Banking & finance security applications
Retail banks and financial services companies have a long history of dealing with the risk and potential threat of criminal activity. Arecont Vision understands the unique needs of the retail banking and financial services market and provides customer-proven megapixel camera technology to specifically meet those needs for our customers around the world. Bank crime statistics In a typical year in the United States, according to the FBI cash losses total around $7.5 million, only about 22% of...
Banks and financial institutions have more complex and diverse requirements for video surveillance technology than most other organisations. From corporate buildings, to branch offices, data centres, ATMs and cash depots. Several European Banks benefit from using Mirasys Video Management Software (VMS), which provides high privacy protection and robust technology. Networking the video management system of the bank’s branch offices provides users a single logical system that can be used fr...
“It’s obvious that a prominent bank like BNP Paribas has to take processes like security extremely seriously", said Alan Ford, Security Manager at BNP Paribas. Spread over several office buildings, more than 4000 staff make daily use of the AEOS Security Management Platform to enter the restricted areas for which only they have been authorised. BNP Paribas needs be certain that they can rely on their access control system. Even though their previous Nedap WinXS system did just t...
As technology continues to catapult forward at a significant pace in the 21st century, banks are increasingly facing new security challenges to safeguard their buildings, staff, customers, and financial operations. Because of this, it is critical that banks invest in security systems that meet the complex and unique requirements of the financial environment. Vanderbilt’s SPC provides this solution through advanced, dedicated intruder detection features and products for banking applic...
Intrusion can be very invasive, damaging and expensive for any industrial or commercial business. The damage of machinery or the theft of goods can be potentially devastating. Not only that, but each commercial and industrial property can vary dramatically in terms of the level of security required, along with the conditions of the installation. Aisles, machinery and varying environmental conditions are all considerations, as is the required function of the security system and the ability to mo...
Erste Group Bank AG built a new group headquarters on the site of the former Südbahnhof railway station in Vienna, with construction work taking place from 2012 to 2016. Employees who were previously distributed across 20 different locations throughout the city now all work in the same building complex. Advantages of new arrangement The advantages of this new arrangement are clear: Closer proximity and improved infrastructure strengthen cooperation and provide a modern, pleasant working e...
I have been thinking a lot about the U.S. government’s ban on video surveillance technologies by Hikvision and Dahua. In general, I question the wisdom and logic of the ban and am frankly puzzled as to how it came to be. Allow me to elaborate. Chinese camera manufacturers Reality check: the government ban is based on concerns about the potential misuse of cameras, not actual misuse. Before the government ban, you occasionally heard about some government entities deciding not to use cameras manufactured by Chinese companies, although the reasons were mostly “in an abundance of caution.” Even so, I find the targeting of two Chinese companies – three if you count Hytera Communications, a mobile radio manufacturer – in a huge government military spending bill to be a little puzzling. I can’t quite picture how these specific companies got on Congress’s radar. The government ban is based on concerns about the potential misuse of cameras, not actual misuse What level of lobbying or backroom dealing was involved in getting the ban introduced (by a Missouri congresswoman) into the House version of the bill? And after the ban was left out of the Senate version, was there a new wave of discussions to ensure it was included in the joint House-Senate version (with some minor changes, and who negotiated those?). It all seems a little random. Concerns for the U.S. Furthermore, the U.S. ban solves neither of the two main concerns that are generally used as its justification: Concern: Cybersecurity. The U.S. ban “solves” the issue of cybersecurity only if both of the following statements are true. No security system that uses a Hikvision or Dahua camera or other component is cybersecure. Any system that does not use a Hikvision or Dahua camera or other component is cybersecure. What level of lobbying or backroom dealing was involved in getting the ban introduced into the House version of the bill? The ban ignores the breadth and complexity of cybersecurity and instead offers up two companies as scapegoats. Our industry has sought to address cybersecurity, and the one principle that has guided that effort is that cybersecurity is an issue that must be addressed by manufacturers, consultants, integrators and end users – in effect, everyone in the industry. Cybersecurity does not begin and end with the manufacturer and banning any manufacturers from the market does not ensure better cybersecurity. Concern: “Untrustworthy” Chinese companies. Hikvision and Dahua are only two Chinese companies. Any response to concerns about whether Chinese companies are trustworthy would need to cover many more companies that manufacture their products in China. Australian TV recently claimed that “all Chinese companies pose a risk. Because of Chinese laws, there is a requirement for companies to be engaged in espionage on behalf of the state.” Even if one embraces that extreme view, the logic fails when only two companies are targeted. One source told me that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, so it’s a much bigger issue than two companies.The Chinese government has much more effective ways of conducting espionage than exploiting security cameras And is U.S. security at risk unless or until it is cut off from more than half of the world’s supply of video cameras? Even Western camera companies manufacture some of their cameras and/or components in China. Why name only two (or three) companies, only one of which has ties to the Chinese government? If the goal of the U.S. ban was to address the possibility of cybersecurity and/or espionage by the Chinese government, shouldn’t there be other companies and product categories included? Clearly, video surveillance is not the only category that has the potential for abuse. The Chinese government has much more effective ways of conducting espionage than exploiting security cameras. Global response to U.S. ban And now that the U.S. ban has been passed, how is the ban being misused to justify a new level of alarm about Chinese companies? Australian television effortlessly made the leap from “software backdoors” to a concerted and organised effort by the Chinese government to use cameras to be the “number one country for espionage.” And it’s not just about government facilities: “Even on the street, [cameras] have the potential to inadvertently contribute toward Chinese espionage activity by providing real-time information about the situation on the ground,” says the Australian TV report. If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies? If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies, or at least those with electronics or computer products that could be used for espionage? What about the espionage potential of the 70% of mobile phones that are made in China? What about other consumer electronics such as PCs or smart TVs? How many government facilities that are eliminating Dahua and Hikvision cameras have employees who use iPhones or use other electronic equipment from China? Artificial intelligence & IP-over-coax Also, consider the impact of the ban on business. Hikvision and Dahua have had many successes in the video surveillance market, including in the U.S. market. They have added value to many integrators and end user customers. They have been on the forefront of important trends such as artificial intelligence and IP-over-coax. And, yes, they have made technologies available at lower prices.Cybersecurity issues have plagued several companies in the industry, not just Hikvision and Dahua Cybersecurity issues have plagued several companies in the industry, not just these two, and both Hikvision and Dahua have worked to fix past problems, and to raise awareness of cybersecurity concerns in general. Is a U.S. ban on two companies an appropriate response to a series of geo-political concerns that are much bigger than those two companies (and bigger than our entire market)? Should two companies take the brunt of the anti-Chinese backlash? Video surveillance cameras Is the video surveillance market as a whole better or worse for the presence of Hikvision and Dahua? Is it up to the U.S. government to make that call? In some ways, thoughts of Chinese espionage are a sign of these uncertain political times. Fear of video surveillance is perfectly congruent with long-standing anxieties about “Big Brother;” suspicion about China taking over our video cameras just rings true at a time when Russia is (supposedly) controlling our elections. But should two companies be targeted while broader concerns are shrugged off?
Governments and corporations face crisis events every day. An active shooter terrorises a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective response plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyse. Assessing threats for prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualise all this intelligence data within the context of an organisation’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social media monitoring Free tools like Google Maps or satellite imagery from organisations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis.Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating a threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualised on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting Acting and automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organisations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon security guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralised within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis of a threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate emergency response Virtually every organisation has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyse. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimise the impact by improving visibility, collaboration and response.
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalisation and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're likely to find a difference in size between companies. Whether it’s a global retail chain versus a small family-owned store, a corporate restaurant chain versus a mom-and-pop diner or a small bed and breakfast versus a large hotel chain — each side of the coin presents unique characteristics and advantages in a number of areas. Disparity in physical security industry Customers are drawn to products and services from large enterprises as the big names typically imply stability This disparity very clearly exists in the physical security industry, and differences in the sizes of product manufacturers and service providers could have important implications for the quality and type of the products and services offered. All too often, customers are drawn to products and services from large enterprises, as the big names typically imply stability, extensive product offerings and global reach. And that's not to say that these considerations are unwarranted; one could argue that larger companies have more resources for product development and likely possess the combined expertise and experience to provide a wide range of products and services. But the value that a company’s products and services can bring isn’t necessarily directly related to or dependent on its size. In an age where the common wisdom is to scale up to be more efficient and profitable, it’s interesting to pause and think about some of the possible advantages of small- and medium-sized businesses (SMBs). Typically, “small” companies are defined as those with less than 100 employees and “medium” with less than 500. Providing social mobility Schumacher argued that smaller companies are important engines of economic growth. Indeed, according to the Organisation for Economic Cooperation and Development (OECD), a group of 36 member countries that promotes policies for economic and social well-being, SMBs account for 60 to 70 percent of jobs in most OECD countries. Importantly, SMBs provide resilience in that there are often large economic and social impacts when big companies fail. Smaller companies are better for regional economies in general, as earnings stay more local compared to big businesses, which in turn generates additional economic activity. SMBs are also better at providing social mobility for disadvantaged groups by giving them opportunities and enabling them to realise their potential. Smaller companies are often more innovative, bringing to the market novel technologies and solutions such as Cloud, analytics, AI, and IoT New companies introduce new technologies There's no denying the role of start-ups when it comes to innovation. In the security industry, many new technologies (e.g. Cloud, analytics, AI, IoT) are first brought to the market by newer companies. In general, smaller companies’ products and services often have to be as good or better than others to be competitive in the marketplace. They are therefore often more innovative, bringing to the market novel technologies and solutions. And these companies are also more willing to try out other new B2B solutions, while larger companies tend to be more risk-averse. Customer service Aside from the quality of products and services, arguably one of the most important components of a security company’s success is its ability to interact with and provide customers the support that they deserve. Smaller companies are able to excel and stand out to their customers in a number of ways: Customer service. Customers’ perceptions of a product’s quality are influenced by the quality of support, and smaller manufacturers often possess a strong, motivated customer service team that can be relatively more responsive to customers of all sizes, not just the large ones. A superior level of support generally translates into high marks on customer satisfaction, since customers’ issues with products can be resolved promptly. Flexibility. SMBs have a greater capacity to detect and satisfy small market niches. While large companies generally create products and services for large markets, smaller companies deal more directly with their customers, enabling them to meet their needs and offer customised products and services. And this translates to adaptability, as SMBs become responsive to new market trends. By having a pulse on the market, smaller companies have much more flexibility in their supply chain and can adjust much faster in response to changing demand. Decision-making. Smaller companies are much more agile in decision-making, while larger enterprises often suffer from complex, tedious and lengthy decision-making processes. Communication is easier throughout SMBs, as smaller teams enable new ideas to flow and can solve problems faster. Job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction. SMBs are also generally more connected to local communities and participation in community activities leads to a greater sense of purpose. Additionally, SMBs have a much smaller impact on the environment, which is increasingly becoming an important consideration for today’s employees and customers. Though Schumacher's book takes a much deeper dive into the large global effects of scale on people and profitability, the general impact of a company’s size on its products and services is clear. It’s important for all players in the security industry to remember that the commitment and dedication to product quality can be found in businesses of all sizes. Ensuring safety of people, property and assets Large manufacturers may catch your eye, but small business shouldn’t be forgotten, as they can offer end users a robust set of attributes and benefits. While all security companies are aiming to achieve a common goal of providing safety for people, property and assets, smaller businesses can provide extensive value when it comes to driving the economy, innovating in the industry, providing quality employment and offering superior customer service.
Repercussions are rippling through the physical security industry since President Trump signed into law the ban on government uses of surveillance equipment by Chinese manufacturers Hikvision and Dahua. In addition to the direct and indirect consequences of the new law, there have also been other developments likely to impact the future of Chinese companies in the video surveillance market. The ban has raised awareness of Chinese companies’ role in video surveillance, and other developments are related to tariffs and possible sanctions, all playing out amid the backdrop of an escalating trade war. One Chinese manufacturer previously dismissed security concerns about its role in video surveillance as “Cold War rhetoric.” There has been an almost nostalgic tone recently to the escalating concerns about video cameras being used for spying. Hikvision and Dahua have both stated emphatically that they have not conducted any espionage-related activities. Even so, the U.S. government ban has emboldened the concerns. However, to be clear: No one has alleged that technologies from either of the companies have been used for espionage. Rather, the concerns are about the potential for misuse, not actual misuse. Also aggravating the situation are Chinese companies’ previous, actual problems with cybersecurity, which the companies say they have addressed. Here are some recent developments related to the U.S. government ban and Chinese manufacturers in general: Tariffs and trade concerns Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods, including data storage and processing components such as printed circuit boards, as well as video camera lenses. The escalating trade war has kept generalised concerns about China and its trade practices in the public eye and fomented a level of uncertainty in many markets, including physical security. Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods Involvement of surveillance in Chinese human rights violations Concerns have surfaced in a Congressional hearing recently about the Chinese government’s surveillance activities targeting the Uyghurs and other Muslim ethnic minorities in the Zinjiang Urghur Autonomous Region (XUAR). Specific attention is being directed at the region’s surveillance system including “thousands of surveillance cameras, including in mosques,” and Hikvision and Dahua were mentioned in the Congressional hearing as profiting from security spending in the area. Increased global media attention The ban has not been widely publicised in the U.S. mainstream media, but the topic has attracted global attention. For example, the Australian Broadcasting Corporation broadcast a 10-minute expose on the use of Chinese-made cameras in Australian government facilities, including “sensitive military facilities.” The report, which mentioned the U.S. ban, noted that “Both [Hikvision and Dahua] have had security flaws be exposed leading to fears that some of the flaws were placed there to help the Chinese government spy.” The report continues: “China is trying to set itself up as the number-one country for cyber-espionage, and this is part of that platform.” How broadly should one interpret the inclusion of "critical infrastructure" mentioned in the bill? Broader interpretation of the bill beyond the federal government The language in the bill leaves a level of ambiguity in terms of the scope of its application, and the security marketplace as a whole has been struggling to understand its full impact. Does the ban only restrict an integrator’s use of Chinese technology on a specific government job, or does it eliminate an integrator who installs the technology (even in non-government projects) from consideration for government jobs? How broadly should one interpret the inclusion of “critical infrastructure” mentioned in the bill, for example, non-governmental facilities? Will other governments and private entities assume they should ban Hikvision and Dahua in order to be compliant? For example, Suffolk, Virginia, has announced it will not to use Dahua or Hikvision cameras because the federal ban applies to “U.S. government-funded contracts and for critical infrastructure and national security usage.” The result of these developments is a kind of snowball effect, simultaneously drawing attention to the issues and adding new elements to an overall narrative. Taken together, these developments suggest the U.S. ban has set off a level of concern about Chinese companies that will have an industry-transforming impact in the months to come.
Newly modernised halls with lots of daylight will house hundreds of exhibitions and conference events at the upcoming Security Essen 2018 at Messe Essen, Germany. A new layout and hall numbering system will be unfamiliar to past attendees but promises to simplify the experience as it brings together attendees and exhibitors. European physical security market Security Essen is an international trade fair, but the emphasis is more on German, Austrian and Swiss companies. In all, Security Essen will feature 1,000 exhibitors from 40 nations. The trade fair has more of a continental European “flavour” compared to IFSEC, which focuses more on the U.K market. At the last Security Essen in 2016, organisers reported about 40,000 visitors including conference participants, VIP guests, members of various delegations and journalists. Security Essen 2018 has more of a continental European “flavour” compared to IFSEC, which focuses more on the U.K market “This year, we have sharpened the profile of Security Essen,” says Oliver P. Kuhrt, CEO of Messe Essen, a trade fair, congress and event organiser with its own exhibition grounds. “The trade fair has become considerably more digital, more modern and more interactive. Due to the optimised hall layout, we are offering our exhibitors and visitors the best possible experience with short paths and direct communication.” Newly modernised Messe Essen The newly modernised site of Security Essen will encompass eight halls, newly renumbered and with the subject areas reorganised, too. Visitors will find Services in Hall 1; Access, Mechanatronics, Mechanics and Systems in Halls 2 and 3 and the Galeria; Perimeter Protection in Hall 3; Video in Halls 5 and 7; and Fire, Intrusion and Systems in Halls 6 and 7. A helpful smart phone app, downloadable free from the Google Play Store (Android) or the Apple App Store (iOS), will be available two weeks before the event and include a show floor plan; the exhibitor list with booth numbers and contact information; and an overview of the supporting programme. A separate hall – Hall 8 – will house new Cyber Security and Economic Security categories. Cyber Security Conference At the new Cyber Security Conference, located prominently at the new East Entrance, experts will share their knowledge about the more pressing challenges and potential of cybersecurity. The programme opens and closes on 25 and 28 September with the main topic “Opportunities and Risks of Cyber Security”. On 26 September, discussions and lectures will centre on “Entry, Admission, Access: Identification Options”.A helpful smart phone app, downloadable free will be available two weeks before the event and include a show floor plan On 27 September, the topic will be smart homes and focus on “Connected Building, Security in the Buildings of the Future”. Speakers will include the president of Germany’s Federal Office for Information Security, who will address cybersecurity as a challenge for politics, business and society. The fair organises the conference in cooperation with the BHE Federal Association of Security Technology and the technical support of the Federal Office for Information Security. In Hall 8, a new Public Security Forum will enable visitors to experience digital security technologies for public spaces from the areas of sensors/IoT, cyber security and surveillance. The products and solutions will be installed in four different building scenarios (town hall, school, hospital and library) and it will be possible to test them extensively. The forum, including lectures and discussions, will target municipal decision makers and planners of public spaces. Comprehensive programme A Security Expert Forum in Hall 2 will present a continuous programme with more than 90 presentations during the period of the fair. Visitors will obtain information and solution ideas about all six subject areas covered at the fair, and the programme will begin with a keynote lecture each morning and finish with a live demonstration in the evening. On the first day of the fair (25 September), Security Essen’s Career Forum will introduce retrainees, students, trainees and graduates to companies from the security industry. Targeted and professional communication will be established between companies and job applicants to facilitate making contacts, developing networks, and filling actual vacancies. Thursday (27 September) will be observed as Fire Prevention Day, and a Drone Course will be provided each day in Hall 7. One day admission to Security Essen is €41; a four-day ticket is €105. Advance sale tickets are discounted.
Financial institutions of all sizes demand simple, reliable solutions to protect against fraud, theft, and accidents in the workplace. Advancements in camera resolution and storage capabilities have put pressure on banks and credit unions to upgrade their video surveillance systems. Upgrading to a modern, economical NVR server will greatly increase system performance and scalability for small-budget projects with benefits seen across both loss prevention and business insights. Reliable high performance However, not all banks have the same security budget as large institutions. This makes high-power, custom-built solutions seem unrealistic; however, small projects featuring bandwidth limitations need to retain the ability to scale up depending on future surveillance demands. Before any system expansion can occur, reliable high-performance must be established. White-box solutions compromise quality and underperform when exposed to the tough requirements of the financial security market. Fortunately, custom-built, video-optimised solutions are not exclusive to large multinational financial institutions. Network architecture When upgrading an ineffective digital security system, a new network architecture needs to be created. Usually, this means switching from DVR to NVR servers. As a result, network switches attach to the camera allowing for easier future system expansion. Along with the newly gained scalability, throughput performance on servers can achieve significantly higher levels.BCDVideo offers servers, networking and workstations that provide enterprise-quality performance for all financial projects, regardless of size Implementing a complete video solution with high-performance servers, modern networking protocols and powerful workstations in financial institutions is now possible, even for small projects. BCDVideo offers servers, networking and workstations that provide enterprise-quality performance for all financial projects, regardless of size. The Benchmark Magazine 2016 Infrastructure award winner Aurora Server Series earns its name by marking the dawn of a new era in DVR replacement. Small-budget projects that have previously succumbed to the pressure of sacrificing quality for short-term savings now have access to servers with redundant power, 12Gbps RAID controller with 2GB of Flash Based Write Cache, hot-pluggable helium hard drive, and 10,000 PassMark rated CPUs. These big project features fit price-conscious budgets while maintaining the high-performance found in enterprise surveillance. BCDVideo Titan Networking The Titan Networking Series is priced well below standard to ensure project size and scope does not prevent an integrator from deploying a complete networking solution. Without the added cost of a networking engineer, savings reach into the thousands. Additionally, by using cutting-edge technology like Shortest Path Bridging, Titan switches, backed by a five-year, on-site warranty, will run at a high-level for years. The Gamma Series workstations fill the void in commercial and enterprise environments. Ideal for access control and IP video surveillance, they are powerful enough to render high-quality megapixel images for applications running 24/7. Optimised for advanced graphics and video capabilities, smaller projects can use the Gamma Series as both a video recorder and viewer.
To the lay person they appear to be simple LED light spots going back to the original style of illumination of the old 1800s palace (1876) that currently houses the Italian Ministry of Economy and Finance, and that historically represents the first great building of the newly reborn Roman capital, as commissioned by the former Minister Quintino Sella. Hidden in plain sight The carefully hidden technology, however, transforms each of the 20 light points (appropriately designated “Roma lights”) decorating the external perimeter into a state-of-the-art tool to guarantee the security of the public in the area around the Ministry. The transformation is executed thanks to the internal installation of IP cameras produced and distributed world-wide by the German company MOBOTIX, equipped with software for recording and processing the images. Notwithstanding the innovation of the performance, the new lighting systems are perfectly integrated, from an aesthetic point of view, with the historic palace where they are installed: A very advanced system, therefore, in terms of technology, but completely hidden inside a design in perfect harmony with the place where the light spot is installed, as envisioned and implemented by Dr. Massimo Belli, Appointed Administrator of the Ministry of Economy and Finance, Dr. Umberto Dall’Aglio, Director of the VI Office of the IV Department of the Ministry and by Architect Gianluca Canofeni, Director of the Works and Technical Administrator of the IV Department. High efficiency at a low cost The transformation is executed thanks to the internal installation of IP cameras produced and distributed by MOBOTIX “The motivation for the project was multifaceted: On the one hand to realise a control system based upon state-of-the-art video surveillance tools, and on the other hand implementing a new lighting project to substantially reduce electricity consumption – within the scope of energy efficiency –, guaranteeing at the same time a much longer useful life, and as a result a substantial reduction of maintenance costs”, said Lieutenant Colonel Saverio La Monaca, chief of the Central Security Organisation of the Ministry. As per the costs, the analysis carried out by the Ghisamestieri teams, obviously as a function of the actual system utilisation give a clear picture: It is foreseen that the initial investment will be recouped within only 4 or 5 years and economic savings of even 50% between the fifth and fifteenth year of useful life of the system. With respect to energy savings, MOBOTIX’ video cameras provide a further guarantee, since their energy consumption is extremely low in comparison with other technologies present on the market: about 4 to 6 watts per hour. MOBOTIX DualDome cameras The project, comprises today of 20 wall light spots installed in strategic positions throughout the Ministry. Each shelf hides inside 2 MOBOTIX DualDome cameras with 180 degrees field of view, for an overall total of 40 high-resolution IP security cameras. The images can be recorded inside the cameras 24/7 (colour, and black and white) to be viewed at the control centre located inside the Ministry building. The security personnel belonging to the military branch of the Financial Guard manage the complete video surveillance apparatus and constantly monitor the images of the cameras in real time. 10 wireless routers manufactured by the young Italian company 3WLan, are installed inside a similar number of wall brackets and are capable of guaranteeing the bi-directional Wi-Fi link between the control centre and the patrols active outside the palace. This is possible thanks to an authentication on a RADIUS server that identifies the access permissions of the router on a list of authorised equipment. Exchange data and images in real time The new wireless system guarantees much more reduced operating expenses against a much more intensive use profile" “Especially in case of demonstrations, which is actually very common, our security operators are involved in the so-called pacification operations outside the palace for the purpose of first of all protecting the ministerial magistrates. These are carried out both on foot and inside our patrols – which implies the need to rapidly cross-check the owner of a particular vehicle or verifying the personal data on passports and identification documents. "Before installing the new intelligent light spots we relied on a GSM system that was, however, very expensive. The new wireless system guarantees much more reduced operating expenses against a much more intensive use profile”, added Giancarlo Varvo, who is responsible for security. The video surveillance technology available on the patrol vehicles, which are also equipped with tools to read license plates, or palmtop operating systems (also known as explorers) supplied to foot patrols, once within the radius of coverage of the poles equipped with Wi-Fi antennas, have the option of exchanging data and images with the operations centre inside the Ministry by means of a recognition system. Furthermore, by connecting to a specific IP address, external patrols have the possibility to view the images recorded by a specific video camera in real time. Remote day/night illumination management Each support is also equipped with a remote switch that allows managing the illumination and video surveillance functions completely autonomously and independently from each other. While the light source turns on at dusk and switches off at sunrise, the cameras continue functioning 24/7, according to the specific settings they may record both in continuous mode or trigger upon an event, such as the movement of a pedestrian, or a sound. The cameras placed close to the entrances of the Ministry are capable of sending alerts in real time to the operations centre, or activating a bollard along the perimeter thanks to an automatic vehicle license plate reading system. Nothing to object about the support of the engineers of Ghisamestieri, that proved to beat all times available and collaborative in answering the requirements of the Ministry. Also, no complaints about Genius, a unique world-wide illumination solution, capable of offering high level design and advanced technology in a single solution. No objections about the technology made in Germany of MOBOTIX. Securing the facility with additional cameras In fact, the operations room located inside the Ministry remotely controls the recording of more than 1,600 cameras" “In addition to the project implemented with Ghisamestieri, we employed the technology of MOBOTIX also for other types of requirements, still obviously related to the security of the Ministry: 36 AllroundMono security cameras have already been installed on the roof of the palace to check potential attacks for instance through the air vent conduits to the so-called Tempest room, a completely aseptic environment for the protection of communications inside the Ministry. "In fact, the operations room located inside the Ministry remotely controls the recording of more than 1,600 cameras installed in various facilities connected to the department”, underscores Varvo. The light spots installed in Rome find their place in a wider project, where any illumination support can potentially serve as a technology node. Named “Genius” by their creators, regardless of the design or aesthetic form, any light spot is potentially capable of becoming a true security centre, perfectly integrated from the aesthetic and urban points of view into city decor. Equipped with microphones and speakers, MOBOTIX’ cameras can put the citizens in touch with the operations centres of the police or ambulances by means of special buttons placed at the base of the pole or through the implementation of an RFID or magnetic strip identification system. “With respect to traditional poles with well-visible cameras installed outdoors, Genius represents a true video security system, not just a simple crime deterrent”, concluded Varvo.
Hikvision, the global leader in video surveillance equipment, and their Abu Dhabi partner, Opal Protection Systems, have played a major role in preventing an attempted robbery at a Money Exchange in Abu Dhabi. A comprehensive Hikvision CCTV System captured the moments when a robed figure threatened employees with a pistol and alerted the Abu Dhabi Police Operations Room, which immediately dispatched officers to arrest the suspect. Footage of the unfolding drama has now been posted to YouTube and proved an online sensation with over 3 million hits. All the money exchanges in Abu Dhabi benefit from the world’s most highly advanced security technology, which is installed by authorised dealers under the strict surveillance of the police. Each is video linked to a 24/7 specialist police department, which can respond in a matter of minutes to any alert. The security system in the money exchange centre involved in the attempted robbery consists of 13 Hikvision easy-to-use IP cameras connected to a Hikvision DS-8616NI-ST Network Video Recorder (NVR). The cameras used include the DS-2CD2120F-I(W)(S) 2MP vandal-proof dome camera, the DS-2CD2520F 2 MP mini dome camera, DS-2CD2020-I 2MP IR bullet camera and the DS-2CD2D14WD 1MP mini camera. Surveillance helped police swiftly secure the situation “The incident in the Abu Dhabi exchange centre involved a woman using a fake gun and a knife in an attempted robbery,” says Yousef Moharib, General Manager at Opal Protection Systems Ltd, which implemented the Hikvision CCTV solution. “Thanks to the Hikvision security solution installed within the exchange centre, Abu Dhabi Police were able to secure the situation within minutes, and with maximum efficiency. I would like to take this opportunity to thank Hikvision for their continued support and feel that this incident has further strengthened our partnership within the region. “We are aggressively focused on staying at the pinnacle of the systems integration industry. Our clients range from Government entities on a federal and municipal level to large enterprises throughout the Middle East. Opal offers clients a turnkey solution for its entire infrastructure requirement,” he added.
Based in Poland, Bank Pekao is one of the largest financial institutions in Central and Eastern Europe. Security is a paramount concern for the organisation, which is why it has chosen to implement Vanderbilt’s cutting edge video and access control technology across a large part of its estate. Leading financial institution Over the last 85 years Bank Pekao has become one of the leading organisations of its kind within Central and Eastern Europe. This Polish financial institution is considered one of the safest banks at the pan-European level and operates almost 1,000 branches, the second largest network in the country. The company belongs to one of the world’s biggest financial groups, UniCredit, which operates in 17 European countries with a network of 9,600 branches and around 145,000 employees. As a pioneer in its industry, Bank Pekao has been awarded many prestigious national and international accolades. In 2014 the company’s mobile banking application won Best Mobile Banking Award by Money.pl, and the Top Employers Institute named it Top Employers Europe 2015 for the sixth consecutive time. Security strategy & technology Its position as one of the safest and secure financial organisations in Poland has been achieved through the implementation of a carefully constructed security strategy, alongside a commitment to adopting cutting edge technology. This area is coordinated by the Bank’s Security Department which is managed by its Director- Janusz Szymków. "As part of this initiative we wanted to move towards an Internet protocol (IP) based solution that could centrally monitor, maintain and control different branch offices" Ryszard Pichnicki Operational Director at Bank Pekao Physical Security Office, explains, “Efficient security is vital, so we have a programme of continually upgrading our infrastructure to make it as reliable as possible. As part of this initiative we wanted to move towards an Internet protocol (IP) based solution that could centrally monitor, maintain and control different branch offices around Poland to allow more efficient management. This would mean that any issues could be identified immediately and remedial action taken when necessary.” Vanderbilt technology Pichnicki contacted Siedlce based intruder alarm system integrator, Cel-Tronics, for its suggestions. Bogdan Jedrych, the company’s Managing Director, explains, “We have worked with Bank Pekao for many years and are pre-approved as a technical partner. After gaining an understanding of what was required, we suggested a solution based around Vanderbilt’s cutting edge technology, including the robust Vectis video recording devices, SPC control panels and the SiPass integrated access control system. Ryszard Pichnicki made it clear that he wanted to implement products from a company that could guarantee availability without any restrictions to installers, and therefore working with Vanderbilt made complete sense.” Interoperability between SPC panels and access control systems SiPass integrated is a powerful and almost infinitely flexible access control system that provides a very high level of security without compromising convenience and ease of use. Krzysztof Krasowski, Vanderbilt’s Sales Manager for Poland, Baltics and Ukraine, says “SiPass integrated is a part of Bank Pekao’s system that restricts movement within each branch and, thanks to its diverse range of modes, can provide ultimate protection. Bank Pekao also required full interoperability between the SPC panels and access control systems for operations such as arm/disarm area, alarms notifications, input/outputs status reading. This is something that we are used to providing, so we had no problem meeting the brief.” Centrally managed single network This level of high-end operability means that the entire system is run over a single network that can be centrally managed, allowing it to work smoothly and ensuring maximum security for all bank branches. Furthermore, this approach was incredibly cost effective, as it eliminated the need for more than one cabling infrastructure. Integration possibilities It also provides an open interface for any third party software, offering the possibility to integrate access control with other systems – therefore creating one intelligent building management system that can check the status of doors, prompt the Vectis iX video recorders to activate, and provide a full audit trail. Vectis iX is based on the ONVIF open communication protocol, which allows these devices to be used alongside third party camera vendors. This has proven to be very beneficial, especially where cameras were already installed and needed to be integrated into the new system. Reusing in-situ infrastructure As the new solution is replacing a Vanderbilt Sintony based system, some of the in-situ infrastructure is being reused, providing further cost savings and reducing unnecessary waste In addition, the Vanderbilt solution is being rolled out in stages and because SiPass is open to readers that can communicate with other controllers, it is helping to provide a smooth migration path. As the new solution is replacing a Vanderbilt Sintony based system, some of the in-situ infrastructure is being reused, providing further cost savings and reducing unnecessary waste, in line with Bank Pekao’s environmental and sustainability policy. Cel-Tronics has installed the new technology in many of the Bank’s branches so far, with great success, and ais planning many more over the next few years. The programme has been very efficient as Bogdan Jedrych explained, “We prepare configuration files beforehand based on existing installations, adjusting them to local requirements. In future we will change the set-up via the central network and apply this to the additional controllers. This will give the flexibility to add/delete cards remotely, download reports and perform other operational tasks.” Bank Pekao’s Ryszard Pichnicki is very pleased with the results so far and concludes, “We take the issue of security very seriously and need to know that we have a system in place that can protect people, property and assets as effectively as possible. I’m confident that, thanks to Cel-Tronics and Vanderbilt, we have the best means of achieving this important objective.”
ASSA ABLOY’s Access Control’s Aperio® wireless locking technology has been installed at the headquarters of BMCE Bank in Casablanca, to provide an instant upgrade to an access control system, without compromising aesthetics. BMCE Bank is one of the largest commercial banks in Morocco, with a network of 540 branches. As part of a complete overhaul of its headquarters security arrangements, around 50 Aperio® C100 wireless online cylinders were selected for its glass doors. Easy to install, ASSA ABLOY Access Control’s Aperio® escutcheon enabled a simple security upgrade from the mechanical systems in place to a sleek access control wireless locking solution. With Aperio®’s flexible design and ability to work with RS485 and Wiegand Interface, and iClass, Mifare Plus and DesFire technology credentials, there was no issue with it instantly connecting to the existing online access control system at BMCE Bank, with minimal modification to doors and premises. Says Chris Bone, ASSA ABLOY Vice President Access Control EMEA: “To have selected Aperio® for such a prestigious building, where security is of paramount importance, is true testament to the abilities of this revolutionary technology.” “This installation really demonstrates how Aperio® can provide end users in any market across the globe, with a simple and intelligent way of upgrading the controllability and security levels of their premises.” Aperio® C100 wireless online cylinders were selected for 50 glass doors at the bank “And with its evolving connectivity and developments in RFID technology, its ability to connect with almost all access control systems is further evidence of how Aperio® continues to evolve and play such a major part in the security industry.” ASSA ABLOY Access Control worked alongside MAXXESS who provided an eFusion security management system and HikVision, which installed a 100 camera surveillance system, incorporating a hybrid recording solution. The contract to implement the complete integrated system was awarded to CST Sécurité, a leading Moroccan security systems integrator.
Mobotix AG, a leading manufacturer of digital high-resolution, network-based video security systems has released details of an installation of its MOBOTIX CCTV solution which is helping to protect and improve access for staff and clients at Pinfields Limited, a highly respected Midlands-based accountancy practice.Based in Bromsgrove, Worcestershire, Pinfields has a long-established background offering high quality financial advice to small and medium enterprises since 1938. Due to their continuing growth, in August 2009 Pinfields moved into new purpose-built offices covering 5,500 sq ft over three floors. With a move to bigger premises, the firm decided to improve its security monitoring and access control requirements and approached Ecl-ips, a local business which specialises in monitoring and surveillance using IP technology. 360° all-round viewAfter surveying the building and discussing the exact requirements with the client, Aaron Kernaghan, Managing Director of Ecl-ips, recommended a solution that combined the MOBOTIX IP Surveillance cameras and a door entry and access control system from Access Control Technology (ACT).Due to MOBOTIX's innovative Q24 hemispheric camera, Ecl-ips only had to install one camera in the office building. Thanks to the 360° all-round view, the Q24 is able to capture an entire room. With a panorama function and a quad view, the camera can show images from four different angles simultaneously. Currently the MOBOTIX Q24 is the only product on the market that offers this functionality and reduces the number of cameras needed to provide surveillance of a room. The MOBOTIX M12 camera was situated at the front of the building to provide external surveillance of the premises. As with the Q24, all of the MOBOTIX cameras are high resolution cameras which store images that are more revealing and provide stronger evidence than other formats. MOBOTIX cameras record approximately 30 times more detail than 95% of all existing video systems worldwide. In virtually all applications, one MOBOTIX camera can replace several standard CCTV systems because MOBOTIX technology offers four times more coverage. Ecl-ips also installed a surveillance class network attached storage device which is capable of recording and storing up to 28 days of high-definition footage from the MOBOTIX cameras. Retrieval of these images is made simple by the utilisation of the license-free MOBOTIX MxControlCenter Video Management Software that has been set up and deployed on several client PCs within the business. One MOBOTIX camera can replace several standard CCTV systems because MOBOTIX technology offers four times more coverage Restricted access and time and attendance recorderThe ACT access control system recommended by Ecl-ips has exceeded the expectations of Nick Pinfield and his team. Ecl-ips fitted an ACTpro 3000 door access controller which allows the staff to gain access to the building via a key fob. This also records the exact time that they enter and leave the building, and by doing so provides the restricted access that was requested and delivers a time and attendance system. With the use of the ACTentry V-IP system, which combines door entry with audio video over IP, visitors to the Pinfields office simply press the door entry panel, which includes a camera, and from any PC in the business that has the client software installed they can view who is at the door and speak to them over the phone system before allowing them access to the building. Nick Pinfield, a Partner at Pinfields Limited commented: "The system recommended and installed by Ecl-ips has definitely exceeded my expectations. The quality of the MOBOTIX images is superb and we can even zoom in and out of the recorded images as and when we need to. I have found the system incredibly easy and intuitive to use. The access control has enabled us to be able to monitor and control our front door when reception is not attended. The time and attendance system is also very simple but highly effective and has fulfilled all of my requirements. This has also increased our productivity."Pinfield continued: "We have been delighted by the professionalism of Ecl-ips and the team of engineers that have worked on this project. They are a company that understand technology and in particular IP. It has definitely been money well spent."