Feenics is pleased to announce our partnership with OpenEye to offer Cloud Managed Video and Access Control Integration

By | Feenics Blog | No Comments

Liberty Lake, WASH – OpenEye, a leading provider of cloud managed video surveillance solutions, announces the integration of OpenEye Web Services (OWS) with the Keep platform, by Feenics.  The completion of this integration marks the kickoff of a strategic technology partnership between the two companies to deliver mutual clients a fully integrated cloud managed access control and video platform.

Keep, by Feenics, is an enterprise accss control platform delivered as a service through a combination of onsite hardware, cloud services, and a highly portable client user interface.  In a traditional video integration, Keep would connect to the unique IP address of each integrated recorder, whenever a user requested video associated with an access control event.  The success of this connection depends upon the network configuration where the recorder is located.  OWS integration eliminates this dependency as video requests from Keep are made against a single point of connectivity in the cloud.  Viewing video in Keep over the WAN no longer requires a VPN connection, port forwarding, DDNS, or opening inbound ports on the local network firewall.

“This type of cloud-to-cloud integration represents the future of access control and video integrations in our industry,” says Denis Hébert, President of Feenics.  “The benefits from a simplicity, reliability, and cyber security perspective are highly compelling.”

“Our clients have been clamoring for integration with an access partner whose architecture best reflects the key benefits of the OWS platform,” says Rick Sheppard, CEO of OpenEye.  “Feenics’ cloud architecture and full-fledged commitment to cyber security make them an ideal technology partner.”

About OpenEye

OpenEye is an innovator in the design and development of cloud-centric software solutions for video management, business intelligence, and loss prevention. All OpenEye Web Services platform software is developed in Liberty Lake, Washington and many of OpenEye’s products are made in America.  With OpenEye, there is more to be seen.

About Feenics

Feenics is paving the way for the future of physical security with innovative cloud-based access control solutions developed by security industry veterans.   We make it possible for organizations to systemically secure buildings, doors and assets with the only true access control as a service solution (ACaaS) built specifically for and hosted in the public cloud. Feenics works with leading access control manufacturers and integration partners to deliver the most robust solutions for secure, connected environments in the industry.  Customers include enterprise organizations, educational institutions, government agencies and other organizations seeking to leverage the power of ACaaS today and into the future.

Learn more about this integration.

Cloud Computing Tackles Emerging Cyber Threats

By | Feenics Blog, Feenics News | No Comments

Cyber threats and ransomware attacks are no match for cloud computing design-built from the ground up for information technology security. In physical security, particularly access control, the history of hacking formerly focused solely on stopping unauthorized users from duplicating or cloning information housed on cards and other devices. Now, it’s all about stopping criminals from gaining access to or attacking a customer’s network and its data through vulnerabilities in their physical security systems…

Read More

Top 5 Fears of Cloud Computing

By | Feenics Blog | No Comments
The stage is set. Cloud computing continues to rise in deployments, with users citing economic advantages, speed, agility, flexibility, elasticity and ongoing innovation.
We’re entering the realm of “everything as a service” and that includes physical security provided by Cloud-hosted security management systems (SMS). Systems integrators who can successfully adopt and offer Cloud-hosted security and access control solutions will find themselves well-positioned for the future — with the ability to deliver a wide range of managed and remote services to vertical market customers — while boosting the overall value of their company in the process with sustainable recurring monthly revenue (RMR).

Research by Gartner predicts a substantial shift in information technology spending from traditional hardware and software to Cloud computing over the next five years, with that transfer set to total $1 trillion, according to the firm’s July 2016 findings.

The Cloud has been used for nearly a decade or more in banking and financial processes but one of the biggest objections still hindering full adoption may be an ongoing concern of data security and integrity. As such, there’s a necessary education process for both systems integrators and the end user customer to understand why Cloud-hosting is inherently safe, being “purpose built” for physical security communications and data exchange.
What fears are most commonly voiced by customers and prospects when it comes to Cloud-hosted SMS? Do you know how to address objections by potential clients? Here are the top five fears you may hear from prospects and the information you need to know to dispel lingering doubts.

1. The Cloud’s data may be easily compromised
Nothing is further than the truth. In fact, the Cloud is actually safer than non-hosted environments and its software programs have been specifically engineered for safe data transmissions for the physical security environment. Using the Cloud for access control and physical security management actually equates to heightened cyber and threat protection as opposed to traditional legacy, on-premises server systems.

With Cloud-hosted systems, a multi-layered design brings together data security and data access with added safeguards. A security management system designed from the ground up as a Cloud-based product begins first and foremost with software security. Hosted systems can follow what Microsoft refers to as SD3+C: Secure by Design, Secure by Default and Secure in Deployment in Communications. In addition, encryption further protects the transmission of data between the client and the Cloud-based server using modern Secure Sockets Layer (SSL) and is something by default that most Cloud-based solutions provide. SSL is a standard security technology for establishing an encrypted link between a server and a client. SSL encryption, 2048 bit, secures the data connection as opposed to easily hacked Open SSL protocols.

In addition, the most secure Cloud-hosted access control systems also utilize IP Client. Systems with IP Client use outbound ports at the user’s site instead of inbound ports, which greatly reduces the risk of security breaches and data compromise. With IP Client, the IT staff does not have to enable any inbound network ports or set up port forwarding. This helps keep the network secure and lowers the management workload on IT.

Finally, some hardware providers enable Transport Layer Security (TLS) encryption which allows the server and client to authenticate each other and to negotiate an encryption algorithm and cryptographic keys before data is exchanged. In Cloud hosting, manufacturers auto-negotiate the TLS encryption with the controller boards as they initiate contact with the server.

2. Passwords make Cloud-hosting vulnerable
That’s definitely true — when it comes to non-hosted solutions. Passwords can be guessed, recycled or written down and all these factors could compromise the security of an access control system. However, secure, Cloud-hosted solutions don’t use default user names and passwords. Instead each hosted system is issued a unique password and can also provide additional security with two-factor authentication which can be attached to the log-in credentials of any user for an added layer of security. With two-factor authentication user accounts are linked with a second source of verification, i.e. Google authenticator, which generates a code based on a timer or counter. Users must provide this code upon entering their user name and password, which means a perpetrator would need three things in order to access the system: user name, password and access to open the device which generates the two-factor authentication code.

3. Management of Cloud software takes an IT tech
Quite the contrary: once it’s set up, no additional work has to be done. A SaaS access control solution can automatically eliminate the threat of the user losing data due to negligence or being too busy to regularly backup the database. An SMS hosted in the Cloud provides regular, automatic upgrades, daily database backups and full redundancy, eliminating the risk of having all data stored on site.

A reliable product will also provide multi-layered redundancy, meaning that multiple “write” transactions are provided. If the primary database goes down that data would exist at another location and brought back online. A second layer would be point-in-time recovery. This allows the user to restore or recover data or a particular setting from a time in the past, including history reports and recent access control transactions. If the user accidentally deletes records it only takes a quick tech support call to revert the system back to a time point before the error happened.

4. Cloud hosted systems don’t readily scale and can’t integrate legacy components
The Cloud actually provides greater flexibility and scalability of applications, and that equates to better business agility. These solutions offer a more convenient route for both small-to-medium businesses as well as enterprise customers who don’t have to go through the complexity of designing and deploying an on-premises server system.

With off-site hosting, there are no servers or appliances necessary at the customer site. This saves time and money and allows customers to future proof themselves from obsolete technology. In addition, Cloud-based SMS systems offer nearly infinite scalability, from smaller systems to large national/enterprise accounts. Cloud-hosted access control is in most cases a platform that can grow to an infinite number of access points, limited only by the controller’s hardware specifications.

Finally, with legacy equipment and Cloud-hosted solutions, the user isn’t forced into a total rip and replace. Cloud-hosted access control systems are most often hardware agnostic and can be configured for communication with many legacy devices already on site.

5. End users will balk at the price tag
Cloud-hosted solutions actually offer a lower total cost of ownership over the life of the solution. Most users don’t consider the true cost of an on-premises system which includes servers, racks, power and cooling costs, labour hours by the IT staff, operating system updates, firewall configurations, necessary VMware, etc. All these little nuances add up big.

In addition, with offsite Cloud hosting customers don’t need a dedicated IT person to administer programs and configure operating systems, databases and applications. These expenses and ongoing maintenance are alleviated as they are handled by data centres in the Cloud. Users also have access to all software functionality housed in the Cloud and can select the portions they want to manage, such as badge creation and decommissioning of access control permissions. They have choices: the option of having the systems integrator manage the solution, or, administer the system themselves with their choice of connected device, including desktop, laptop, tablet or smartphone. Integrators get the bonus of managed services, which allows them to perform maintenance and service remotely, which equals lower costs for users as opposed to paying for a service call or onsite visit. And, as a tiered solution, customers can expand without costly jumps from entry level to enterprise solutions.

Finally, users will be attracted to the possibility of being able to budget effectively with Cloud-hosted services, which move physical security from a large initial capital outlay or capital expense to an operating expense which can be planned and budgeted for easily.

Today’s systems integration is all about delivering service. And there’s no better way to deliver service in a highly flexible and scalable environment than Cloud-hosting. Cloud hosting for physical security and access control management is a sophisticated, yet user-friendly solution that provides tangible benefits to both systems integrators and end users. The challenge lies in understanding the technology and what it can do and conveying benefits to the customer.

by Brian Matthews-Director of Sales at Feenics, Inc.

Feenics Heads to PSA-TEC 2017 with Award-Winning Cloud-Hosted Access Control Platform Designed for Large Enterprises

By | Feenics Blog | No Comments

Westminster, Colo.— PSA-TECMay 7-11, 2017—Feenics Inc., a leading provider of cloud-hosted access control and a PSA Security Network Vendor will participate in PSA-TEC 2017, May 7-11 in Westminster, Colo., drawing on the momentum from recent security industry accolades and educating systems integrators on the advantages of flexible and scalable cloud-computing solutions.

Feenics launched its enterprise Keep by Feenics platform earlier this year, winning the prestigious Security Industry Association New Product Showcase (NPS) award in cloud computing and a Most Valuable Product (MVP) accolade. The newest version of Keep V3 provides extreme scalability, unprecedented flexibility and advanced security in a cloud-based Access Control as a Service (ACaaS) solution. Keep V3 integrates native visitor management and a RESTful API that allows systems installers simple integration of a wide array of complementary systems and open hardware devices, generating new revenue streams while creating a path for customers to lower their total cost of system ownership. Feenics will demonstrate Keep during exhibit hours on Wednesday, May 10 at stand A29.

View Full Release

Feenics Wins Security Industry Association (SIA) Award for Its New Cloud-based Access Control Platform for Enterprises

By | Feenics Blog | No Comments

LAS VEGAS, Nevada ISC West April 6, 2017 – Feenics Inc., a leading provider of cloud-based access control solutions, today announced it has won the Security Industry Association (SIA) New Product Showcase award in the Cloud Solutions category for its Keep by Feenics enterprise solution. The SIA awards program recognizes the year’s most innovative products, services and solutions in the industry.

“The SIA New Product Showcase award is highly competitive and we are extremely honored that our new enterprise platform for cloud-based access control has been recognized by the preeminent voice in the security industry,” said Denis Hébert, President of Feenics Inc. “This award further validates the important role access control as a service is playing in the security market and it is a profound indicator of the growing adoption of these solutions by organizations large and small.”

Keep by Feenics enables organizations to minimize the cost and complexity of deploying highly available and resilient access control systems, while providing the superior service, data availability and support required today. The solution is built on open architecture hardware and fortified by the security, disaster recovery and redundancy of Amazon Web Services.

Scalable from one door to global enterprise environments, Keep by Feenics provides a new level of flexibility and choice for organizations to manage security infrastructures, integrate third-party applications and reduce capital expenditures.

View Full Release

Feenics Wins Industry Award for New Cloud-based Access Control Platform

By | Feenics Blog | No Comments

LAS VEGAS, Nevada ISC West April 5, 2017 – Feenics Inc., a leading provider of cloud-based access control solutions, today announced it has won the Security Sales & Integration Most Valuable Product (MVP) award in the Access Control category for its new Keep by Feenics™ enterprise platform. The award reinforces the company’s commitment to providing flexible and scalable cloud-based solutions that are built for the future of access control.

“We are honored that our new enterprise version of Keep by Feenics has been recognized for its leading integration capabilities that deliver a new level of flexibility and scalability to organizations of all sizes,” said Denis Hébert, President of Feenics Inc. “The award reinforces the value of cloud-based solutions for physical security and points towards a bright future for access control as a service.”

Keep by Feenics is the industry’s most secure and flexible cloud-based access control solution that can be accessed anytime and anywhere there is an Internet connection. Built on open architecture hardware and fortified by the security, disaster recovery and redundancy of Amazon Web Services, Keep is scalable from one door to global enterprise environments. It provides the ultimate choice for managing security infrastructures, integrate third-party applications and reduce capital expenditure.

See Keep by Feenics in Action at ISC West 2017 in Las Vegas

Visit the Feenics booth #22135 at ISC West from April 5-7 for live demonstrations of the Keep by Feenics cloud-based access control solution.

View Full Release

Feenics Launches Cloud-based Access Control Platform for Large Enterprises

By | Feenics Blog | No Comments

New Keep by Feenics Platform Provides Extreme Scalability and Leverages RESTFul API For Faster Integration and Deployment. Delivers Advanced Security and Ability to Manage Systems Anywhere, Anytime.

LAS VEGAS, Nevada ISC West April 5, 2017 – Feenics Inc., a leading provider of cloud-based access control solutions, today launched its enterprise Keep by Feenics™ platform that delivers extreme scalability, unprecedented flexibility and advanced security. The new cloud-based access control as service (ACaaS) platform integrates native visitor management, and incorporates RESTful API that dramatically simplifies integrating complementary systems plus connecting Keep to applications outside of the organization. The solution’s mobile capabilities also make it possible for customers to monitor and manage systems on the go.

“The new enterprise version of Keep by Feenics solidifies our leadership in the access control as a service space with an agile solution which addresses the need for pre-configured, highly customizable systems that are easy to implement and manage,” said Denis Hébert, President of Feenics Inc. “Keep’s flexible infrastructure is particularly important for security directors in today’s smarter, more connected environments where systems must seamlessly work together.  The solution also has the unique ability to quickly scale up based on an organization’s evolving business and security requirements.”

View Full Release

Cloud-Hosted Security Gives Comfort & Convenience To Concerned Families

By | Feenics Blog | No Comments

From: SDM Magazine

The Ronald McDonald House of Western Michigan (RMHWM) in Grand Rapids has been serving families of children and youth requiring critical and essential medical care since 1990. The house can accommodate 17 families and offers compassionate support, respectful privacy, and a “home away from home” so families are able to be close to their ill children when they are needed most. A new, cloud-hosted access control and security solution lets parents focus on their child’s health while feeling safe and protected.

When RMHWM underwent a $1.2 million renovation, House Services Director Megan Priester knew it was the perfect time to consider the benefits of upgraded security for the facility. The access control system — a key card solution that required local programming at each individual door — had become cumbersome and hard to manage. It had recurrent failures, including one guest being locked inside their room…

 

Feenics Rises to Platinum Partner Status with Mercury Security

By | Feenics Blog | No Comments

Ottawa, Canada – January 17, 2017 – Feenics, Inc., Ottawa, Can., has achieved elite Platinum Partner Status for Mercury Security, Long Beach, Calif., indicative of the company’s commitment to non-proprietary hardware cloud-computing environments. Authentic Mercury Security is one of the most widely used and specified access control hardware brands in the world.

Feenics is the originator of the award-winning Keep by Feenics™ Access Control as a Service (ACaaS) cloud-hosted security management solution (SMS). The partnership lends further credibility to Keep SMS and integration with Authentic Mercury hardware.

“We are very excited to welcome Feenics as a Platinum Partner for the Authentic Mercury platform,” said Matt Barnette, President of Mercury Security. “The partnership has experienced phenomenal growth since its inception and validates the growing trend in the industry to open, cloud-based access control solutions.”

Paul DiPeso, Executive Vice President of Feenics, said “achieving Platinum Partner status with Mercury is a validation of our strategy of teaming with the best field hardware provider in the industry in Mercury, while Feenics focuses solely on developing the most robust, cloud-based, access control solution, to meet the growing needs of the end-user market.  The numbers don’t lie with our rapid growth and we are fortunate to have a tremendous partner in Mercury.  Their support has been second to none.”

View Full Release

SSI’s 2017 Security Industry Forecast

By | Feenics Blog | No Comments

Denis Hebert, President, Feenics; Chairman, Security Industry Association (SIA)

From Security Sales & Integration:

The security industry will remain robust over the coming years, yet the focus will be on business continuity and convergence of security services across the enterprise. That said, the influence of IT over the physical security domain will increase, driving standards, imposing cybersecurity considerations, manage compliance and further commoditize hardware devices.

As product commoditization becomes more prevalent, dealers/integrators will need to focus on services, thereby building recurring offerings to end users through subscription-based business models such as the Cloud, value-based contracts, etc.

With the advent of Cloud-based services and alternate suppliers — such as cable/phone, DIY video, etc. — increasing response issues and potential UL considerations, the central station monitoring side of the business will be subject to major competitive pressures.

The manufacturing segment of the value chain has enjoyed safe margins for a long time, but product commoditization will put pressure on this area in the coming years. Those manufacturers capable of assembling or developing Cloud- or service-based offerings will likely be the companies with long-term survivability.