24.12.2018 Views

PSIJanuary2019

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Open Door<br />

Pro-Watch upgraded for increased<br />

productivity and reduced costs<br />

Through a series of enhanced updates, Pro-Watch 4.3.5 offers<br />

increased productivity opportunities for businesses. Now with support<br />

for both iOS and Android, the mobile application improves operator efficiency by allowing<br />

facility managers to control badging, badging verification and manage door controls via<br />

smart phones and devices at any time and from any location. The Identity Management web portal – an open platform that<br />

allows badge holders to request access changes and routes the request to assigned approvers with full auditing and status<br />

capabilities – is now available across all verticals, increasing efficiency by reducing operator workload. Pro-Watch 4.3.5 uses an<br />

encrypted open standard communications protocol – Security Industry Association’s (SIA) OSDP – in its reader<br />

communications. Lastly, Pro-Watch 4.3.5 integrates with third-party solutions, including CASI/iSTAR controller replacements,<br />

biometric readers and mobile credentials. These integrations offer a cost-effective solution for implementing a comprehensive<br />

security solution, while driving productivity gains.<br />

Pro-Watch 4.3.5 is ideally suited for enterprise and critical infrastructure environments across a<br />

wide variety of markets, and serves as the center of a connected ecosystem that integrates<br />

Honeywell and third-party solutions to provide a comprehensive connected building platform.<br />

For more visit: hwll.co/pro-watch<br />

Axis outlines commitment for<br />

sustainable values<br />

A white paper from Axis challenges the need for a new way of<br />

looking at business value over time, and what intangible assets<br />

that needs to be examined and included when building long term partnership. It<br />

outlines a couple of areas where sustainability has a direct impact on today’s way<br />

of doing business, but also how the approach of circular economy will impact the<br />

way we do business. The paper also touches upon the subject of building the right<br />

sustainability strategy and more importantly, how it can be delivered throughout<br />

not only an organisation, but rather the whole supply chain involved in today’s complex business models.<br />

"We have laid out an overview of how we strive to achieve our goals in this area, and the ways in which we believe all<br />

companies should behave if we’re to move towards fairer and more sustainable models of doing business. That is why we work<br />

hard to ensure our business is sustainable and transparent, adheres to the most stringent guidelines<br />

and values our people, our culture and our planet." Atul Rajput, Regional Director Axis Northern<br />

Europe Visit: www.axis-communications.com/sustainability-wp<br />

Vanderbilt Discussions:<br />

We need to talk about IoT security<br />

IoT technology is accelerating at such a pace that it can<br />

potentially create detrimental problems for which many<br />

organizations may be ill-prepared – or may not even be able to comprehend.<br />

Several flags have been raised already when it comes to the connectivity of IoT<br />

technology, and the debate still centers around who is responsible for the<br />

security of these kinds of devices.<br />

When the internet first originated in the mid-90s, it was a utility only accessible through computers and dial tones. Now its<br />

reach is far and wide, and IoT technology includes everything from wearable devices that are equipped with sensors that collect<br />

biometric data, to smart home systems enabling users to control their lights and thermostats.<br />

These devices typically come with built-in electronics, software, and sensors, and are also assigned unique IP addresses. This<br />

allows them to communicate and exchange data with other machines. This design is built around<br />

convenience. But how much attention should be centered on security when designing these<br />

devices?<br />

For more visit: vanderbiltindustries.com<br />

36<br />

www.psimagazine.co.uk

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!