SAGEM Access Control Softwares(1)
Browse Access Control Softwares
Access control software products updated recently
Gallagher Command Centre Site Plan Viewer for centralised site management visibility and situational awareness
Gallagher Software Maintenance ensures security system stays up-to-date with latest security innovations
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilised than others: financial services were quick to recognise the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realise is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimise displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyse and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organisation looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organisation is safe from innovative cyber threats. Security solutions enterprises Organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organisations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organisations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analysing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognise we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organisation's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organisation’s defences, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organisation's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious behaviour Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organisations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behaviour on your network and can prioritise threats for SOC teams for faster remediation. In-depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organisations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organisations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organisations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioural analytics The solution can then know when to remove an adversary before a breakout occurs Behavioural analytics and machine learning capabilities identify known and unknown threats by analysing unusual behaviour within the network. These have the ability to provide an essential first line of defence, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organisations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organisation cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organisations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organisations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organisations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Christopher Columbus and his Spanish colonisers brought sugarcane into the Dominican Republic at the end of the 15th century. Today, agriculture is one of the most important sectors of the Dominican Republic’s national economy and sugarcane is the country’s most important agricultural product. The processing of the sugarcane stalk produces sucrose, the main product of sugarcane. Cane accounts for about 80 percent of the world’s sugar produced, while most of the remaining percentage is made from sugar beets. Named after the man who is credited with bringing the crop into the Dominican Republic, Cristobal Colon is the second largest producer of sugarcane in the country based in San Pedro de Macoris, 45 miles east of Santo Domingo. Getting compensated accurately The company produces sugarcane in two regions of the Dominican Republic with the second site about 30 miles west of Santo Domingo. While 95 percent of the company’s revenue comes from sugarcane, Cristobal Colon also produces meats and fruits, including mangos and pineapples. Overall, Cristobal Colon owns about 23,000 hectares (or around 57,000 acres) of land, on which approximately 3,500 migrant personnel work during the harvesting season between December and May. Off-season, the company continues to employ about 1,000 people on its plantations. With such a busy harvesting season and employees that are paid in cash, Cristobal Colon was having difficulty making sure that its workers were getting compensated accurately. The company, like many others that have large amounts of migrant workers, was relying on ID cards and management’s visual verification of each person to make sure that the correct individuals were receiving their cash wages. Sometimes workers did not have their ID cards with them, and they were using another individual’s ID card to collect wages that were not their own. Espinal and his team began researching for a fail-proof way to better identify workers for cash payments out in the field Biometrically authentication “It’s a very weak way to identify people; sometimes we just had to trust that the co-worker was identifying himself correctly,” said Edgar Espinal, information technology manager at Cristobal Colon. A few years ago, Espinal and his team began researching for a fail-proof way to better identify workers for cash payments out in the field. A previous failed attempt with one software developer left Espinal searching the Internet for a software company that could help, which is how he came upon HID Global and its credential verification software development division in the United States. Cristobal Colon asked HID Global to develop a custom product that would allow them to biometrically authenticate their employees before handing them their wages, without the use of cards or certificates. Rather than a one-to-many match process to verify if a person has certificates or access to a particular site, Cristobal Colon needed a way to identify a person one-to-one, to ensure they were who they said they were. Development of the software Managers out in the field needed to know if the person giving them his fingerprint was in fact the exact person he claimed to be. “Our basic need is to know who the person giving us their fingerprint is,” said Espinal. “It took about four months to fully develop.” HID Global relied upon the expertise of employee Miriam Celi, a software engineer whose native language is Spanish To develop the solution for Cristobal Colon, HID Global relied upon the expertise of employee Miriam Celi, a software engineer whose native language is Spanish. Celi developed the software to meet the sugarcane producer’s specific needs, and wrote the program in Spanish, which included all of the manuals and graphical displays. “When we received the call from Edgar at Cristobal Colon, we knew this was going to be a unique project,” said Geri Castaldo, vice president, Business Development, Federal Identity with HID Global. “Not only was it an interesting use case for biometric software, but it’s the first time we’ve developed a solution in Spanish.” Handheld mobile readers Once HID Global developed the software to be used without cards for identification, Cristobal Colon’s IT staff built an interface with the company’s human resources and payment systems. They tied it together using handheld mobile readers from Intermec with Edgeline Technologies’ PIV endcap, which includes a Sagem compact biometric module. “It is of great importance to know we are paying the right people, regardless of whether they have a personal ID with them or not,” said Espinal. Employees are first enrolled on a desktop computer at the company’s headquarters by taking their fingerprints and making sure there are no duplicates in the system. The fingerprints are stored in the company’s HR database along with a PIN for each person. Espinal and his team were worried that the system would run into problems identifying people, since many of the workers have worn out fingerprints Problems identifying people That data is pushed to Intermec handheld devices equipped with Edgeline fingerprint accessories for use in the field. Managers on the plantation sites then use the handheld devices to scan fingerprints and PIN numbers before paying the employee. If both steps are exact matches, the worker receives their wages. Initially, Espinal and his team were worried that the system would run into problems identifying people, particularly since many of the workers have worn out fingerprints or calluses on their hands from manual labour. “We were expecting violations and a lower rate of positive ID because of the nature of them working with their hands,” Espinal explained. “We have had a few people try to misidentify themselves, but it hasn’t been possible. We have had 100% validation with no false positives or non-validations. It has exceeded our expectations.” Streamlining business practices The sugarcane producer began with 10 mobile devices and soon after increased its count to 30. Most recently, Cristobal Colon added eight more mobile devices, and more tablet PCs and desktop stations running the software to keep up with new applications that its IT staff continues to develop. One of those new applications that Cristobal Colon has found useful is tying the biometric information it has for employees into its cafeteria payment system. “Employees validate themselves with their fingerprints in the cafeteria and it goes directly into our payroll system,” Espinal explained. “We are very excited about that and it’s something that the software made possible for us to do.” As Cristobal Colon’s needs have expanded, the sugarcane company has found more possibilities to use its HID Global biometric verification software that go beyond paying workers in the field, and they continue to look for ways to use the software to simplify and streamline business practices even further. Company wants to have a way to ensure they are providing the appropriate people with their allotted number of services Expanding biometric enrolment Cristobal Colon is currently in the process of gearing up to use the software to develop a Census application, which will expand biometric enrolment into the company’s database to include family members of employees and people living in the community. The company provides a number of services to community members, such as sanitary services, education and medical services and the company wants to have a way to ensure they are providing the appropriate people with their allotted number of services, as well as making sure services are not duplicated. “We want to know every one’s biometric signatures, and better track what services are being used and who is getting the services,” Espinal said. “These are all things that we couldn’t have developed without the right partner. HID Global really worked with us to find a unique solution for our market that we couldn’t find anywhere else, and together, we developed a terrific product.”
SETAF 2016 will bring together military and industry experts to lead focused discussion group SMi Group is delighted to welcome on board Systems Engineering and Assessment Ltd (SEA), the latest speaker to sign up for SMi's 2nd annual Soldier Equipment and Technology Advancement Forum (SETAF) taking place 14-15 March in London. Uniting military & industry experts SETAF 2016 will bring together military and industry experts to lead focused discussion groups and help participants drill down on the latest strategic, technical and scientific research, all designed to allow those at the forum to return to their organisations better equipped to solve the next big programme challenges. Join the following discussion groups with SEA's Land Project Manager Justin Prowse and Senior Principal Consultant Colin Rayment: Situational Awareness: Effectively delivering data to the dismounted soldier for increased situational awareness and decisive decision making (with British Army and BAE Systems) Approaches to enhancing soldier lethality via weapon system upgrades and increased co-operation with supporting arms (with British Army, John H. Northrop and Associates and United States) The science behind the system (with DSTL, Thales and Fraunhofer Institute for Chemical Technology) Confirmed attendees With top-ranking military officers representing 10 nations and leading soldier programmes experts all under one roof, this is the event you cannot afford to miss. Our expert speaker line up 2016 includes key decision makers from the military sector (US Army, DSTL (UK), British Army, German Army, Swedish Armed Forces, Ministry of Defence (Netherlands)) and the industry sector (BAE Systems, Sagem, Rheinmetall Electronics, Thales) and many more. Over 20 hours of informal networking, more than at any other soldier system meeting in 2016! Confirmed attendees include representatives from Ministry of Defence Singapore, Thales Norway, Bundeswehr, Ultra Electronics, MOD Abbeywood, Otis Technology, Bren-Tronics, Royal Military Academy Sandhurst, Fokker Special Products, and many more. Unique opportunities for discussion, including 2 morning coffee breaks, 2 networking lunches and 2 afternoon tea sessions. Make new contacts and form the relationships you can count on in the future. After the success of our last conference, SETAF 2016 is guaranteed to sell out once again.
Sagem and Thales bring to Sofradir IR technologies originally developed for their internal purposes Sagem (Safran group), Thales and Sofradir have signed an agreement for Sofradir to acquire Sagem and Thales’ infrared (IR) detector technology development and manufacturing facilities. Sagem and Thales bring to Sofradir IR technologies originally developed for their internal purposes. IR detectors are advanced technology components at the centre of multiple military, space, commercial and scientific applications: thermal imagers, missile seekers, surveillance systems, targeting systems or observation satellites. Their performance and price are key to the competitiveness of optronics systems. Under the agreement, Sagem will transfer to Sofradir the Indium Antimonide (InSb) technology. The Quantum Well-Infrared Photodetector (QWIP) and Indium Gallium Arsenide (InGaAs) technologies will be transferred to Sofradir from the GIE III-V Lab, an economic interest group with partners Alcatel Lucent, Thales and research institute CEA (the French nuclear energy and alternate energies commission). By consolidating these IR technologies under one roof, Sofradir joins a very small circle of IR detector manufacturers with expertise in all the cooled and uncooled IR technologies. The acquisition will reinforce Sofradir’s leading position in Europe and pave the way to a global leadership position in the imaging market. Sofradir is currently ranked number one for volume deliveries of IR detectors based on its Mercury Cadmium Telluride (HgCdTe) technology. Serge Adrian, senior vice president of land defence at Thales and Philippe Petitcolin, chairman and CEO of Sagem praised the agreement that strengthens a key technopole and further enhances years of research initially carried out by Thales and then by the III-V Lab and Sagem: “We are confident that Sofradir will take these IR activities to the next level and benefit from the synergies between the different IR technologies.” “The technologies from Sagem and the III-V Lab enable Sofradir to have from this point forward the complete portfolio of infrared technologies. These assets consolidate Sofradir’s leadership position,” said Philippe Bensussan, chairman and CEO of Sofradir. “With the new technologies, Sofradir along with its subsidiary ULIS will be able to select the technology best adapted to our clients’ applications. We are in a fortified position to offer IR products with more innovation, performance and compactness in order to respond to any IR market need.”
Physical security supports a future-proof cyber security strategyDownload
Combining systems intelligence and human insight for superior securityDownload
Three reasons for adopting open architecture access control solutionsDownload
- Cognitec offers Face VACS face recognition system to enhance casino security
- Airbus provided state-of-the-art communication solutions to secure the G7 meeting at Biarritz
- FLIR Systems United VMS provides surveillance for Abu Dhabi’s safe city initiative
- Ping Identity completes FAPI conformance testing by enhancing security for Open Banking