Banking & finance security applications
Retail banks and financial services companies have a long history of dealing with the risk and potential threat of criminal activity. Arecont Vision understands the unique needs of the retail banking and financial services market and provides customer-proven megapixel camera technology to specifically meet those needs for our customers around the world. Bank crime statistics In a typical year in the United States, according to the FBI cash losses total around $7.5 million, only about 22% of...
Banks and financial institutions have more complex and diverse requirements for video surveillance technology than most other organisations. From corporate buildings, to branch offices, data centres, ATMs and cash depots. Several European Banks benefit from using Mirasys Video Management Software (VMS), which provides high privacy protection and robust technology. Networking the video management system of the bank’s branch offices provides users a single logical system that can be used fr...
“It’s obvious that a prominent bank like BNP Paribas has to take processes like security extremely seriously", said Alan Ford, Security Manager at BNP Paribas. Spread over several office buildings, more than 4000 staff make daily use of the AEOS Security Management Platform to enter the restricted areas for which only they have been authorised. BNP Paribas needs be certain that they can rely on their access control system. Even though their previous Nedap WinXS system did just t...
As technology continues to catapult forward at a significant pace in the 21st century, banks are increasingly facing new security challenges to safeguard their buildings, staff, customers, and financial operations. Because of this, it is critical that banks invest in security systems that meet the complex and unique requirements of the financial environment. Vanderbilt’s SPC provides this solution through advanced, dedicated intruder detection features and products for banking applic...
Intrusion can be very invasive, damaging and expensive for any industrial or commercial business. The damage of machinery or the theft of goods can be potentially devastating. Not only that, but each commercial and industrial property can vary dramatically in terms of the level of security required, along with the conditions of the installation. Aisles, machinery and varying environmental conditions are all considerations, as is the required function of the security system and the ability to mo...
Erste Group Bank AG built a new group headquarters on the site of the former Südbahnhof railway station in Vienna, with construction work taking place from 2012 to 2016. Employees who were previously distributed across 20 different locations throughout the city now all work in the same building complex. Advantages of new arrangement The advantages of this new arrangement are clear: Closer proximity and improved infrastructure strengthen cooperation and provide a modern, pleasant working e...
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalisation and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're likely to find a difference in size between companies. Whether it’s a global retail chain versus a small family-owned store, a corporate restaurant chain versus a mom-and-pop diner or a small bed and breakfast versus a large hotel chain — each side of the coin presents unique characteristics and advantages in a number of areas. Disparity in physical security industry Customers are drawn to products and services from large enterprises as the big names typically imply stability This disparity very clearly exists in the physical security industry, and differences in the sizes of product manufacturers and service providers could have important implications for the quality and type of the products and services offered. All too often, customers are drawn to products and services from large enterprises, as the big names typically imply stability, extensive product offerings and global reach. And that's not to say that these considerations are unwarranted; one could argue that larger companies have more resources for product development and likely possess the combined expertise and experience to provide a wide range of products and services. But the value that a company’s products and services can bring isn’t necessarily directly related to or dependent on its size. In an age where the common wisdom is to scale up to be more efficient and profitable, it’s interesting to pause and think about some of the possible advantages of small- and medium-sized businesses (SMBs). Typically, “small” companies are defined as those with less than 100 employees and “medium” with less than 500. Providing social mobility Schumacher argued that smaller companies are important engines of economic growth. Indeed, according to the Organisation for Economic Cooperation and Development (OECD), a group of 36 member countries that promotes policies for economic and social well-being, SMBs account for 60 to 70 percent of jobs in most OECD countries. Importantly, SMBs provide resilience in that there are often large economic and social impacts when big companies fail. Smaller companies are better for regional economies in general, as earnings stay more local compared to big businesses, which in turn generates additional economic activity. SMBs are also better at providing social mobility for disadvantaged groups by giving them opportunities and enabling them to realise their potential. Smaller companies are often more innovative, bringing to the market novel technologies and solutions such as Cloud, analytics, AI, and IoT New companies introduce new technologies There's no denying the role of start-ups when it comes to innovation. In the security industry, many new technologies (e.g. Cloud, analytics, AI, IoT) are first brought to the market by newer companies. In general, smaller companies’ products and services often have to be as good or better than others to be competitive in the marketplace. They are therefore often more innovative, bringing to the market novel technologies and solutions. And these companies are also more willing to try out other new B2B solutions, while larger companies tend to be more risk-averse. Customer service Aside from the quality of products and services, arguably one of the most important components of a security company’s success is its ability to interact with and provide customers the support that they deserve. Smaller companies are able to excel and stand out to their customers in a number of ways: Customer service. Customers’ perceptions of a product’s quality are influenced by the quality of support, and smaller manufacturers often possess a strong, motivated customer service team that can be relatively more responsive to customers of all sizes, not just the large ones. A superior level of support generally translates into high marks on customer satisfaction, since customers’ issues with products can be resolved promptly. Flexibility. SMBs have a greater capacity to detect and satisfy small market niches. While large companies generally create products and services for large markets, smaller companies deal more directly with their customers, enabling them to meet their needs and offer customised products and services. And this translates to adaptability, as SMBs become responsive to new market trends. By having a pulse on the market, smaller companies have much more flexibility in their supply chain and can adjust much faster in response to changing demand. Decision-making. Smaller companies are much more agile in decision-making, while larger enterprises often suffer from complex, tedious and lengthy decision-making processes. Communication is easier throughout SMBs, as smaller teams enable new ideas to flow and can solve problems faster. Job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction. SMBs are also generally more connected to local communities and participation in community activities leads to a greater sense of purpose. Additionally, SMBs have a much smaller impact on the environment, which is increasingly becoming an important consideration for today’s employees and customers. Though Schumacher's book takes a much deeper dive into the large global effects of scale on people and profitability, the general impact of a company’s size on its products and services is clear. It’s important for all players in the security industry to remember that the commitment and dedication to product quality can be found in businesses of all sizes. Ensuring safety of people, property and assets Large manufacturers may catch your eye, but small business shouldn’t be forgotten, as they can offer end users a robust set of attributes and benefits. While all security companies are aiming to achieve a common goal of providing safety for people, property and assets, smaller businesses can provide extensive value when it comes to driving the economy, innovating in the industry, providing quality employment and offering superior customer service.
Repercussions are rippling through the physical security industry since President Trump signed into law the ban on government uses of surveillance equipment by Chinese manufacturers Hikvision and Dahua. In addition to the direct and indirect consequences of the new law, there have also been other developments likely to impact the future of Chinese companies in the video surveillance market. The ban has raised awareness of Chinese companies’ role in video surveillance, and other developments are related to tariffs and possible sanctions, all playing out amid the backdrop of an escalating trade war. One Chinese manufacturer previously dismissed security concerns about its role in video surveillance as “Cold War rhetoric.” There has been an almost nostalgic tone recently to the escalating concerns about video cameras being used for spying. Hikvision and Dahua have both stated emphatically that they have not conducted any espionage-related activities. Even so, the U.S. government ban has emboldened the concerns. However, to be clear: No one has alleged that technologies from either of the companies have been used for espionage. Rather, the concerns are about the potential for misuse, not actual misuse. Also aggravating the situation are Chinese companies’ previous, actual problems with cybersecurity, which the companies say they have addressed. Here are some recent developments related to the U.S. government ban and Chinese manufacturers in general: Tariffs and trade concerns Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods, including data storage and processing components such as printed circuit boards, as well as video camera lenses. The escalating trade war has kept generalised concerns about China and its trade practices in the public eye and fomented a level of uncertainty in many markets, including physical security. Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods Involvement of surveillance in Chinese human rights violations Concerns have surfaced in a Congressional hearing recently about the Chinese government’s surveillance activities targeting the Uyghurs and other Muslim ethnic minorities in the Zinjiang Urghur Autonomous Region (XUAR). Specific attention is being directed at the region’s surveillance system including “thousands of surveillance cameras, including in mosques,” and Hikvision and Dahua were mentioned in the Congressional hearing as profiting from security spending in the area. Increased global media attention The ban has not been widely publicised in the U.S. mainstream media, but the topic has attracted global attention. For example, the Australian Broadcasting Corporation broadcast a 10-minute expose on the use of Chinese-made cameras in Australian government facilities, including “sensitive military facilities.” The report, which mentioned the U.S. ban, noted that “Both [Hikvision and Dahua] have had security flaws be exposed leading to fears that some of the flaws were placed there to help the Chinese government spy.” The report continues: “China is trying to set itself up as the number-one country for cyber-espionage, and this is part of that platform.” How broadly should one interpret the inclusion of "critical infrastructure" mentioned in the bill? Broader interpretation of the bill beyond the federal government The language in the bill leaves a level of ambiguity in terms of the scope of its application, and the security marketplace as a whole has been struggling to understand its full impact. Does the ban only restrict an integrator’s use of Chinese technology on a specific government job, or does it eliminate an integrator who installs the technology (even in non-government projects) from consideration for government jobs? How broadly should one interpret the inclusion of “critical infrastructure” mentioned in the bill, for example, non-governmental facilities? Will other governments and private entities assume they should ban Hikvision and Dahua in order to be compliant? For example, Suffolk, Virginia, has announced it will not to use Dahua or Hikvision cameras because the federal ban applies to “U.S. government-funded contracts and for critical infrastructure and national security usage.” The result of these developments is a kind of snowball effect, simultaneously drawing attention to the issues and adding new elements to an overall narrative. Taken together, these developments suggest the U.S. ban has set off a level of concern about Chinese companies that will have an industry-transforming impact in the months to come.
Newly modernised halls with lots of daylight will house hundreds of exhibitions and conference events at the upcoming Security Essen 2018 at Messe Essen, Germany. A new layout and hall numbering system will be unfamiliar to past attendees but promises to simplify the experience as it brings together attendees and exhibitors. European physical security market Security Essen is an international trade fair, but the emphasis is more on German, Austrian and Swiss companies. In all, Security Essen will feature 1,000 exhibitors from 40 nations. The trade fair has more of a continental European “flavour” compared to IFSEC, which focuses more on the U.K market. At the last Security Essen in 2016, organisers reported about 40,000 visitors including conference participants, VIP guests, members of various delegations and journalists. Security Essen 2018 has more of a continental European “flavour” compared to IFSEC, which focuses more on the U.K market “This year, we have sharpened the profile of Security Essen,” says Oliver P. Kuhrt, CEO of Messe Essen, a trade fair, congress and event organiser with its own exhibition grounds. “The trade fair has become considerably more digital, more modern and more interactive. Due to the optimised hall layout, we are offering our exhibitors and visitors the best possible experience with short paths and direct communication.” Newly modernised Messe Essen The newly modernised site of Security Essen will encompass eight halls, newly renumbered and with the subject areas reorganised, too. Visitors will find Services in Hall 1; Access, Mechanatronics, Mechanics and Systems in Halls 2 and 3 and the Galeria; Perimeter Protection in Hall 3; Video in Halls 5 and 7; and Fire, Intrusion and Systems in Halls 6 and 7. A helpful smart phone app, downloadable free from the Google Play Store (Android) or the Apple App Store (iOS), will be available two weeks before the event and include a show floor plan; the exhibitor list with booth numbers and contact information; and an overview of the supporting programme. A separate hall – Hall 8 – will house new Cyber Security and Economic Security categories. Cyber Security Conference At the new Cyber Security Conference, located prominently at the new East Entrance, experts will share their knowledge about the more pressing challenges and potential of cybersecurity. The programme opens and closes on 25 and 28 September with the main topic “Opportunities and Risks of Cyber Security”. On 26 September, discussions and lectures will centre on “Entry, Admission, Access: Identification Options”.A helpful smart phone app, downloadable free will be available two weeks before the event and include a show floor plan On 27 September, the topic will be smart homes and focus on “Connected Building, Security in the Buildings of the Future”. Speakers will include the president of Germany’s Federal Office for Information Security, who will address cybersecurity as a challenge for politics, business and society. The fair organises the conference in cooperation with the BHE Federal Association of Security Technology and the technical support of the Federal Office for Information Security. In Hall 8, a new Public Security Forum will enable visitors to experience digital security technologies for public spaces from the areas of sensors/IoT, cyber security and surveillance. The products and solutions will be installed in four different building scenarios (town hall, school, hospital and library) and it will be possible to test them extensively. The forum, including lectures and discussions, will target municipal decision makers and planners of public spaces. Comprehensive programme A Security Expert Forum in Hall 2 will present a continuous programme with more than 90 presentations during the period of the fair. Visitors will obtain information and solution ideas about all six subject areas covered at the fair, and the programme will begin with a keynote lecture each morning and finish with a live demonstration in the evening. On the first day of the fair (25 September), Security Essen’s Career Forum will introduce retrainees, students, trainees and graduates to companies from the security industry. Targeted and professional communication will be established between companies and job applicants to facilitate making contacts, developing networks, and filling actual vacancies. Thursday (27 September) will be observed as Fire Prevention Day, and a Drone Course will be provided each day in Hall 7. One day admission to Security Essen is €41; a four-day ticket is €105. Advance sale tickets are discounted.
GSX 2018 is both a new event for the security industry and the continuation of a 63-year tradition. Global Security Exchange (GSX) is the new branding for ASIS International’s annual seminar and exhibits, which have been held since 1955. In recent years, the ASIS event has joined forces with other organisations to expand its scope and to appeal to a broader audience. Partners include ISSA (Information Systems Security Association) and Infragard, a public-private partnership between U.S. businesses and the Federal Bureau of Investigation (FBI). The expansion is continuing this year with the addition of 30 supporting organisations representing industry verticals and reflecting ASIS’s intent to unite the full spectrum of security. Improving the state of cyber security Held September 23-27 at the Las Vegas convention Center, GSX 2018 seeks to attract more than 20,000 operational and cyber security professionals and 550 exhibitors. The Cyber Security Summit will co-locate with GSX, offering cyber security programming at a time when it is needed the most Other elements will further expand the 2018 event’s scope. The Cyber Security Summit will co-locate with GSX, offering cyber security programming at a time when it is needed the most. Top government, industry and academic thought leaders will engage in a dialogue to improve the state of cyber security. The 2018 Security Cares Program will address school violence prevention and response in a free education program. Topics will include pre-violence indicators, target hardening, and best practices to involve the entire community of school administrators, law enforcement, security professionals and mental health providers. Experts to deliver keynote speeches Keynote speakers including CNN host Fareed Zakaria will bestow celebrity appeal. Air Force Major General Bradley D. Spacy will share details about the new AFWERX innovation and tech hub in Las Vegas and how the U.S. Air Force is collaborating with the private sector to bring new security product ideas to market. Spacy’s keynote on Sept. 26 will kick off Military and Law Enforcement Appreciation Day. Also, K.T. McFarland, former Trump Administration Deputy National Security Advisor, will share an insider’s perspective on critical foreign policy and defence industries. Attendees to ASIS International’s annual gathering typically list networking and education as big benefits of the event. Historically, the trade show aspect has existed separately from the educational program, and foot traffic to the exhibits has sometimes suffered from the competition. Beginning last year, and continuing in 2018, ASIS International has pursued innovative approaches to integrate the trade show more closely into the overall attendee experience. “The integration of programming and exhibits is truly seamless,” says one observer of the new approach. Held Sept. 23-27 at the Las Vegas convention Center, GSX 2018 seeks to attract more than 20,000 operational and cyber security professionals and 550 exhibitors X Learning Theatres GSX has sought to transform the exhibit hall into a ‘learning lab environment’ that features thousands of security products, technologies and service solutions (provided by the exhibitors), in addition to ‘immersive learning opportunities to connect the current and emerging threat landscape with solutions available in the marketplace’. There are several ‘X Learning Theatres’, including one (‘X-Stage’) focussed on leading-edge technologies such as blockchain, cryptocurrencies, AI, drones, and robotics. There is also an ‘Xcelerated Exchange Stage’ to facilitate discussions among security practitioners and solution providers. The ‘Xperience Stage’ showcases case studies and best practices. Also attracting more attendees to the Exhibit Hall will be ‘Career HQ’, a free career fair and enhanced career centre. ‘D3 Xperience’ (Drones, Droids Defence) will focus on unmanned systems with education and demos. The ‘Innovative Product Awards (IPAs) Showcase’ will highlight winners of an awards program. Focussing on security practices GSX is not as much about sales leads as about making connections and contributing to a larger conversation about how to protect people, facilities and assets ASIS International (now GSX 2018) is often compared to ISC West, the U.S. industry’s largest show held in Las Vegas in the spring. GSX 2018 this year may face even more scrutiny based on the changes, rebranding, and location (also in Las Vegas). However, GSX is a completely different show than ISC West, which focuses on the business of security. In contrast, GSX is much more about the practice of security than business. The international network of ASIS International members attend the yearly conference to make new connections, to learn and to benefit from the experiences of other security professionals around the world. The successful trade show exhibitors are the ones that approach the show with that understanding. GSX is not as much about sales leads as about making connections and contributing to a larger conversation about how to protect people, facilities and assets. ASIS International deserves credit for their efforts to integrate the trade show element into the larger goal of the event. Hopefully their new approach will enhance the overall experience for both attendees and exhibitors – and help to make the world a safer place as a consequence.
By now your organisation should know the drill. To keep your enterprise safe from unauthorised access you take the basic precautions: create strong passwords that are not re-used and are updated frequently, use updated anti-virus software, employ host and network-based intrusion detection and prevention, data encryption, etc. etc. However, complacency has no place in cybersecurity. Hackers are working round-the-clock to outwit your most ardent security professionals. Here are a few specific vulnerabilities that require immediate and constant attention to stay safe in a hostile security world. Protect against burst attacks You may be aware of DDoS, or distributed denial of service attacks. In fact, Cisco writes that these online attacks — where high-volume traffic floods a system’s servers, making web traffic extremely slow — grew 172% in 2016. But in the last few years, Cisco documents how "burst attacks", a type of DDoS attack that floods traffic in short bursts at random times over a prolonged period, has skyrocketed. They claim that in one study, 42% of the companies faced a burst attack in 2017. Burst attacks change vectors throughout an attack, making it difficult to create a signature to block the attack According to Radware, on-premises DDoS protection needs to adapt to counter these often less than one-minute attacks. While the majority of these solutions detect burst attacks, they write that "most of them limit the rate of bad (and legitimate) traffic to a certain threshold, resulting in a high level of false positives." One big challenge is burst attacks change vectors throughout an attack, making it difficult to create a signature to block the attack. They recommend adopting two key solutions: 1) a behavioural DDoS protection system that utilises machine learning algorithms to identify the patterns of burst attacks, and 2) measuring the degree-of-attack (DoA) surface, which looks at the bandwidth or rate of a specific type of traffic and the percentage of a given type of traffic out of the entire distribution of traffic. If an attack rates high in both the bandwidth and percentage parameters, then it gets a high DoA surface score, showing that a burst attack likely occurred. Prioritise network infrastructure Nefarious actors have been exploiting both enterprise level and small/home office and residential routers For companies with in-house information technology staff, network infrastructure usually gets plenty of attention. Proper configuration, maintenance and security are often key considerations for infrastructure due to its importance to the business. What about smaller entities? Do you have a small switch or router you either purchased or leased from your internet service provider? If so, when was the last time you updated it? In Alert TA18-106A, the United States Computer Emergency Response Team (US-CERT) shares information dating all the way back to 2015 on how nefarious actors have been exploiting both enterprise level and small office/home office and residential routers and switches. If you haven’t changed passwords and updated the software/firmware on these devices yet it should be near the top of your priority list. Hide sensitive web pages from search engines Search engines are an easy first step for someone looking to exploit your environment. They can conduct searches of your known web presence, looking for pages which might not have been meant for the general public but are still accessible. Using robots.txt pages can be excluded from search engine crawlers. Entrepreneur.com suggests checking out a tutorial from SEObook.com to learn more about how you can do this. Keep in mind this will only deter the most basic attackers as more sophisticated attackers will conduct manual searches. Update passwords on your IoT devices Data at rest is important, but data in transit is just as important to encrypt, particularly sensitive information It is shocking how many IoT devices are used in our daily lives, such as security and video conference cameras, cars, and smart sensors, but also contraptions you probably forgot are now connected to the internet, such as garage doors, appliances, etc. Tom’s Guide gives a good list of the many things you should remember to update. Use encryption to protect data in transit Encryption your data at rest – when it is stored somewhere – is incredibly important. However, your encryption efforts should not stop there. Data in transit is just as important to encrypt, particularly sensitive information. This could include communication between your websites and applications or even just communications within your company. Unencrypted information is at risk to an eavesdropper on your network. To prevent the data from being usable to potential eavesdroppers, ensure you are using encrypted connections such as HTTPS, SSL, TLS, FTPS, etc.
Financial institutions of all sizes demand simple, reliable solutions to protect against fraud, theft, and accidents in the workplace. Advancements in camera resolution and storage capabilities have put pressure on banks and credit unions to upgrade their video surveillance systems. Upgrading to a modern, economical NVR server will greatly increase system performance and scalability for small-budget projects with benefits seen across both loss prevention and business insights. Reliable high performance However, not all banks have the same security budget as large institutions. This makes high-power, custom-built solutions seem unrealistic; however, small projects featuring bandwidth limitations need to retain the ability to scale up depending on future surveillance demands. Before any system expansion can occur, reliable high-performance must be established. White-box solutions compromise quality and underperform when exposed to the tough requirements of the financial security market. Fortunately, custom-built, video-optimised solutions are not exclusive to large multinational financial institutions. Network architecture When upgrading an ineffective digital security system, a new network architecture needs to be created. Usually, this means switching from DVR to NVR servers. As a result, network switches attach to the camera allowing for easier future system expansion. Along with the newly gained scalability, throughput performance on servers can achieve significantly higher levels.BCDVideo offers servers, networking and workstations that provide enterprise-quality performance for all financial projects, regardless of size Implementing a complete video solution with high-performance servers, modern networking protocols and powerful workstations in financial institutions is now possible, even for small projects. BCDVideo offers servers, networking and workstations that provide enterprise-quality performance for all financial projects, regardless of size. The Benchmark Magazine 2016 Infrastructure award winner Aurora Server Series earns its name by marking the dawn of a new era in DVR replacement. Small-budget projects that have previously succumbed to the pressure of sacrificing quality for short-term savings now have access to servers with redundant power, 12Gbps RAID controller with 2GB of Flash Based Write Cache, hot-pluggable helium hard drive, and 10,000 PassMark rated CPUs. These big project features fit price-conscious budgets while maintaining the high-performance found in enterprise surveillance. BCDVideo Titan Networking The Titan Networking Series is priced well below standard to ensure project size and scope does not prevent an integrator from deploying a complete networking solution. Without the added cost of a networking engineer, savings reach into the thousands. Additionally, by using cutting-edge technology like Shortest Path Bridging, Titan switches, backed by a five-year, on-site warranty, will run at a high-level for years. The Gamma Series workstations fill the void in commercial and enterprise environments. Ideal for access control and IP video surveillance, they are powerful enough to render high-quality megapixel images for applications running 24/7. Optimised for advanced graphics and video capabilities, smaller projects can use the Gamma Series as both a video recorder and viewer.
To the lay person they appear to be simple LED light spots going back to the original style of illumination of the old 1800s palace (1876) that currently houses the Italian Ministry of Economy and Finance, and that historically represents the first great building of the newly reborn Roman capital, as commissioned by the former Minister Quintino Sella. Hidden in plain sight The carefully hidden technology, however, transforms each of the 20 light points (appropriately designated “Roma lights”) decorating the external perimeter into a state-of-the-art tool to guarantee the security of the public in the area around the Ministry. The transformation is executed thanks to the internal installation of IP cameras produced and distributed world-wide by the German company MOBOTIX, equipped with software for recording and processing the images. Notwithstanding the innovation of the performance, the new lighting systems are perfectly integrated, from an aesthetic point of view, with the historic palace where they are installed: A very advanced system, therefore, in terms of technology, but completely hidden inside a design in perfect harmony with the place where the light spot is installed, as envisioned and implemented by Dr. Massimo Belli, Appointed Administrator of the Ministry of Economy and Finance, Dr. Umberto Dall’Aglio, Director of the VI Office of the IV Department of the Ministry and by Architect Gianluca Canofeni, Director of the Works and Technical Administrator of the IV Department. High efficiency at a low cost The transformation is executed thanks to the internal installation of IP cameras produced and distributed by MOBOTIX “The motivation for the project was multifaceted: On the one hand to realise a control system based upon state-of-the-art video surveillance tools, and on the other hand implementing a new lighting project to substantially reduce electricity consumption – within the scope of energy efficiency –, guaranteeing at the same time a much longer useful life, and as a result a substantial reduction of maintenance costs”, said Lieutenant Colonel Saverio La Monaca, chief of the Central Security Organisation of the Ministry. As per the costs, the analysis carried out by the Ghisamestieri teams, obviously as a function of the actual system utilisation give a clear picture: It is foreseen that the initial investment will be recouped within only 4 or 5 years and economic savings of even 50% between the fifth and fifteenth year of useful life of the system. With respect to energy savings, MOBOTIX’ video cameras provide a further guarantee, since their energy consumption is extremely low in comparison with other technologies present on the market: about 4 to 6 watts per hour. MOBOTIX DualDome cameras The project, comprises today of 20 wall light spots installed in strategic positions throughout the Ministry. Each shelf hides inside 2 MOBOTIX DualDome cameras with 180 degrees field of view, for an overall total of 40 high-resolution IP security cameras. The images can be recorded inside the cameras 24/7 (colour, and black and white) to be viewed at the control centre located inside the Ministry building. The security personnel belonging to the military branch of the Financial Guard manage the complete video surveillance apparatus and constantly monitor the images of the cameras in real time. 10 wireless routers manufactured by the young Italian company 3WLan, are installed inside a similar number of wall brackets and are capable of guaranteeing the bi-directional Wi-Fi link between the control centre and the patrols active outside the palace. This is possible thanks to an authentication on a RADIUS server that identifies the access permissions of the router on a list of authorised equipment. Exchange data and images in real time The new wireless system guarantees much more reduced operating expenses against a much more intensive use profile" “Especially in case of demonstrations, which is actually very common, our security operators are involved in the so-called pacification operations outside the palace for the purpose of first of all protecting the ministerial magistrates. These are carried out both on foot and inside our patrols – which implies the need to rapidly cross-check the owner of a particular vehicle or verifying the personal data on passports and identification documents. "Before installing the new intelligent light spots we relied on a GSM system that was, however, very expensive. The new wireless system guarantees much more reduced operating expenses against a much more intensive use profile”, added Giancarlo Varvo, who is responsible for security. The video surveillance technology available on the patrol vehicles, which are also equipped with tools to read license plates, or palmtop operating systems (also known as explorers) supplied to foot patrols, once within the radius of coverage of the poles equipped with Wi-Fi antennas, have the option of exchanging data and images with the operations centre inside the Ministry by means of a recognition system. Furthermore, by connecting to a specific IP address, external patrols have the possibility to view the images recorded by a specific video camera in real time. Remote day/night illumination management Each support is also equipped with a remote switch that allows managing the illumination and video surveillance functions completely autonomously and independently from each other. While the light source turns on at dusk and switches off at sunrise, the cameras continue functioning 24/7, according to the specific settings they may record both in continuous mode or trigger upon an event, such as the movement of a pedestrian, or a sound. The cameras placed close to the entrances of the Ministry are capable of sending alerts in real time to the operations centre, or activating a bollard along the perimeter thanks to an automatic vehicle license plate reading system. Nothing to object about the support of the engineers of Ghisamestieri, that proved to beat all times available and collaborative in answering the requirements of the Ministry. Also, no complaints about Genius, a unique world-wide illumination solution, capable of offering high level design and advanced technology in a single solution. No objections about the technology made in Germany of MOBOTIX. Securing the facility with additional cameras In fact, the operations room located inside the Ministry remotely controls the recording of more than 1,600 cameras" “In addition to the project implemented with Ghisamestieri, we employed the technology of MOBOTIX also for other types of requirements, still obviously related to the security of the Ministry: 36 AllroundMono security cameras have already been installed on the roof of the palace to check potential attacks for instance through the air vent conduits to the so-called Tempest room, a completely aseptic environment for the protection of communications inside the Ministry. "In fact, the operations room located inside the Ministry remotely controls the recording of more than 1,600 cameras installed in various facilities connected to the department”, underscores Varvo. The light spots installed in Rome find their place in a wider project, where any illumination support can potentially serve as a technology node. Named “Genius” by their creators, regardless of the design or aesthetic form, any light spot is potentially capable of becoming a true security centre, perfectly integrated from the aesthetic and urban points of view into city decor. Equipped with microphones and speakers, MOBOTIX’ cameras can put the citizens in touch with the operations centres of the police or ambulances by means of special buttons placed at the base of the pole or through the implementation of an RFID or magnetic strip identification system. “With respect to traditional poles with well-visible cameras installed outdoors, Genius represents a true video security system, not just a simple crime deterrent”, concluded Varvo.
Hikvision, the global leader in video surveillance equipment, and their Abu Dhabi partner, Opal Protection Systems, have played a major role in preventing an attempted robbery at a Money Exchange in Abu Dhabi. A comprehensive Hikvision CCTV System captured the moments when a robed figure threatened employees with a pistol and alerted the Abu Dhabi Police Operations Room, which immediately dispatched officers to arrest the suspect. Footage of the unfolding drama has now been posted to YouTube and proved an online sensation with over 3 million hits. All the money exchanges in Abu Dhabi benefit from the world’s most highly advanced security technology, which is installed by authorised dealers under the strict surveillance of the police. Each is video linked to a 24/7 specialist police department, which can respond in a matter of minutes to any alert. The security system in the money exchange centre involved in the attempted robbery consists of 13 Hikvision easy-to-use IP cameras connected to a Hikvision DS-8616NI-ST Network Video Recorder (NVR). The cameras used include the DS-2CD2120F-I(W)(S) 2MP vandal-proof dome camera, the DS-2CD2520F 2 MP mini dome camera, DS-2CD2020-I 2MP IR bullet camera and the DS-2CD2D14WD 1MP mini camera. Surveillance helped police swiftly secure the situation “The incident in the Abu Dhabi exchange centre involved a woman using a fake gun and a knife in an attempted robbery,” says Yousef Moharib, General Manager at Opal Protection Systems Ltd, which implemented the Hikvision CCTV solution. “Thanks to the Hikvision security solution installed within the exchange centre, Abu Dhabi Police were able to secure the situation within minutes, and with maximum efficiency. I would like to take this opportunity to thank Hikvision for their continued support and feel that this incident has further strengthened our partnership within the region. “We are aggressively focused on staying at the pinnacle of the systems integration industry. Our clients range from Government entities on a federal and municipal level to large enterprises throughout the Middle East. Opal offers clients a turnkey solution for its entire infrastructure requirement,” he added.
Based in Poland, Bank Pekao is one of the largest financial institutions in Central and Eastern Europe. Security is a paramount concern for the organisation, which is why it has chosen to implement Vanderbilt’s cutting edge video and access control technology across a large part of its estate. Leading financial institution Over the last 85 years Bank Pekao has become one of the leading organisations of its kind within Central and Eastern Europe. This Polish financial institution is considered one of the safest banks at the pan-European level and operates almost 1,000 branches, the second largest network in the country. The company belongs to one of the world’s biggest financial groups, UniCredit, which operates in 17 European countries with a network of 9,600 branches and around 145,000 employees. As a pioneer in its industry, Bank Pekao has been awarded many prestigious national and international accolades. In 2014 the company’s mobile banking application won Best Mobile Banking Award by Money.pl, and the Top Employers Institute named it Top Employers Europe 2015 for the sixth consecutive time. Security strategy & technology Its position as one of the safest and secure financial organisations in Poland has been achieved through the implementation of a carefully constructed security strategy, alongside a commitment to adopting cutting edge technology. This area is coordinated by the Bank’s Security Department which is managed by its Director- Janusz Szymków. "As part of this initiative we wanted to move towards an Internet protocol (IP) based solution that could centrally monitor, maintain and control different branch offices" Ryszard Pichnicki Operational Director at Bank Pekao Physical Security Office, explains, “Efficient security is vital, so we have a programme of continually upgrading our infrastructure to make it as reliable as possible. As part of this initiative we wanted to move towards an Internet protocol (IP) based solution that could centrally monitor, maintain and control different branch offices around Poland to allow more efficient management. This would mean that any issues could be identified immediately and remedial action taken when necessary.” Vanderbilt technology Pichnicki contacted Siedlce based intruder alarm system integrator, Cel-Tronics, for its suggestions. Bogdan Jedrych, the company’s Managing Director, explains, “We have worked with Bank Pekao for many years and are pre-approved as a technical partner. After gaining an understanding of what was required, we suggested a solution based around Vanderbilt’s cutting edge technology, including the robust Vectis video recording devices, SPC control panels and the SiPass integrated access control system. Ryszard Pichnicki made it clear that he wanted to implement products from a company that could guarantee availability without any restrictions to installers, and therefore working with Vanderbilt made complete sense.” Interoperability between SPC panels and access control systems SiPass integrated is a powerful and almost infinitely flexible access control system that provides a very high level of security without compromising convenience and ease of use. Krzysztof Krasowski, Vanderbilt’s Sales Manager for Poland, Baltics and Ukraine, says “SiPass integrated is a part of Bank Pekao’s system that restricts movement within each branch and, thanks to its diverse range of modes, can provide ultimate protection. Bank Pekao also required full interoperability between the SPC panels and access control systems for operations such as arm/disarm area, alarms notifications, input/outputs status reading. This is something that we are used to providing, so we had no problem meeting the brief.” Centrally managed single network This level of high-end operability means that the entire system is run over a single network that can be centrally managed, allowing it to work smoothly and ensuring maximum security for all bank branches. Furthermore, this approach was incredibly cost effective, as it eliminated the need for more than one cabling infrastructure. Integration possibilities It also provides an open interface for any third party software, offering the possibility to integrate access control with other systems – therefore creating one intelligent building management system that can check the status of doors, prompt the Vectis iX video recorders to activate, and provide a full audit trail. Vectis iX is based on the ONVIF open communication protocol, which allows these devices to be used alongside third party camera vendors. This has proven to be very beneficial, especially where cameras were already installed and needed to be integrated into the new system. Reusing in-situ infrastructure As the new solution is replacing a Vanderbilt Sintony based system, some of the in-situ infrastructure is being reused, providing further cost savings and reducing unnecessary waste In addition, the Vanderbilt solution is being rolled out in stages and because SiPass is open to readers that can communicate with other controllers, it is helping to provide a smooth migration path. As the new solution is replacing a Vanderbilt Sintony based system, some of the in-situ infrastructure is being reused, providing further cost savings and reducing unnecessary waste, in line with Bank Pekao’s environmental and sustainability policy. Cel-Tronics has installed the new technology in many of the Bank’s branches so far, with great success, and ais planning many more over the next few years. The programme has been very efficient as Bogdan Jedrych explained, “We prepare configuration files beforehand based on existing installations, adjusting them to local requirements. In future we will change the set-up via the central network and apply this to the additional controllers. This will give the flexibility to add/delete cards remotely, download reports and perform other operational tasks.” Bank Pekao’s Ryszard Pichnicki is very pleased with the results so far and concludes, “We take the issue of security very seriously and need to know that we have a system in place that can protect people, property and assets as effectively as possible. I’m confident that, thanks to Cel-Tronics and Vanderbilt, we have the best means of achieving this important objective.”
ASSA ABLOY’s Access Control’s Aperio® wireless locking technology has been installed at the headquarters of BMCE Bank in Casablanca, to provide an instant upgrade to an access control system, without compromising aesthetics. BMCE Bank is one of the largest commercial banks in Morocco, with a network of 540 branches. As part of a complete overhaul of its headquarters security arrangements, around 50 Aperio® C100 wireless online cylinders were selected for its glass doors. Easy to install, ASSA ABLOY Access Control’s Aperio® escutcheon enabled a simple security upgrade from the mechanical systems in place to a sleek access control wireless locking solution. With Aperio®’s flexible design and ability to work with RS485 and Wiegand Interface, and iClass, Mifare Plus and DesFire technology credentials, there was no issue with it instantly connecting to the existing online access control system at BMCE Bank, with minimal modification to doors and premises. Says Chris Bone, ASSA ABLOY Vice President Access Control EMEA: “To have selected Aperio® for such a prestigious building, where security is of paramount importance, is true testament to the abilities of this revolutionary technology.” “This installation really demonstrates how Aperio® can provide end users in any market across the globe, with a simple and intelligent way of upgrading the controllability and security levels of their premises.” Aperio® C100 wireless online cylinders were selected for 50 glass doors at the bank “And with its evolving connectivity and developments in RFID technology, its ability to connect with almost all access control systems is further evidence of how Aperio® continues to evolve and play such a major part in the security industry.” ASSA ABLOY Access Control worked alongside MAXXESS who provided an eFusion security management system and HikVision, which installed a 100 camera surveillance system, incorporating a hybrid recording solution. The contract to implement the complete integrated system was awarded to CST Sécurité, a leading Moroccan security systems integrator.
Mobotix AG, a leading manufacturer of digital high-resolution, network-based video security systems has released details of an installation of its MOBOTIX CCTV solution which is helping to protect and improve access for staff and clients at Pinfields Limited, a highly respected Midlands-based accountancy practice.Based in Bromsgrove, Worcestershire, Pinfields has a long-established background offering high quality financial advice to small and medium enterprises since 1938. Due to their continuing growth, in August 2009 Pinfields moved into new purpose-built offices covering 5,500 sq ft over three floors. With a move to bigger premises, the firm decided to improve its security monitoring and access control requirements and approached Ecl-ips, a local business which specialises in monitoring and surveillance using IP technology. 360° all-round viewAfter surveying the building and discussing the exact requirements with the client, Aaron Kernaghan, Managing Director of Ecl-ips, recommended a solution that combined the MOBOTIX IP Surveillance cameras and a door entry and access control system from Access Control Technology (ACT).Due to MOBOTIX's innovative Q24 hemispheric camera, Ecl-ips only had to install one camera in the office building. Thanks to the 360° all-round view, the Q24 is able to capture an entire room. With a panorama function and a quad view, the camera can show images from four different angles simultaneously. Currently the MOBOTIX Q24 is the only product on the market that offers this functionality and reduces the number of cameras needed to provide surveillance of a room. The MOBOTIX M12 camera was situated at the front of the building to provide external surveillance of the premises. As with the Q24, all of the MOBOTIX cameras are high resolution cameras which store images that are more revealing and provide stronger evidence than other formats. MOBOTIX cameras record approximately 30 times more detail than 95% of all existing video systems worldwide. In virtually all applications, one MOBOTIX camera can replace several standard CCTV systems because MOBOTIX technology offers four times more coverage. Ecl-ips also installed a surveillance class network attached storage device which is capable of recording and storing up to 28 days of high-definition footage from the MOBOTIX cameras. Retrieval of these images is made simple by the utilisation of the license-free MOBOTIX MxControlCenter Video Management Software that has been set up and deployed on several client PCs within the business. One MOBOTIX camera can replace several standard CCTV systems because MOBOTIX technology offers four times more coverage Restricted access and time and attendance recorderThe ACT access control system recommended by Ecl-ips has exceeded the expectations of Nick Pinfield and his team. Ecl-ips fitted an ACTpro 3000 door access controller which allows the staff to gain access to the building via a key fob. This also records the exact time that they enter and leave the building, and by doing so provides the restricted access that was requested and delivers a time and attendance system. With the use of the ACTentry V-IP system, which combines door entry with audio video over IP, visitors to the Pinfields office simply press the door entry panel, which includes a camera, and from any PC in the business that has the client software installed they can view who is at the door and speak to them over the phone system before allowing them access to the building. Nick Pinfield, a Partner at Pinfields Limited commented: "The system recommended and installed by Ecl-ips has definitely exceeded my expectations. The quality of the MOBOTIX images is superb and we can even zoom in and out of the recorded images as and when we need to. I have found the system incredibly easy and intuitive to use. The access control has enabled us to be able to monitor and control our front door when reception is not attended. The time and attendance system is also very simple but highly effective and has fulfilled all of my requirements. This has also increased our productivity."Pinfield continued: "We have been delighted by the professionalism of Ecl-ips and the team of engineers that have worked on this project. They are a company that understand technology and in particular IP. It has definitely been money well spent."