Banking & finance security applications
PINs protect, just ask your credit card company. How many rooms at your office shouldn’t offer an open access, free-for-all? Probably quite a few. But expecting everyone to keep them locked, and the key-carrying and-tracking that entails, is unrealistic. This is when you need Code Handle. Access control system This simple, secure, easy-to-fit handle works with your current door lock. There is no need for you to change the door lock mechanism; just replace the existing handle to add PIN s...
Financial institutions require reliable IP video surveillance systems that provide high-performance, quality, and scalability. Unfortunately, with limited budgets, many financial institutions are still utilising outdated appliances. When security is not a priority, they are putting themselves at risk for fraud, theft, and data breaches. Security Integrators have an opportunity to help financial institutions by upgrading their systems with an up-to-date NVR server and overall video surveillance...
Columbia Bank, a Northwest community bank headquartered in Tacoma, Washington, sought to upgrade their video surveillance solution to improve image quality and retention time. They also wanted to maximise field of view to deliver a more forceful and expansive – yet, less intrusive – solution. Working with Cook Security Group, Inc., Ross Armstrong, vice president of physical security at Columbia Bank, chose to overhaul video surveillance in their 150-plus branches across the Northwes...
Brian Ishikawa has always kept tight control over his video surveillance system, allowing only authorised personnel within his corporate security division to access video footage. So it was a change for Ishikawa, Senior Vice President and Director of Corporate Security for the Bank of Hawaii, to get used to the idea of authorised staff from the bank’s branch division being able to review video for operational, compliance and marketing-related purposes. The insights collected from the vide...
Retail banking combines a demand for high security with complex workflows. Staff need efficient access. Facility managers need the flexibility to design access permissions around individual needs, so not everyone can access every area whenever they choose. Nobody wants to carry or track large numbers of keys. These were the requirements, managers of Creval — a regional bank in Italy — faced when seeking an alternative to a mechanical master-key system. Creval needed new access contr...
Retail banks and financial services companies have a long history of dealing with the risk and potential threat of criminal activity. Arecont Vision Costar understands the unique needs of the retail banking and financial services market and provides customer-proven megapixel camera technology to specifically meet those needs for our customers around the world. Bank crime statistics In a typical year in the United States, according to the FBI cash losses total around $7.5 million, only about...
Rapiscan Systems RTT 110 is the first high-speed Computed Tomography Explosive Detection System (EDS) to be approved on TSA's Air Cargo Screening Technology List (ACSTL). This was achieved last month after a thorough testing process with the TSA and means that the RTT 110 will now undergo further field test activities which it must pass before it can be formally qualified. The RTT 110 has revolutionised the EDS market by providing exceptional performance at significantly lower cost of ownership. With its unique stationary gantry design and belt speed of 0.5m/s, the RTT 110 produces industry-leading high-resolution full volumetric 3D images at high speed, giving excellent security. Reliable and effective high-speed screening “We are very excited to be included on the ACSTL and the only approved CT EDS on the list”, said Mal Maginnis, President, Rapiscan Systems. “Our teams have worked extremely hard to create an exceptional product which we are all proud of. The technology has been designed to the highest quality to provide reliable and effective high-speed screening with many features ideally suited for the fast parcel industry and we are really pleased that our hard work is now being recognised”. By February 2021, all cargo shipments leaving, entering or travelling within the USA must be screened by a product included on the latest TSA’s Air Cargo Screening Technology List (ACSTL). The RTT 110 is the only EDS to be approved by the TSA and to be included on the ACSTL.
Cybersecurity services and Integrated Risk Management solutions provider SureCloud has announced that it has been accredited to provide Simulated Target Attack and Response (STAR) Intelligence-Led Penetration Testing services by the not-for-profit accreditation and certification body, CREST that represents the technical information security market. CREST developed the STAR framework to deliver intelligence-led cybersecurity testing, incorporating advanced penetration testing and threat intelligence services to more accurately replicate cybersecurity threats to critical assets. To meet CREST’s stringent requirements to secure STAR service provider status, SureCloud had to demonstrate its robust methodologies and sophisticated capabilities relating to the latest vulnerabilities and cybercrime techniques, as well as meeting government and risk management requirements. We have recognised their high professional service standards and the rigorous approach" Mitigating risks President of CREST, Ian Glover said, “SureCloud has been successfully assessed against our strict criteria for the supply of Simulated Target Attack and Response (STAR) Intelligence-Led Penetration Testing services. In accrediting SureCloud, we have recognised their high professional service standards and the rigorous approach they take in helping their customers mitigate risks and safeguard against advanced cyber-attacks. We congratulate them on this excellent achievement.” SureCloud’s VP of Cybersecurity, Mike Harrison, said, “The CREST STAR accreditation is a real testament to our capabilities as a business and it’s an important industry benchmark for delivering STAR intelligence-led penetration testing services. We’re proud to be amongst only 5% of UK penetration testing vendors that have been awarded this accreditation and are therefore able to offer STAR services in line with the high standards set by CREST. The fact we can deliver this excellent service through our vulnerability management platform means further value for our clients.” SureCloud’s Penetration Testing services have been CHECK approved since 2009 This accreditation reinforces the strong performance of the SureCloud team in undertaking Red-Team simulated Cyber Attack services for their clients. Techniques used are typically a blend of penetration testing, social engineering and physical breach attempts, with the overall aim being that organisations can prevent, detect and respond to the attack as if it were real. Crucially, this gives them a realistic overview for testing crisis management procedures, and how they might need to improve. Minimising risks of potential data breaches Given the complexity of these engagements, the standards you need to achieve a STAR accreditation are set exceptionally high, as it is imperative that the increasing number of organisations looking to undertake these engagements can understand who has the capability to deliver the highest quality service to them. SureCloud’s Penetration Testing services have been CHECK approved since 2009, and has been re-certified by the Payment Card Industry Security Standards Council (PCI SSC) as a PCI Approved Scanning Vendor (PCI ASV) for more than 10 years running. SureCloud is certified by internationally recognised ISO/ IEC 27001 for achieving operational excellence, minimising the risks of potential data breaches. SureCloud is also certified by Cyber Essentials Plus, complying with the requirements of the scheme, which focuses on technical control themes such as firewalls, secure configuration, user access control, malware protection and patch management.
ExtraHop, the leader in cloud-native network detection and response, announced its top predictions for the cybersecurity and technology industries in 2020. Informed by insight from customers, partners and industry analysts and insiders, ExtraHop leaders predict a year of tool consolidation, headline-grabbing breaches and a shifting industry focus on what makes a successful tech start-up. The Year of Deeper Scrutiny for Fast-Growth Companies: “2019 was a tough year for heavily hyped, fast-growth companies going public in Silicon Valley. Several companies that raised huge rounds ultimately failed to deliver expected results or even approach profitability after they went public, and Wall Street was not amused. In 2020, we expect the investment community to more deeply scrutinise companies' financials and business fundamentals, ultimately leading to the support of companies who deliver on their promises, are capital-efficient with sound vision and innovation, and have truly sustainable business results and models to back them up.” - Arif Kareem, CEO File hashing has been the default mechanism for detecting malicious threat activity" Antiquated Threat Detection Methods like File Hashing and Signature-Based IDS Waste Time: “Since the 1990s, file hashing has been the default mechanism for detecting malicious threat activity, despite the fact that it's ineffective against modern attacks that use polymorphic or fileless methods to go undetected. The same goes for signature-based IDS, which are extremely noisy while providing very little actual alert context. Security teams will continue to rely on these antiquated methods of detection because they are expected to, regardless of how well they work in today's threat landscape.” - Jesse Rothstein, CTO and co-founder Accountability for the Ethical Use of Users’ Data: “Recent headlines tell of giant data corporations like Google and Facebook monetising users' data and lacking sufficient transparency in these activities. There’s already been significant social backlash, but in 2020 we predict that users will demand companies not just follow the often-dated laws, but that they also do what’s right. Regulations like GDPR and CCPA are helping to bring more clarity around what’s appropriate, but 2020 will be the year that the industry is held accountable for the ethical, in addition to regulatory-compliant, use of personal data.” - Raja Mukerji, CCO and co-founder A Slowing Economy Will Force Tool Consolidation: “In security programs, it's been very difficult to turn tools off. What gaps will I create? What unintended consequences will I see? As the economy has rolled along over the last decade, most security programs have had the necessary funding to add new tools and retain legacy tools under the guise of risk management. Economic slowdown is likely to change all of that, as investments in new technology will require cost savings elsewhere. A tighter economy will finally cause us to pull the plug on legacy security tools.” - Bill Ruckelshaus, CFO A tighter economy will finally cause us to pull the plug on legacy security tools""Observability" Will Gain Ground as Both a Concept and a Vocabulary Term in Security and DevOps: “Observability is a term that several companies are using to describe the practice of capturing metrics, logs and wire telemetry, or sometimes other data sources, mostly in the DevOps space. The value of correlating insights from these data sources has gained enough ground that vendors need a word for it. Observability, The SOC Visibility Triad, and other terms have been spotted in marketing materials and on big screens and main stages at security and analytics conferences. In 2020, we'll see heated competition to control the vocabulary and mental models that enterprises and vendors use to discuss and market security best practices regarding gathering multiple data sources and correlating insights between them.”- John Matthews, CIO A Major Information Leak from a Cloud Provider is Coming: “In 2020, we are likely to see a major information leak from a cloud provider. While at the same time the cloud providers are providing many useful built-in tools, it's not clear that they are using their own tools to secure themselves. As a further prediction, the leak will not effectively diminish migration to the cloud. As we have noticed with other breaches, they do not significantly erode confidence in the services.” - Jeff Costlow, CISO 2020 may well be the year that a breach of a vendor’s environment exposes the data of one or more of their customers" The Wave Begins Towards Security Tool Consolidation: “Organisations will take a strong look at the number of security vendors within their ecosystem in 2020 to determine overlap and begin a move towards consolidation of tools. The winners will include those that have proven their API superiority and ability to work together within an organisation’s ecosystem. The losers will be those who have not proven their ability to strengthen core security.” - Chris Lehman, SVP of Worldwide Sales A Vendor Will Be Responsible for a Major Breach of Data Due to Phoning Home: “In 2019, ExtraHop issued a security advisory about the vendor practice of phoning data home and how this is happening without the knowledge of customers. The problem with this practice is that it expands the attack surface via which that data can be breached, exposing it to threats within the vendor’s environment. 2020 may well be the year that a breach of a vendor’s environment exposes the data of one or more of their customers. Regulations like GDPR have imagined exactly this type of scenario and laid out specific requirements for data controllers and data processors. But when such a breach occurs, it will have broad impact and implications.” - Matt Cauthorn, VP Security The Big IoT Breach is Coming: “In 2017, major ransomware attacks crippled the networks, and operations, of major global organisations. While those attacks did billions in damage, for the most part, IoT devices were left unscathed. But sooner or later, and probably sooner, the big IoT breach is coming, and it could have global implications. Whether it happens in the US or abroad, in healthcare, shipping and logistics, or manufacturing, IoT devices around the globe are fertile hunting grounds for attackers. Taking down every connected device, from telemetry sensors to infusion pumps to mobile points-of-sale, could easily grind operations to a halt.” - Mike Campfield, VP of Global Security Programs
Traka, from ASSA ABLOY Global Solutions, has integrated with Maxxess’ award-winning security management software, eFusion, to present users with a powerful route to achieving operational efficiencies across a wide range of systems and functions. Complete site control Traka, in conjunction with Maxxess Systems, has developed a seamless integration with Maxxess’ eFusion open platform, to allow complete site control, centralise site visibility and present real-time monitoring, ensuring situational awareness for all assets, safely and securely. eFusion with Traka makes it simple for authorised staff to gain access to a wide range of controlled assets, from keys and premises to high value equipment, vehicles and machinery. The new integration enables full traceability and audit reports that can include video and audio recordings, as well as transactional data from systems such as access control, intruder, HR and fire. eFusion system is renowned as presenting a seamless opportunity to integrate to third party systems" Integration with third party systems Martin Woodhouse, Traka Head of Asia Pacific, Middle East, India and Africa (APACMEA), “Maxxess is one of the foremost global innovators within the security industry, its eFusion system is renowned as presenting a seamless opportunity to integrate to third party systems. Now together with Traka, we can deliver a significant futureproof technology that paves the way for users to benefit from one all-encompassing building control system.” “The power of this new integration brings together Traka’s intelligent key and equipment management systems with eFusion’s flexible cloud architecture, developing a solution that will deliver exciting advances in security and operational efficiency.” “It will not only benefit major new build projects, but also open new opportunities for existing users of eFusion and Traka. We look forward to building on this exciting partnership with Maxxess, which we jointly believe continues to deliver real benefits to our valued customers.” Audit capabilities across key cabinets and lockers As with all Traka solutions, the integration with Maxxess’ eFusion presents audit capabilities across its key cabinets and lockers, and enables instant traceability and reporting. Other important features include fault logging, curfews and multiple authorisations, which provide tangible returns on investment by improving operational efficiency, increasing productivity and minimising costly down time. Integration with eFusion opens the way for more powerful joint opportunities" Lee Copland, Managing Director, Maxxess EMEA adds, “With Traka solutions globally deployed in many market sectors such as critical infrastructure, retail, logistics, hospitality and corporate environments - and increasingly integrated with many third-party systems - this integration with eFusion opens the way for more powerful joint opportunities to be developed.” “There are huge benefits to be gained from integrating Traka’s capability with wider functions and operations, including building management systems, security, fire and the many application-specific systems used by our customers in different sectors.” To see Traka’s integration with Maxxess eFusion in action, one can visit Traka in hall 2, stand G20 at Intersec Dubai, taking place at Dubai’s International Convention and Exhibition Centre from 19 - 21 January 2020.
Steel fencing manufacturer Zaun Ltd has appointed Mat White from Highway Care Security Solutions. Zaun boasts a long-standing working relationship with White extending back over many years. For the past five years, he has been at Highway Care, initially as project manager on security and major highways contracts, and more recently as commercial manager and director for H2S2, a joint venture business between Highway Care and Hill & Smith business Hardstaff Barriers. White said, “I’m really excited to be joining the Zaun team and can’t wait to get my teeth stuck into my new role, while strengthening long term customer relationships and opening new doors to help create a sustainable future for the business. Zaun is picking up momentum thanks to the high-quality products it manufactures, and the dedicated and enthusiastic team that represent the business.” White project managed the design, program and deployment of security measures utilising the National Barrier Asset (NBA) Deployment of security measures Prior to Highway Care, White spent 12 years at Hardstaff, starting out as a plant operator and quickly progressing through the ranks to site supervisor and then operations manager overseeing highways and security projects. As the UK terrorist threat increased, he project managed the design, program and deployment of security measures utilising the National Barrier Asset (NBA) for high-profile events including the Nuclear Security Summit in Holland, Champions League Final, G8 and NATO conferences. High security environment Zaun sales and marketing director Chris Plimley said, “Mat brings a wealth of experience to Zaun in the high security environment, having previously worked alongside us on various high profile critical projects over the years. His product and design experience is exceptional, as is his ability to communicate at all levels from the teams on the ground to the end client means, building confidence that the project gets over the line. I’m delighted to welcome Mat into the team.” White joins four other recent recruits at Zaun. Andy Holloway has joined as internal sales manager, alongside sales estimator father and son Dave and Tommy Calvin together with design and production engineer Shane Rowton. Plimley concluded, “These appointments put the Zaun sales team on a stronger footing than ever and are key to driving forward our plans for continued growth coupled with ever improved customer service.”
RSA, a global cybersecurity provider of delivering Business-Driven Security solutions to help organisations manage digital risk, will extend its enterprise offering of modern authentication and identity assurance through a strategic partnership and joint solution with Yubico. The solution, YubiKey for RSA SecurID® Access, combines a FIDO2-enabled hardware device by Yubico with the benefits of enterprise-grade security, risk-based authentication and simplified credential lifecycle management delivered by RSA SecurID Access. YubiKey for RSA SecurID Access In today’s dynamic workforce, users expect a frictionless experience, regardless of where they are or what applications they are accessing. At the same time, organisations want to reduce the risk of security breaches, secure critical assets and minimise the costs associated with credential lifecycle management. Stolen identity is a critical security issue, and often the weakest link in security postures. In fact, 80 percent of breaches involve compromised and weak credentials, and last year security breaches cost companies an average of $3.86 million per breach. “Our partnership with RSA demonstrates a shared commitment to protect millions of users from security breaches,” said Jerrod Chong, Chief Solutions Officer, Yubico. “This collaborative effort combines RSA’s long-standing expertise in identity and access management, with Yubico’s proven leadership in standards and innovation, to bring forward a unified FIDO-based hardware authentication solution for enterprises, their partners and their customers.” Leadership in authentication and identity assurance YubiKey complements the existing range of authentication methods of RSA SecurID AccessAs organisations continue to pursue digital transformation initiatives, identity management has become increasingly complex. Continuing leadership in authentication and identity assurance, the strategic partnership will add to the broad range of authentication methods offered in the RSA SecurID Access Suite. RSA and Yubico will address a variety of workforce use cases with a simple login experience enabled by the YubiKey for RSA SecurID Access and backed by the enterprise-grade security of RSA SecurID Access. The YubiKey complements the existing range of authentication methods of RSA SecurID Access including push notification, one-time password, SMS and biometrics to enable the broadest support for diverse user populations and use cases. FIDO authentication is uniquely suited for use cases like passwordless logon to PCs and laptops and mobile-restricted environments (e.g., call centres). The joint solution will also provide identity insights, threat intelligence, and business context for user access, devices, applications and behaviour to provide businesses with the confidence that users are who they say they are. “With ongoing support for FIDO, RSA continues to deliver modern authentication solutions and identity assurance to help enterprises meet business needs, provide a range of authentication options for users and protect their most valuable assets,” said Jim Ducharme, VP of Identity and Fraud & Risk Intelligence Products, RSA. “Now, we’re enabling our customers to combine the robust, enterprise-grade identity assurance of RSA SecurID Access with YubiKey hardware devices, for secure and convenient authentication. The strategic partnership extends our support for FIDO in RSA SecurID Access, allowing integration with applications from ground to cloud to address the evolving threats and challenges in today’s dynamic workforce.” RSA SecurID Access bridges islands of identity RSA SecurID Access provides a unified platform for secure enrolment Today, RSA SecurID Access provides the backend software and services required for a full range of authentication options like the YubiKey for RSA SecurID Access to be successfully deployed, managed and used across an enterprise environment. RSA SecurID Access bridges islands of identity, and with one of the strongest partner ecosystems in the industry (RSA Ready), RSA SecurID Access provides a unified platform for secure enrolment, access control, policy enforcement and lifecycle management across all of an enterprise’s applications from data centre, endpoint and network perimeter to the cloud. For customers, this enables features like secure (multi-factor) enrolment, self-service, emergency access, and a single FIDO registration across all enterprise applications. It also provides broader compatibility and a consistent user experience for YubiKeys within the enterprise. RSA is a longstanding member of the FIDO Alliance as well as a member of the Board of Directors. As a market leader in multi-factor authentication, RSA is committed to supporting the new FIDO2 standard and providing best practices for FIDO deployment in the enterprise with RSA SecurID Access.
It’s not just a new year, it’s a new decade. And somehow this makes it feel bigger. Almost like we’re moving faster or reaching farther. Technology is certainly advancing at an unprecedented pace. While there’s a lot to talk about, there are three big security trends that we think will continue to have a huge impact in the year to come. 1. What is artificial intelligence and is it going to take over? We’ve seen countless versions of artificial intelligence (AI) in pop culture—think of Sonny in the 2004 film I, Robot or Rachael in Blade Runner—so we feel we know the technology. And, based on this, we believe our anxieties around it are warranted. But, the truth is that the science to produce even far less sophisticated versions of these characters just doesn’t exist. AI today Computers use data to help improve performance without being explicitly programmed Today’s AI science is focused largely on machine learning. With machine learning, computers use data to help improve performance without being explicitly programmed. This means that, through the use of algorithms and training, a computer can be programmed to determine which features it should use in the identification process to efficiently produce the most accurate output. Over time and based on a trainer’s feedback, for example, a computer can determine that using color rather than shape to identify a flower is more efficient because the results are more accurate. Machine learning in the physical security industry In the security sector, we’re seeing good results with automatic license plate recognition (ALPR) systems that employ machine learning. Today’s ALPR cameras and systems are better at recognising license plates from different countries, states, or provinces because they’re more efficient at identifying an ever-expanding number of inputs. We don’t need to worry that AI will be running our lives So, we don’t need to worry that AI will be running our lives. And, in fact, we should be relieved that machine learning can be used to identify scofflaw plates as this will help keep our roads and spaces safer. 2. Can we move beyond the single, secured door? With increased globalisation and the rise of multinational companies, organisations everywhere are facing new challenges around visitor, and employee access management. Protecting your environment is no longer as easy as securing a single door. As the nature of work becomes more complex, organisations are going to have to take a different approach for managing the flow of people through their facilities. Organszations are going to have to take a different approach for managing the flow of people through their facilities The challenges of traditional access control We’ve seen that relying exclusively on a static access control system can increase workload and inefficiencies. With this approach, granting and revoking temporary access and provisioning employees is a labor-intensive process. It requires hands-on participation from security operators and front office staff. There is no guarantee that corporate or regulatory policies are being followed as well as little-to-no traceability. And, ultimately, the process is, by its very nature, prone to human error. Large conglomerates have been meeting these challenges by developing tailor-made solutions based on physical identity management. These systems are costly and require 3rd party support. Smaller organisations simply could not afford the time or resources necessary to implement them. Heading into 2020, we’re seeing an increase in out-of-the-box solutions that will allow organisations of all sizes to move to cloud-based identity management systems. How Physical Identity and Access Management (PIAM) systems can help More affordable Physical Identity and Access Management (PIAM) solutions will help organisations secure their systems and facilities by effectively managing access requests based on an individual’s identity and an organisation’s security policies. They can ensure that only those individuals who have the right to access a secured area can do so by managing and automating the process. In effect, by extending an access control system with a PIAM, organisations of any size will be able to reduce workloads, fully implement corporate policies, and better protect their spaces. 3. Should we be nervous about facial recognition? We shouldn’t be surprised by the public’s fear of facial recognition. The idea that private citizens can be identified and tracked in public is the stuff of political espionage and sci-fi thrillers. But, beyond the fictional examples, we’ve also seen cases where facial recognition gets it wrong. Incorrectly identifying an innocent man for a robbery twice or having difficulty distinguishing members of the same race are just some of the real-world reasons people don’t trust facial recognition. How facial recognition can increase security Facial recognition technology can play a huge role in helping keep people, assets, and spaces safe. It can monitor visitors to improve safety and efficiency, assist security personnel by helping to reduce response times, and aid in the investigation of incidents. Facial recognition technology can play a huge role in helping keep people, assets, and spaces safe In the coming year, we’re going to see a greater focus on developing solutions that use a privacy-by-design approach. For video surveillance applications, this will include the ability to automatically mask—through blurring or pixelation—persons in live and stored video feeds. The system itself will ensure that only authorised personnel can access un-pixelated or blurred images and only in cases that warrant it. Anonymisation Using this approach will help reduce concerns and increase protection, which will lead to greater accuracy and trust. In parallel, technology providers must continue to work with regulating bodies to ensure that the policies around implementing and using any surveillance technology, especially facial recognition, align with our values. With all these trends, we’re seeing the relationship between people and technology evolving. When we focus on improving the lives of people in our communities, we can harness the power in these advancements and make a real difference.
Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorised personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognising the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorised person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorised users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.
On November 2019 in Stockton, California, surveillance footage found that vandals shot out glass windows and doors in many places in a small business complex (FOX40). The intruders broke in only to leave with nothing, proving their intent was solely to vandalize the property. Meanwhile, it was reported that a trio of ATM thieves struck around 9 times across many different locations inside Brooklyn and Queens within just over a month in fall 2019 (ATM Marketplace). On average, the cost of vandalism to SMB is around $3,370 per incident (US Small Business Administration), including a staggering 692 vehicle vandalism claims per day. Likewise, the average cost of theft to SMB is about $300 per shoplifting incident and $1,500 per employee theft incident, which accounts for 38% and 34.5% of all theft instances, respectively (National Retail Security Survey). High-performance artificial intelligent systems can automate the monitoring tasks Vandalism and theft have proven time and time again to be inconvenient and deconstructively harmful towards SMB. However, these financial burdens can be prevented with the use of the right security system. AI-based security systems with Deep Learning contain many features that many SMB owners find advantageous in their pursuit to stop unwarranted and unwanted money loss. Intrusion and loitering detection The first of many features that can help with vandalism and theft prevention is Intrusion Detection. High-performance artificial intelligent systems can automate the monitoring tasks for high-risk sites to provide a high level of security and security personnel monitoring efficiency. Traditional intrusion detection systems detect objects based on size and location, but they do not recognise the type of objects. Now, Intrusion Detection (Perimeter Protection) systems with cutting-edge, built-in AI algorithms to recognise a plethora of different object types, can distinguish objects of interest, thus significantly decreases the false-positive intrusion rate. The more advanced AI-based systems, like those we offered at IronYun, enable the users to draw ROIs based on break-in points, areas of high-valuables, and any other preference to where alerts may be beneficial. Similarly, AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store. The loitering time and region of interest are customisable in particular systems, which allows for a range of detection options. Advanced loitering detection software as such can detect and trigger real-time alerts for both people loitering and/or vehicles that are illegally parked in certain areas of interest. A benefit, which only certain advanced systems contain, is the ability to send trigger actions to 3rd-party systems in reaction to receiving an alert of loitering and/or intrusion detection. These trigger actions can be set to contact authorities immediately and/or trigger a scare tactic alarm or announcement to intruder/loiterer. Certain Face Recognition and License Plate Recognition software can record individual people/vehicles Face and license plate recognition In addition to the activity detection solutions, certain Face Recognition and License Plate Recognition software can record individual people/vehicles and use pre-configured lists to identify particular faces or plates that may be of interest, such as those in watchlists. These systems can also enable the users to upload images of faces not in the lists and search for them in the camera recording. For instance, if a person is detected several times loitering outside a store, one may save one of the detection photos into the watchlist, and set up an alert when said face is recognised again outside the building in the future. The alerts will help to deter and prevent vandalism or theft, and notify the authorities to the scene before the troublemaker completes the act. The main attributes of high-performance Face Recognition systems which maximise assistance with vandalism and theft management include: Face match rate > 90% with good camera angles and lighting. Processing multiple streams and multiple faces per image. Live face extraction and matching to databases of thousands of faces within 3 seconds. State-of-the-art AI security software with Deep Learning allows the user to no longer need to install special LPR camerasIf the watchlist individual is wearing a mask or their face is not in view of the camera, their license plate may be a good indicator. If a particular car is detected several times loitering in the parking lot or street outside a store, the user can set the alerts for such car to get notified in the future. With an AI solution like this, common street cameras should be equipped with LPR capabilities. So, state-of-the-art AI security software with Deep Learning allows the user to no longer need to install special LPR cameras. High-performance alert mechanisms A high-performance AI solution, in addition to having high accuracy, should be able to: Easily integrate with 3rd-party systems Work well with all ONVIF IP cameras including infrared and thermal ones (for Intrusion detection) Analyses video streams in real time and trigger alerts within a few seconds Send alerts to multiple VMSs, connect with signalling devices such as loud speakers or flashing lights Send email notifications to security staff and police departments Send notification on mobile device using AI NVR mobile app Maintains a record of all alerts to provide evidence of intrusion and loitering instances for police and insurance agencies. To assist in theft and vandalism prevention, AI-based security systems with deep learning will do all of the tedious work for you. Their low cost and high performance also make them the most accessible security solutions in the market with large return on investment. Stopping crimes is a difficult, ongoing challenge, but with the right AI software, business vendors and police departments can do so with more ease.
Facial recognition continues to be a political football and a target of privacy activists in the United States. For example, San Diego has suspended its use of facial recognition scanners by law enforcement after a campaign by civil rights groups. The San Diego Tactical Identification System (TACIDS) programme included a database of facial recognition scans shared by 30 local, state and federal agencies. A California law, passed in the fall, puts a three-year moratorium on law enforcement use of face recognition technology. A proposal in Congress would prohibit use of biometric recognition technology in most public and assisted housing units funded by the Department of Housing and Urban Development (HUD), thus protecting the more than two million public housing residents nationwide from being “over-surveilled.” The “No Biometric Barriers to Housing Act” is supported by the NAACP, the National Housing Law Project, National Low-Income Housing Coalition, National Action Network, Color of Change, and the Project on Government Oversight. The problems of Facial Recognition "Studies that show that facial recognition systems may misidentify many individuals including women and people of colour" A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing because it “could be used to enable invasive, unnecessary and harmful government surveillance of…residents.” The letter cites studies that show that facial recognition systems may misidentify many individuals including women and people of colour, thus “exacerbating vulnerabilities that marginalized groups already face in life.” In June, Somerville, Mass., became the second U.S. city to ban the use of facial recognition technology in public spaces. The first was San Francisco. A coalition of organisations and trade associations has issued a letter to Congress outlining concerns with “blanket prohibitions” or moratoriums on facial recognition technology and listing beneficial uses for public safety, national security and fighting fraud. The Security Industry Association (SIA) is part of the coalition, the Information Technology and Innovation Foundation. A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing Facial recognition technology has benefited Americans in many ways, such as helping to thwart identity thieves" The letter says: “While polls consistently show that Americans trust law enforcement to use facial recognition technology responsibly, some groups have called for lawmakers to enact bans on [the] technology. While we agree that it is important to have effective oversight and accountability of these tools to uphold and protect civil liberties, we disagree that a ban is the best option.” Development and guidance As alternatives to outright bans, the letter proposes expanded testing and performance standards, develop of best practices and guidance for law enforcement, and additional training for different uses of the technology. “Facial recognition technology has benefited Americans in many ways, such as helping to fight human trafficking, thwart identity thieves and improve passenger facilitation at airports and enhance aviation security,” says Don Erickson, CEO of SIA. “SIA believes this advanced technology should be used in a safe, accurate and effective way, and look forward to working with Congress to help the U.S. set the example on how to ethically and responsibly govern this technology.” SIA has produced a document called “Face Facts: Dispelling Common Myths Associated with Facial Recognition Technology.”
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy" Smart home market on the forefront The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.” “The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.” Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com. Focus on Cybersecurity In 2020, companies will continue to focus on solutions for protecting consumer data" Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates. “Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.” “At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds. Smart access control Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology. Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighbourhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighbourhood security. Homeguard offers a range of affordable CCTV solutions for home and small business DIY CCTV demonstrations DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits. Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing. AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customised central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities. Security and automation solutions D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access. Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring. Personal safety mobile application Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens" WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features. “Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.” “Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Banks and financial institutions have more complex and diverse requirements for video surveillance technology than most other organisations. From corporate buildings, to branch offices, data centres, ATMs and cash depots. Several European Banks benefit from using Mirasys Video Management Software (VMS), which provides high privacy protection and robust technology. Networking the video management system of the bank’s branch offices provides users a single logical system that can be used from any site or from an external service provider's service centre. Hence, VMS services are produced in the most cost-effective way whether it be locally, centrally or outsourced.The unique, non-fragmenting storage file system provided by Mirasys protects against hard disk failure The Mirasys VMS checks the system performance in real time and helps to prevent system failure. Enhanced multi-disk recording minimises data loss and maximises recording continuity. The unique, non-fragmenting storage file system protects against hard disk failure. Benefits to financial sector Perimeter and motion detection monitors sensitive and restricted areas, such us bank vaults or safety deposit boxes, and alerts personnel only if an important event occurs, saving time and operational costs. People counting and other data reporting enables reduction of business inefficiencies and enhances customer service. Advanced alarm management tools enable the creation of specific alarm lists based on the motion, sound or text data triggers; reducing the number of false alarms. Dwell time and stopping detects people loitering at the ATM. Automatic Number Plate Recognition (ANPR) alerts on potential threats and suspicious vehicle movement and reports on car parking utilisation.Automatic Number Plate Recognition (ANPR) alerts on potential threats and suspicious vehicle movement and reports on car parking utilisation Recorded video watermarking guarantees the integrity and authenticity of recorded and exported video data for court evidence. User authentication and setting specific user rights ensures control of system access and protects sensitive data. Also, product features such as audit trail and versatile material management and search functionality support, e.g., the new EU General Data Protection Regulation (GDPR) requirements. The purpose of the audit trail events is both to show what the user has done, and also to track other (programmatic) changes that change the user interface. Key to data security is operational policies for: account security (e.g., personal user accounts, instead of shared accounts, rename default administration accounts, etc.); password security (don't leave systems with default passwords, don't permit too short passwords, use passphrases instead, etc.), and; software and device firmware updating. Mirasys recommends that systems are kept up to date with the latest software versions. In a networked, multi-server or multi-site environment, all Mirasys VMS servers and client applications can be centrally upgraded from the Mirasys management server. Manage easily various event sources in multiple locations with the flexible Mirasys Smart Event Management platform How to protect your surveillance online For deployments, Mirasys recommends that surveillance cameras are installed, when possible, in a private camera network, where the direct camera communications take place only inside the camera network to VMS servers, and is separate from the client access (“viewing”) network (and from the public Internet, in particular). This also prevents the camera streaming and signalling from being forwarded inadvertently to any external systems not part of the VMS solution. In addition, camera access from outside the private network is thus not possible. It is also recommended to protect wide area network links with VPN (Virtual Private Networking), or other secured, connections.Integrated systems such as access control, intruder detection and fire alarm systems serve as sensors for the video management system For server-to-server and client-to-server signalling, the data communication is in Mirasys VMS both compressed and encrypted by default for sensitive data (such as usernames and passwords and other details). Integration and Internet of Things in VMS With larger video management solutions, the integration of different systems is valuable because it allows automated functionalities that eliminate human errors and delays. Integrated systems such as access control, intruder detection and fire alarm systems serve as sensors for the video management system. IoT (Internet of Things) is increasingly applied in the video management. The sensors continuously provide information and, if necessary, based on this information, the predefined decision chains automatically open a video connection to the event place without any delay or error. The resulting snapshot may be one image or a set of several images that supports decision making in a problem situation. All the information is also stored for later processing. The event picture is routed either automatically or manually for people and organisations needing the information. Also, related Standard Operating Procedures can be automatically opened.Mirasys VMS is the answer to the scalability and performance needs of new camera technologies from any manufacturer Mirasys VMS is quick and easy to install, and especially effective in networked, IP-based CCTV systems and their operational and management needs, such as centralised management and upgrading/updating of servers, drivers and client applications without requiring on-site travel to remote locations. User profiles are easy to create and change. Servers can be pre-installed and pre-configured before delivering to the deployment location. Easy-to-use user interface The Mirasys VMS user interface can be adapted to individual and specific needs and preferences and provides more visual space for videos without sacrificing any functionality. A HTML5 (Hypertext Markup Language, Version 5) based user interface in Version 8.4 offers easy access to the Mirasys system from anywhere; PCs, tablets or smartphones. Video surveillance camera features are consistently improving. Image quality can be exceptionally good compared to what it used to be only a few years ago. The newest cameras also require much less network bandwidth due to more effective encoding formats, such as H.265/HEVC (from 40% up to 60% of bandwidth and storage space savings, depending on the footage and device without any loss of quality, or increased quality at the same level with the H.264/AVC encoding) that many IP camera manufacturers have started to support. Individual servers can handle more simultaneously connected cameras than before, and the entire system has no actual upper limit. Mirasys VMS is the answer to the scalability and performance needs of new camera technologies from any manufacturer, and the Mirasys based video management system can be designed freely using the best equipment for the customer-specific requirements and can support also all future needs.
“It’s obvious that a prominent bank like BNP Paribas has to take processes like security extremely seriously", said Alan Ford, Security Manager at BNP Paribas. Spread over several office buildings, more than 4000 staff make daily use of the AEOS Security Management Platform to enter the restricted areas for which only they have been authorised. BNP Paribas needs be certain that they can rely on their access control system. Even though their previous Nedap WinXS system did just that, in 2011 they chose to migrate to Nedap AEOS as WinXS had come close to the end of its development cycle. Hassle-free migration BNP Paribas’ Security Management team had worked with their previous WinXS system for more than 13 years. It was so familiar that Security Manager Alan Ford said: “It was like riding a bike.” For this reason the decision to make a transition to a new security management platform wasn’t an easy one. However AEOS had been tried and tested in the market and offered even higher security features and easier management, so it was an obvious candidate. This, combined with a safe, hassle-free, seamless migration pathway coordinated by Nedap and its certified Business Partner, made the choice easier. Security stress test To make sure that AEOS would achieve the same level of security as WinXS, the security platform was tested thoroughly. Alan Ford, “Before implementing AEOS, we asked an independent IT company to try to break into our IT systems. They used a little device with which they normally could ‘clone’ access cards without actually touching them. They had to admit that the AEOS encryption was so advanced, they didn’t have the technology to hack into the system. This is what we wanted to hear. It may not have been our main reason for selecting AEOS, but it certainly gave us the reassurance that AEOS would boost our security to a higher level.” Customised access control AEOS was installed at head office and nearby locations to access security for staff, catering staff and contractors In addition to security itself, BNP Paribas has to take the security management seriously, with over 4000 people entering and leaving their buildings daily. AEOS is in use at both the head office and its nearby locations for access security for staff, flex workers, catering staff, contractors and cleaners. Given the large numbers and different types and levels of staff, ease of management and flexibility are two essential requirements for those managing the security platform. AEOS can be set up to produce any form of pass for individuals or groups based on location, security level, clock time and duration. For example, at BNP Paribas, cleaners only access the building after working hours, so their passes have restricted time and area access. Contractors work for fixed periods, and need to be visually identified; they are given different passes and their access is automatically blocked on the day their contract is finished. Employees need to be able to access their offices, the restaurant, the gym and specific rooms or departments; this can be set up for a specific role or group. If a pass is lost or mislaid, it can be blocked immediately and a new pass quickly generated. All these tasks are centrally managed at BNP Paribas, reducing the need for specialised AEOS management users at remote locations. Unobtrusive, clever security Another important requirement for BNP Paribas was that, although security has to be high, it mustn’t be too obtrusive, impeding staff movements or visitor comfort. Even though the speed gates and security officers at the reception desk make it obvious that visitors are entering a high secure area, AEOS meets these demands by operating easy and efficiently. The building’s design glass doors are fitted with elegant steel door handles. Cleverly and unobtrusively these handles contain a long distance card reader so that staff and guests never notice that they are entering a high security area. Effective, intuitive managementEfficiency of access control is further improved by AEOS’ extremely intuitive user interface. This not only saves time, it takes the stress out of managing access passes for large numbers of diverse user needs. “This makes it possible to get people into the building quicker, giving them more time to make money”, Alan Ford noted. “Besides, having a system that is really easy to pick up and really quick to use also saves a lot of time for the security management team. So, for what we need to do, it’s a perfect system”, Gitka Randackova, controlling operative, added. "Here again we will use AEOS for access control. Implementing AEOS in the new building was an easy decision as we have already invested in AEOS" Saving time and money from 2014 on, BNP Paribas will start using their new offices on the other side of the street, where AEOS has also been implemented. “Here again we will use AEOS for access control. Implementing AEOS in the new building was an easy decision as we have already invested in AEOS. It was logical to stick to the same platform as we’re satisfied with its capabilities. We’re happy in the knowledge that we’ll be able to expand our use of the system in the future – both in user numbers as well as in functionality. Besides, when implementing AEOS across the road, we’ll still be able to have one central administration for all locations. This saves time and manpower, decreasing investments on several levels.” Towards a high secure future BNP Paribas are more than happy with AEOS, its current ease of use and flexibility for access control, as well as the inbuilt opportunities it offers for expanding use and improving security to an even higher level. They know that their access control is in secure hands, now and in the future.
As technology continues to catapult forward at a significant pace in the 21st century, banks are increasingly facing new security challenges to safeguard their buildings, staff, customers, and financial operations. Because of this, it is critical that banks invest in security systems that meet the complex and unique requirements of the financial environment. Vanderbilt’s SPC provides this solution through advanced, dedicated intruder detection features and products for banking applications. SPC offers versatile operation and comprehensive alarm management functionality. With the support of cloud services, end-user apps, and a dedicated software suite, this puts SPC at the forefront of modern intrusion detection. Credito Cooperativo consortium Italy’s Credito Cooperativo (BCC) consortium of banks are found throughout the length and breadth of the country and have served local communities for the past 134 years. There are 317 mutual not-for-profit organisations comprising over 4,300 branches, all of which work together to guarantee a range of products in keeping with the values and identity of a cooperative. Vanderbilt’s SPC is a true hybrid intrusion detection system that meets EN 50131 standards and has unmatched flexibility and scalability Headquartered in Cesena, Banca di Cesena e Banca di GATTEO Credito Cooperativo S.Coop is the first member of the BCC to initiate a new security infrastructure. The bank wanted a system that offered integrated between access control and intrusion detection as well as being reliable, easy to install and future proof. Hybrid intrusion detection Vanderbilt’s SPC is a true hybrid intrusion detection system that meets EN 50131 standards and has unmatched flexibility and scalability. SPC5000 and SPC6000 control panels are being installed at each branch, with the former able to be expanded per specific customers and project needs with up to 128 zones, 128 outputs, 16 system keypads, 16 doors and eight verification zones. SPC6000 expands upon this functionality with up to 512 zones, 512 outputs, 32 system keypads, 64 doors and 16 verification zones. SPC Connect offers the ability to customise how data is viewed by setting up a feature that allows Smart Security to manage and control access rights to individual panels and groups of panels. This means that tasks such as configuration management, troubleshooting, and regular maintenance can be carried out remotely, saving massive amounts of time and money, and enabling a swift resolution to any issues. SPC Connect integration The control panels are being fully integrated with Vanderbilt’s pioneering SPC Connect system – a cloud-based solution that allows Smart Security to monitor, manage and control the SPC control panels remotely from any location. Personal security devices, such as the SPC Wireless Personal Alarm, increase the confidence and security of bank employees, while SPC also offers a set of specifically defined ‘Financial’ area types for ATM and vault environments with pre-defined times and enhanced security functions. Here’s how it works. Users can define the period during which an ATM or vault remains unset. Once that period expires, the ATM or vault automatically sets to an interlock group, thus denying further access to other ATMs or vaults if any area within a group is unset. The dual PIN feature is another measured safeguard, requiring two PINs to be entered within 30 seconds to set or unset an ATM or vault. Meanwhile, the All Okay feature requires users to confirm ‘All Okay’ on entry, otherwise an alarm is generated. Banks wish to operate in an open and friendly layout while safeguarding their customers, staff, and assets Monitoring safety Central Monitoring Stations (CMS) working with SPC quickly and correctly identify the source of any alarms. As a direct consequence, the number of needless callouts due to false alarms can be significantly reduced. For example, if the bank manager arrives early, he uses his card to gain access to the branch office and PIN to disarm the alarm. His code disarms the office and secure area but the ATMs, vaults, and safe deposit boxes remain armed. A Central Monitoring Station is alerted to the early entry. They need to know whether the entry is routine or under duress. The monitoring station views the manager in live video as he executes a predetermined security procedure and until he hits an “All Okay” button. If there is a problem the manager sends a silent duress alarm rather than the “All Okay” button. The monitoring station can listen in and if necessary call the police. Multiple layers This is just one layer of automated security that Vanderbilt provides to protect banks and other financial institutions. For instance, SiPass® integrated (a product made by Siemens AG) offers protection against cyber threats and intellectual property espionage. Personal security devices, such as the SPC Wireless Personal Alarm, increase the confidence and security of bank employees SiPass meets current IT security requirements for data protection and delivers the highest data security through encrypted data transmission throughout the network. SiPass is one Vanderbilt solution used at Bank Pekao, a Polish financial institution considered to be one of the safest banks at the pan-European level. Seismic detectors are designed for monitoring of ATMs, 24/7. They have been developed for false alarm immunity and even the subtlest attacks can be detected at a very early stage, repeatedly triggering an alarm that gives ample time for intervention. Importance of security in banking Security in banking is an essential issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability – flagship traits of the Vanderbilt brand. Banks wish to operate in an open and friendly layout while ultimately safeguarding their customers, staff, and assets. Vanderbilt’s solutions respond to these expectations and enable effective safeguarding foundations to be laid.
Intrusion can be very invasive, damaging and expensive for any industrial or commercial business. The damage of machinery or the theft of goods can be potentially devastating. Not only that, but each commercial and industrial property can vary dramatically in terms of the level of security required, along with the conditions of the installation. Aisles, machinery and varying environmental conditions are all considerations, as is the required function of the security system and the ability to monitor it safely and remotely. Pyronix hybrid solution So, which security system can deliver the right solution? Look no further than the PCX46 APP. This is the professional high-security hybrid solution that delivers maximum security, convenience, flexibility and potential. Tailor the security system to meet the individual needs of the property, with the full range of Pyronix devices. Whether wired for Grade 3 requirements (large casing PCX46 APP) or utilising the multi-award-winning two-way wireless technology for any Grade 2 requirements, you can deliver the ideal system for the property and provide the user with full assurance that they are paying for the best possible security solution. Protecting external areas So, for any environments such as show rooms, factories, garages, banks, entrances or exits, there is the Pyronix range of KX detectors, which utilise Dual Technology (DT) which offer resolute detection in areas with changing conditions. If there are any drafts or fluctuating temperatures, there is the perfect KX. There is also the XD range of external detectors that utilise Tri-Technology (TT), as well as Anti-Masking and Anti-Blocking options. These can offer any external areas the protection they need, as well as be utilised to set off lights. Whether the installation requires sensors, detectors, sirens and much more, this is all possible and easily accomplished with the PCX46 APP. PyronixCloud and HomeControl+ App Utilise this security system and you can also benefit from the PyronixCloud and HomeControl+ App infrastructure. The user gets remote control of their system from anywhere in the world, while you benefit from remote diagnostics and programming, as well as easy set up. The HomeControl+ App delivers unrivalled control over the property for the user, with the ability to: arm and disarm, control any automation outputs, check the status of every individual device on the system, see their event history and much much more, all in real-time. So, whether the user is at work, on holiday or in bed, they are always informed and always in control. This is particularly useful for any business owner or manager, where it may be advantageous to monitor the access to the building, as well as any automation outputs added to the system. With remote programming and diagnostics of the system using InSite UDL software via the PyronixCloud, there are fewer call-outs and therefore reduced costs. This makes the PCX46 APP a more profitable solution for businesses, as systems can be fully managed remotely and even when a call-out is necessary, the engineer will know what the issue is before getting to site. Furthermore, users can also generate recurring revenue streams by offering PyronixCloud management services.
Erste Group Bank AG built a new group headquarters on the site of the former Südbahnhof railway station in Vienna, with construction work taking place from 2012 to 2016. Employees who were previously distributed across 20 different locations throughout the city now all work in the same building complex. Advantages of new arrangement The advantages of this new arrangement are clear: Closer proximity and improved infrastructure strengthen cooperation and provide a modern, pleasant working environment for employees. The ground-breaking, award-winning design concept by Vienna architects 'Henke Schreieck Architekten' plays a key role by creating a feeling of openness with its curved buildings and the integration of green spaces, producing an environment which encourages creativity. The highest construction standards were applied to the planning of the new building complex – which accommodates around 4,000 employees – in order to, for example, optimise cost-effectiveness by minimising energy and operating costs. The Erste Campus was awarded the DGNB (German Sustainable Building Council) platinum certificate for sustainable building. Video security requirements Security was a major priority for the new headquarters. In 2014, the Erste Group put out a tender based on a detailed catalogue of requirements for an overall building security concept for the Erste Campus. Among other things, the requirements included video surveillance and intelligent video analysis. The video technology needed to support security personnel, detect security-critical events in real time around the clock and, when necessary, raise an alarm immediately. In order to ensure smooth communication and quick responses, seamless integration was required between the video analysis, video management system and all other components and systems. SeeTec Cayuga solution A key factor to the success of this solution was the close dovetailing of the two systems, made possible by the flexible architecture of SeeTec Cayuga A key factor to the success of this solution was the close dovetailing of the two systems, made possible by the flexible architecture of SeeTec Cayuga – which, for example, shares the image streams from the cameras. Alarm events from the CogVis video analysis are seamlessly transferred to SeeTec Cayuga, where they are visualised and processed. Kapsch Businesscom won the tender with an overall concept featuring video technology based on SeeTec GmbH video management and CogVis GmbH video analysis. Another major factor in the selection process was ensuring that the video system complies with the high IT standards in the banking sector – this was verified in advance by extensive testing. This means that SeeTec Cayuga supports encrypted communication between server and client, as well as secure connections with the cameras. The protection of customers' and employees' personal rights is also crucial – CogVis provides algorithms to disguise people's identities in live images by using pixelisation. Centrally managed video solution After several months of implementation, installation and testing, the integrated overall system went into live operation at the end of 2015. Since then, the cameras distributed all over the campus have been protecting the buildings and grounds around the clock. In order to minimise the load on the network and the risk of failures, the cameras in SeeTec Cayuga were distributed across multiple recording servers which are connected to a central management server. Furthermore, the video streams are made available to the CogVis analytics directly. The CogVis C3 server is responsible for central management of the external and internal communication with the distributed C3 nodes on which the video analysis is carried out. Cameras and alarms are visualised and processed using the SeeTec software in the security control centre, which is manned 24/7. Camera images and views can also be displayed on a large-screen system using the SeeTec Display Agent in conjunction with a central control room solution. Discrete security measures The complete solution balances the high security requirements of a bank with the structural nature of the Erste Campus – the idea of openness is continued in the design of the interiors, which is why video technology is ideal as a relatively discreet security measure. The analysis algorithms of the C3 security portfolio from CogVis detect unauthorised access to indoor and outdoor areas, issue warnings regarding left objects, and provide additional security in the field of access control. The intelligent system uses state-of-the-art techniques from the field of machine learning in order to minimise false alarms efficiently as the operating time increases. Monitoring functions provide security personnel with real-time updates about the functional state of the CogVis video analysis so that they can respond immediately if there is a problem. Erste Group Bank AG Functions such as licence plate recognition or mobile system access can be added at any time by means of expansion modules Like the Erste Campus buildings, which are designed to allow changes in work processes or new work area allocations to be implemented at any point in the future without major structural work, the video system also has a flexible design and is therefore well-equipped for the future. New video or analysis channels can be easily added to the existing system at any time. New functions such as licence plate recognition or mobile system access can also be added at any time by means of expansion modules. Ing. Peter Hollenthoner, the Erste Group Bank AG staff member responsible for the implementation of the video project on the Erste Campus, sums up the experience so far: "Our security concept had to meet all of the security requirements in full without conflicting with the open room structures which enable collaboration, flexibility and meetings with customers. "The only way to achieve the objectives was with intelligent video surveillance and analytics which provide optimal support for the security process. We were keen to work with companies who understood our requirements and could provide us with the best possible, technically stable implementation."
Financial institutions of all sizes demand simple, reliable solutions to protect against fraud, theft, and accidents in the workplace. Advancements in camera resolution and storage capabilities have put pressure on banks and credit unions to upgrade their video surveillance systems. Upgrading to a modern, economical NVR server will greatly increase system performance and scalability for small-budget projects with benefits seen across both loss prevention and business insights. Reliable high performance However, not all banks have the same security budget as large institutions. This makes high-power, custom-built solutions seem unrealistic; however, small projects featuring bandwidth limitations need to retain the ability to scale up depending on future surveillance demands. Before any system expansion can occur, reliable high-performance must be established. White-box solutions compromise quality and underperform when exposed to the tough requirements of the financial security market. Fortunately, custom-built, video-optimised solutions are not exclusive to large multinational financial institutions. Network architecture When upgrading an ineffective digital security system, a new network architecture needs to be created. Usually, this means switching from DVR to NVR servers. As a result, network switches attach to the camera allowing for easier future system expansion. Along with the newly gained scalability, throughput performance on servers can achieve significantly higher levels.BCDVideo offers servers, networking and workstations that provide enterprise-quality performance for all financial projects, regardless of size Implementing a complete video solution with high-performance servers, modern networking protocols and powerful workstations in financial institutions is now possible, even for small projects. BCDVideo offers servers, networking and workstations that provide enterprise-quality performance for all financial projects, regardless of size. The Benchmark Magazine 2016 Infrastructure award winner Aurora Server Series earns its name by marking the dawn of a new era in DVR replacement. Small-budget projects that have previously succumbed to the pressure of sacrificing quality for short-term savings now have access to servers with redundant power, 12Gbps RAID controller with 2GB of Flash Based Write Cache, hot-pluggable helium hard drive, and 10,000 PassMark rated CPUs. These big project features fit price-conscious budgets while maintaining the high-performance found in enterprise surveillance. BCDVideo Titan Networking The Titan Networking Series is priced well below standard to ensure project size and scope does not prevent an integrator from deploying a complete networking solution. Without the added cost of a networking engineer, savings reach into the thousands. Additionally, by using cutting-edge technology like Shortest Path Bridging, Titan switches, backed by a five-year, on-site warranty, will run at a high-level for years. The Gamma Series workstations fill the void in commercial and enterprise environments. Ideal for access control and IP video surveillance, they are powerful enough to render high-quality megapixel images for applications running 24/7. Optimised for advanced graphics and video capabilities, smaller projects can use the Gamma Series as both a video recorder and viewer.
Round table discussion
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.
The new year comes with new opportunities for the security industry, but what technologies will dominate our discussions in 2020? Topics such as artificial intelligence (AI) and HCI (hyperconverged infrastructure) became familiar in conversations during 2019, and they are likely to dominate our thoughts again in the new year. But other buzzwords are also gaining steam, such as “blockchain” and “frictionless access control.” Connectivity and the cloud will also be timely technology topics as the industry evolves. We asked this week’s Expert Panel Roundtable: What technology buzz will dominate the security industry in 2020?
“Open systems” has been a security industry buzzword for decades, although reality has sometimes diverged significantly from the ideal. The current state-of-the-art in open systems provides a multitude of benefits to increasingly complex physical security systems. We asked this week’s Expert Panel Roundtable to elaborate: What is the impact of open systems on physical security?