Tag Archives: Security Integration

CNL Software appoints James Condron to global vice-president for sales and marketing

Physical Security Information Management (PSIM) software specialist CNL Software is strengthening its senior management team and Board with the promotion of James Condron to the role of global vice-president with responsibility for sales and marketing. Condron will now be in charge of driving growth for the company via its already extensive global partner ecosystem.

Condron joined CNL Software in 2004 and boasts over 25 years’ experience within sales and marketing of IT software and hardware solutions. With a successful track record in delivering significant business growth, he has been instrumental in some of the largest, most complex and ground-breaking security integration projects during his tenure at CNL Software.

Condron’s appointment comes as CNL Software increases its share of the growing international security integration market by demonstrating a strong customer-focused approach and specialism in key vertical segments. Condron’s ability to execute profitable sales through customer relationship management and systematic marketing strategies will help to drive growth over the next three years. Immediate attentions will be focused on process management, partner acquisition and support and customer service strategies.

James Condron: moving into a new role at CNL Software

James Condron: moving into a new role at CNL Software

“We’re all extremely excited that James has accepted this new role,” commented Keith Bloodworth, CEO at CNL Software. “He brings with him great drive, energy and expertise within complex security integration programs.”

Bloodworth continued: “The global growth of connected devices will exceed 40 billion by 2020. That being so, organisations across all vertical markets and geographies will need to transform huge volumes of data into meaningful intelligence for their security and operations. James’ excellent work over the last decade leaves us with no doubt that he’s the right person to help us increase our share within this market segment.”

Speaking about his new role within the business, Condron told Risk UK: “Security operations across the world are eager to leverage additional value from the investments made in their security infrastructure and also to exploit the tremendous benefits offered by the Internet of Things, yet they’re struggling to make sense of the myriad of data being produced by multiple systems and devices. CNL Software can help them cut through all of this complexity.”

In conclusion, Condron stated: “I look forward to engaging with our valued international customer base to help support their operational insights and to working with our world class partner ecosystem as we expand our global footprint.”

Leave a comment

Filed under Risk UK News

Security and access control: the key trends for 2014

John Davies (managing director) and Mike Sussman (engineering and operations director) of TDSi forecast that access control will exhibit much innovation in 2014 by embracing new technology.

Last year saw a big rise in integrated systems across the security sector, and 2014 looks set to follow this pattern with a number of technologies and trends coming to the fore.

With the integration of different security, IT and building services coming together, 2014 looks set to be a year of evolution rather than revolution. From a business point of view, this places the industry in a strong position to maintain growth.

Near Field Communications (NFC)

A technology that has been promising to do big things for some time is Near Field Communications (NFC). While the technology for it has been available for some time, NFC’s success will be determined by the tipping point from the number of enabled mobile devices and the public’s willingness to use them to gain secure access to secure doorways.

However, the use of NFC has also been spurred on by a number of new compatible stand-alone locks particularly well suited to access control using a smart device.

At the moment NFC is more popular in the consumer market. For example, landlords can send a key to the smart phone of a tenant which can then be activated or revoked as necessary (without the inconveniences of having to immediately issue traditional metal keys).

John Davies: md at TDSi

John Davies: md at TDSi

History has shown us that public acceptance of a technology will push its adoption in the commercial market too, as experience of the technology and trust in its ability is cemented.

NFC offers exciting possibilities for securing access and the signs are that the market is poised to increase adoption very soon.

Cloud-based security

The adoption of cloud-based security is another area that has gained enormous ground in recent years, and looks set to continue vehemently in 2014.

It’s fair to say there were concerns over the security of using the cloud voiced by some commentators and potential users when cloud-based access control was first muted. However, these concerns were largely quashed by a wider acceptance of online use of services such as banking or retail which have demonstrated that using IP needn’t compromise vital security.

As well as ease of use and installation, cloud-based services also rapidly roll out updates (which is particularly useful in an emergency situation) and there is no need to store large servers onsite (which could be attacked or hacked directly), in turn freeing space and resources.

Security integration

The momentum of security integration is unlikely to slow in 2014. In fact, it will continue to be a key market driver moving forward.

The benefits are unquestionable, with the drive for efficiency savings being the core proposition. It enhances security reaction times – for instance if a door is forced the combined system will sound an alarm, lock-down key areas and direct the security team to the location of the potential incursion.

Integration makes installation and upgrades easier and more cost-effective and it renders full use of legacy and existing systems possible. There’s a massive growth in the use of BACnet protocols as well. These are adding a new level of software integration which is helping the move away from the remaining proprietary software that was once commonplace in the security sector.

Mike Sussman: TDSi's engineering and operations director

Mike Sussman: TDSi’s engineering and operations director

Of late, there has been some debate within the security world about the effectiveness and convenience of using passwords (both for physical access to premises and logical access to IT systems). Integrated security systems allow authorised users to minimise the security details they have to memorise and are likely to gain further interest this year because of this advantage.

The ability of integrated systems to intelligently provide access also means that workforce management is much easier using integrated security. From managing working hours to activating building services only when they are needed (and thus saving energy and resources), integration is providing intelligent solutions that will save real money in 2014 and beyond.

The increase in mobile working and the use of smart devices will also continue to steer security demands, offering convenient and secure access to integrated systems. However, by their (highly portable) nature, mobile devices pose the potential risk of unauthorised misuse.

Accordingly, though, mobile device manufacturers have ‘beefed up’ handset security and this has offset many of the potential concerns – in some ways echoing developments in the security sector itself.

Biometric security

Long promoted as convenient and highly secure, biometrics recently received further mainstream consumer adoption with the inclusion of fingerprint readers on iPhone 5s handsets late last year.

This use of biometrics has wider repercussions, too. As with mobile devices, experience shows that consumer adoption helps to facilitate business use so we would expect biometrics to find even greater popularity in 2014.

The quality and accuracy of biometrics have rapidly improved in recent years, moving on from fingerprint readers and now readily incorporating facial recognition (which is very well suited to ‘clean’ areas) and moving on towards previously niche and more complicated systems such as palm, vein and heartbeat recognition readers.

Security legislation

As well as the technology, legislation is moving forward to meet the demands of the security sector.

In 2014, we will see the publication of IEC 60839 entitled: ‘Alarm and Electronic Security Systems/ Electronic Access Control Systems – System and Components Requirements’ which aims to update the standard to take into account the latest integrated systems.

It’s being published at the IEC level (ie world standard) and also published by the BSI as a European (EN) standard.

As is the case with all new standards, IEC 60839 will have a profound impact on the security sector in 2014, pushing solutions providers further towards modern integrated systems and ensuring that they adhere to the developing needs of all customers reliant upon them.

Leave a comment

Filed under IFSECGlobal.com News