Home Articles posted by a&s Adria (Page 169)

Suprema facial recognition integrates with Nedap AEOS

Suprema has integrated its latest facial recognition devices into Nedap’s access control system, AEOS, enabling organisations around the world to manage access control by making use of Suprema’s latest facial recognition technology.

“The Covid-19 pandemic has shaken up the security and building management industry, resulting in a surge of interest in contactless access control. Thanks to the flexibility of our open platform, we have been able to quickly adapt to these changing customer requests. We have a great partner in Suprema who stands at the forefront of biometric innovation,” said Ruben Brinkman, alliance manager at Nedap.

For the past years, Suprema and Nedap have continuously released new integrated solutions. Suprema achieved this facial recognition integration by using Nedap’s Bio-API,.specifically developed to enable biometric solution integration into AEOS.

“The addition of Suprema’s face recognition devices with Nedap AEOS will allow customers to take advantage of a wider variety of Suprema’s biometric solutions. Suprema and Nedap will continue to strengthen our collaboration to bring new innovative solutions to quickly adapt to market needs, such as the recent demand for contactless security solutions,” said Hanchul Kim, the CEO of Suprema Inc.

The integration utilises a ‘single platform’ approach, meaning that there is no need for operators to switch screens. They can continue working in AEOS to manage enrolment and biometric identities. The biometric profiles are stored in Suprema’s security platform Biostar 2 and are constantly synchronised with AEOS. an information exchange safeguarded through SSL certificates, which provides strong encryption.

Both Nedap and Suprema are strongly committed to maintaining the integration, ensuring future backward compatibility and adding new functionalities along the way.

New digital signature standard solves problem for over 4,000 banks

The new ETSI TS 119 182-1 is a specification for digital signatures supported by PKI and public key certificates which authenticates the origin of transactions ensuring that the originator can be held accountable and access to sensitive resources can be controlled.

This standard is a major achievement for interoperability of digital signatures for a range of applications in today’s digital economy including the banking and financial world where so far, some 4,000 banks were using various signing algorithms for their APIs to secure their online transactions.

Called JAdES, ETSI TS 119 182-1 comes in support of secure communications fulfilling the requirements of the European Union eIDAS Regulation (No 910/2014) for advanced electronic signatures and seals and regulatory requirements for services such as open banking.

This JAdES digital signature specification is based on JSON Web Signature and contains the features already defined in the related ETSI standards for AdES (advanced electronic signature/seal) applied to other data formats including XML, PDF and binary. The standard was developed with contributions from a number of stakeholders including representatives from the banking sector who, through Open Banking Europe, have brought their operational requirements to align European APIs onto one security model.

Nick Pope, Vice-Chair of the ETSI technical committee on Electronic Signatures and Infrastructures (ESI) comments: “The ETSI JAdES standard builds on ETSI’s decades of experience in defining standards for applying digital signatures to a variety of document formats to provide evidence of their authenticity supported by European Regulations. Working with Open Banking Europe, ETSI has developed a solution which matches the requirements of Open Banking APIs whilst assuring the authenticity of financial transactions.”

ETSI TS 119 182-1 can be used for any transaction between an individual and a company, between two companies, between an individual and a governmental body, etc. applicable to any electronic communications.

Electronic commerce has emerged as a frequent way of doing business between companies across local, wide area and global networks. Trust in this way of doing business is essential for the success and continued development of electronic commerce. It is therefore important that companies using this electronic means of doing business have suitable security controls and mechanisms in place to protect their transactions and to ensure trust and confidence with their business partners. In this respect digital signatures are an important security component that can be used to protect information, provide trust in electronic business and prevent tampering.

Axis Talk 2021

Join us to unite human imagination and intelligent technology.
20th & 21st April, 2021

The world has changed, and so has Axis. Instead of everyone coming to Axis Open Days, Axis is coming to you — to your kitchen, to your living room, even to your own backyard. We’ll bring smart new security innovations, customer success stories, timely, relevant, insightful conversations, and inspirational surveillance solutions for both integrators and end customers. Plus amazing global & regional speakers and, of course, our inspiring community of Axis Partners. Axis Talk 2021 — because we don’t need to be together, to be together.

Conference fee
The conference is free of charge. Just register in advance to have your seat confirmed.

Internet connection
Please ensure a good and stable internet connection to take advantage of the full spectrum of possibilities during Axis Talk 2021

Microphone and camera
We enable you the possibility of peer-to-peer meetings with our local Axis Team who helps you achieve success. That’s why please test the camera and microphone before the conference.

REGISTER

Sany Safe Webinar

Dear Partner /Distributor,

in this moment of general emergency, AVS Electronics wants to be close to its customers,
giving the chance to present the new product SANY SAFE SUPER FAST, to take care and protect everyone from the virus.

We invite you to attend the SANY SAFE SUPERFAST WEBINAR: counteract the presence of Sars Covid 19 in indoor enviroments, has never been so rapid, easy & complete!

THURSDAY April, 15 from 10.00-12.00 AM, clicking at the following link:

https://attendee.gotowebinar.com/register/706112279090308878

ID WEBINAR: 725-372-803
Join it is very simple:

You can participate by:

PC
TABLET
or
SMARTPHONE.

If you connect from a PC, follow the link of the day.

If you connect from a smartphone or tablet, first download the GOTOWEBINAR APP and then follow the instructions.

Don’t miss it!

Integration of Partizan Security and Cathexis Europe Ltd: testing is finished!

The series of significant integrations with Partizan Security participation are continued. Now our IP CCTV cameras are compatible with CathexisVision software.

Cathexis is an electronic and software systems development and manufacturing company, specialised in video management solutions (VMS) for the international market.

The company has been developing solutions for the industry for more than 20 years and has significant blue-chip and governmental customers in European Union, USA, South Africa, Great Britain, Australia, India, Africa and Middle East. Cathexis’ video surveillance solutions can be found in all vertical markets.

The capability of the software to easily integrate deeply with 3rd party products, like network I.P Surveillance Cameras, Access Control, Intruder and Fire panels and many other digital products enables it to supply systems that offer holistic solutions beyond security. This increases the customers return on investment, as they see the Cathexis video management solutions adding value in many aspects of their business.

In 2020 it was awarded by the Benchmark Magazine Best VMS for ease of operator use, simplicity of configuration and rich feature set. CathexisVision is a powerful yet highly cost effective and exceptionally stable VMS.

We are confident that our high-tech CCTV cameras with CathexisVision software will provide users with even more functionality for high-quality video surveillance of open areas and premises.

The right solution for smarter, secure mobile access control could be the wireless locks you already use

London, April 2021 – Mobile access is changing the way we interact with buildings and how we manage their security. The smartphone becomes a mobile key just as easily as it transforms into a payment card or a map. The device which users already carry enables them to unlock buildings or rooms, across one or multiple sites, securely and at a lower cost to the business than alternative credentials.

According to one recent access control market report, users view the benefits as a powerful triad of convenience, cost and security*. The security of a mobile credential offers enhancements over a smart-card or fob, because biometrics are built into almost every modern smartphone via fingerprint or face ID unlocking.

Human behaviour is also on the smartphone’s side. How quickly would a student or employee notice a missing plastic access card? Everyone is more careful with their handset. Facilities staff are left frustrated when users lend or share credentials. Far fewer users are willing to pass on their phone, even for 5 minutes.

Streamlining security management with the smartphone
Around two-thirds of organizations plan to adopt mobile access control within two years, or already have*. According to Omdia, mobile credential downloads grew by 220% between 2018 and 2019**. This growth path is likely to continue. From a security management point of view, enhanced convenience is the major driver.

Mobile credentials can be amended over the air, without any need for dedicated updaters or asking a user to check-in their credential. Nobody is left waiting around for access permissions to update.

Furthermore, when a security administrator cancels a mobile key, it vanishes immediately from a user’s phone. No more time-wasting handover meetings are scheduled when a tenancy, employment contract or authorized visit ends.

Cost efficiencies also accrue by switching away from plastic credentials: Mobile keys remove any need to source and print smart-cards, badges or fobs.

Mobile access done right: Aperio wireless locks
All these advantages are available in a building equipped with Aperio battery powered locks from ASSA ABLOY. Aperio mobile access is built on Seos, a next-generation platform with class-leading cryptography and authentication, plus unrivalled privacy protection***. Unlocking an Aperio device is easy and intuitive: users simply present their phone at the reader, just as they would a smart-card. They don’t even need to open an app.

Compatibility and security are at the heart of Aperio mobile access. Aperio locks are compatible with all major RFID credentials, as well as with Bluetooth and NFC mobile wireless protocols, too. User experience at the door is identical for each. No training is needed.

These locks can operate with all credential technologies simultaneously: Building users need not stick unanimously to one format. Security managers do not have to implement a mass transfer to a single technology. Because Aperio is built for maximum compatibility, businesses can run RFID and mobile in parallel. They can upgrade from low- to high-security credentials when they choose. Every technology is always included in the package: There is decision to make at the moment of purchase.

All these benefits are now available in the Aperio E100 electronic escutcheon and will be offered with more Aperio devices in the near future.

Aperio locks already reduce the cost of extending access control within a building, wire-free. They are quick to install, cost-efficient to run and integrate seamlessly with security systems from over 100 different manufacturers.

And for buildings equipped with these locks, the cost of upgrading to smartphone keys may be zero: Aperio wireless locking technology has mobile access baked-in.

To learn more, download a free Aperio Mobile Access Solution Guide at https://campaigns.assaabloyopeningsolutions.eu/aperio-mobile-access

Consumer IoT security: From “nice to have” to “new normal”

The current rise of the Internet of Things (IoT) ecosystem is something that cannot be denied. For example, smart building elements, vehicles connected to a smart transport infrastructure, or gadgets that can be controlled remotely through mobile applications and cloud are only a few examples of the current state. Moreover, the rate at which IoT is expanding is currently accelerating. Based on recent reports, it is expected that 5.8 billion IoT endpoints will be in use by the end of 2020, only in automotive and enterprise environments.

Whenever the term IoT is mentioned, the thoughts are initially running towards smart consumer gadgets. In fact, this paradigm, even though slightly outdated, is still correct for a large extend. Based on reports, the market of consumer IoT products is projected to reach 153.8 Billion $ by 2026 . However, together with the increase in connected products volume and functionality, the cybersecurity risks associated with these products are strongly increasing as well. Due to the volume of this market, as well as its connectivity to other high-risk environments, this becomes a serious issue.

Are there published guidelines for securing IoT devices?
The responsibility for introducing sufficient security controls inside IoT products lies mostly with their developers, as they are the ones who have technically the ability to design such security functionalities. But often one of the biggest challenges is knowing precisely what kind of security controls to include. Is simple authentication and encryption of data sufficient, or should IoT products include more sophisticated features such as secure boot, protection against physical tampering or side channel attacks? Since this is an essential question, the need for sufficient and good quality international standards and best practices is critical for consumer IoT domain. Luckily, we don’t lack such publications. The IoT Security Foundation framework, IEC 62443-4-2, GSMA IoT requirements or ETSI EN 303 645 are examples of well known publications which can be used as reference for implementing security by design in such products. It is sometimes hard to pick the favorite out of this list (and with even many more other publications that address the domain as well). However, in the last two years, the cybersecurity world has started to focus its attention more and more towards ETSI EN 303 645, with the hope that this could become the ultimate reference standard that we were all looking for.

ETSI EN 303 645, officially released by ETSI in June 2020, provides a common view on what a consumer IoT security baseline should look like. Straight to the point, while leaving out of scope requirements which would make the testing effort difficult and too long. The standard is split into 13 chapters, including requirements focused on various domains of control, such as secure authentication, software updates, software integrity, secure installation, etc.

The standard itself aims to provide a baseline of security requirements, therefore, as expected, the testing depth is medium. General security evaluation knowledge related to hardware, software and protocols security are sufficient in order to go through the requirements. The difficulty comes however from interpreting some requirements which are made “flexible” on purpose. For example, the requirement “The product shall have an update mechanism for the secure installation of updates” requires first of all consensus on what is meant by “secure installation”, especially in sense of what is good enough and what is not good enough. There are multiple other instances of such requirements where common interpretation is needed in order to reach a testing verdict. Finally, the smooth applicability of the standard will require a certain set of evidences to be provided by the developer to facilitate the evaluation. This is still expected to be much less extensive than the evidence set for a, for example, Common Criteria evaluation.

Is it possible to currently certify the security of IoT products?
In one word, yes! The existence of relevant security certification schemes was an essential aspect in the increase of security by design adoption among developers. Being able to get this official recognition in return, and use it for creating a market advantage, can stimulate manufacturers of consumer IoT products to allocate more time and budget to cybersecurity. There are in fact several options that developers can choose from, and currently the most relevant are based on the ETSI EN 303 645 standards. National certification schemes for IoT have been established in Finland and Singapore . At the same time, private certification schemes exist for certifying based on the ETSI norm . We all know that security is not a cheap business. In order to certify a product, developers will need to invest not only in contracting a testing facility, but also in order to create the necessary product documentation, as well as address possible detected security gaps. However, at the end of the day, these kind of labels and certificates distinguish a product among the thousands of other similar devices on the IoT market. And finally, a certification assignment is not only a checkbox kind of work. The testing and documentation evaluation will often help the developer in making the product more mature, improve its user and deployment guidance, or address security gaps which were not spotted during the development.

Are there, or will there be mandatory laws for IoT products security?
A regulatory background focused specifically on (consumer) IoT products has been missing so far, but it’s becoming a more and more hot topic of discussion. This is mostly because consumers will almost always be more attracted by the functionalities (or price) of a product, rather than researching its security capabilities. Therefore, such security validation needs to happen in the background, in order for consumers to be able to choose only from minimum protected devices.
The EU, as well as UK, USA, Brazil and other regions are considering local laws and regulations aimed to mandate a minimum level of cybersecurity in the products which are placed on the market. In the beginning, it is aimed that this minimum level should be something that developers can achieve without unreasonable costs or effort. Laws like the RED (Radio Equipment Directive in EU), UK IoT security law or the California IoT security law ask for a baseline security, including secure passwords, vulnerability disclosure procedure or secure software updates. While minimal, such a beginning set of mandatory requirements is expected to make a major difference in improving the security posture of IoT products available on the market. As the years go on, it is expected that this set of minimum requirements will be expanded, and the security of consumer IoT products will gradually get higher. The only thing we can hope is that, in several years from now we will see security as the “new normal”, instead of a “nice to have” feature.

OPTEX ADDS VIDEO TO EUROPE’S MOST POPULAR EXTERNAL INTRUSION DETECTOR

VXI-CMOD takes outdoor detection to another level.

OPTEX, the leading sensor manufacturer, has announced the launch of the VXI-CMOD – a new Wi-Fi camera module that can be easily integrated with its best-selling VX Infinity (VXI) sensor, adding visual verification to outdoor intrusion detection.

The VXI provides highly reliable outdoor detection with a range of up to 12m and a 90° field of view. It is used for both residential and commercial applications detecting intrusions in courtyards, gardens, driveways and secured car parks. The VXI-CMOD Wi-Fi connected camera module can be retro-fitted onto any existing wired VXI models (VXI-ST, AM, DAM), fitting snugly on top, creating a single unit visual verification system.

When the sensor detects an intruder, the integrated camera module is activated: it records the event and sends a notification to the owners’ paired mobile phone(s) (iOS or Android). The notification is made through an app called ‘OPTEX Vision’ and can be received by multiple users simultaneously. By opening the app, the recipients can access the VXI-CMOD’s live view* and the stored recording (two-second pre-alarm and 28-second post-alarm) of the event for verification.

The VXI-CMOD is enabled with Real Time Streaming Protocol (RTSP), which allows the live camera view to be streamed and recorded on a third party security system, such as NVR and VMS platforms. This provides an additional option to visually verify the event and centrally record it for identification of the intruder and reporting to the security authority.

The VXI-CMOD features a 180° panoramic view at 1080P HD, with built-in infrared LEDs for enhanced vision at night. VXI-CMOD is also equipped with a microphone. Via the app, the owners can access the camera’s live view and audio at any time.

The new camera module adds visual verification to the market-leading sensing technology of the VXI series. The ‘traditional’ VXI is one the most popular OPTEX detectors in Europe and many thousands are already installed. Now installers have the opportunity to add a new module – the VXI-CMOD – to go a step further, and deliver an all-in-one video and intruder security system for business and homeowners alike. The VXI-CMOD is available through Optex’s distributors.

*Up to three concurrent viewings. Viewing performance is subject to Wi-Fi and internet connection speed.

For more information please contact: optex@optex.com.pl; www.optex-europe.com

WITH ISEO, YOU CAN OPEN YOUR DOOR WITH YOUR FINGER

Argo is the free app by ISEO, which allows to easily manage access with a smartphone, with no need of additional software or internet connection.

Argo App by ISEO, is the ideal opening solution for private homes and small hotels, all doors equipped with Smart series devices (electromechanical locks for armoured doors, electronic cylinders and handles) can be opened and managed.
Besides the electromechanical lock for armoured doors x1R Smart, Argo app can indeed manage and control access of the doors equipped with other opening devices of the Smart range by ISEO: Libra Smart electronic cylinder, Aries Smart electronic trim set, Stylos Smart credential readers, Smart Locker electronic lock for lockers.

Thanks to the Argo App, access can be given to whoever you want, where you want, even temporarily, allowing selected people to enter reserved rooms on days and times which have been preselected. Furthermore, Argo registers the last 1000 entries and also any unauthorised access attempts. If you have a B&B with Argo 2.5 and Remote Key Delivery and Invitation functions, you will be able to offer to your guests a fast and efficient service, in particular when managing access in Bed and Breakfast structures and small hotels. With the new functions of Argo App, indeed, you can manage guests’ entry to your structure remotely using your smartphone. This way, even if you are not physically present, you can allow guests access to their rooms on the days and at the times established based on check-in and check-out, without having to physically hand over any keys.

X1R SMART – ELECTROMECHANICAL LOCK FOR ARMOURED DOORS
For residential contexts, the x1R electromechanical lock for armoured doors is the ideal product, as it makes the door not only more secure against unauthorised entries, but access is also smarter and more practical. It has the same standards in terms of dimensions as the most commonly used mechanical locks and the alkaline battery version makes installation even easier. In fact, the door does not require any external wiring connections. Depending on user requirements, different opening applications can be selected.
The x1R Smart version allows the user to interact with Bluetooth Smart Ready devices (iPhone, Android smartphone, etc.). Interaction between the x1R Smart and the opening devices, such as smartphones, takes place via the Argo application with which the administrator can manage access authorisations of the various users intuitively and without the need for any additional software or internet connection. Authorisations of up to 300 users can be added, deleted or modified. Furthermore, the list of users can be transferred from one door to another. The log of the last 1000 events relating to each door can be consulted and the report can be sent via email. The Bluetooth Smart technology also allows use of any smartphone as the remote control for opening the door at a distance of up to 10 metres.

FINGERPRINT READER
Among the latest products, ISEO presents the fingerprint reader combined to x1R Smart, the electromechanical lock for armoured doors.
The fingerprint is a very secure and convenient authentication credential: it can’t be borrowed, stolen or forgotten, and it is almost impossible to forge it.
Furthermore, the reader detects authentic fingerprints and does not allow access with fake fingerprints.
You don’t have to bring with you an inconvenient bunch of keys anymore!
Thanks to Argo App by ISEO, the electromechanical lock for armoured doors x1R Smart can be opened also by an iOS or Android smartphone, Apple Watch, card, tag and PIN codes.
It is also possible to give access only to certain people to specific areas, even choosing the period of time. You can retrieve the last 1000 events of each door, including date and time of the accesses and the unauthorized entrance attempts.
With Argo app you can store up to 300 users for each door.

 

Iterview: Peter McKee, Frogblue

Mr/Ms …, tell us something about yourself, your educational and professional background and experience?
I was born and educated in Scotland. I have been living and working in sales and marketing in Germany since 1985. In 2000 I joined Dr Ralf Hinkel at MOBOTIX to build a Global Partner Network and I have been in the IT/Security/Intelligent Solutions industry ever since.

How did everything started with frogblue? At first, it was technology company Abionix, founded in 2014, which later transitioned into the Frogblue Technology GmbH. When and how did you come up with the idea to start this company, how was that transition like, what were the most important milestones, how many employees do you have now and where do you sell your products?

The company was founded in 2014 by Rene Hinkel and his father Dr Ralf Hinkel. Rene had studied dimming electronics as the topic of his bachelors degree and at Abionix he started to develop a robust, reliable and affordable dimming solution. He quickly realized that this solution had much more potential than just dimming lights and the vision of frogblue was born. After looking at the existing market Rene and Dr Hinkel were convinced that there were no other manufacturers focusing on a high quality, easy to install, easy to expand, easily affordable and secure solution. One of the main elements of this solution had to be a reliable and globally accepted communication method between the devices so Rene and Dr Hinkel chose a Bluetooth LE solution enhanced by frogblue to give it quicker response time. Because the solution is environmentally friendly (green) and the messages and commands “hop” from one device to another the name frogblue seemed an obvious choice. We currently have around 60 employees split between hardware and software development, sales and marketing and our technical / sales support team who are also available to assist our partners in project planning. Frogblue are currently active throughout Europe and also as far away as Australia and Japan.

With frogblue everything is smart: from lighting and access control to living and sleeping. Tell us more about your system: what is it based on, how does it uses the frogs to combine all aspects of smart buildings into one solution, what are its major features?

Frogblue is based on a concept and a vision that reaches far into the future, we have a comprehensive and robust roadmap which is already entering the next phase with new products and powerful new software management Apps.
This future proof concept is made possible through a combination of robust reliable hardware and intelligent powerful software. Every frog has the built-in intelligence and logic to receive, analyze and forward messages and command to every other frogblue device in the system.
For example, the frogs that are controlling the internal and external lighting can communicate with the frogs that are controlling the garage and front door lock so when a person activates the garage door using his frogblueApp or frogKey(intelligent transponder) the lights leading to the house and inside the hallway will automatically go on and the door will unlock either immediately or on a time delay. All of this can be configured to only happen under set parameters – only at night, when its dark, after a certain time. If a window is open the heating system will be alerted, if a door is open an alarm will be sent, if the humidity goes up the ventilation will be turned on – the interaction possibilities are endless.

You market frogblue as “easy to install”. What do you imply by that? Do you need any additional IT maintenance?

Because we use an intelligent Bluetooth LE mesh network as each frog is added to the system they automatically – without any configuration- join the mesh network. As long as you have 100V-230V power the system is up and running. The Bluetooth LE Mesh network does not require, for example, the hardware installation and software configuration that a wireless based network would require. The frogs do not require a central unit or an internet connection in order to be configured or to operate. There is no need for complicated IT installation or maintenance. There is no cabling required (green, environmentally friendly). The frogs do not take up valuable space in the sub-distribution cabinet of the building. Once the frogs are installed they immediately start working in default mode – on/off and dimming functions are instantly available.

Is frogblue expandable? Can a company, for instance, install frogblue modules and accessories into one building and expand it later to another one in close proximity?

Scalability is an integral part of frogblue philosophy. In fact because of the intelligence in each frog you can introduce the “smart” concept into any home or building with just one frog. For example a frogDim2-2 with two outputs and two inputs is capable of providing an intelligent dimming solution for two 300W light circuits . This could be an open plan dinning room set up or a combined bedroom bathroom solution – with just one frog. This is also important from an affordability aspect. the user is not forced into a higher investment by having to buy an additional central unit to make the system work. If for example an office building decided they wanted to install an intelligent control system for their window shutters frogblue would be the solution, if they then wanted to enhance the effectiveness of that solution by integrating the lighting solution with the shutter system frogblue could be easily installed. They could then gradually integrate the door entry system, the heating, the alarms, the ventilation and have everything managed intelligently via time settings, temperature, humidity, motion, open door and window notifications, Astro function, and many more sensor based inputs. The system can be extended to buildings close by and far away via the frogDisplay which acts as a gateway as well as, among other things, a central control panel for setting preconfigured scenes and scenarios, controlling heating, viewing security cameras.

The robust quality of the frogblue hardware is only half the story. Frogblue also provides management software. How does it get the most out of these high-quality hardware products?

We have the software to make our hardware smart. Our dedication to intelligent software development is what differentiates us from the competition and allows us to plan for the future. Our frogs already have embedded functionalities that will be improved and increased with subsequent – free of charge- software releases. The logic module inside each frog gives us “if this then that” based capabilities. If this happens then the frogs should do that, if that happens then then the frogs should do this but only if that happens under certain conditions and only at certain times of the day/week/year/ at other times only selected frogs should react in another way – logic based software.

The frogs connect wirelessly via frogblue Bluetooth mesh network. How do you create a virtual cable between these devices?

By giving an output and an input the same name – kitchen light, back door, bathroom ventilator, security light etc- you immediately create a virtual cable between devices with no need for drilling, laying cables, re-plastering and painting. Each frog input and output is capable of receiving and sending multiple commands so without any physical cabling one frog in the system can be giving and receiving commands from multiple frogs within the system. For example in panic mode one frog can tell all other frogs in the building to turn on and off, if someone comes home to an empty house in the dark one click will turn on all lights in the house.

The major concern with the smart building is the level of security from data breach and cyber attacks aimed at taking control over the system. What did you do to make your system as secure as possible?

Security was a major factor in deciding to go with Bluetooth. Bluetooth has its own embedded encryption to which we added the frogblue 128bit encryption. We also have an embedded time stamp in every communication that is sent by the frogs. This time stamp is accurate to a split second and once the message has been sent it cannot be used again and every frog in the system will recognize this.

Your company is VDE-certified. What does it represent?

VDE stands for Verband der Elektrotechnik, Elektronik und Informationstechnik. It represents the highest standard of electrical and fire testing available in Germany. Each product is given over 100 safety tests and frogblue passed every one. The VDE certification represents safety and this is very important for both user and installer. The products are tested and inspected for electrical, mechanical, thermal, toxic, radiological and other hazards and have been proven to be completely safe.

Co-founder of frogblue, Dr. Ralf Hinkel, has also founded MOBOTIX AG, a developer of IP cameras and software with about 400 employees and other High tech business . One can assume that frogblue product is well integrated with the offerings of MOBOTIX. What are the benefits of such interaction of three companies for the end user.

There are really limitless benefits to the experience gained from starting and growing MOBOTIX from a start-up company with under 20 employees to a company with an annual revenue of over €80 million and 400 hundred employees. Many of the people responsible for the hardware and software development at frogblue were involved with developing the innovative software that put MOBOTIX in a class of its own. There are certain synergies to be drawn between the two companies – Decentralised concept, every device is a system within itself, distributed intelligence, no central point of failure, powerful software enabling high quality robust hardware. We have naturally integrated a lot of the intelligent functionality of the MOBOTIX cameras into the frogblue solution so that it is now possible to wirelessly connect both systems and use the multiple sensor and notification capabilities of each to further expand the overall effectiveness of the system. For example the a MOBOTIX camera can now interact with security lights or gates based on motion detection without any cabling necessary or a MOBOTIX thermal camera could also control the ventilation system in an industrial setting – again the possibilities are almost endless.
So although frogblue are still a young dynamic forward looking company we have many years of experience in innovative solutions development and supporting a global network of partners.

Are your products applicable to any type of buildings? Who are your major customers? Could you present or enlist a couple of case studies (give us an info on specific projects, how many and what kind of devices you used, what were customer expectations and results)?

Frogblue solutions can be used in any type of building whether it is a private residence or a commercial building. Because of the ease of installation frogblue is also ideal for retrofits and renovations in old buildings where a smart solution is desired but the cost and disruption of a new installation is prohibitive. To date we have installed frogblue solutions in private homes, holiday homes, hotels, commercial properties, renovated and new apartment buildings, industrial premises. Some examples that I can give you are a renovated villa in France with 130 frogs, industrial food processing plant in Ireland with about 40 frogs giving them a safe secure and switchless lighting and safety control solution, renovated apartment building in Belgium with over 180 frogs and 40 frogDisplay and frogAccess devices controlling every aspect of the building. Last year we also got involved with an installation in a winery that started with an intended 40 frogs for guest chalets and ended up with over 400 frogs covering not only the comfort in the accommodation but also the commercial and retail applications of the winery. This year we are starting another winery installation with over 1000 frogs planned. Another successful project was the upgrading of the lighting system in a major bank in Eastern Europe. The frogblue solution is very flexible and has something to offer in every type of building and installation.

The koronavirus pandemic has affected the smart building and security markets. Was your company affected as well and how did you adapt to this situation? In your opinion, when can we expect the market to recover?

Sadly the Corona pandemic has effected almost everybody and every industry however we have to be thankful that frogblue has continued to grow at a high rate and we will always keep looking forward. At frogblue we have been using this time to get our new products to market and work with our partners on educating them in the frogblue solutions. Generally preparing for a bright, optimistic and successful future. We already see markets recovering in many areas. I expect that construction and renovation projects will be among the first to bounce back. There is also a much higher awareness of not only what constitutes a safe and comfortable office environment but also the need to adapt to the changes brought about by having less people in the office and using resources in the most intelligent and economical way.

You are strongly positioning yourself in Adriatic region. Who are your major partners in the area, are you pleased with the sales results and growth? Where do you see possible improvements?

Together with our partner TEND we are setting up a frogblue Competence Center to provide local technical ,sales and marketing support. TEND have been a partner of ours since the very early days of MOBOTIX, almost 20 years.From this base we will train and support our new partners that come on board.
Frogblue are at the start of a very promising future in the Adriatic region and we are looking for the right partners to accompany us on the journey. If any of your readers are interested then they should contact Ales Polajnko at info@frogblue.si