Banking & finance security applications
Brian Ishikawa has always kept tight control over his video surveillance system, allowing only authorised personnel within his corporate security division to access video footage. So it was a change for Ishikawa, Senior Vice President and Director of Corporate Security for the Bank of Hawaii, to get used to the idea of authorised staff from the bank’s branch division being able to review video for operational, compliance and marketing-related purposes. The insights collected from the vide...
Retail banking combines a demand for high security with complex workflows. Staff need efficient access. Facility managers need the flexibility to design access permissions around individual needs, so not everyone can access every area whenever they choose. Nobody wants to carry or track large numbers of keys. These were the requirements, managers of Creval — a regional bank in Italy — faced when seeking an alternative to a mechanical master-key system. Creval needed new access contr...
Retail banks and financial services companies have a long history of dealing with the risk and potential threat of criminal activity. Arecont Vision Costar understands the unique needs of the retail banking and financial services market and provides customer-proven megapixel camera technology to specifically meet those needs for our customers around the world. Bank crime statistics In a typical year in the United States, according to the FBI cash losses total around $7.5 million, only about...
Banks and financial institutions have more complex and diverse requirements for video surveillance technology than most other organisations. From corporate buildings, to branch offices, data centres, ATMs and cash depots. Several European Banks benefit from using Mirasys Video Management Software (VMS), which provides high privacy protection and robust technology. Networking the video management system of the bank’s branch offices provides users a single logical system that can be used fr...
“It’s obvious that a prominent bank like BNP Paribas has to take processes like security extremely seriously", said Alan Ford, Security Manager at BNP Paribas. Spread over several office buildings, more than 4000 staff make daily use of the AEOS Security Management Platform to enter the restricted areas for which only they have been authorised. BNP Paribas needs be certain that they can rely on their access control system. Even though their previous Nedap WinXS system did just t...
As technology continues to catapult forward at a significant pace in the 21st century, banks are increasingly facing new security challenges to safeguard their buildings, staff, customers, and financial operations. Because of this, it is critical that banks invest in security systems that meet the complex and unique requirements of the financial environment. Vanderbilt’s SPC provides this solution through advanced, dedicated intruder detection features and products for banking applic...
Booth number: 14039 Dahua Technology USA Inc. will display video surveillance solutions, access control and intercoms at ISC West. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. The first year that we exhibited at ISC West was in 2012. That was before we had a local US operation. The market started to pick up our brand and was surprised that we offer extensive product portfolios. In 2014, we registered our US office and continued to participate in ISC West. Through our presence at the show, customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints. We are local here and help our customers to grow their business and increase their satisfaction with us. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organisation Q: What strategies do you use to get the most out of exhibiting at ISC West? A trade show is definitely a lot of investment within a few days. Therefore, how we create the best ROI and meet the right customers are very important. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organisation, including products and technical expertise as well as the sales team. We use an internal and highly coordinated plan with the team to get a better result. We make sure everyone is on the same page in terms of the products/technology we are going to present and have the people with the best knowledge to present to customers who visit our booth. Therefore, a highly coordinated team strategy is required. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Every company has their ways to follow up with the leads and evaluate the ROI from the show. The way we are using is to upload all our leads to our software and track all these leads afterwards. If they are not already buying from us, our goal is to convert them to become a registered dealer. Customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints If they are already our registered dealers, we seek to grow their business by using our latest technology solutions. In general, all marketing activities in business today require a clear ROI, and it has to tie into the sales numbers. From our experience, the ISC West show provides the best ROI among other shows in the North American market. Q: What company activities (outside the show floor) does your company organise each year? We have a partner event and invite our value-added dealers and partners. We’ve been hosting this event since 2015. Q: What sets ISC West apart from other trade shows on the calendar? As I mentioned, ISC West provides the highest ROI among other shows in the North America market. This show also brings many of our customers and partners to the city as well. I guess people value this opportunity to meet and discuss the technology, the industry trends, and the business to figure out how we can grow together. Other trade shows might be smaller than ISC West and targeted at different markets or address different scopes of the industry need. Every show we attend in 2019 plays a strategic role for us to communicate with the market and find the customers we are looking for.
Booth number: 8045 Costar Technologies, Inc. is a public company that designs, develops, manufactures and distributes a full range of products for the video surveillance and machine vision markets. Costar consists of five operating companies: Arecont Vision Costar, CohuHD Costar, Costar Video Systems, Innotech, and IVS Imaging. The combined product portfolio consists of surveillance cameras, video surveillance systems, recorders, monitors, lenses, cables, accessories, and cloud-enabled services. For more about their presence at ISC West, we contacted Jeff Whitney, Vice President of Marketing for Arecont Vision Costar, a Costar Technologies, Inc. business unit. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. One of our companies, Arecont Vision, exhibited in ISC West booth 17147 in 2005, a tiny space on which the hopes of the company rested. At the time AV was focused on pioneering IP megapixel surveillance cameras, but today we are part of Costar Technologies, offering cameras, VMSs, and recorders. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry. Talking with those who were with the company at time, the enthusiasm of the booth team reached the security dealers and systems integrators who were attending, helping bring megapixel cameras to a much wider audience. Q: What strategies do you use to get the most out of exhibiting at ISC West? The Costar companies have a very deep portfolio of products for the security market, and we bring our latest products from each business unit to ISC West. Attendees come in part to see the latest tech, and we drive our development cycle to have exciting new products to unveil on the show floor. We also have meeting space in the booth to provide one-on-one time with our executives and sales team, while sponsoring free admission to the expo for all who want it. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Unveiling our latest products and solutions to existing customers and partners is key to a successful event, and ISC West’s large impact on the industry ensures that many will attend. Perhaps even more important is informing those attending of the strength of the Costar product portfolio, including many Made in USA products and services that others don’t deliver. Both help to drive leads for projects in which we can really benefit our partners and end user customers. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show Q: What company activities (outside the show floor) does your company organise each year? A large show like ISC West brings many of the Costar business units together, providing an excellent opportunity to continue bonding as a team, as well as to participate in events beyond the show floor. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show. Q: What sets ISC West apart from other trade shows on the calendar? ISC West brings a very large number of interested, security-focused systems integrators, dealers, consultants, and end user customers all to one place for a three-day expo. That audience and opportunity to share our message validates the investment any large show requires from Costar or others. While some industry events have struggled to find and maintain their audiences, ISC West continues to deliver quality, knowledgeable attendees from across the Americas and around the world. The show differs from other events we do, which are typically regional in attendance or focused more on specific vertical markets.
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. We have come a long way from a little-known surveillance manufacturer with a small booth size VIVOTEK has been an exhibitor at ISC West for many years now. Looking back, we have come a long way from a little-known surveillance manufacturer with a small booth size to one of the global providers in the security industry with a recognisable and trusted brand. Now, we are well-known in the industry and are proud of our accomplishments, but we feel greater things are still in front of us. Q: What strategies do you use to get the most out of exhibiting at ISC West? Each year, we want our booth to tell our stories – who we are, what we do and what we are capable of, and where we are heading. We do not want to just be another camera manufacturer who only promotes and displays products; we want to be the solution provider that customers are looking for. In addition, we have very knowledgeable sale managers who can assist visitors at our booth who are looking for surveillance, whether it’s an upgrade or a totally new solution. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Gain industry knowledge and perspective as to where surveillance security industry is heading Like any trade show, it is difficult to quantify success. We attend ISC West to promote the VIVOTEK brand, meet and discuss with customers and gain industry knowledge and perspective as to where surveillance security industry is heading. If we achieve these, then ISC West is a success for us. Q: What company activities (outside the show floor) does your company organise each year? Our main focus each year at ISC West has always been the interaction with customers and potential customers on the show floor. We pride ourselves in the products and technology we offer, and there aren’t any other trade shows in North America to showcase our capabilities than ISC West. Q: What sets ISC West apart from other trade shows on the calendar? ISC West is the industry standard of security trade shows in North America. Since we are a security surveillance manufacturer, ISC West is the one show that all manufacturers in this industry must attend.
Booth number: 26041 March Networks is a global provider of video surveillance and video-based business intelligence solutions. Their product portfolio is end-to-end, ensuring that customers can deploy comprehensive solutions designed to help them address real business challenges and improve performance. At ISC West this year, March Networks will be showcasing new hosted services, new PTZ cameras and additional offerings. Attendees will also be encouraged to discover their solutions for banking, retail, cannabis and transportation – all of which help organisations transform video into business intelligence through the integration of surveillance video, analytics, and data from business systems and IoT devices. For more about their presence at ISC West, we contacted Peter Strom, President and CEO, March Networks. And not surprisingly, the technology was a lot less sophisticated compared to what we see today Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. I believe March Networks first exhibited at ISC West in 2001. I did not join the company until 2003, however I had been working in the industry for several years already, and can recall that the exhibitions back then had a much different feel. For one thing, there weren’t the very large companies we see today dominating a lot of the landscape. And not surprisingly, the technology was a lot less sophisticated compared to what we see today. Anyone who has worked in physical security for a long time can attest to the remarkable shift we have seen over the years, first with the transition from analogue to IP video and all that entails, to security analytics, to today’s truly advanced business intelligence applications, hosted solutions, and artificial intelligence, computer vision and similar content analytics. Q: What strategies do you use to get the most out of exhibiting at ISC West? Our most effective strategy by far is scheduling our business meetings in advance of ISC West. Our sales team does a very good job of planning meetings with enterprise end users and channel partners ahead of time, so we’re hitting the ground running even before the doors open on Day 1 of the event. In addition, our channel partners are also very well organised, and know which organisations they are going to bring to our booth during ISC West. This pre-planning saves us a tremendous amount of time and ensures that we make the most of the opportunity to meet face-to-face with the many decision-makers who have travelled to the show. The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year Q: How do you quantify your success at ISC West? What ROI do you receive from the show? The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year. Of course we do track the number and quality of the leads we capture as well; however, our face-to-face meetings with end user organisations and channel partners are the primary measures of our ROI. Q: What company activities (outside the show floor) does your company organise each year? The activities we organise outside of the show floor vary from year to year. We have hosted customer appreciation events and roundtable events. We will typically organise an internal sales meeting as well to take advantage of the fact that many of our salespeople and product managers are in the same location. Q: What sets ISC West apart from other trade shows on the calendar? The timing of ISC West is good for most people, as it is still early enough in the budget cycle for most customers to leverage the show to help make decisions – particularly in our banking, retail, cannabis and transit target verticals. Holding the event consistently in Las Vegas is also beneficial, as it makes it easier for people and exhibitors to plan in advance. The city itself is well equipped to handle large exhibitions, offering everything from a central conference space at the Sands to the convenience of nearby accommodations, restaurants etc. Travel is typically convenient as well. In our opinion, ISC West is the premier industry show in North America and appears to be gaining momentum each year.
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valuable business intelligence analytics; TurboHD (HD over coax) for high resolution video using existing cabling; PanoVu and multi-sensor cameras. We will also feature Hikvision’s central management system, HikCentral, which provides a highly-scalable, reliable, and efficient centralised system management. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience? Hikvision has exhibited at ISC West since 2006. Our presence has grown considerably since then. Each year we showcase Hikvision’s latest technologies and the evolution of the brand through ad campaigns: “Heartbeat of Security” (2016), “Art of Video Surveillance” (2017), and “Achieve Extraordinary” (2018). At ISC West, Hikvision enjoys re-connecting with existing customers and developing new partnerships. Over the years, Hikvision has demonstrated growth and strength within the industry and will continue to support its partners through the dedicated workforce that makes up Hikvision North America. Q: What strategies do you use to get the most out of exhibiting at ISC West? The strategy is simple. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners. With our latest products displayed at our booth and our team of product managers, vertical-market leaders, and other technical gurus readily available in one place, it’s a great opportunity to connect with our current and future partners. Of course, we also have one-on-one client meetings in our meeting rooms throughout the show. And, we also host interactive experiences including trivia games, product demonstrations, and other technical presentations at the Thought Theater in our booth. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Hikvision quantifies its success with a variety of metrics including traffic throughout the booth, attendance at educational sessions we host, the number of meetings we conduct with customers, and responses from our sales team on the engagement with integrators and end users after the show. We also measure the feedback we receive from our advertising campaigns whether it’s through our signage at the show or coverage in publications. Q: What company activities (outside the show floor) does your company organise each year? We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners, and end users. We consider it a fun way for us to say thank you to our valued partners in a casual setting. We’re also an enthusiastic sponsor of the Mission 500 Security 5/2K. Hikvision is fielding a running team, and we’ve begun our fundraising in earnest. Corporate social responsibility is part of our DNA at Hikvision, and the Security 5/2K is a wonderful way to join with our security industry colleagues to make a difference in kids’ lives and give back. Q: What sets ISC West apart from other trade shows on the calendar? Hikvision attends a variety of important conferences and trade shows throughout the year, but ISC West is the big show that attracts international attendees that everyone looks forward to. We wouldn’t miss it.
Booth number: 20031 Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond Pelco’s priorities for 2019 at ISC West are informed by worldwide trends in the security industry. As a result, Pelco will be focusing on enhancing cloud connectivity and cybersecurity for their customers. In addition, VideoXpert is Pelco’s best-selling video management solution, so this system will be the primary solution focus moving forward. Pelco is also planning to build upon Pelco Professional Services, which will include VxCare, a three-tier service plan for VideoXpert owners available worldwide this May. Overall, Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. Pelco was established in its current form around the year 1987, we have been attending ISC West since at least then. One memory that stands out is having to make many coax cables connect with all the analogue cameras and switchers. Q: What strategies do you use to get the most out of exhibiting at ISC West? We truly value the media relationships we’ve nurtured over the years. The security trade media specifically have played a pivotal role in sharing the latest news as it relates to our industry and ISC West. In addition to media relations, e-mail blasts and blogs are also key tools to build buzz around our exhibit. Lastly, we utilise a playbook and training protocols developed for our sales department. This information ultimately benefits our customers because they will receive accurate and up-to-date information about our video surveillance solutions. One way we quantify our success at ISC West is to keep track of the number of people attending our booth Q: How do you quantify your success at ISC West? What ROI do you receive from the show? One way we quantify our success at ISC West is to keep track of the number of people attending our booth. The show is considered the premier event in North American security so a major way we measure our ROI is through initial or final meetings with customers and partners. These initial connections can happen on or near the show floor. In addition, our product managers and engineers create a dialogue with our customers so they can determine the transferrable value of a potential solution, which in turn influences our product world map. Q: What company activities (outside the show floor) does your company organise each year? We have participated in the Security 5K in support of Mission 500. Additionally, we sometimes host customers at local end user sites so they get to see the system in operation. Q: What sets ISC West apart from other trade shows on the calendar? It’s the best-attended security conference in North America by far, attracting both domestic and international visitors.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organisation, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR world. Large cloud environment But modern applications are difficult to secure. SaaS based, web, mobile, or custom made all work on different platforms and frameworks. It’s a headache managing all the APIs needed to automate and sync tools. This introduces risk. The greater the number of apps the broader the attack surface and therefore the greater the chance there will be blind posts. Keeping up to date with updates and new security policies is never easy There are also added hazards. Applications are always changing. Keeping up to date with updates and new security policies is never easy, but especially hard in a large cloud environment. Failure to adopt changes puts the organisation and customers at further risk. But the biggest obstacle is keeping applications and APIs out of harm’s way. It’s a near on impossible task when attack methods and sources are constantly changing. More advanced threats To be specific there are four emerging challenges when it comes to protecting apps. Firstly, managing the good and the bad bots and spotting which is which, secondly securing APIs as IoT adoption intensifies, thirdly the relationship between securing apps and DevOps and ensuring ownership of security, and finally denial of service attacks that use newer tactics such as brute force. Basic security hygiene dictates that security teams refer to the OWASP Top 10. It’s considered the ‘ten commandments’ in security circles, providing a starting point for ensuring the most common threats and vulnerabilities are managed, detected and mitigated. Web Application Firewalls also come into the fray with guidance on testing for the ways hackers exploit vulnerabilities. However, though the basics are good to have in place, there are always more advanced threats to take care of. Bots being a big one. Bot management The more sophisticated bots will go as far as to mimic human behaviourAstonishingly about half of internet traffic is bot generated. Half of it is from bad bots. Discerning the good from the bad isn’t easy though and explains why around 80% of organisations can’t make a clear distinction between the two. Bad bots can do a lot of damage like take over user accounts and payment information, scrape confidential data, or hold up inventory and skew marketing metrics. The more sophisticated bots will go as far as to mimic human behaviour and bypass tools like CAPTCHA and even device fingerprinting based protection ineffective. Securing APIs Then there’s the complications derived from machine-to-machine and internet of things (IoT) communications. The more integrated ‘things’, the more data there is, the more events there are report on, and the more activity there is reliant on APIs to make the ‘things’ useful and agile. That’s what makes them a target and the threats to API vulnerabilities include injections, protocol attacks, parameter manipulations, invalidated redirects and bot attacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks Denial of service (DoS) You might think there’s little to add to the swathes of denial of service warnings. Yet when businesses are still being targeted and feeling the ill effects it’s worth mentioning again that different forms of application-layer DoS attacks are still very effective at bringing application services down. Even the greatest application protection is worthless if the service itself can be knocked down This includes HTTP/S floods, low and slow attacks (famous examples being Slowloris, LOIC, Torshammer), dynamic IP attacks, buffer overflow, Brute Force attacks and more. The IoT botnets are the culprits and have made application-layer attacks so popular that they have become the preferred DDoS attack vector. Even the greatest application protection is worthless if the service itself can be knocked down. Continuous security It may seem easy to say but for modern DevOps, agility is valued at the expense of security. We see time and again examples of where development and roll-out methodologies, such as continuous delivery, mean applications are exposed to threats each time they are modified. There’s no doubt it is extremely difficult to maintain a valid security policy and protect sensitive data in dynamic conditions without creating a high number of false positives. But we now find that this task has gone way beyond the capability of humans. Organisations now need machine-learning based solutions that map application resources, analyse possible threats, and create and optimise security policies in real time. Reaching this level in security planning should be a big wake-up call that security automation is an essential not a nice to have. Running security plans The board needs to know that investment is critical to protect their profits It’s critical that the security solution your company adopts protects applications on all platforms, against all attacks, through all the channels and at all times. The board needs to know that investment is critical to protect their profits. As such there are six things they need to know: Application security solutions must encompass web and mobile apps, as well as APIs. Bot management solutions need to overcome the most sophisticated bot attacks. DDoS mitigation must be an essential and integrated part of application security solutions. A future-proof solution must protect containerised applications, severless functions, and integrate with automation, provisioning and orchestration tools. To keep up with continuous application delivery, security protections must adapt in real time. A fully managed service should be considered to remove complexity and minimise resources. No amount of human power will beat the bots. That last point is the most critical. Skill is essential in designing and running security plans and policies that work. But the plans can’t be executed without automated tools. There are just too many decisions to make in a split second. Combining both is the path to an effective app protection strategy and a stronger brand to boot.
Edge devices (and edge computing) are the future. Although, this does seem a little cliché, it is the truth. The edge computing industry is growing as quickly as technology can support it and it looks like we will need it to. IoT global market The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 according to a recent Forbes article titled, “10 Charts That Will Challenge Your Perspective of IoT’s growth”. IoT devices are not the only edge devices we have to deal with as the total number of connected edge devices includes the likes of devices like security devices, phones, sensors, retail sales devices, and industrial and home automation devices. The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 The sheer number of devices begins to bring thoughts of possible security and bandwidth implications into perspective. The amount of data that will need to be passed and processed with all of these devices will be massive. There needs to be consideration taken by all business owners and automation engineers into how this amount of data and processing will be conducted. Ever-expanding edge devices market As the number of edge devices in the marketplace and their use among consumers and businesses rises, the need to be able to handle the data from all of these devices is no longer going to be suitable for central server architectures. We are talking about hundreds of billions and even trillions of devices. According to IHS Markit researchers’ study, there were 245 million CCTV cameras worldwide. One has to imagine there are at least 25% of that many access control devices (61.25 million devices) based on a $344 million market cap also calculated by IHS Markit’s researchers. If all the other edge devices mentioned earlier are considered then one can see that trying to route them all through servers for processing is going to start to become difficult if it hasn’t already, -which arguably it already has, as is evidenced by the popularity of cloud-based solutions amongst those businesses that already use a lot of edge devices or are processing a lot of information on a constant basis. Cloud computing The question is whether cloud computing the most effective and efficient solution as the IoT industry grows The question is this; is cloud computing the most effective and efficient solution as the IoT industry grows and the amount of edge devices becomes so numerous? My belief is that it is not. Taking the example of a $399 USD device that is just larger than the size of a pack of cards and runs a CPU benchmarked at the same level as a mid-size desktop. This device has 8GB RAM and 64GB EMMC built-in and a GPU that can comfortably support a 4K signal at 60Hz with support for NVMe SSDs for add-on storage. This would have been unbelievable five years ago. As the price of edge computing goes down, which it has done in a dramatic way over the last 10 years (as can be seen with my recent purchase), the price to maintain a central server that can perform the processing required for all of the new devices being introduced to the world (due to the low cost of entry for edge device manufacturers) becomes more expensive. This introduces the guarantee that there will be a point where it will be less expensive for businesses, and consumers alike, to do the bulk of their processing at the edge as opposed to in central server architectures. Cloud computing is now being overtaken by edge computing, the method of processing data at the edge of the network in the devices themselves Edge computing There are a plethora of articles discussing and detailing the opposition between the two sides of the computing technology coin, cloud computing and edge computing. The gist of it is that “cloud computing” was the hot new buzzword three years ago and is now being overtaken by “edge computing.” The truth is that cloud computing is a central server architecture hosted at someone else’s location. Edge computing is going to be a necessary development in the technology industry Edge computing is the method of processing data at the edge of the network (in the devices themselves) and allowing for less resources required at a central location. There is certainly a use case for both, however the shift to edge computing amongst the general public and small to mid-sized businesses will not be a surprise to those players, who have been paying attention. One article titled, “Next Big Thing In Cloud Computing Puts Amazon And Its Peers On The Edge” by Investor’s Business Daily takes the stance that edge computing is going to completely displace centralised cloud computing and even coins the phrase, “Cloud computing, decentralised” to explain edge computing. It speaks for the stance that most experts in technology seem to be taking, including Amazon Web Services’ VP of Technology, Marco Argenti according to the same article. We know that edge computing is going to be a necessary development in the technology industry, and it is happening as I write this, and quickly at that. Cost efficiency of edge processing As time goes on, the intersection between the prices of network bandwidth, edge processing and maintaining super powerful central servers will cause edge processing to be the most efficient and cost-effective way to maintain a scalable network in any environment, including datacenters. Owning a central server or utilising edge computing become the better options As it currently stands, most residential users can only achieve a 1Gbps WAN (internet) connection, and small to medium-sized business can’t get much more but seem to get much less, based on my personal experience. When more than 1Gbps needs to be processed, cloud computing becomes very expensive at which point, owning a central server or utilising edge computing become the better options. Then you look a total cost of ownership and when the cost of edge computing is less expensive than the cost of maintaining central server architectures, edge computing becomes the single best option. So, I’ll say it again, edge devices (and edge computing) are the future.
As political winds present new challenges for Chinese companies doing business in the U.S. market, the countdown is under way to implementation of a ban on sale of Chinese manufacturers’ video surveillance products to the Federal government. Some good news is a delay enacting the wider-reaching “blacklist” aspects of the ban. Meanwhile, possible sanctions to prevent U.S. manufacturers from selling components to Chinese companies are posing immediate public relations difficulties – and the possibility of eventual more tangible ones. Chinese ban imposed by U.S. government The “Chinese ban” provision [[Paragraph (a)(1)(a) of section 889 of Title VII of the National Defense Authorisation Act (NDAA) for FY 2019] prohibits Federal government procurement of “equipment, systems, or services provided by specified entities.” The “specified entities” are Huawei Technologies Co., ZTE Corp., Hytera Communications Corp., Hangzhou Hikvision Digital Technology Co. and Dahua Technology Co. Hikvision and Dahua are two of the largest manufacturers of video surveillance equipment, and Huawei manufactures HiSilicon chips widely used in video cameras. NDAA specifies that the ban be implemented within a year of the law taking effected The “Chinese ban” provision is an open Federal Acquisition Regulations (FAR) Case, and a proposed FAR draft rule is due in early June. NDAA specifies that the ban be implemented within a year of the law taking effected (signed by President Trump on August 18, 2018). Blacklisting Chinese video surveillance parts Implementation of a “blacklist” provision has been spun off into a separate FAR Case, and enactment has been delayed allowing time for public comments on its ramifications. The provision [Paragraph (a)(1)(B) of section 889 of Title VII of the National Defense Authorisation Act (NDAA) for FY 2019] addresses “entities that use covered equipment.” As it relates to the video surveillance market, this provision has been interpreted to mean, for example, that an integrator that sells Hikvision equipment to anyone (e.g., to a small retailer) would be banned even from selling non-Hikvision equipment to the U.S. government or ‘recipients of Federal loan or grant funds.’ Obviously, this represents a broader impact on the industry compared to the Chinese equipment sale ban. The government’s stated reasons for the delay include concern about a dramatic reduction in the available industrial base Reduction in available industrial base The government’s stated reasons for the delay include concern about a dramatic reduction in the available industrial base (including small business suppliers), who will no longer be able to sell to the government, either because their non-government business is more valuable, or due to the cost of the potential regulatory burdens associated with compliance. Another concern is that Federal grant recipients in rural areas may be ‘disproportionally impacted … due to the limited number of market options in rural areas.’ The delay will allow time for a public meeting to solicit input on the proposed rulemaking The delay will allow time for a public meeting to solicit input on the proposed rulemaking. In fact, the Department of Defense (DoD), General Services Administration (GSA) and NASA (National Aeronautics and Space Administration) are hosting a public meeting on July 19 from 9 a.m. to 3 p.m. at the Department of Interior (DOI) Auditorium in Washington, D.C. Interested parties may also attend virtually via the Internet. NDAA ban on Chinese technology, equipment Furthermore, a proposed rule of implementation will be published, followed by a second public meeting. The Office and Management and Budget will solicit feedback on proposed changes to existing grants and loans and consider public comments and feedback prior to finalising changes. The White House has sent a legislative proposal to Congress to "adjust certain implementation deadlines to allow for additional stakeholder engagement." The Federal Acquisition Security Council would be tasked with submitting a report “containing a discussion and recommendations regarding any changes required for effective implementation of that section.” Do these processes represent hope for leniency? Hikvision targeted in ban The NDAA ban is one of several issues facing Chinese companies in the U.S. market The NDAA ban is one of several issues facing Chinese companies in the U.S. market. Another is snowballing backlash about the involvement of surveillance companies in human rights abuses at detention camps in the Xinjiang region of China. For example, a number of Congressmen and Senators have sent a letter asking the U.S. State Department and Treasury to impose sanctions, export controls and financial disclosures to counter the human rights abuses. In response, Hikvision has retained human rights expert and former U.S. Ambassador Pierre-Richard Prosper to advise the company regarding human rights compliance. According to a company spokesperson: “Hikvision takes these concerns very seriously and has engaged with the U.S. government regarding all of this since last October.” Furthermore, Hikvision expressed optimism at the ISC West trade show. The Trump administration has also singled out Hikvision and is considering seeking limits on the video surveillance giant’s ability to buy American technology, similar to a ban already implemented against chipmaker Huawei. HiSilicon chips, manufactured by Huawei, currently run millions of security cameras across the United States, and several video camera manufacturers are rethinking their use of HiSilicon chips in wake of the ban.
IFSEC Global, like any large trade show, can be daunting for attendees. At big shows, there can be hundreds of physical security manufacturers and dealers vying for your attention. As the scope of physical security expands from video surveillance and access control to include smart building integrations, cybersecurity and the Internet of Things (IoT), there is an increasing amount of information to take in from education sessions and panels. With IFSEC Global approaching next week, we present eight hints and tips for visitors to make the most out of trade shows: 1. Outline your objectives As the famous saying goes, “Failing to plan is planning to fail!” Once you know your objectives, you can start to research who is exhibiting Before you plan anything else, ensure you know what you need to achieve at the show. By clearly noting your objectives, you will be able to divide your time at the show appropriately, and carefully choose who you speak to. If there is a particular project your organisation is working on, search out the products and solutions that address your security challenges. If you are a security professional aiming to keep up with the latest trends and technologies, then networking sessions and seminars may be more appropriate. 2. Bring a standard list of questions Prepare a list of specific questions that will tell you if a product, solution or potential partner will help you meet your objectives. By asking the same questions to each exhibitor you speak to, you will be able to take notes and compare their offerings side by side at the end of the day. This also means you won’t get bogged down in details that are irrelevant to your goals. 3. Do your homework Once you know your objectives, you can start to research who is exhibiting and decide who you want to talk to. Lists of exhibitors can be daunting, and don’t always show you which manufacturers meet your needs. Luckily, most trade show websites provide the option to filter exhibitors by their product category. Once you know your objectives, you can start to research who is exhibiting and it may be easier to download the floor plan to your phone/tablet Many exhibitions also offer a downloadable floor plan, grouping exhibitors by product category or by relevant vertical market. It may be easier to download the floor plan to your phone/tablet or even print it out, if you don’t want to carry around a weighty map or show-guide. 4. Make a schedule Once you have shortlisted the companies you need to see, you can make a schedule that reflects your priorities. Even if you are not booking fixed meetings, a schedule will allow you to effectively manage your time, ensuring you make time for the exhibitors you can’t afford to miss. When scheduling fixed meetings, keep the floor plan at hand If the trade show spans several days, aim to have your most important conversations early on day one. By the time the last afternoon of the show comes around, many companies are already packing up their booth and preparing to head home. When scheduling fixed meetings, keep the floor plan at hand to avoid booking consecutive meetings at opposite ends of the venue. This will ensure you can walk calmly between stands and don’t arrive at an important meeting feeling flustered! 5. Make time for learning If you’re on a mission to expand your knowledge in a given area, check the event guide beforehand to note any education sessions you may want to attend. Look for panels and seminars which address the specific needs of your project, or which will contribute to your professional growth. This is one of the best opportunities you will have to learn from industry leaders in the field. Be sure to plan your attendance in advance so you can schedule the rest of your day accordingly. Check the event guide beforehand to note any education sessions you may want to attend and be sure to plan your attendance in advance 6. Keep a record Armed with your objectives and list of questions, you will want to make a note of exhibitors’ responses to help you come to an informed decision. If you’re relying on an electronic device such as a smartphone or tablet to take notes, you may like to consider bringing a back-up notepad and pen, so you can continue to take notes if your battery fails. Your record does not have to be confined to written bullet points. Photos and videos are great tools remind you what you saw at the show, and they may pick up details that you weren’t able to describe in your notes. Most mobile devices can take photos – and images don’t need to be high quality if they’re just to refresh your memory. 7. Network – but don’t let small talk rule the day It may seem obvious, but don’t forget to exchange business cards with everyone you speak to It may be tempting to take advantage of this time away from the office to talk about anything but business! While small talk can be helpful for building strong professional relationships, remember to keep your list of questions at hand so you can always bring conversations back to your key objectives. Keeping these goals in mind will also help you avoid being swayed by any unhelpful marketing-speak. It may seem obvious, but don’t forget to exchange business cards with everyone you speak to, or even take the opportunity to connect via LinkedIn. Even if something doesn’t seem relevant now, these contacts may be useful in future. Have a dedicated section in your bag or briefcase for business cards to avoid rummaging around. 8. Schedule time for wandering With your most important conversations planned carefully, there should be time left to explore the show more freely. Allowing dedicated time to wander will give you a welcome break from more pressing conversations, and may throw up a welcome surprise in the form of a smaller company or new technology you weren’t aware of. Allowing dedicated time may throw up a welcome surprise in the form of a smaller company or new technology you weren’t aware of Security trade show checklist Photo Identification: As well as your event pass, some events require photo identification for entry. Notebook and pen: By writing as you go, you will be able to compare notes at the end of the day. Mobile device: Photos and videos are great tools to remind you what you saw at the show, and may pick up details you missed in your notes. Paper schedule and floor plan: In case batteries or network service fail. Business cards: Have a dedicated pouch or pocket for these to avoid rummaging at the bottom of a bag. Comfortable shoes: If you’re spending a whole day at an event, and plan on visiting multiple booths, comfortable shoes are a must!
Panasonic is selling off 80% of its video surveillance business to a private equity firm but will retain 20%, and the new company will continue to use the well-known Panasonic brand. The move is aimed at reinvigorating a business challenged by new competition from large Chinese companies and lower prices of video surveillance equipment. Strategic business alliances Panasonic is establishing a new company made up of its security systems business, and Polaris Capital Group Co. will acquire 80% of the outstanding shares of the new company. The decision was approved by the board of directors on May 31, and the transaction is expected to be completed by Oct. 1. The new company’s security cameras and software will be sold under the Panasonic brand Polaris has experience in strategic capital alliances with manufacturers and large-scale companies. Based on that experience, Polaris expects to smoothly and rapidly build the structure necessary for an independent business while preserving the strengths and unique characteristics of the business. The goal is to 'maximise corporate value as an independent company toward IPO (initial public offering) in the future.' Panasonic brand name to continue The new company – named Panasonic i-PRO Sensing Solutions Co., Ltd. – will encompass the Panasonic Connected Solutions Company’s Security Systems Business Division and the industrial and medical vision compact camera R&D department of its Innovation Center. The Public Safety sales and development functions of Panasonic System Solutions Company of North America (PSSNA), and the security camera manufacturing factory in China – Panasonic System Networks Suzhou Co., Ltd. (PSNS) – will become subsidiaries of the new company. Polaris expects to smoothly and rapidly build the structure necessary for an independent business After establishment, the new company’s security cameras and software will be sold under the Panasonic brand. Sales will be handled directly by the new company in the U.S. market; through Panasonic System Solutions Japan Co., Ltd. (PSSJ) in the Japanese domestic market; and through existing Panasonic sales companies in other regions including Europe, China, Southeast Asia, Oceania and Canada, which will all sign sales agreements with the new company. Future outlook An announcement from Panasonic details plans for the new company: “It will build on the strengths of the Division while benefitting from management and resources of Polaris to seamlessly implement the necessary structure to operate as an independent organisation. Strengthening its solutions capabilities with proactive alliances and M&As, the new company will aim to enhance its revenue and profitability globally centred on the North American market. With new and next-generation products and services, and a strategic growth plan to expand sales of medical camera modules, the new company will build a solid foundation as an independent entity.” The core business of video surveillance equipment is more competitive than ever The Security Systems Business Division of Panasonic has a roughly 60-year history of developing security cameras and advanced edge devices and combining these with unique software such as facial recognition to meet the needs of the market. It has established itself as a top brand. Effect on U.S. market Panasonic in the U.S. broadened its business approach to increase systems sales with the acquisition of Houston, Texas-based Video Insight in 2015. The developer of video management software especially helped to boost business opportunities in the education market in North America. More recently, Panasonic has sought to differentiate itself with an emphasis on R&D and new product developments, including artificial intelligence. Last year, the company highlighted its FacePro deep learning facial recognition system using extreme sensing and enhanced detection technology to identify persons of interest and alert authorities of their presence in real-time. Developments in the offing The Security Systems Business Division of Panasonic has a roughly 60-year history of developing security cameras In the near future, Panasonic is also looking to apply AI-based capabilities to vehicle recognition, with the ability to identify vehicle characteristics such as colour, type of vehicle and direction of travel. On the VMS side, Panasonic announced last year its intent to transition its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved. Still, the core business of video surveillance equipment is more competitive than ever. As Panasonic looks to regain its former dominance, it will face an uphill battle. A sharper focus and new management, resulting from the acquisition, may help to turn the tides.
Intrusion can be very invasive, damaging and expensive for any industrial or commercial business. The damage of machinery or the theft of goods can be potentially devastating. Not only that, but each commercial and industrial property can vary dramatically in terms of the level of security required, along with the conditions of the installation. Aisles, machinery and varying environmental conditions are all considerations, as is the required function of the security system and the ability to monitor it safely and remotely. Pyronix hybrid solution So, which security system can deliver the right solution? Look no further than the PCX46 APP. This is the professional high-security hybrid solution that delivers maximum security, convenience, flexibility and potential. Tailor the security system to meet the individual needs of the property, with the full range of Pyronix devices. Whether wired for Grade 3 requirements (large casing PCX46 APP) or utilising the multi-award-winning two-way wireless technology for any Grade 2 requirements, you can deliver the ideal system for the property and provide the user with full assurance that they are paying for the best possible security solution. Protecting external areas So, for any environments such as show rooms, factories, garages, banks, entrances or exits, there is the Pyronix range of KX detectors, which utilise Dual Technology (DT) which offer resolute detection in areas with changing conditions. If there are any drafts or fluctuating temperatures, there is the perfect KX. There is also the XD range of external detectors that utilise Tri-Technology (TT), as well as Anti-Masking and Anti-Blocking options. These can offer any external areas the protection they need, as well as be utilised to set off lights. Whether the installation requires sensors, detectors, sirens and much more, this is all possible and easily accomplished with the PCX46 APP. PyronixCloud and HomeControl+ App Utilise this security system and you can also benefit from the PyronixCloud and HomeControl+ App infrastructure. The user gets remote control of their system from anywhere in the world, while you benefit from remote diagnostics and programming, as well as easy set up. The HomeControl+ App delivers unrivalled control over the property for the user, with the ability to: arm and disarm, control any automation outputs, check the status of every individual device on the system, see their event history and much much more, all in real-time. So, whether the user is at work, on holiday or in bed, they are always informed and always in control. This is particularly useful for any business owner or manager, where it may be advantageous to monitor the access to the building, as well as any automation outputs added to the system. With remote programming and diagnostics of the system using InSite UDL software via the PyronixCloud, there are fewer call-outs and therefore reduced costs. This makes the PCX46 APP a more profitable solution for businesses, as systems can be fully managed remotely and even when a call-out is necessary, the engineer will know what the issue is before getting to site. Furthermore, users can also generate recurring revenue streams by offering PyronixCloud management services.
Erste Group Bank AG built a new group headquarters on the site of the former Südbahnhof railway station in Vienna, with construction work taking place from 2012 to 2016. Employees who were previously distributed across 20 different locations throughout the city now all work in the same building complex. Advantages of new arrangement The advantages of this new arrangement are clear: Closer proximity and improved infrastructure strengthen cooperation and provide a modern, pleasant working environment for employees. The ground-breaking, award-winning design concept by Vienna architects 'Henke Schreieck Architekten' plays a key role by creating a feeling of openness with its curved buildings and the integration of green spaces, producing an environment which encourages creativity. The highest construction standards were applied to the planning of the new building complex – which accommodates around 4,000 employees – in order to, for example, optimise cost-effectiveness by minimising energy and operating costs. The Erste Campus was awarded the DGNB (German Sustainable Building Council) platinum certificate for sustainable building. Video security requirements Security was a major priority for the new headquarters. In 2014, the Erste Group put out a tender based on a detailed catalogue of requirements for an overall building security concept for the Erste Campus. Among other things, the requirements included video surveillance and intelligent video analysis. The video technology needed to support security personnel, detect security-critical events in real time around the clock and, when necessary, raise an alarm immediately. In order to ensure smooth communication and quick responses, seamless integration was required between the video analysis, video management system and all other components and systems. SeeTec Cayuga solution A key factor to the success of this solution was the close dovetailing of the two systems, made possible by the flexible architecture of SeeTec Cayuga A key factor to the success of this solution was the close dovetailing of the two systems, made possible by the flexible architecture of SeeTec Cayuga – which, for example, shares the image streams from the cameras. Alarm events from the CogVis video analysis are seamlessly transferred to SeeTec Cayuga, where they are visualised and processed. Kapsch Businesscom won the tender with an overall concept featuring video technology based on SeeTec GmbH video management and CogVis GmbH video analysis. Another major factor in the selection process was ensuring that the video system complies with the high IT standards in the banking sector – this was verified in advance by extensive testing. This means that SeeTec Cayuga supports encrypted communication between server and client, as well as secure connections with the cameras. The protection of customers' and employees' personal rights is also crucial – CogVis provides algorithms to disguise people's identities in live images by using pixelisation. Centrally managed video solution After several months of implementation, installation and testing, the integrated overall system went into live operation at the end of 2015. Since then, the cameras distributed all over the campus have been protecting the buildings and grounds around the clock. In order to minimise the load on the network and the risk of failures, the cameras in SeeTec Cayuga were distributed across multiple recording servers which are connected to a central management server. Furthermore, the video streams are made available to the CogVis analytics directly. The CogVis C3 server is responsible for central management of the external and internal communication with the distributed C3 nodes on which the video analysis is carried out. Cameras and alarms are visualised and processed using the SeeTec software in the security control centre, which is manned 24/7. Camera images and views can also be displayed on a large-screen system using the SeeTec Display Agent in conjunction with a central control room solution. Discrete security measures The complete solution balances the high security requirements of a bank with the structural nature of the Erste Campus – the idea of openness is continued in the design of the interiors, which is why video technology is ideal as a relatively discreet security measure. The analysis algorithms of the C3 security portfolio from CogVis detect unauthorised access to indoor and outdoor areas, issue warnings regarding left objects, and provide additional security in the field of access control. The intelligent system uses state-of-the-art techniques from the field of machine learning in order to minimise false alarms efficiently as the operating time increases. Monitoring functions provide security personnel with real-time updates about the functional state of the CogVis video analysis so that they can respond immediately if there is a problem. Erste Group Bank AG Functions such as licence plate recognition or mobile system access can be added at any time by means of expansion modules Like the Erste Campus buildings, which are designed to allow changes in work processes or new work area allocations to be implemented at any point in the future without major structural work, the video system also has a flexible design and is therefore well-equipped for the future. New video or analysis channels can be easily added to the existing system at any time. New functions such as licence plate recognition or mobile system access can also be added at any time by means of expansion modules. Ing. Peter Hollenthoner, the Erste Group Bank AG staff member responsible for the implementation of the video project on the Erste Campus, sums up the experience so far: "Our security concept had to meet all of the security requirements in full without conflicting with the open room structures which enable collaboration, flexibility and meetings with customers. "The only way to achieve the objectives was with intelligent video surveillance and analytics which provide optimal support for the security process. We were keen to work with companies who understood our requirements and could provide us with the best possible, technically stable implementation."
Financial institutions of all sizes demand simple, reliable solutions to protect against fraud, theft, and accidents in the workplace. Advancements in camera resolution and storage capabilities have put pressure on banks and credit unions to upgrade their video surveillance systems. Upgrading to a modern, economical NVR server will greatly increase system performance and scalability for small-budget projects with benefits seen across both loss prevention and business insights. Reliable high performance However, not all banks have the same security budget as large institutions. This makes high-power, custom-built solutions seem unrealistic; however, small projects featuring bandwidth limitations need to retain the ability to scale up depending on future surveillance demands. Before any system expansion can occur, reliable high-performance must be established. White-box solutions compromise quality and underperform when exposed to the tough requirements of the financial security market. Fortunately, custom-built, video-optimised solutions are not exclusive to large multinational financial institutions. Network architecture When upgrading an ineffective digital security system, a new network architecture needs to be created. Usually, this means switching from DVR to NVR servers. As a result, network switches attach to the camera allowing for easier future system expansion. Along with the newly gained scalability, throughput performance on servers can achieve significantly higher levels.BCDVideo offers servers, networking and workstations that provide enterprise-quality performance for all financial projects, regardless of size Implementing a complete video solution with high-performance servers, modern networking protocols and powerful workstations in financial institutions is now possible, even for small projects. BCDVideo offers servers, networking and workstations that provide enterprise-quality performance for all financial projects, regardless of size. The Benchmark Magazine 2016 Infrastructure award winner Aurora Server Series earns its name by marking the dawn of a new era in DVR replacement. Small-budget projects that have previously succumbed to the pressure of sacrificing quality for short-term savings now have access to servers with redundant power, 12Gbps RAID controller with 2GB of Flash Based Write Cache, hot-pluggable helium hard drive, and 10,000 PassMark rated CPUs. These big project features fit price-conscious budgets while maintaining the high-performance found in enterprise surveillance. BCDVideo Titan Networking The Titan Networking Series is priced well below standard to ensure project size and scope does not prevent an integrator from deploying a complete networking solution. Without the added cost of a networking engineer, savings reach into the thousands. Additionally, by using cutting-edge technology like Shortest Path Bridging, Titan switches, backed by a five-year, on-site warranty, will run at a high-level for years. The Gamma Series workstations fill the void in commercial and enterprise environments. Ideal for access control and IP video surveillance, they are powerful enough to render high-quality megapixel images for applications running 24/7. Optimised for advanced graphics and video capabilities, smaller projects can use the Gamma Series as both a video recorder and viewer.
To the lay person they appear to be simple LED light spots going back to the original style of illumination of the old 1800s palace (1876) that currently houses the Italian Ministry of Economy and Finance, and that historically represents the first great building of the newly reborn Roman capital, as commissioned by the former Minister Quintino Sella. Hidden in plain sight The carefully hidden technology, however, transforms each of the 20 light points (appropriately designated “Roma lights”) decorating the external perimeter into a state-of-the-art tool to guarantee the security of the public in the area around the Ministry. The transformation is executed thanks to the internal installation of IP cameras produced and distributed world-wide by the German company MOBOTIX, equipped with software for recording and processing the images. Notwithstanding the innovation of the performance, the new lighting systems are perfectly integrated, from an aesthetic point of view, with the historic palace where they are installed: A very advanced system, therefore, in terms of technology, but completely hidden inside a design in perfect harmony with the place where the light spot is installed, as envisioned and implemented by Dr. Massimo Belli, Appointed Administrator of the Ministry of Economy and Finance, Dr. Umberto Dall’Aglio, Director of the VI Office of the IV Department of the Ministry and by Architect Gianluca Canofeni, Director of the Works and Technical Administrator of the IV Department. High efficiency at a low cost The transformation is executed thanks to the internal installation of IP cameras produced and distributed by MOBOTIX “The motivation for the project was multifaceted: On the one hand to realise a control system based upon state-of-the-art video surveillance tools, and on the other hand implementing a new lighting project to substantially reduce electricity consumption – within the scope of energy efficiency –, guaranteeing at the same time a much longer useful life, and as a result a substantial reduction of maintenance costs”, said Lieutenant Colonel Saverio La Monaca, chief of the Central Security Organisation of the Ministry. As per the costs, the analysis carried out by the Ghisamestieri teams, obviously as a function of the actual system utilisation give a clear picture: It is foreseen that the initial investment will be recouped within only 4 or 5 years and economic savings of even 50% between the fifth and fifteenth year of useful life of the system. With respect to energy savings, MOBOTIX’ video cameras provide a further guarantee, since their energy consumption is extremely low in comparison with other technologies present on the market: about 4 to 6 watts per hour. MOBOTIX DualDome cameras The project, comprises today of 20 wall light spots installed in strategic positions throughout the Ministry. Each shelf hides inside 2 MOBOTIX DualDome cameras with 180 degrees field of view, for an overall total of 40 high-resolution IP security cameras. The images can be recorded inside the cameras 24/7 (colour, and black and white) to be viewed at the control centre located inside the Ministry building. The security personnel belonging to the military branch of the Financial Guard manage the complete video surveillance apparatus and constantly monitor the images of the cameras in real time. 10 wireless routers manufactured by the young Italian company 3WLan, are installed inside a similar number of wall brackets and are capable of guaranteeing the bi-directional Wi-Fi link between the control centre and the patrols active outside the palace. This is possible thanks to an authentication on a RADIUS server that identifies the access permissions of the router on a list of authorised equipment. Exchange data and images in real time The new wireless system guarantees much more reduced operating expenses against a much more intensive use profile" “Especially in case of demonstrations, which is actually very common, our security operators are involved in the so-called pacification operations outside the palace for the purpose of first of all protecting the ministerial magistrates. These are carried out both on foot and inside our patrols – which implies the need to rapidly cross-check the owner of a particular vehicle or verifying the personal data on passports and identification documents. "Before installing the new intelligent light spots we relied on a GSM system that was, however, very expensive. The new wireless system guarantees much more reduced operating expenses against a much more intensive use profile”, added Giancarlo Varvo, who is responsible for security. The video surveillance technology available on the patrol vehicles, which are also equipped with tools to read license plates, or palmtop operating systems (also known as explorers) supplied to foot patrols, once within the radius of coverage of the poles equipped with Wi-Fi antennas, have the option of exchanging data and images with the operations centre inside the Ministry by means of a recognition system. Furthermore, by connecting to a specific IP address, external patrols have the possibility to view the images recorded by a specific video camera in real time. Remote day/night illumination management Each support is also equipped with a remote switch that allows managing the illumination and video surveillance functions completely autonomously and independently from each other. While the light source turns on at dusk and switches off at sunrise, the cameras continue functioning 24/7, according to the specific settings they may record both in continuous mode or trigger upon an event, such as the movement of a pedestrian, or a sound. The cameras placed close to the entrances of the Ministry are capable of sending alerts in real time to the operations centre, or activating a bollard along the perimeter thanks to an automatic vehicle license plate reading system. Nothing to object about the support of the engineers of Ghisamestieri, that proved to beat all times available and collaborative in answering the requirements of the Ministry. Also, no complaints about Genius, a unique world-wide illumination solution, capable of offering high level design and advanced technology in a single solution. No objections about the technology made in Germany of MOBOTIX. Securing the facility with additional cameras In fact, the operations room located inside the Ministry remotely controls the recording of more than 1,600 cameras" “In addition to the project implemented with Ghisamestieri, we employed the technology of MOBOTIX also for other types of requirements, still obviously related to the security of the Ministry: 36 AllroundMono security cameras have already been installed on the roof of the palace to check potential attacks for instance through the air vent conduits to the so-called Tempest room, a completely aseptic environment for the protection of communications inside the Ministry. "In fact, the operations room located inside the Ministry remotely controls the recording of more than 1,600 cameras installed in various facilities connected to the department”, underscores Varvo. The light spots installed in Rome find their place in a wider project, where any illumination support can potentially serve as a technology node. Named “Genius” by their creators, regardless of the design or aesthetic form, any light spot is potentially capable of becoming a true security centre, perfectly integrated from the aesthetic and urban points of view into city decor. Equipped with microphones and speakers, MOBOTIX’ cameras can put the citizens in touch with the operations centres of the police or ambulances by means of special buttons placed at the base of the pole or through the implementation of an RFID or magnetic strip identification system. “With respect to traditional poles with well-visible cameras installed outdoors, Genius represents a true video security system, not just a simple crime deterrent”, concluded Varvo.
Hikvision, the global leader in video surveillance equipment, and their Abu Dhabi partner, Opal Protection Systems, have played a major role in preventing an attempted robbery at a Money Exchange in Abu Dhabi. A comprehensive Hikvision CCTV System captured the moments when a robed figure threatened employees with a pistol and alerted the Abu Dhabi Police Operations Room, which immediately dispatched officers to arrest the suspect. Footage of the unfolding drama has now been posted to YouTube and proved an online sensation with over 3 million hits. All the money exchanges in Abu Dhabi benefit from the world’s most highly advanced security technology, which is installed by authorised dealers under the strict surveillance of the police. Each is video linked to a 24/7 specialist police department, which can respond in a matter of minutes to any alert. The security system in the money exchange centre involved in the attempted robbery consists of 13 Hikvision easy-to-use IP cameras connected to a Hikvision DS-8616NI-ST Network Video Recorder (NVR). The cameras used include the DS-2CD2120F-I(W)(S) 2MP vandal-proof dome camera, the DS-2CD2520F 2 MP mini dome camera, DS-2CD2020-I 2MP IR bullet camera and the DS-2CD2D14WD 1MP mini camera. Surveillance helped police swiftly secure the situation “The incident in the Abu Dhabi exchange centre involved a woman using a fake gun and a knife in an attempted robbery,” says Yousef Moharib, General Manager at Opal Protection Systems Ltd, which implemented the Hikvision CCTV solution. “Thanks to the Hikvision security solution installed within the exchange centre, Abu Dhabi Police were able to secure the situation within minutes, and with maximum efficiency. I would like to take this opportunity to thank Hikvision for their continued support and feel that this incident has further strengthened our partnership within the region. “We are aggressively focused on staying at the pinnacle of the systems integration industry. Our clients range from Government entities on a federal and municipal level to large enterprises throughout the Middle East. Opal offers clients a turnkey solution for its entire infrastructure requirement,” he added.
Based in Poland, Bank Pekao is one of the largest financial institutions in Central and Eastern Europe. Security is a paramount concern for the organisation, which is why it has chosen to implement Vanderbilt’s cutting edge video and access control technology across a large part of its estate. Leading financial institution Over the last 85 years Bank Pekao has become one of the leading organisations of its kind within Central and Eastern Europe. This Polish financial institution is considered one of the safest banks at the pan-European level and operates almost 1,000 branches, the second largest network in the country. The company belongs to one of the world’s biggest financial groups, UniCredit, which operates in 17 European countries with a network of 9,600 branches and around 145,000 employees. As a pioneer in its industry, Bank Pekao has been awarded many prestigious national and international accolades. In 2014 the company’s mobile banking application won Best Mobile Banking Award by Money.pl, and the Top Employers Institute named it Top Employers Europe 2015 for the sixth consecutive time. Security strategy & technology Its position as one of the safest and secure financial organisations in Poland has been achieved through the implementation of a carefully constructed security strategy, alongside a commitment to adopting cutting edge technology. This area is coordinated by the Bank’s Security Department which is managed by its Director- Janusz Szymków. "As part of this initiative we wanted to move towards an Internet protocol (IP) based solution that could centrally monitor, maintain and control different branch offices" Ryszard Pichnicki Operational Director at Bank Pekao Physical Security Office, explains, “Efficient security is vital, so we have a programme of continually upgrading our infrastructure to make it as reliable as possible. As part of this initiative we wanted to move towards an Internet protocol (IP) based solution that could centrally monitor, maintain and control different branch offices around Poland to allow more efficient management. This would mean that any issues could be identified immediately and remedial action taken when necessary.” Vanderbilt technology Pichnicki contacted Siedlce based intruder alarm system integrator, Cel-Tronics, for its suggestions. Bogdan Jedrych, the company’s Managing Director, explains, “We have worked with Bank Pekao for many years and are pre-approved as a technical partner. After gaining an understanding of what was required, we suggested a solution based around Vanderbilt’s cutting edge technology, including the robust Vectis video recording devices, SPC control panels and the SiPass integrated access control system. Ryszard Pichnicki made it clear that he wanted to implement products from a company that could guarantee availability without any restrictions to installers, and therefore working with Vanderbilt made complete sense.” Interoperability between SPC panels and access control systems SiPass integrated is a powerful and almost infinitely flexible access control system that provides a very high level of security without compromising convenience and ease of use. Krzysztof Krasowski, Vanderbilt’s Sales Manager for Poland, Baltics and Ukraine, says “SiPass integrated is a part of Bank Pekao’s system that restricts movement within each branch and, thanks to its diverse range of modes, can provide ultimate protection. Bank Pekao also required full interoperability between the SPC panels and access control systems for operations such as arm/disarm area, alarms notifications, input/outputs status reading. This is something that we are used to providing, so we had no problem meeting the brief.” Centrally managed single network This level of high-end operability means that the entire system is run over a single network that can be centrally managed, allowing it to work smoothly and ensuring maximum security for all bank branches. Furthermore, this approach was incredibly cost effective, as it eliminated the need for more than one cabling infrastructure. Integration possibilities It also provides an open interface for any third party software, offering the possibility to integrate access control with other systems – therefore creating one intelligent building management system that can check the status of doors, prompt the Vectis iX video recorders to activate, and provide a full audit trail. Vectis iX is based on the ONVIF open communication protocol, which allows these devices to be used alongside third party camera vendors. This has proven to be very beneficial, especially where cameras were already installed and needed to be integrated into the new system. Reusing in-situ infrastructure As the new solution is replacing a Vanderbilt Sintony based system, some of the in-situ infrastructure is being reused, providing further cost savings and reducing unnecessary waste In addition, the Vanderbilt solution is being rolled out in stages and because SiPass is open to readers that can communicate with other controllers, it is helping to provide a smooth migration path. As the new solution is replacing a Vanderbilt Sintony based system, some of the in-situ infrastructure is being reused, providing further cost savings and reducing unnecessary waste, in line with Bank Pekao’s environmental and sustainability policy. Cel-Tronics has installed the new technology in many of the Bank’s branches so far, with great success, and ais planning many more over the next few years. The programme has been very efficient as Bogdan Jedrych explained, “We prepare configuration files beforehand based on existing installations, adjusting them to local requirements. In future we will change the set-up via the central network and apply this to the additional controllers. This will give the flexibility to add/delete cards remotely, download reports and perform other operational tasks.” Bank Pekao’s Ryszard Pichnicki is very pleased with the results so far and concludes, “We take the issue of security very seriously and need to know that we have a system in place that can protect people, property and assets as effectively as possible. I’m confident that, thanks to Cel-Tronics and Vanderbilt, we have the best means of achieving this important objective.”
Round table discussion
With the advent of online shopping, brick-and-mortar retail businesses are challenged to make transactions more convenient while enhancing the “experience” aspects that differentiate real-life shopping from the simpler route of clicking on a website. Technology is helping retailers create that differentiation, including technologies such as video systems, deep learning analytics and point-of-sale (POS) integrations that have evolved from innovation in the physical security market. For more insights, we asked this week’s Expert Panel Roundtable: What new security industry technologies are having an impact on the retail market?
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase the cybersecurity of physical security systems?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?