire system can be treated as one dedicated solution, unified and customised to meet a customer’s needs. AXIS Camera Station is constantly growing to support changing business and security requirements, while simultaneously evolving to meet the next generation of threats and cybersecurity regulations. It is a powerful package that provides high levels of security to protect and support modern organisations across many industries and sectors. A truly unified approach is now central to Axis’ vision of innovating for a smarter, safer world.

UNIFIED SOLUTIONS About AXIS Camera Station Secure Entry This out-of-the-box ready solution is included as standard in AXIS Camera Station video management software whether pre-loaded onto Axis network video recorders (AXIS S11 and AXIS S22) or as a software only install. There is no activation fee and the licensing model takes the simple format of one license per device. Full installation also requires AXIS A1601 Network Door Controller with connected card readers. AXIS Camera Station Secure Entry is optimized for up to 128 doors and up to 10,000 cardholders with support for multiple credentials. The user-friendly web-based interface makes it simple to add or remove users with easy drag and drop operation, and to set up users based on specific criteria such as user location and schedule, so operators can easily control who has access to which access points and at what time. By synchronizing all databases with AXIS A1601 Network Door Controller, all access control decisions are made locally on the edge. The solution is designed with cybersecurity in mind and provides encrypted communication to ensure data is protected. Finally, support for Uninterruptible Power Supply (UPS) provides additional peace of mind, guaranteeing continuous service even during a power failure.

Test the Beta version of AXIS Camera Station Secure Entry with a free trial: www.axis.com/products/axiscamera-station/free-download Read more about AXIS Camera Station: www.axis.com/products/ axis-camera-station/

7


ACCESS CONTROL

Which access control management software is right for you? AXIS Camera Station Secure Entry and AXIS Entry Manager are two end-to-end access control management software options ready to meet your needs. But which one should you choose? Let’s compare.

System size

What is it?

Optimized for 10 doorsU

AXIS Entry Manager

AXIS Camera Station Secure Entry

A standalone access control system with basic integration to video management systems, including AXIS Camera Station.

in one software, an all-in-one solution.

p to 128 doors per server

400 cardholders

10,000 cardholders

Maximum credentials per cardholder: 1 credential

AXIS Entry Manager is pre-loaded on AXIS A1001 Network Door Controller. No separate server needed.

Included in AXIS Camera Station stand-alone licenses. Pre-loaded on AXIS S11 and AXIS S22 Network Video Recorders.

5 credentials

Access control features AXIS Entry Manager

AXIS Camera Station Secure Entry Alarm management

AXIS A1001 Network Door Controller AXIS Entry Manager is included for free on controller.

AXIS A1601 Network Door Controller Requires one AXIS Camera Station license per controller.

Yes, limited

Yes

No

Yes

Graphical maps Yes

No

Who’s it for?

Zone management Yes

No

First person in No

For small size system only Limited scalability and functionality.

For larger systems Good scalability and advanced features.

Yes

Lockdown No

Yes

Duress PIN

Learn more: www.axis.com/products/access-control

8

No

Yes


ACCESS CONTROL

The digitization and cybersecurity of physical access control Critical considerations to create a cyber hygiene profile.

Suppliers 1

Products and systems

Check registrations and certifications

Review appropriate registrations and certifications: e.g. ISO9000. Determine if the supplier’s products have been designed for use on a corporate network.

2

3

Audit your provider

Conduct an audit and check terms of business to make sure they are clear. Consider what would happen if the business ran into trouble.

5

Define future business needs

Focus on your needs for the future. You should feel confident that your supplier will meet or exceed your expectations, with maintenance agreements and ongoing support.

6

2

3

Secure connected devices

Be confident that your network-connected physical security system is secure. Systems should be deployed with cybersecurity in mind.

4

Request a statement of design security

Your supplier should provide a statement of design security as proof of the cyber secure status for any network connected devices.

5

Assess the intelligence of the system

Connected devices that are intelligent are those that are networked with a MAC address. Those without a MAC address are not intelligent.

Seek verification of ethical practices

Check for evidence of ethical and sustainable practices e.g. a CSR program. A partnership built on trust is a powerful foundation.

Check the maintenance contract

Verify what is included as part of a contract, such as whether the service and maintenance contract includes manufacturer software updates and firmware upgrades.

Determine resources for ongoing support

Verify that your provider has the resources and is of a size, reach and capability to support your business moving forward as it grows.

Exercise due diligence

Carry out technical due diligence on the system to make sure that it delivers value with no underlying questions. Ensure that information on risk assessment and mitigation is clear.

Look for evidence of best practice

Ensure the provider can demonstrate cyber security best practice. They should offer a cyber hardening guide to help secure the network.

4

1

6

Evaluate GDPR / DPA

Ensure that products and systems support the ability to comply with GDPR (2018) and the updated Data Protection Act (1998).

Download the whitepaper to unlock the full potential of access control and create a smarter, safer world: www.axis-communications.com/axis-whitepaper-2020

9


ARTIFICIAL INTELLIGENCE

Artificial intelligence in the surveillance sector By Mats Thulin, Director Core Technologies, Axis Communications If you’re a bit tired of hearing about the potential for artificial intelligence (AI) in our lives and work, you are not alone! AI have been one of the buzzwords of the past few years, and like all buzzwords its overuse and misunderstanding can lead people to be skeptical about its potential. While that’s understandable, we shouldn’t let this prevent us from recognizing some of the real potential of AI in specific applications within video analytics based on machine learning (ML) and deep learning (DL). Defining AI, ML and DL in surveillance Artificial intelligence is a branch of computer science that studies and develops methods that allow computers to simulate intelligent behavior. In general terms AI is a very broad concept, but in the specific context of video analytics the principal focus is to increase operational efficiency and add value by automatically processing and analyzing video streams.

10

In this context a subcategory of AI, machine learning, is more specifically relevant. As its name suggests, machine learning allows computers to improve algorithms through ‘learning’ based on real-world examples. The improved algorithms are then used to analyze images or video sequences to generate alarms, metadata or other information. More recently, attention has turned to a subcategory of ML, deep learning, which describes algorithms based on simulated neural networks. The idea for this type of algorithm was inspired by the human vision system, hence its name – neural networks. In DL networks, layers of operations are arranged in a hierarchy of complex and abstract layers, each layer using information from the previous one to draw its final conclusion. DL models enable more complex analytical algorithms and generally achieve greater precision than traditional ones. In video surveillance systems they

are used primarily in the detection, classification and recognition of different types of objects. However, one drawback of DL algorithms is that they require more computational power and more mathematical operations in comparison to traditional algorithms. Deep learning’s demand for lots of data ML and DL requires relevant huge amounts of input data for training to achieve good quality results. If enough relevant data – and computing power – is available for training, ML- and DL-based methods can efficiently process it to achieve algorithms with higher precision. The computer can analyze thousands of images to find details that characterize specific objects in different scenarios. If the data and their descriptions are of high quality, therefore, an application based on DL is able to achieve even greater accuracy. But availability of highquality data can be a challenge.


ARTIFICIAL INTELLIGENCE

Perhaps countering the general perception of AI, today’s technologies still lack awareness or what might be referred to as general intelligence. In applications where the technology is used, it focuses on very specific problems in limited areas. For example, for a voice application such as Siri or Alexa to accurately answer our questions, we need to ask very specific and explicit questions. Otherwise, we will get a completely incomprehensible answer. Similarly, in surveillance systems: a poor description of images used for training will result in applications with low accuracy. Given the current limitations in accuracy of these technologies, and that properly and contextually understanding a scene in real detail from a video is still far away, we must be cautious on how and where to use these technologies. The technology today improves efficiency but the actual decision making in a surveillance scenario must still lie with the security guard or the operator. We must keep a ‘human in the loop’. Keeping the surveillance use case in mind As any new technology matures beyond the initial ‘hype’, weaknesses and limitations of the technology will become clear and only in the areas where the technology it provides real value we will see growth. In surveillance it is important to start with the use-case: what problem are you trying to solve, or which effect are you looking to achieve? Based on a good understanding of the specific usecase it is much more feasible to apply ML and DL to achieve a good result. While we are still at the beginning of the AI journey in surveillance, there are applications and use-cases in which DL analytics is already providing real value for organizations, for instance when browsing large amounts of recorded material in search of specific objects or events, what we often refer to as forensic search. Analytics applications and the use of DL analytics surveillance systems will increase, but a cautious approach is needed. Truly understanding the usecases, the limitations of the technology and thorough testing and evaluation to make sure the intended result is achieved is crucial.

High-quality surveillance images as the foundation Fundamental to the ability to analyze video is camera and image quality, or what is known as ‘image usability’: the image quality directly reflects in the quality of the video analytics accuracy. Video cameras in surveillance systems need to operate around the clock, 365 days a year, deal with temperature fluctuations and different lighting conditions, while still analyzing the image correctly in real-time. One industry trend is that more advanced video analytics are moving to edge devices, with applications running on the cameras themselves. There are a number of benefits in this: for instance, saving bandwidth – as only the extracted data needs to be transferred from the camera – addressing privacy concerns, saving on expensive server-side hardware and more accurate analytics, as the video is analyzed before the video is compressed with the risk of quality degradation. Intelligent analytics on the edge will open up numerous opportunities for applications that will further enhance safety and security and deliver additional benefits in operational efficiency. Patience is a virtue Those familiar with the Gartner Technology Hype Cycle will know that after initial excitement about innovations in technology, there is an almost inevitable period of frustration when it appears not to be meeting expectations. But rest assured, many people are working behind the scenes to ensure that artificial intelligence – and more specifically machine learning and deep learning – over time will deliver on their potential. Reference: www.gartner.com/ en/research/methodologies/ gartner-hype-cycle

11


OPEN PLATFORMS

The future of physical security: analytics, the edge and integrated applications By Bjรถrn Callenfors, Axis Communications, Northern Europe Physical security has come a long way since its humble beginnings of standalone CCTV systems and manually operated access points. Cloud connectivity, the internet of things (IoT) and advancements in the technology itself have transformed physical security into a smart, interconnected system of cameras and sensors. Such systems are now capable of processing data through an analytics engine to produce powerful insights, serving to inform security and operational decision making across many industries and sectors. Technological advancements to benefit industry Analytics has many possibilities, some already established and some which have risen to prominence in answer to some of the challenges as a result of the COVID-19 pandemic. The ability to set and monitor occupancy thresholds has proven invaluable in the retail

12

environment as stores re-opened their doors and shop managers needed a way to safely and accurately calculate customer numbers. In hospitals, mask detection algorithms monitor network video feeds to make sure masks are being worn at all times. Across the public transport industry, analytics can be used to track passenger movement through busy stations and onto their mode of transport, triggering alerts or announcements in response to certain behaviours. These might include a display of aggression, or the breaching of social distancing or face covering guidelines that could impact others negatively in the current climate. Edge computing makes many new applications of security technology possible. Devices such as network cameras have become increasingly capable of processing and analysing

video at the edge. Onboard processing power has huge benefits in relation to the recording and analysis of video in real time and availability of related data. The ability to export and package video surveillance data in the event of an incident, without the potential time lag and energy drain associated with the sending of data back and forward to a server, results in an efficient, cost effective and faster means of video capture, analysis and delivery. The power of open platforms In a highly competitive market, those established providers who have realised the benefits of collaboration over a siloed approach are advocating open platforms. An open approach facilitates the sharing of best practices and collaboration over hardware and software.


OPEN PLATFORMS

In short, this method enables vendors to come together to deliver a customised best-of-breed solution to meet a customer’s exact requirements. This can be more powerful than anything that one provider could produce in isolation. Through collaboration and the sharing of ideas, innovation is possible. Much of the current thinking on artificial intelligence (AI) and deep learning in regard to the processing of video and proliferation of powerful analytics comes as a result of knowledge sharing between leaders in these fields. Today’s fluid, dynamic systems can make use of distributed intelligence for maximum levels of security and efficiency, allowing a non-rigid approach to processing power and a combination of server, cloud and edge capabilities. Technology doesn’t stand still, and this approach allows developers to make use of a blend of all of these methods of data processing. AI debunked and the future of analytics It is important that vendors and end customers do not get caught up in the hype around what analytics will deliver as AI capabilities mature. In order to

appeal to a wider market, it’s tempting for vendors to exaggerate the capabilities of their solutions, presenting what is effectively an ‘artist’s impression’ in order to propose a package that seemingly covers all possible bases. Often, such technology is unrealistic in its claims, or represents a serious, and oftentimes an indefensible, hardware investment. In bridging the gap of hype vs reality, it’s important for both end user and vendor to discuss requirements. Vendors should offer a solution that will deliver to time and budget, with full transparency around cost. End users should not be afraid to ask of a provider how far they are away from presenting a fully working version of the solutions they promise. While any invention can be made to sound impressive, it is an innovation, with tangible benefits of scalability, logistics and service, that brings an invention to life as a realistic and deliverable solution. Smart, secure systems for a safer world Physical security continues to evolve rapidly, where multiple sensors, intelligence and on-device processing are becoming the norm.

With greater emphasis on demonstrating IT maturity and cyber hygiene, building APIs and supporting the latest protocols and languages, the providers of physical security solutions will not only be required to prove their worth in the physical security market, but in the IT space too, as these two worlds increasingly converge. Rather than becoming hung up on specific technology, the security provider of the future will be required to work collaboratively to create a solution to fit a problem, of deploying analytics as a key component, and innovating for a smarter, safer world. Find out more about analytics: www.axis.com/products/ analytics-and-other-applications

13


NETWORK AUDIO

Choose the right audio management software for your business Our audio management software lets you manage and control your audio systems - no matter how complex they are. From a single user interface, you have full control of your audio system for everything from installation to daily operations. Axis audio management software helps you realize the benefits of network audio. It comes embedded in network speakers or as a standalone unit, so it’s easy to grow your business as your needs change.

Benefits of Axis audio management software Axis audio manager software offers you an easy way to manage your audio management system, helping ensure your message reaches the right target group, at the right time. All tailored to your specific needs. Content management

Content prioritization

Play background music and live or pre-recorded messages

Prioritize content and ensure urgent messages interrupt the schedule

Which option is right for your business? Start

here

! What is the size of your site ?

Small site

Large site

• 1-20 zones

• 1-100+ zones

• 1-200 speakers

• 1-1000+ speakers

Health monitoring

eed:

n You

Discover system errors remotely What are your use cases?

Zone management

Pro

User management and access control

Divide your site into zones and play content of your choice in one or more zones

AXIS Audio Manager

Control who has access to what features Moderate complexity • Play live call-outs in any zone at any time

What options are available?

• Play the same kind of pre-recorded announcements in all announcements zones at all times

AXIS Audio Manager Edge

AXIS Audio Manager Pro

• Play the same background music in all music zones at all times

• Free license

• One-time license

• Built-in on all Axis network speakers

• Installed on Windows PC

• Set weekly schedules for content and timings

ed:

ne You

AXIS Audio Manager

Edge

14

More information about Axis network audio: www.axis.com/audio


NETWORK AUDIO

Protect what matters most with Axis network audio Protect what matters most Detect, act andaudio protect against threats to your with Axis network campus or healthcare facilities.

Detect, act and protect against threats to your campus or healthcare facilities.

School On and around school grounds: > Detect and address agression or suspicious activity > Deploy to students and staff in one area or the whole facility > Trigger bells

Detect and respond to car break-ins and vandalism as it happens

Hospital Deter and respond to traffic incidents

In healthcare facilities: > Automatic audio alerts in restricted areas > Remote monitoring and with patients from nurse's station > Trigger safety alerts and announcements in the whole building or specific zones

Restricted access granted via communication between other IP technologies such as access control or intercoms

Code Blue

Protecting your site with Axis

15


RETAIL

Protecting retail distribution centres from an escalating threat By Graham Swallow, Axis Communications, Northern Europe The retail industry has faced more than its fair share of challenges as a result of the COVID-19 pandemic. An increasing trend towards online shopping has put more pressure on logistics and operations businesses, and seen shops and underutilized premises being converted into local fulfilment and distribution centres1 to cope with demand. With consumers still wary of venturing onto the high street, and the comparative ease of shopping online, this trend looks unlikely to change in coming years. Yet poorly guarded premises can present an easy target for criminals eager to get their hands on valuable goods. In 2019 total UK retail crime losses were estimated to be around £4,821 million2. While it’s imperative that retail organisations continually risk assess and take steps to better secure their depots, the capabilities of legacy technologies such as standalone CCTV and manually operated access points are limited, and can no longer be relied on

16

as a comprehensive security solution. Instead, network cameras, combined with other connected IoT technologies, can provide greater levels of surveillance and security, leading to benefits from both an operational and security perspective. Securing the perimeter The protection of any distribution centre starts at the perimeter. One of the many challenges is the high number of false alarms or ‘false positives’ that regularly occur at sites. These are genuine yet unverified alerts, caused by factors other than criminal activity such as a plastic bag blowing within the camera scene, animals or, in a store environment, it could just be personnel failing to follow procedure. This will cause resources being called to a site unnecessarily and usually out of operation hours; long term, this may result in general apathy around the system’s capabilities. Furthermore, multiple false callouts without hard evidence of a verifiable incident can result in the police removing a company’s

designated URN (unique reference number), given to a business to aid quick and efficient incident reporting. The absence of a URN makes reporting a genuine crime that much more difficult. False positives are a distraction to an organisation’s mission, and there are simple changes that can be made to vastly improve deterrent and alerting capabilities at a store or distribution centre site. Higher grade cameras, equipped with built in edge-based analytics will process video within the device itself for more accurate and effective assessment of a situation, minimizing the likelihood of false positives. The addition of radar to complement surveillance can offer additional benefits to security teams. Radar makes it possible to differentiate between people and vehicles, to accurately gauge the direction and speed of an object,


RETAIL ascertain whether it’s moving outwards or inwards from the site perimeter, and to plot its position accurately on a site map. Such technology enables security operations teams to have the situational awareness that helps them to make the decision to deploy the right and safest resource. Protecting goods and people on the inside Inside each busy centre, operatives deal with high volumes of stock which is usually required to move at pace from A to B. This can, of course, create risks to safety. Network cameras with analytics on board can be employed to monitor space to drive actionable alerts in situations such as traffic which is heading in the wrong direction, fire exits that are blocked with pallets of stock, pedestrians entering unsafe or forbidden areas and much more. Triggering a local pre-recorded audio message, traffic lights and sends alerts to camera operators.

This is primarily designed to keep people safe but also helps avoid costly and distracting investigation in the process. Surveillance cameras integrated with automated barriers, access controlled doors and IP audio can also be used to improve health and safety, helping to enforce protocols relating to COVID-19, such as mask wearing or social distancing. Taking this a stage further, in such a busy environment with lorries and fork lift trucks moving around at pace, automated announcements can be made to warn staff that additional care should be taken in the area, based on real-time data around current activity identified by camera analytics. Securing sites of any size Whether protecting a huge distribution warehouse or a small satellite site used by couriers for dropping and collecting parcels, the security of goods, streamlining of operations and protection of people is vitally important. Through the application of high quality solutions, greater safety and loss prevention can

be achieved, bringing peace of mind to site managers and even raising morale of staff who might feel uneasy working in an environment that they feel is improperly secured, especially at a time when the goods they deal with are in such high demand. Partnering with trusted vendors of such solutions is a step towards dramatically improving a retailer’s safety and security provision. High quality, data driven, network security systems provide benefits across many aspects of retail operations. Not only do they give decision makers a comprehensive view of the retail operation, but they also represent an important strategic enhancement to support the business over the longer term, enabling them to respond to the threats and challenges of today and also tomorrow. Learn more about Axis solutions for industry: www.axis-communications. com/industrysolutionsfortodayandtomorrow

www.dmagazine.com/commercial-real-estate/2020/09/the-surge-in-online-shopping-has-put-pressure-on-logistics-operations/ www.retailresearch.org/crime-costs-uk.html

1 2

17


CNI

With a UK threat attack ‘highly likely’, is our national infrastructure at risk? By Lucas Young, Axis Communications, Northern Europe Our critical national infrastructure (CNI) underpins the foundation of our modern existence, yet as most of its operation takes place ‘behind the scenes’, it is often so seamless that we hardly notice it’s there. Energy, water supplies, transportation and even logistics are all essential components of our modern world. Disruption, damage to or sabotage of any one of these sites could be catastrophic, depriving millions of people of access to essential services and, in some cases, causing loss of life. With the UK's terrorism threat level having just been upgraded from substantial (3) to severe (4), it’s crucial that these industries adjust their security posture accordingly and have appropriate technologies in place to support this. Existing security provisions should be thoroughly assessed as the need to adopt high quality security solutions,

18

providing continual real time surveillance and security protection, becomes even more imperative. Security measures must consider both the threat and the operating requirements. Typically for CNI this may include large and remote locations. But there will always be environmental constraints and it’s important to ensure that any security provision does not conflict with operations at a site. Consideration must be given to finding a solution that integrates into existing infrastructure, providing high levels of accuracy and allowing for timely incident alert and response. Pitfalls of traditional perimeter protection While no technology is fool-proof, certain technology is more prone to false alarms, referred to as ‘false positives’. This can often result in operational headaches

for security teams when dealing with traditional intrusion detection solutions physically integrated into a perimeter fence. Common causes of false positives include animals, moving plants and trees, and even wind. As it’s not always possible for security staff to quickly and accurately determine the cause of an alarm, a site has to be physically checked. This can waste valuable time and resources, and could result in apathetic or overstretched staff ignoring a genuine threat, which in the case of CNI could be life threatening. Other intrusion detectors, such as infrared and lasers can be positioned on the perimeter, but these too can be affected by false positives and restricted by limited detection capabilities over distance or at height. By contrast, employing the latest generation of network video technologies can reduce


CNI

operating overheads dramatically, by cutting down the number of false positive alerts. Significantly improved images provide remote operators with the ability to accurately assess a situation before despatching a ground team, and integration with additional technologies such as radar, can result in a smarter solution that is capable of providing comprehensive overarching protection. Capable solutions for effective CNI security Modern networked IP cameras, in contrast, are capable of reducing unnecessary deployment of security teams, representing a clear return on investment. The combination of video surveillance cameras and motion detection software has expanded the range and capabilities of perimeter protection solutions from simple detection to complex intrusion analysis. Today’s specially designed cameras feature sensors that are capable of producing highly detailed images even in rain, fog or at night. Now even capable of utilising the power of Artificial Intelligence, each camera can host its own task-specific video analytic and integrate with other third party technology to significantly improve the ability to detect intrusions quickly and efficiently, making blanket coverage of a perimeter more cost effective. Combining visual data from cameras with other sources, such as infrared imaging, can further improve detection capabilities. Thermal (or thermographic) cameras, when coupled with video analytics software, can protect an area at any time of day or night. Sensors using thermal technology offer excellent detection capabilities over considerable distances, which are ideal for larger estates. The addition of integrated IP audio horn speakers allows pre-recorded warnings to be issued to deter any would-be intruder, or real-time voice alerts which can be communicated from a central location. In addition, access control systems which use video surveillance as a second form of authentication, can prove a powerful tool for effectively guarding entrance and exit points. Admission to a CNI site can be carefully monitored, with access attempts granted or rejected

based on a combination of having the right credentials and a positive identification via video camera. In the current COVID-19 climate, the use of frictionless access control technologies allow access to a site without the need to touch shared surfaces, removing the risk of cross infection. A QR code presented using a mobile phone is one such example, and can again be backed up by network video. Converged security Effectively securing and protecting CNI sites requires taking a converged approach. This includes input from other departments, such as IT and operations, and is fast becoming best practice. Historically, a good starting point for the perimeter would always have been the more traditional measures, which typically deter and delay a potential intruder. But, with many measures and systems now integrating with each other, a more considered and holistic approach is required. Integrated networked security technologies therefore offer a highly desirable security solution. Modern IP based technology is affordable and scalable while able to provide enhanced perimeter protection and, through fully supported surveillance and security systems backed by powerful analytics, enables security teams to respond accurately and swiftly in the event of a potential threat. Such solutions, when built upon open platforms, facilitate simple integration with other technologies by using APIs and standard IoT protocols. This results in an overarching solution that can seamlessly incorporate a range of sophisticated technologies to keep pace with an ever evolving threat. Investing in intelligent security solutions is an investment into protecting our critical national infrastructure and our modern standard of living. Download our perimeter security whitepaper to learn more: www.axis-communications.com/ perimeter-protection-whitepaper Watch Axis’ recent perimeter protection online event: https://bit.ly/3hI3cxz

19


SMART CITIES

The Smart City: why the silo mindset will limit its full potential By Jens Strinsjรถ, Axis Communications, Northern Europe The smart city offers significant benefits. These urban constructs are capable of reducing waste, driving efficiencies, optimising resources and increasing citizen engagement. Such benefits are reflected in the $189 billion that is anticipated to be spent on smart city initiatives globally by 20231. Public safety remains a priority area and the use cases most likely to see the money will include surveillance systems, intelligent traffic management systems and smart grids2. Smart cities offer both the business and public sectors the opportunity to embed improvements that can not only transform citizen engagement but also reduce top line spend. However, for the vision of the smart city to be fully realised there are challenges that must be overcome. While smart technology, at its core, enables the collection and analysis of data to create actionable and automated events which streamline operations, its effectiveness can be

20

limited by the silo mindset. To deliver at scale, interoperability is key. Not just in terms of the technology, but the entire smart city vision. Change behaviours and break the silo Too often, city leaders think of smart city initiatives as individual strategies, for example, smart parking, smart security, smart traffic. Each area is treated as a standalone project rather than part of a comprehensive whole. The result is that the solutions, while smart and capable, are being implemented as silos and therefore limited to a narrow focus. The smart city vision cannot be realised by utilising technologies in isolation, with no thought given to how they might relate to, or work with, one another to achieve a common goal. Success in smart cities is dependent on maintaining the balance between the technology, the level of integration, the

data collected, and how this data can be leveraged to deliver the right intelligence. Smart cities must move away from the traditional operating model that involves silos and departments only focusing on one area of operation. Instead, collaboration between teams and systems is critical to the development of the fully scalable and smart city, where data can be shared horizontally for the benefit of multiple teams. Making informed decisions on technology investment The smart city cannot achieve its potential without a clear and holistic strategy that takes into account multiple requirements and determines how technologies can be used to deliver the required outcome; a centralised smart city mandate that feeds into every initiative and investment. This will involve siloed teams collaborating and sharing their learnings so that data and analysis from integrated cloud-based


SMART CITIES

services can help them to achieve their combined goals and visions. Only then can connected systems, cameras and sensors come together to make the truly smart city a reality. However, there is a natural dispensation towards purchasing low cost solutions that are perceived as offering the same value as their more expensive equivalents. While some have taken the decision to implement such solutions in an attempt to unlock the required benefits while saving their bottom line, the limited lifespan of these technologies puts a heavier cost and reputational burden onto organisations by their association. End-to-end value – Focus on the total cost of ownership Others have wisely looked towards solutions that are manufactured using ethical approaches and sustainable practices by companies with appropriate credentials. The concept of Total Cost of Ownership (TCO) is well established and offers strategic buyers a mechanism to consider all of the aspects involved when purchasing, setting up and operating a new system, evidencing the complete end-to-end value which is otherwise difficult to ascertain. In relation to the physical security of the smart city environment, ensuring comprehensive protection of people, premises and assets begins with the integrity of the systems deployed and the pedigree of the vendors behind those technologies. TCO can highlight labour costs and identify what percentage of the overall total these equate to. Labour costs that make up a significant percentage of the total cost of a project could indicate a need to invest in automation to reduce these costs. TCO can also introduce vendor assessments that allow full visibility of the costs that the system will occur over the long term. Cheaper technology which is not sustainable can result in a ‘false economy’ where continued maintenance and repair is necessary to keep it operational.

Security and sustainability: critical Smart City factors In the future, a focus on cybersecurity and sustainability in the enabling of the smart city environment will be critical. TCO can be assessed against multiple sustainable metrics that include energy consumption, power demands, product lifespan, maintenance and risk. For example, a system employing low power cameras and low-light image capture technologies can result in a reduction in overall power consumption which will contribute to a low carbon footprint as well as an overall reduction in the TCO. From a security perspective, evidence of a technology provider’s cybersecurity credentials, and service agreements provide assurances around the integrity of the technologies themselves. The right technologies are those that are deemed secure and fit the requirements of the NIS Directive3. In the physical security arena, Secure by Default accreditation and Cyber Essentials Plus are accolades that evidence a manufacturer’s security credentials. The implementation of secure cameras and sensors will bring peace of mind to smart city officials. Such systems, capable of delivering data that can drive and support operations for multiple stakeholders, will form the cornerstone of the smart city. Breaking away from a silo mentality and embracing collaboration allows multiple teams to utilise this technology for a mutually beneficial purpose; to finally make the smart city a reality. Download our whitepaper: www.axis-communications. com/Smart-city-Security-TheKey-to-the-connected-metropolis Listen to this on-demand webinar: www.axiscommunications.com/smartcity-webinar2

www.idc.com/getdoc.jsp?containerId=prUS45303119 https://s3platform.jrc.ec.europa.eu/smart-grids 3 www.itgovernance.co.uk/nis-directive 1 2

21


SMART BUILDINGS

Smart buildings: going beyond the hype to reap the benefits By Carl Staël von Holstein, Axis Communications, Northern Europe In the previous issue of this magazine, #AxisInnovates issue 13, I noted that the real estate sector has been slow to adopt digitization and an updated business model compared to other sectors. Many real estate owners are still missing out on the business and operational benefits such as scalability, future-proofing, and additional incomes. To be fair, ten years ago, no one could have had the vaguest idea about the dramatic changes that digitization, the internet of things, artificial intelligence, et cetera, would bring. And no one indeed knows today what technology we will take for granted in 2025, or how various stakeholder needs will change. I guess it is only natural that some property owners are reluctant to take the digital leap. Traditionally, the real estate sector has relied on a business model where savings are the top priority, not increasing the incomes – which can be the case with

22

smart buildings. But even so, getting left behind in a silo model benefits neither owners nor the tenants

Many real estate owners are still missing out on the business and operational benefits such as scalability, futureproofing, and additional incomes.

Playing to everyone’s strengths In my previous blog post, Swedish IT entrepreneur Jonas Birgersson advocated a layer structure where the infrastructure ownership is divided horizontally among several players instead of vertically with one or few owners. “When you spread the control of infrastructure and processes, there is a level playing field,” Jonas said.

“In each layer, different players can compete and do what they do best. In the best case, companies are spurred on to be creative and to develop innovations.” To make it work properly, we must turn to open common standards and open technology platforms where solutions from different third-party suppliers can interact to provide something significantly more than the sum of its parts. Learning from good examples From a positive perspective, I can see signs that things are starting to pick up speed. There are players out there that are willing to drive digitization and promoting interactive systems, which have been built on an open platform solution. While maybe not your typical real estate owner, Swedish self-storage company 24Storage is still a perfect example of how to think and what to do.


SMART BUILDINGS They chose an IP-based platform when they wanted to upgrade their sales and communication model for better customer experience. When explaining the thoughts behind the new platform, Michael Fogelberg, founder and board member, said: “We wanted to make it simple for the customers, and to serve them more hours. We needed equipment that works all the time, which is reliable and can be used in many locations simultaneously. One of the first things was to get the access control to work on IP.”

We must turn to open common standards and open technology platforms where solutions from different third-party suppliers can interact.

The council lists four main reasons to adopt digitization: > It simplifies and makes the business more effective > Improved services and more satisfied customers > New business opportunities > It contributes to a better and more inclusive society So, there is a lot to gain. Even if not all municipal public housing companies are on the ball, there are several good examples. One company has stopped using paper and is instead relying on a mobile app to communicate digitally in real-time with workers who carry out maintenance. The same company is also installing digital locks that can be managed effectively and safely from a smartphone.

A scalable and futureproof platform 24Storage’s solution uses cameras and access control as well as audio. It is a scalable system to which they can add new components and functionalities.

A mobile user interface simplifies As with most things these days, the services in smart buildings are centered on smartphone user interfaces. With mobile apps and QR codes, persons bring their own mobile access, which can be used at work or home.

According to Michael, the next level is to use the data that they are getting from the equipment to get smarter and better, using AI and tools that are available today and to develop that further.

There is also on-demand access. One example is the Botkyrka Municipality, just south of Stockholm, which has started to roll out on-demand access control across all their sports centers.

That may include everything from biometrics to using existing statistics smarter. Michael says, “When changing the way you grow your business, you are constantly learning and trying to use your equipment better. It is also key to use partners that can scale with you and the business.”

An example: a sports association is going to hire a municipality-owned sports hall. Having paid for the booking, they receive a QR code in a smartphone app. This code works as a digital key and eliminates any waiting to be let into the sports hall. Obviously, it works equally well for booking and access to, for example, gyms or tennis courts.

Changing the entire real estate sector Another example is the Swedish public housing sector, which has started to act. Public Housing Sweden, the industry and interest organization for public housing companies, has set up a digitization council. They say that it is “more than a trend – it is a revolution in business models, power structures, how we work, and how we look at information technology (…) Digitization will affect and change all parts of our sector.”

Andrea Daboscy, Botkyrka Municipality, explains that, “Our vision was to use a digital solution to simplify entrance to our sports centers. It improves accessibility and flexibility as it eliminates the need to borrow physical keys. When the customers let themselves in, we don’t need to have someone from the municipality open and closing doors, so we reduce our costs. We have also connected the alarms to the system, which improves security.”

A revolution in digital infrastructure These are some examples, and I am sure that we will see a lot happening within the next few years. It was recently announced that Jonas Birgersson’s software company Labs2 had started a collaboration with a major construction and real estate company to build digital infrastructure in a new district in Helsingborg, southwestern Sweden. The project aims to offer both residential and commercial customers new digital services and optimize the buildings’ technical systems. When you link systems such as access control and ventilation, you can create new personalized customer services. Different buildings can also be connected, which makes it possible to improve sustainability. To take it to the next level, AI can be used to analyze and optimize various systems. Commenting on the project, Jonas said, “This will be the revolution that we have been waiting for in the real estate and construction industry.” Let us hope so. From now on, it will certainly be interesting to be part of the development. This will be the revolution that we have been waiting for in the real estate and construction industry. For more information: 24Storage - Watch the video to learn what they gained from choosing an IP-based platform: https://youtu.be/9qSvk7i9UTo Mobile app and QR code access control; watch the video to learn how Entryfy and Axis provide total access: https://youtu.be/y-dWktTC0so Botkyrka Municipality: See the video how their ondemand access control system works (Swedish only): https://vimeo.com/345678152 Labs2: Read the press release here (Swedish only): www.midroc.se/nyheter/2020/ stort-tekniksprang/

23


CYBERSECURITY

The state of constant change By Sarb Sembhi, CISM CTO and CISO,Virtually Informed Ltd., and James Willison MA, Founder,Unified Security Ltd. In life the only constant is change. In 2020, that constant in the form of change became the largest single most obvious constant in both personal and business life. COVID-19 has changed most of the rules we took for granted. Humans are social animals, our whole way of life and work has been based on being social and getting more done together. So, when we could no longer leave our houses to go to work, go on holiday, go shopping, go to the pub, meet people, etc., we had to find new and alternative ways to accommodate that. How we have survived could only really have been possible due to the technology of the day. If this pandemic had happened ten years ago, things would not have turned out the same as they have now. Binge watching streaming media and allowing children to play games in their rooms for longer periods of time are now no longer unacceptable. Just as sitting in front of a computer all day in conference calls is now a reality for most office-based workers.

24

Throughout the new norm some trends have accelerated faster than others, here are three of the important ones: business priorities, cyber attacks, and enterprise security risk management (ESRM). Business priorities When businesses realised that this pandemic was going to last more than a couple of weeks, it became more than apparent that they had to change their priorities. As people stopped going out to the shops, retailers had to come to them. As people stopped going out to work, businesses had to figure out how their employees could work from home. Since technology, the internet and online activities have become the dominant norm, the acceleration of digital transformation of all businesses has never been as fast as it has become for some businesses. Whereas, previously many businesses were taking their time to get things right before moving their business processes online, now those businesses which did

not change early enough have already suffered greater losses that cannot easily be made up. The business priorities seem to be about a) longer term survival (cost cutting) due to the uncertainty of how long this pandemic could last, and b) transforming the businesses to cut operating costs while getting closer to the customer. These strategies are possible for some businesses but not all. However, other approaches to achieve the same objectives of longer-term survival as opposed to growth have included mergers and acquisitions. Cyber attacks The trend of unprecedented increases in cyber attacks has been brought about due to the many new opportunities arising from artificial temporary mass shortages of basic food and sanitising items, as well as government aid to those affected by loss of income.


Attackers who may have had to attend to day jobs in the office have now been able to run their attacks while they work from home. And while there are more people working from home, attackers have been attacking with the knowledge that many targeted victims are less protected than they were when working from the corporate offices. > Phishing scams are up astronomically to a point that several law enforcement bodies have issued advisories of all the different current scams. > Anti-malware vendors have reported the rise in mobile malware (compared to previous quarters), malware targeting IoT devices has also risen. > People left in a desperate position whether it is because they are lonely, have no money, or any other reason brought on by the pandemic.

Apart from the fact that attacks have been increasing, the number of attacks on IoT devices, Building Control Systems, and Industrial Controls Systems have been increasing significantly on a quarter by quarter basis. (As stated in a recent report1) This has led to some organisations utilising strategic approaches such as Enterprise Security Risk Management (ESRM) to respond to these all types of attacks. ESRM ESRM brings all related teams together not just to provide a single view of risk, but also the necessary skills from across the organisation to provide a single response. ESRM has been gaining momentum driven partly by the realisation of the lack of cybersecurity skills of physical security professionals to be able to deal with the technology (devices, systems and system of systems) they are tasked with managing in their increasingly ‘connected’ buildings.

For about twenty years, ASIS International, the leading security association for corporate security professionals, has championed ESRM recommending security teams work together on all areas of security risk and by so doing achieve organisational resilience. In their latest Security Awareness standard ASIS International and (ISC)2, a global cybersecurity association, state that security awareness is ‘part an ESRM program’. They call for ‘one voice’ to simplify the message and conclude that there is a need to “Establish cross-functional security teams to identify cyber physical risk in the digital/smart environment”2. Some will continue to resist the pace of change but as the World Economic Forum states, “We must stop thinking in compartmentalised ways when making decisions – particularly as the challenges we face are increasingly interconnected... This will require collaborative and flexible structures that reflect the integration of various ecosystems and that take fully into account all stakeholders.” (The Fourth Industrial Revolution, K Schwab, p 112). In closing All change brings some element of risk, and all those organisations which are effective at dealing with risk will be the ones to fare best in this age of change. Business risk may well be managed by the board and management, security risk is managed by the various security teams. Both physical and logical security teams have great experience and skills in managing risk on their own, but unless they work together there are great possibilities for criminals to overwhelm businesses with continuous attacks from all sides that it is very likely that at some point they will break in. As the saying goes, the bad guys only have to be lucky just once to get in – those protecting their businesses have to be “lucky” all the time. History and experience have shown that when we talk about luck in business, what we really mean is organised methodical preparedness by using tools like enterprise security risk management frameworks.

www.techrepublic.com/google-amp/article/industrial-control-system-cybersecurityvulnerabilities-are-rising-in-2020/ 2 https://store.asisonline.org/security-awareness-standard-e-book.html

CYBERSECURITY

Sarb Sembhi CISM Sarb is the CTO & CISO at Virtually Informed, and has previously been a CTO & CISO for the Noord Group. He has previously worked as a consultant covering most issues in risk and security. Sarb’s contributions to the industry include the London Chamber of Commerce and Industry Defence and Security Committee and its Cybersecurity working group. Other contributions include: Past President of the ISACA London Chapter, Chair of ISACA International GRA Region 3 SubCommittee, Chair of ISACA International GRA Committee, ISSA UK Advisory Group member, InfoSecurity Magazine Editorial Group member. Sarb has also served on several Security Standards Groups, and continues to write and speak at risk and security events around the world. Sarb was shortlisted in the IFSEC Global Most Influential people in Security & Fire 2017: Top 50 influencers in security & fire 2017: Cybersecurity IFSEC Global | Security and Fire News and Resources: www.ifsecglobal.com/ global/top-50-influencers-securityfire-2017-cybersecurity/ James Willison, BA, MA, MSyl James Willison is a recognised international leader in Security Convergence and Enterprise Security Risk Management and founder of Unified Security Ltd. Named #8 Cyber Security Professional IFSEC Global Influencers Security and Fire 2020. Shortlisted in Security Serious Unsung Security Heroes Awards 2018 as a Security Leader/mentor. James is Co-Chair, Smart Buildings Working Group, Internet of Things Security Foundation, and a member of the ASIS International ESRM Steering Committee. James was awarded the Imbert Prize for an ‘outstanding contribution to the Security Industry in 2011’ for his work on convergence with ASIS Europe and the Information Security Awareness Forum. He has more than 20 years of management experience in the physical and information security industry, including posts as Advisor on Convergence to the Mitie TSM Board, Senior lecturer in Security Management at Loughborough University and Digital Security Expert with the European Union.

1

25


CUSTOMER STORY - END-TO-END

Casino group raises the stakes on security Innovative end-to-end security and surveillance solution developed by Axis improves operations and security at Napoleons Casinos & Restaurants new Manchester site.

The complete end-to-end solution offers advanced levels of protection at the perimeter, entrance and exit points, as well as close monitoring of the gaming hall and individual machines, guarding against break-ins and criminal damage as well as tampering and fraud. Napoleons Casinos & Restaurants in Manchester, UK, is a successful chain with premises across the north of England. Owners, The A&S Leisure Group Ltd, sought to employ a system that would incorporate the latest advancements in security, without the need to use multiple providers. Casinos must be adequately protected, not just to secure the premises and protect against fraud or theft, but also to fulfil legal requirements set by the Gambling Commission and local authorities. Axis, together with its partner Brock Business Support, specified and deployed a solution which was customized to fully support the casino’s requirements. Guy Hewson, Head of Security at The A&S Leisure Group Ltd, explains: “When looking at the requirements of the new site, integration between the surveillance and access control systems was important, together with high quality images from the cameras, and immediate video play back with audio. We turned to Brock Business Support who, through its close working partnership with Axis Communications, was able to specify a system that could be tailor-made for our requirements.”

26

One hundred cameras were installed at the site, requiring six AXIS T8524 PoE+ Network Switches and recording on three servers, all driven by the AXIS Camera Station software running over four viewing stations. The staff entrance utilises an AXIS A8004-VE Network Video Door Station, and all staff are admitted after scanning using a biometric reader. Inside, AXIS M3065-V Detwork Dome Cameras cover back of house areas, providing a wide-angle view.

Externally, the perimeter is covered by AXIS P3245-LVE Dome Network Cameras with Axis Lightfinder technology, ideal for variable lighting and weather conditions.

Gaming tables, money exchange areas, bars and slot machines are monitored by AXIS P3375-V Network Cameras with built in two-way audio functionality. At the roulette wheels, AXIS F1015 Sensor Units sit inside the table displays, providing a discrete full view with recording capabilities and images that are clear and sharp.

review the technologies at the other four sites, implementing variations on the design employed so successfully at the Manchester premises.

With the ability to capture and export live video data in real-time for the authorities in the event of an incident, Axis’ solution provides peace of mind for all at the site. Satisfied that the new system has met all of its objectives, The A&S Leisure Group Ltd now plans to

Read the full story: www.axis.com/customer-story/ surveillance-and-securitynapoleons-casino


CUSTOMER STORY - END-TO-END

Innovative use of security system helps unlock zero waste targets Global leader in metal recycling EMR deploys security and surveillance technologies from Axis Communications to secure its premises and help meet its sustainability goals. overview of EMR’s entire operations at this site. EMR’s drive towards a more ethical, waste-free way of operating also matches our own ethos perfectly.”

The installation of the integrated end-to-end solution which comprises network cameras, access control and IP audio products integrated with a hosted software application allows the close monitoring of not only the site’s premises, but also every aspect of onsite operations. This will enable staff to identify improvements in processes and take major steps towards achieving EMR’s sustainability goals. EMR, a leader in material recovery producing in excess of 10 million tonnes a year of high quality recycled materials, approached Axis to design a dual purpose solution. The resulting system provides comprehensive security across access points and the wider perimeter, while also enabling greater visibility into the efficiency of operational processes, including the monitoring of onsite machinery, to identify opportunities to better manage waste in line with the organisation’s sustainability targets. “With such a substantial operational environment, there is much to consider,” stated Roger Hewitt, Head of Security at EMR UK. “We needed a better monitoring status of the site’s security but also, and equally important, greater visibility of every stage of the recycling process." "Axis cameras mounted on our weigh bridge, for example, can assist in the calculation of loads. Thermal imaging cameras can monitor for excess heat,

not just inside the machinery, but also within the piles of metal and material that we have on site, notifying operators if rising temperatures are detected. The image quality of the Axis cameras is excellent and allow us to monitor our entire operation while also ensuring the highest levels of safety.” The end-to-end solution includes a range of innovative Axis technologies comprising an Axis network door station and AXIS A1601 Network Door Controller to manage all entrances and exits, while a network audio system incorporating horn speakers is capable of playing pre-recorded alerts triggered in the event of unauthorized access. A range of cameras are employed to protect the site perimeter and monitor operations, including AXIS P5624-E dome cameras and an AXIS Q2901-E Temperature Alarm Camera which has been installed to detect heat for the purpose of identifying fire risk.

The Axis end-to-end solution has brought peace of mind to all at the site, while the benefit of being able to monitor operations has resulted in more accurate decision making around how best to optimise production while striving to improve sustainable practices. The new system enables EMR to demonstrate its position as a sustainable and ethical company, committed to smarter, greener operations. Both Axis and EMR share a commitment to working towards a better, safer world. Roger Hewitt shared his view of the relationship with Axis that has made the new solution possible: “At EMR we realise the importance of operating a sustainable and ethical company with a responsible working culture. I think this is one of the main reasons for our close working relationship with Axis; that shared vision of how to operate in line with social responsibility, and how to try and make things better for everyone.” Read the full story: www.axis.com/customer-story/ axis-helps-recycling-companymeet-sustainability-goals

Axis’ Nick Platt-Higgins, UK Key Account Manager, said of the project: “This is perhaps one of the most all-encompassing solutions we have designed and installed to date. It really provides a real world opportunity to see a significant number of Axis technologies out in the field, using cloud connectivity to provide a comprehensive

27


PARTNER SOLUTIONS

The flexible advantages of cloud security to help retailers post-lockdown Morphean’s retail segment lead, Andy Martin, explains how hosted security solutions can help the retail industry unlock intelligence and improve operations. The COVID-19 pandemic has added to the challenges already being faced by many retailers. As infection rates slowly decrease and businesses open their doors once more, there is much to consider. With staff and customers returning to the shop floor, retailers will need to maintain the controls that have given staff and customers the confidence to shop. Implementing a new operating model changes the store’s performance and resourcing, requiring close attention. Efficiency is the key, and data can provide real insights to manage the change successfully, trade profitably and avoid further lockdown measures. The pandemic has taught the retail industry that it’s better to be prepared for every eventuality in an increasingly uncertain world. Cloud technology demonstrated its value under lockdown,

28

manifestly evident in the surge in use of video conferencing platforms that kept people connected. Change was implemented with lightening speed and in complete confidence globally by a variety of businesses. It is this technology that can also be utilised to help retailers ensure the safety and security of their premises as well as meeting operational goals. The cloud has transformed business across many sectors; it is immediately scalable, easily managed from one central location and visible to the entire organisation. CCTV now forms part of a wider IoT world where connectivity and customisation make most things possible. CCTV should not stand alone with only surveillance in mind. Here we explore some of the many flexible benefits to help retailers rise to the challenge.

Cloud technology: Secure, flexible and easy to deploy Cloud-based video surveillance and access control solutions are built around an ‘as-a-service’ operational expenditure (OpEx) business model which offers many key benefits to the retail organisation. Video surveillance as-a-service (VSaaS) and access control as-a-service (ACaaS) offer complete flexibility in that they can be easily deployed via an existing IT network, customised and scaled up or down to directly match spend to the operational need and business challenges. Importantly, they are also backed by the latest security software and firmware upgrades, for a solution that’s always up to date and online. In contrast, solutions built around a traditional capital expenditure (CapEx) model are quicker to age and less futureproofed.


PARTNER SOLUTIONS

Such systems not only represent a considerable investment, requiring large capital expenditure upfront, but they also lack some of the guarantees around system security. A cloud platform for video surveillance that is designed from the ground up to ensure data is encrypted, and to be sensitive to new vulnerabilities or malwares, provides a secure layer of defence against both physical and cyber attack.

Retail managers can use this data, combined with information from the instore surveillance system, to automate customer reminders of the importance of maintaining a safe social distance through network (IP) audio speakers. Such intelligence can also support general operational decisions about signage placement, deployment of staff or re-ordering of goods in response to customer behaviour and demand.

Stop spending on security: invest in intelligence As security equipment is connected to the wider IT network, the data that it generates can be used for a much wider variety of purposes beyond protection of people and assets. By their nature, security devices such as IP-enabled network cameras are present at critical points of physical infrastructure, and as more data is gathered, analysed and combined with other information in the cloud, more uses can be unlocked. Mindsets needs to adapt. Cameras should be thought less of in terms of security devices, and more as part of a mix of technologies that, when combined with data from multiple sources, can produce valuable business insights and automate decision making. Security is just one benefit of a much greater system.

Find out more about unlocking cloud intelligence in retail: www.youtube.com/ watch?v=D_DvKHcTCEA For more info about Morphean: https://morphean.com

Use case: measuring retail occupancy The setting and control of in store occupancy levels can prove invaluable in this current transition period between full lockdown and the ‘new normal’. Understanding and being able to respond to occupancy data is an important part of not only improving onsite security and situational awareness, but is also integral to delivering great service, appropriate resourcing and creating a secure and positive shopping environment. Through the use of sensors placed at entrances and exit points, customers coming and going can be counted to establish the total occupancy number within the store at any one time. Downward placement of cameras ensures GDPR compliance by performing a head count rather than identifying individuals.

29


PARTNER SOLUTIONS

Streamlined futures – why enterprise customers now see integration as vital By Phil Campbell, European Sales Director, Quanika Today’s business landscape is changing rapidly. In almost every part of the economy we are seeing major challenges and disruptions. Each business faces its own sectorspecific pressures: retailers, most obviously, adapting to the challenges of e-commerce, oil giants facing hefty carbon taxes, the education sector shifting to e-learning, healthcare providers treating increasingly aging populations as well as dealing with major public health crises. And, above all this, organisations are being hit by wave after wave powerful global economic and technological forces, from the shift towards greater sustainability to the rise of artificial intelligence. But all this disruption doesn’t have to be bad news. Along with all these challenges come very real opportunities.

30

Tech savvy organisations know that to evolve and adapt they need to eliminate disparate systems and silos of information, to give them improved insights and decision-making power and to let them better manage staff and facilities. Whereas just a few years ago it would have been impractical and unaffordable for many businesses to integrate security systems beyond access control, surveillance and intruder, today they can use the next gen software platforms that make it far more straightforward to connect with an array of security and life safety systems as well as back-office systems and prevalent databases. And the latest research from Data Bridge Market Research¹ released in June backs this up, forecasting the systems integration market to rise an estimated value of USD 58.73 billion in 2018 to USD

90.82 billion by 2026, registering a CAGR of 5.6% in the forecast period of 20192026. Enhanced protection and streamlined operations Even a minimal level of integration, such as pulling together access control and surveillance, makes security and safety operations simpler to operate from a single interface and offers clear advantages and a practical way forward for even for the most complex, multilocation organisation. But going beyond this, today organisations can benefit from easy, off-the-shelf integration with dozens of building management systems – from elevator controls, fire detection and parking management to asset tracking – and streamline identity management by exchanging data with Microsoft’s Active Directory and other popular databases.


PARTNER SOLUTIONS

An easy-to-use, centralised system can reduce the burden of ensuring enterprise security from all angles and eliminate the need to deal with repetitive challenges, such as managing and responding to alarms and processing and analysing data from disparate systems. Integrated solutions also offer remote access capabilities which allow security managers to maintain oversight away from the control room. Single or multiple facilities can be monitored from any location. Assimilating alarms from multiple systems also gives operators improved ability to visually verify notifications and automatically capture events using video. And streamlined reporting gives managers the required intelligence to implement changes quickly. Adopting the latest AI technology will also act as a force multiplier, and integrated solution will increase operational efficiency by allowing security teams to detect, verify and respond quickly and effectively with easy coordination and streamlined processes. Benefits of end-to-end solutions Next gen software that comes with off-the-shelf integrations is also helping tackle industry specific challenges. In the hospitality sector, for example, forwardthinking hotels can now integrate their front of house and back of house operations using Oracle's OPERA to not only improve efficiency – reducing pressure on busy reception desks by automating aspects of check in and housekeeping, for example – but they can offer guests a significantly enhanced experience, with hassle-free arrivals and departures, and more efficient room service. That gives them a competitive advantage.

We’re seeing a growing number of examples of this in action, and seeing how the resulting efficiency is helping healthcare providers manage times of peak demand more efficiently. Ultimately, these solutions make life less stressful for individual medical workers too, making it easier for them to access the right facilities and associated IT systems and networks, even when the location is unfamiliar to them, and cutting down on the effort it takes to get where they are needed. In sectors from retail, finance and logistics, to manufacturing, integrators and technology vendors are delivering ever more capable, more flexible solutions. And they are making them applicable to for every type of mediumto-large business, from those that operate standalone large buildings and campuses to those with complex, dispersed, and multi-site estates. Today, scalable, flexible, and future-proof solutions can be adapted to meet new requirements and changing priorities – new functions added for example - with minimal expense and disruption. And today it is faster than ever for engineers to develop new integrations using the latest architectures and APIs. This has reduced the time it takes to satisfy customers’ requests for new integrations from months to weeks. This means that organisations can move as quickly as they need to by upgrading and scaling systems, to pivot operations and stay fully in control. More info about Quanika: http://quanika.com

In healthcare settings, it’s now much easier to divert medical teams and reallocate resources from hospital to hospital, with integrated systems that allow floating staff to work flexibly wherever they are needed. Ref: Data Bridge Market Research: www.globenewswire.com/news-release/2020/06/25/2053386/0/ en/System-Integration-Market-Overview-by-2027-Integration-of-Latest-Technologies-into-ExistentOfferings-to-Industry-Growth-and-Business-Strategy.html 1

31


WEARABLES

Viktor

Sv

är m Wayne

Da v is

Body worn cameras: expanding the possibilities of security and surveillance Viktor Svärm and Wayne Davis are sales engineers working to bring the latest solutions to market. Here they explain the purpose and benefits of Axis’ new body worn cameras. You have been involved with Axis’ body worn camera solution from its inception through to launch and beyond. Can you explain its use and benefits? VS: Axis body worn cameras offer a robust and lightweight security solution which has been designed for use by law enforcement and private security teams. These cameras represent the next generation of physical security, providing flexible surveillance on-the-move, often in challenging situations, and meeting Axis’ usual high standards when it comes to quality, ease of use, design and usability. What makes Axis’s solution stand out in the market, from a technical perspective? VS: The use of open platforms and dedicated APIs mean that integration with multiple video management systems

32

(VMS) as well as evidence management systems (EMS) is quick and simple. Open system architecture also facilitates simple integration with a broad range of third party systems, which promotes collaboration with Axis’ partners to work on future enhancements to the technology or new ways in which it can be used and developed. The inclusion of a three year warranty is a major plus point for our customers as it demonstrates our confidence in the product and gives them extra peace of mind. Were there any challenges that had to be overcome in developing this solution? WD: Obvious challenges relate to finding the optimum combination of size, weight, the need for robustness and maximizing battery life. To get all these elements right, our research and design team consulted with customers to gauge their requirements.

This resulted in the development of multiple product prototypes and a number of early-stage pilot projects. An holistic view was taken, factoring in a range of requirements from initial video capture in the field, right through to the presentation of evidence in the courtroom, where the authenticity and integrity of the video evidence is absolutely critical. How can body worn cameras be used in conjunction with existing security systems, and what additional value to they bring to a user or company? WD: The body worn solutions adds a new layer to our portfolio, covering the wearable market. The first person perspective gained from a body worn camera can complement a fixed camera solution, capturing real-time evidence of a situation at the point at which it occurs.


HIGHLIGHTS Integration with an operator’s VMS allows one system to monitor all cameras, both wearable and fixed, and enables the data from both wearable and fixed solutions to be combined, building an accurate incident report. The cameras include a 64GB hard drive, providing security personnel with enough capacity to capture high definition video throughout even the most gruelling of shifts. Can you provide examples of use, and do you have any hands on experience or feedback from customers that have tested it? VS: During the launch period, the solution was thoroughly trialled in a wide variety of applications within the private security space. These included use by security personnel at football stadiums and at other large events prior to the COVID-19 pandemic. The solution has also been rigorously tested by law enforcement teams. Feedback has been very positive especially around key features such as battery lifetime, pre-recording buffer, recording retention and image quality. The unit itself is rugged and has been praised for its extreme durability as well as its simplistic operation, ideal for use in high pressure scenarios where split second decision making is crucial. Are there plans for future enhancements to the body worn camera range? WD: Due to the amount of positive feedback we have already received, and the multiple scenarios in which the technology has been successfully put through its paces, we certainly hope to see this product line grow. We see potential for the technology to be incorporated into security training programmes, and its use as a visual deterrent to help keep situations under control has already been duly noted. Axis provides accessory lenses to give extra options around how the cameras can be mounted, depending on application. Further modifications and refinements according to continued customer feedback will help to further improve this already first class security solution. Learn more about Axis body worn camera solution: www.axis.com/products/ wearables

Three years in a row to developing solutions that continue to meet industry demand and follow best-practice.

We are proud to have won the Security Hardware Manufacturer of the Year gong at the Security and Fire Excellence Awards 2020. The ceremony, held virtually for the first time in its history, marks the third consecutive year that Axis has triumphed in this category. While the current COVID-19 pandemic has meant that this year’s security industry celebration was conducted with slightly less fanfare than in previous years, Axis’ win represents the culmination of a year of hard work and dedication from across the business. It is testament to Axis’ ongoing commitment

Dominic Jones, Regional Marketing Manager for Northern Europe at Axis Communications, commented: “We are delighted to have been awarded Security Hardware Manufacturer of the Year, and recognised for our continued focus on product innovation three years in a row. It’s been a challenging year for all, but Axis has been able to effectively respond and adapt. The challenges have strengthened our resolve to continue to innovate for a smarter, safer world.” Read more: www.ifsecglobal.com/ ifsec-international/securityfire-excellence-awards-2020winners-revealed/

New 5-year warranty Axis has long offered an excellent hardware warranty service covering defects in design, workmanship, and material under normal use for 3 years from the date of purchase, depending on the product. Now customers can take advantage of a 5-year Axis warranty service free of charge. Valid for purchases shipped from Axis to the original purchaser on or after 1 April 2020.

The 5-year Axis warranty covers most Axis products, it’s free of charge and there’s no action required. More information about warranty coverage details for each product can be found on the respective products' datasheets. www.axis.com/products-andsolutions

New distributor for Nordics Axis Communications and Ingram Micro have signed an agreement for the distribution of Axis network products in Finland and Sweden. “We have been looking forward to this day where we are able to announce the collaboration with Axis. They have a full portfolio of IP based video and audio solutions that fits perfectly into the Ingram Micro customer base and the verticals we are working with."

"We see new solutions with, for instance, number plate recognition and people counting in retail, that we now can deliver with a high-quality vendor like Axis,” says Jesper Tørnkvist, Nordic and Baltic Lead for Speciality at Ingram Micro. Visit se.ingrammicro.eu

33


PARTNER SURVEY

Axis ‘listening project’ to determine ways to help and support partners in 2021 New study to lift the lid on the impact of COVID-19 on partners, primary business concerns and ways Axis can support its network in challenging times.

During Q1 2021, Axis will be announcing the results of its ‘listening project’ across the UK and Ireland, to better understand the impact of the pandemic on its partners and the challenges they face. Following a similar survey conducted in the U.S, results will also make for an interesting comparison to help develop a picture of the global effect of the pandemic on the physical security industry and what more we can offer to better support its partners in challenging times as 2021 unfolds. Despite the unprecedented disruption and obstacles that COVID-19 presented, we are proud to have been able to

effectively respond and adapt, working closely with our partners and customers to support wherever possible. To further demonstrate this commitment, a survey has been launched to identify the main challenges and opportunities, needs and expectations of partners, their customers, and wider stakeholders. We requested the help of our trusted partner base across the UK and Ireland, drawing on the experiences of senior decision makers from from installers and integrators.

Through careful analysis of the findings, we will be able to determine where the greatest support is needed and identify ways that technology can facilitate safer and more effective business operations. We would like to thank everyone involved and will be making the findings available during Q1 2021 and we are very grateful for the feedback as this is invaluable to us and will help us build the best partner support. The report will be available in February 2021: www.axis-communications.com/ Axis-White-Papers

Know your way

to success. Unlock your full potential and take your team and business to new heights. Passionate about sharing expert knowledge, at Axis Communications Academy we enable you to accelerate your performance, grow, and win in an ever-changing world. Axis Communications Academy – Learn, discover, innovate and collaborate. Visit www.axis.com/learning

34


ONLINE CHANNELS

Where to go to stay informed... New products and solutions

Are you having a hard time keeping up with all of our new product and solution launches? You are not the only one. To make your life easier, we have created a web page that will be updated every month with the most recently launched products, solutions and tools from Axis Communications. Check out the new products: www.axis.com/products-and-solutions/new-products

Online news, training and events in the Nordics

At Axis we always strive to give our partners and other stakeholders with an easy and accessible way of learning more about the trends, solutions and topics that concern our industry today. We offer everything from events to webinars, newsroom content and much more. Go here for more information: www.axis-communications.com/nordics-enews

Axis Online in the UK and Ireland

In a disrupted world we adapt and are just as available for our customers as before. On this page we have gathered information about all our virtual classrooms, online training events, webinars and more to keep you up to date and provide an easy way to update your knowledge. Find out more about Axis Online: www.axis-communications.com/axisonline

Hub-page: Adaptable technology for a changing world

The world is looking a bit different today than it did just a few months ago. Essential teams are working around the clock to support customers and ensure that staff is conducting their job safely. At Axis, we want to support you with the right technology to operate in a safe manner. Read more to discover key solutions that address the government guidelines set in our region for your industry to maintain the safety of your customers, passengers, and staff, which can be tailored to match your business needs. Read more about our industry solutions: www.axis-communications.com/industrysolutions-fortodayandtomorrow

Secure Insights blog

If you are a buyer or user of security solutions, then you have come to the right place. We created this blog to help businesses like yours learn the ins and outs of surveillance, get insights from intelligent security solutions and show how surveillance can help you gain business intelligence. The Axis blog is meant to be a place for the entire Axis community to meet and exchange ideas. So please jump in and join the conversation! Visit the Axis blog! www.axis.com/blog/secure-insights/

Latest news, articles and more

In the Axis newsrooms you will find News, press releases, articles and more. Everything you could possibly want to read to keep up to date with the latest and greatest from us. UK: Sweden: Norway: Denmark: Finland:

www.axis.com/en-gb/newsroom www.axis.com/sv-se/newsroom www.axis.com/en-no/newsroom www.axis.com/en-dk/newsroom www.axis.com/en-fi/newsroom

35


About Axis Communications Axis enables a smarter and safer world by creating network solutions that provide insights for improving security and new ways of doing business. As the industry leader in network video, Axis offers products and services for video surveillance and analytics, access control, intercom and audio systems. Axis has more than 3,800 dedicated employees in over 50 countries and collaborates with partners worldwide to deliver customer solutions. Axis was founded in 1984 and has its headquarters in Lund, Sweden. For more information about Axis, please visit our website www.axis.com.

Twitter: LinkedIn: Facebook: YouTube: Blog:

36

@axis_neur /axis-communications /axiscommunications /AxisCommunications axis.com/blog/secure-insights/

Š2021 Axis Communications AB. AXIS COMMUNICATIONS, AXIS, ARTPEC and VAPIX are registered trademarks of Axis AB in various jurisdictions. All other trademarks are the property of their respective owners.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.