Veracity CCTV Storage System / HDD(2)
Browse CCTV Storage System / HDD
Storage products updated recently
The past decade has seen unprecedented growth in data creation and management. The products and services that consumers use every day – and the systems businesses, large and small, rely on – all revolve around data. The increasing frequency of high-profile data breaches and hacks should be alarming to anyone, and there’s a danger data security could worsen in the coming years. According to DataAge 2025, a report by IDC and Seagate, by 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half of it will actually be secured. Nuanced approach to data security Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its securityThe rapid proliferation of embedded systems, IoT, real-time data and AI-powered cognitive systems – as well as new legislation like the European Union’s GDPR – means that data security has to be a priority for businesses like never before. With data used, stored and analysed at both the hardware and software level, we need a new and more nuanced approach to data security. Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its security. What this means in practice is renewed focus on areas of hardware and software protection that have previously not been top of mind or received large amounts of investment from businesses, with security at the drive level being a prime example. The importance of data-at-rest encryption In a world where data is everywhere, businesses need always-on protection. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways A recent report from Thales Data Threat found that data-at-rest security tools can be a great way to help protect your data. However, it’s important to note that this must be used in conjunction with other security measures to ensure that those that fraudulently gain access to your key management system can’t access your data. Ensuring drives to be Common Criteria compliant One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliantDespite the clear benefits, this kind of encryption lags behind other areas, such as network and endpoint security, in terms of the investment it currently receives. The same Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security. One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliant. Common Criteria is an international standard for computer security certification, and drives that meet this standard have a foundational level of protection which users can build on. Providing an additional layer of security The retail industry has seen a spate of security breaches recently, with several major US brands suffering attacks over the busy Easter weekend this year. As frequent handlers of consumer card information, retailers are particularly vulnerable to attack. Data-at-rest encryption could enhance security in these instances, providing an additional layer of security between customer records and the attacker The advanced threats retailers face can often evade security defences without detection. Such a breach could grant attackers unrestricted access to sensitive information for possibly months – some breaches are known to have been detected only after consumer payment details appeared on the dark web. These types of undetected attacks are highly dangerous for retailers, which are relatively helpless to protect consumer information once their defences have been compromised. Data-at-rest encryption could significantly enhance security in these instances, providing an additional layer of security between customer records and the attacker which has the potential to make the stolen data valueless to cyber criminals. Industries in need of data-at-rest encryption Healthcare organisations, which hold highly sensitive customer and patient information, have a strong use case for data-at-rest encryption. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack. Recent research from the American Medical Association and Accenture revealed that 74% of physicians are concerned over future attacks that may compromise patient records. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack The financial sector would also benefit from further investment in data-at-rest encryption, given 78% of financial services firms globally are planning on increasing their spending on critical data, according to Thales’ Data Threat Report. It’s helpful to view security as a circle in which every piece of hardware and software handling the data plays its part SMEs and enterprises are not immune to security threats either – with growing numbers of people traveling for work or working remotely, the risk of sensitive business data becoming exposed via device theft is heightened. Usernames and passwords have little use if thieves can simply remove unencrypted hard drives and copy data across. Securing every hardware and software Technology vendors often focus on aspects of hardware and application security that are within their control. This is understandable, but it risks proliferating a siloed approach to data security. There is no single line for data security -- rather, it’s helpful to view it as a circle in which every piece of hardware and software handling the data plays its part. There’s a clear need for more industry dialogue and collaboration to ensure data security is effectively deployed and connected throughout the security circle and across the value chain.
The use of facial recognition has become a highly debated topic recently, and has increasingly and misleadingly been criticised by some for being an unethical tool used to spy on the public. The reason for such criticism is however largely due to lack of information and regulation around the technology. Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future – from street crime to airport security, all the way through to helping those battling addiction, the technology can take security and operations to new heights. These systems can memorise the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes The rise in knife crime Knife crime has dominated the headlines in the UK throughout the year. Recent statistics show the number of people being admitted to emergency care due to attacks by a sharp object to be up by nearly 40 per cent from two years ago, whilst the number of children under the age of 18 being admitted to hospitals with stab wounds is up by 86 per cent in only four years. This recent surge in knife crime has put police forces under immense pressure, and the intelligent use of facial recognition has a role to play in enabling more informed stop & search interventions. Currently UK police can stop and search an individual they suspect to be carrying drugs or weapons or both, or they can stop and search a person in a location where there have been or are considered likely to be “incidents involving serious violence.” In both cases they must do so with access to limited information, leaving themselves open to accusations of bias or discrimination. Knife crime dominated the headlines in the UK throughout 2018 Police systems benefiting crime investigations This is where facial recognition can offer up additional intelligence. These systems can memorise the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes. Furthermore, these systems don’t need prior personal engagement to recognise an individual and see only data, not gender, age or race. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. The technology doesn’t take the decision away from the human police officer. However, it does bring greater transparency and context to the decision-making process of whether a stop and search intervention is justified. Similarly, the advanced technology can recognise and match an individual seen on a CCTV camera at a crime scene to someone the police encounters on the streets some time later, justifying a stop and search on that individual. Its ability to check in real time if a person is on a criminal watchlist adds an extra layer to the decision-making process prior to conducting a stop and search, lowering the likelihood of discrimination. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. Gambling addiction and how facial recognition can help There are an estimated 593,000 people in the UK currently battling a gambling problem, making it a serious public health issue in the country. Having understood the gravity of the issue, the UK gambling commission have set limits and advice in place to help those suffering this addiction; yet as with all addictions, gambling is a tough habit to beat. In order to put effective limitations in place and make a real difference, the gambling commission needs the right technology to protect those most vulnerable in the industry. Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers to a higher degree. Monitoring those entering and moving around gambling areas is an extremely difficult task for human staff to do alone, especially in large crowded areas such as casinos. Facial recognition technology installed around the premises would be able to help the company and the staff to identify people who have registered as gambling addicts, and keep record of their day’s play in order to inform staff if and when it was time for them to stop. It would also be able to ensure effective self-exclusion procedures, by identifying a self-excluded individual via CCTV as soon as they entered the venue to then allow security staff to respectfully escort them out. Utilising facial recognition at airport security Facial recognition has by now become a normal sight at many airports around the world. Several people today hold a so-called biometric passport, which allows them to skip the normally longer queues and instead walk through an automated ePassport control to proceed to the gate faster without having to deal with control officers. Facial recognition used in this way has managed to significantly cut waiting times at the passport control, but it also has the ability to enhance security in and around airports. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces Earlier this year, facial recognition technology managed to catch an imposter trying to enter the US at the Washington Dulles Airport. The false passport may have been uncaught by the human eye, yet due to the accuracy of the facial recognition technology it managed to help officers catch the imposter and bring him to justice. Facial recognition thus allows officers to identify an individual faster and more accurately than the human eye. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces, which have been collected from visas, passports and other sources. Facial recognition allows officers to identify an individual faster and more accurately than the human eye At airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-inWhilst some critics may worry about issues of privacy related to the technology, at airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in and, in the future, even boarding proceedings. If used correctly and proportionately, facial recognition can help safeguard the public and improve national security on several fronts. Whilst the many benefits of facial recognition are evident, the lack of regulation and understanding of the technology has led to misconception around how it works and what it is used for. Facial recognition technology can match faces in crowded public places against criminal watch lists, and register faces that match with those on criminal watch lists – whilst ignoring everyone else.
Terry Gold of D6 Research has been giving “cyber in physical security” presentations at a variety of conferences, including ISC West and the Cyber:Secured Forum. We caught up with him for some insights about the intersection of cybersecurity and physical security. Q: Tell us a little bit about your background, specifically in the context of its relevance to cyber security in physical access. Gold: I started out in information security and then got involved in physical security along the way. I started really focusing on physical from a cyber standpoint about 10 years ago. I got into ethical hacking about 8 years ago, and then worked on putting it all together. There wasn’t a roadmap, so I had to build a methodology which I now share with other hackers, end users and law enforcement. I spend all my time either in the lab building success models, methods, and testing them out in some of the largest customers or agencies in the world for validation and improvement. Also, a chunk of my time is spent re-engineering security assessment and controls for end users or validating vendors on their behalf from a unique viewpoint that’s not (yet) typical in the industry. Q: How well prepared is physical security overall against cyber threats? Gold: Not well at all. While security is imperfect anywhere, much of the practices and designs have critical defects and overlook either best practice or fundamental application security principles. I’d say that the industry is very wide open for exploitation that doesn’t take much sophistication to execute. Breach disclosure laws are focused on mandatory reporting for personally identifiable information (PII) Q: What things stand out to you along your journey regarding the changes that you are seeing on this topic? Gold: Culture. Over the years, the industry (and most end users) have been dismissive of my findings. Industry culture hasn’t been aligned to embrace the topic and make requisite improvements that are needed to achieve “good security.” However, I’m finally starting to see that change – quickly and at scale. It doesn’t mean that we’re close to “good,” but rather reached the inflection point of change – and I’m rather pleased about it. Breach disclosure laws has resulted in IT getting a lot of media attention in comparison to hacks made against physical security Q: D6 does a lot of research in this area. What is the analysis behind the recent push for cyber security in physical security? Gold: First, it must be recognised that the threat isn’t new, but rather that the industry is only now coming to the table on it. Industry sentiment has been that breaches in physical security don’t happen or that there’s little impact.It must be recognised that the threat isn’t new, but rather that the industry is only now coming to the table on it Both are false. Mainly, IT gets all the media attention with breaches for two reasons; 1) breach disclosure laws are focused on mandatory reporting for personally identifiable information (PII), and 2) there is really poor detection (mostly non-existent) against hacks in physical security, so they go unrecognised. On the other side, as physical security systems increasingly resemble an IT architecture, so does their risk profile. As it expands to mobile, cloud, IOT and intelligence - InfoSec and auditors are taking a look and are alarmed at what they’re seeing. Before you know it, the scrutiny is cutting pretty deep, pressure for alignment becomes intense, and vendors feel the pinch on the sales cycles. It’s not a comfortable position for anyone. Q: What will be the projected impact? Are practitioners seeing the whole picture? Gold: No, and this area is probably the most important takeaway of this interview. The industry is where InfoSec was about 15 years ago in their journey, except we have an additional headwind to deal with – culture change. This industry tends to rely more on trusted relationships than validating the recommendations are being provided. There are too many prevailing misconceptions, that unless remediated, investments won’t be as effective as expected. Q: What do you believe are the top misconceptions? Gold: Well, this is a longer topic, but here’s a sampling that cuts across different areas. Regarding hackers: A misconception is that they’re generally not interested. Hackers are increasingly very interested. When I teach a workshop at a hacker conference, it’s usually the quickest to fill up and go to wait list (within a couple hours). Regarding attacks: A misconception is that attacks are executed directly against the target system. Example, their goal is to get into VMS and attack it directly. The reality is that they’re more commonly dynamic where physical is part of a larger attack and its role is an easier gateway to another system (or vice versa, with many hops). Regarding protective measures. The most prevalent mistake that the industry is currently making is too much focus and reliance on air-gapping networks or locking ports. This is only a slice of the attack surface and there are various ways to get around it. There’s a heavy price to pay for those that that rely too much on this strategy since its often accompanied by few mechanisms to deal with actors once they do get in (and they definitely will). Regarding the value of exploiting physical security. Too often perceived as low value. In our white paper we review many of the things that hackers can do, what they gain, and how it can impact the overall organisation. It’s far broader and deeper than most. Q: What are the top things that need to change in the industry? Gold: First, culture. This can be answered by adopting the same principles as InfoSec. From an execution standpoint, the industry needs to change how they perform risk assessments.At D6, we’ve developed a stepwise methodology from ground up and it’s a huge difference Industry practices, including certifications, are significantly outdated and don’t reflect a methodology that accurately considers cybersecurity, actors, methods, and proactive remedy. At D6, we’ve developed a stepwise methodology from ground up and it’s a huge difference. End users that don’t re-engineer their practice, will be very limited for meaningful cybersecurity improvement. One of the changes needed in the industry includes how risk assessments are performed Q: Generally, what advice do you give to clients on steps to move their cyber security to the next level? Gold: Don’t operate like a silo anymore. Transition from industry “common practices” to best practices that can be validated. Rely less on previous relationships and more toward domain competence. Collaborate with the CISO to a principled, goal-oriented and metrics-based approach. Embed an InfoSec person on the physical team. Present priorities and risks jointly to the board within an overall risk portfolio. Invite scrutiny from auditors. Get a red team performed once a year. Until you do the last step, you don’t really know where you stand (but don’t do it until the other things are done). Last, set the bar higher with vendors to support these improvements or their products will just end up being weak link. Q: What type of challenges do you see and any advice on how end user and integrators can overcome them? Lessons learned? Gold: There are too many specific domains across cybersecurity – it’s not just a network security resourceFeedback I get from integrators is that they’re struggling to figure out how to deliver expertise to their clients in their area. They’re somewhat overwhelmed with the complexity, becoming an expert or how expensive it is to hire and maintain those skilled resources. My best advice is not to do either. There are too many specific domains across cybersecurity – it’s not just a network security resource. Not even the large integrators have the right bench, and unfortunately, they’re just further down a doomed path than smaller integrators. Form a partnership with boutique cybersecurity firms that have multiple specialists. Negotiate rates, margins, scope, and call on them when needed. It won’t come out of your bottom line, the results will be better, and the risk will be extremely low. You’ll learn along the way too. Q: Anything notable that your research is uncovering in this area that might not be on people’s radar yet? Gold: Yes, quite a bit. Our Annual Industry Assessment Report goes through every segment. We’re making pretty bold statements about the future and impact, but we’re confident. One thing that stands out is how intelligence (and the swath of subsets) will impose stringent demands on physical security due to attribute and data collection (for analysis) which will absolutely require privacy compliance, integrity, and controls. It will even shape organisations that might not care about cybersecurity but are prioritising function. Q: Where can readers learn more about your perspectives on this topic? Gold: Blogs on the D6research.com website. Our annual report. Val Thomas of Securicon and D6 have collaborated on a three-part cybersecurity in physical white paper series. It goes into all of this in detail, as well as remedy.
After a busy three days of business exchanges in Mumbai, the 2019 edition of Secutech India was hailed as a success, with many participants commending the new smart home zone as a welcome addition to the show. A consensus was also reached on the effectiveness of the fair’s fringe events, which updated the market on smart city infrastructure and security technology. Travelling from the subcontinent and beyond, more than 20,000 security industry professionals visited the fair from 25 – 27 April 2019 at the Bombay Exhibition Center. “The new smart home zone and exhibitors of intelligent transportation technology were added to help participants take advantage of the growing market for smart devices and intelligent solutions,” said Ms Regina Tsai, the Deputy General Manager of Messe Frankfurt New Era Business Media Ltd. “The enthusiastic response to the new additions and the positive sentiments expressed about the fringe seminars demonstrate that the fair remains firmly in touch with the needs of the local market.” Commercial security and fire safety products The fair showcased the very best commercial security and fire safety products from regional heavyweightsOn top of smart home and intelligent transportation solutions, the fair showcased the very best commercial security and fire safety products from regional heavyweights. To the satisfaction of trade visitors, over 200 exhibitors were in attendance at the fair, including brands such as AAAG, Avigilon, Biomax, CP Plus, ESSL and Mantra. Altogether, the fair spanned 15,000 sqm, with the commercial security exhibitors forming the largest section. The applications of AI in video surveillance systems was a hot topic of conversation in the exhibition hall, where exhibitors such as Hikvision and Veracity demonstrated how the technology can be used to support processes such as facial recognition and automatic security alerts. Live demonstrations of threat detection systems also attracted great interest from trade visitors. Ideal occasion to launch new products From the standpoint of many international exhibitors, positive conditions in the domestic security market and a strong turnout of quality buyers, meant that the fair was an ideal occasion to find strategic partnerships and launch new products. A good example of this was the Shenzhen pavilion, which hosted an array of OEMs and ODMs from the smart home and intelligent building sectors. The participating companies at the pavilion were looking to find business partners, distributors and re-selling partners for the Indian market, but the pavilion was also of great interest to system integrators and consultants, who could find an array of security surveillance cameras, smart home devices and access control systems. Detection and alarm systems As part of the fire and safety event, a fire safety volunteer training took place on the third day of the fairAnother success was the concurrent fire and safety event, which returned for its 2nd edition as the destination for buyers to locate the latest firefighting products, emergency response systems and evacuation equipment. With the number of high-rise buildings in India increasing, the event was an important hub for the market to locate the relevant safety solutions, such as detection and alarm systems, emergency lighting and escape ladders. As part of the event, and in partnership with the Maharashtra fire services, a fire safety volunteer training took place on the third day of the fair, allowing participants to learn about the fundamentals of fire, safety precautions and evacuation drills. Bringing smart city fraternity together In addition to the fire safety training, the organisers of Secutech India, together with knowledge partners PwC India and Mitkat Advisory, formulated two days of seminars and conferences to deliver the most relevant market intelligence for India’s security professionals. Led by high profile industry members and representatives of local government departments, discussion points included the next five years development prospects for India’s smart cities, emergency response mechanisms and cyber security. A speaker at the Secutech Smart City Infrastructure Conference, Mr Samrendra Kumar, the Co-founder and MD of Mitkat Advisory, said that the forum was effective in bringing the regions smart and safe city fraternity together for productive discussions: “You have government officials, policy makers, law enforcement and other government departments in attendance. There are also OEMs and systems integrators. So, this is a great place to interact with a full array of people who are going to make tomorrow’s cities smarter and safer.” AI products and big data analysis This year we are focussed on AI products, deep learning technology and big data analysis"“We provide total solutions in the security and surveillance industry and we have participated at the fair several times since the first edition. This year we are focussed on AI products, deep learning technology and big data analysis. The industry is seeing the arrival of advanced solutions. Not just AI, but also things like big data. In just three days at the fair, we can get a complete picture of the market and an understanding of customer requirements." “It’s also an opportunity for us to exhibit our capabilities and new products. The quality of visitors is improving. A lot of systems integrators are coming in and we see people from different regions such as the South of India. The feedback from visitors has been positive and we will return again next year,” said Mr Ashish Dhakan, Managing Director, Prama Hikvision, India. Innovative LPR system “ESSL has been in existence since 2004 in the field of biometrics and over the years we have become market leaders. Our license plate recognition system, which we call LPR, is new and innovative. There are very few companies that are offering this solution in India. With the maturity that we have reached in this market, Secutech India is an ideal forum to meet up with our present channel buyers, interact with them, showcase our products, and more importantly, get feedback that we can use to make visions for the next year. “Our stand has great visibility and our booth is large with lots of space for customers to spend time with their products of interest. The feedback so far has been excellent, and we are definitely satisfied with the flow and quality of visitors. We will return again next year,” said Mr Roshan Bohra, Director, eSSL, India. UL listed CO2 separation system We specialise in different kinds of gas separation systems for the fire safety sector"“We specialise in different kinds of gas separation systems for the fire safety sector. Our CO2 separation system is a UL listed product. This is our second time exhibiting at the fair. We have returned because the quality of this show is high. Our main objective is to increase our brand exposure and show our presence in the market. “The organisers of the fair are doing a great job of connecting us with end users through the ‘connect’ business matching programme. The visitor quality has been good; it’s not just the numbers but it’s also the type of visitors. We have met decision makers from companies such as Reliance, HPCL, and BPCL, so we are happy with the result,” said Mr Kunal L Zatakia, Director, Swastik Synergy Engineering, India. Learning about the new products “I work for the Meteorological department of India, a Central government organisation in Bombay. This is my first time at the show, and I’m looking for products and solutions that can be used in our offices and buildings, such as biometrics. I have found a lot of new devices which I didn’t know about such as facial recognition products. The show is wonderful with a lot of visitors – it helps us understand the new products that are in the market,” said Mr Sunil G Kamble, Director, Met Department, Govt of India. The quality of exhibitors is good and some of the exhibitors have done a great job at reaching out to customers at the fair"“I am a system integrator from Mumbai, and I’ve been coming to the show for the past five years. I’m searching for new CCTV products and advanced technologies. The fair helps me to research any new solutions that the large companies are offering, and I have been able to learn a lot about new developments. I will definitely return again next year,” said Mr Ronald Rodrigues, Systems Integrator, Classic Network, India. “My company is involved in CRM solutions and I am here at the fair to network with companies from the same field. We would like our company to expand globally and this is a good step to meet others in the industry. The quality of exhibitors is good and some of the exhibitors have done a great job at reaching out to customers at the fair. This is a good place to explore different players in the industry. I will return again next year,” said Ms Pooja Khedekar, Customer Success Manager, Edge CRM, India.
Security industry stakeholders from across the subcontinent have descended upon Mumbai for the 8th edition of Secutech India, which opens its doors today at the Bombay Exhibition Center. Taking place from 25 – 27 April, the fair offers business, networking and sourcing opportunities for India’s commercial security, smart home and fire safety sectors. In addition, plenty of educational value can be gained through the fairs fringe events, which include a fire safety training and two full days of smart city and security technology forums. Ms Regina Tsai, the Deputy General Manager of Messe Frankfurt New Era Business Media Ltd, spoke about the distinguishing features of this year’s fair: “In response to market demands, this year’s show features more exhibitors from the smart home and intelligent transportation sectors. “Exciting products gaining traction in these sectors include home surveillance systems, integrated home networks and vehicle tracking solutions. We have also refined the fringe programme to incorporate the most relevant topics for the Indian market, including smart city solutions, cyber security, and the growing role of artificial intelligence.” Altogether, 100 exhibitors representing over 400 brands are featured across 15,000 sqm of exhibition space Security products on display The ‘Make in India’ initiative has sparked a renaissance among Indian OEMs, with many domestic security and fire safety brands such as ESSL, Mantra, Biomax and AAAG represented across the show floor. In addition to the domestic companies, there is also a significant international presence. Brands Avigilon, Hikvision, Vanderbilt and Veracity, join the fair’s strong exhibitor line-up to display the latest surveillance cameras, access control systems, intrusion alarms, police equipment, and perimeter security systems for the commercial and government sectors. Altogether, 100 exhibitors representing over 400 brands are featured across 15,000 sqm of exhibition space. A highlight of the international contingent is the Shenzhen pavilion, where buyers are able to find security, smart home solutions, components, networking communication systems and peripherals. Shenzhen is one of China’s powerhubs for security manufacturers, and the attending exhibitors were carefully selected to represent a wide array of solutions for visitors seeking OEM opportunities. Smart home zone The new smart home zone features a selection of smart cameras, locks and integrated networksAnother convergence point at the fair is the new smart home zone. Featuring a selection of smart cameras, locks and integrated networks, the zone serves as a hub for suppliers to connect with property developers, architects, system integrators and other related buyers. Elsewhere, the concurrent ‘Fire and safety India’ event is a significant attraction for the fire safety fraternity. The event returns for its 4th edition this year as the destination for visitors to get hands-on with the latest fire detection and alarm systems, firefighting gear, evacuation apparatus and rescue equipment. Whether trying to penetrate the Indian market or further bolster their brand exposure, exhibitors will be aiming to connect with as many trade visitors as possible during the show. Fair organisers are anticipating a similar visitor turnout to the previous edition, which attracted 22,720 trade visitors, including distributors, system integrators, architects and consultants. Smart City Infrastructure Conference On top of being a business and networking occasion, the fair adds even more value to the visitor experience through its fringe programme of forums, seminars and events. This year’s programme is headlined by the ‘Smart City Infrastructure Conference’, which takes place on day one. A panel discussion is set to examine how smart cities will develop in India over the next five yearsAs part of the conference, a panel discussion is set to examine how smart cities will develop in India over the next five years. Other discussions analyse emergency response mechanisms and cyber security in smart cities. In addition, the ‘Security Technology Conference’ takes place on the second day of the fringe programme to explore supply-chain security in e-commerce, as well as AI and its impact on the security industry. Fire safety training to raise awareness On the final day, industry experts will gather for the highly anticipated fire safety training day. As part of the concurrent ‘Fire and Safety India’ event, and run by the State of Maharashtra Fire Service and the Mumbai Fire Brigade, the training aims to raise awareness among corporate professionals and wider society. Important topics to be addressed during the training include the common causes of fire, fire safety precautions, fire drills, evacuation procedures and safety legislation. On top of providing a platform conducive to information exchange, the fringe programme is also a hub to celebrate the achievements of India’s security and fire safety fraternity. The SECONA Shield Awards return this year to acclaim OEMs, system integrators, consultants and end users for product innovations, R&D, successful projects, unique designs and outstanding individual contributions to India’s safety and security landscape. The awards are co-organised with the Security Consultants Association of India, and the winners will be announced on the 26th April.
At Secutech this year, on stand C6, Veracity will be demonstrating VIEWSCAPE, the integrated command and control solution developed to meet the needs of complex security applications. VIEWSCAPE is a real success story, now used in many smart cities, retail and critical infrastructure sites. VIEWSCAPE delivers a modular, advanced Command and Control platform with integration to multiple elements of CCTV and security, including video, access control, fire & intruder systems, intercom, building management systems, mapping, reporting and incident management. This provides operators with situational awareness and intuitive control over complex surveillance and security applications. Ethernet and PoE transmission devices Veracity will have the full range of single and multi-channel Ethernet and PoE transmission devices on showDesigned to meet new requirements, and with minimal integration effort needed for legacy systems, anyone with an interest in C3, critical command solutions should get to know VIEWSCAPE. This comprehensive command and control system can be seen on Veracity’s stand C6. As a market leader in IP Transmission, Veracity will have the full range of single and multi-channel Ethernet and PoE transmission devices on show. These will include the HIGHWIRE Ethernet over Coax range, OUTREACH Ethernet extenders and LONGSPAN extreme distance point to point Ethernet and PoE adaptors. Surveillance storage solution COLDSTORE, Veracity’s high-capacity surveillance storage solution, will also be on show. This has been engineered to meet long-term video retention needs with extreme disk reliability and very low total cost of ownership. COLDSTORE’s patented sequential recording technology requires no disk rebuild process, dramatically reduces disk failure rates and consumes very little power. The smallest 2U model, with 112TB maximum capacity, consumes only 40W, whilst the highest capacity 4U model has up to 630TB capacity The smallest 2U model, with 112TB maximum capacity, consumes only 40W, whilst the highest capacity 4U model has up to 630TB capacity and still only consumes 80W, which is only 0.13W per terabyte! UK-headquartered Veracity operates in India with a sizeable team based in its regional office in New Delhi, providing local sales, support and integration services. It continues to experience rapid growth fuelled by the development of strong relationships with many customers and partners across India. Veracity experts will be available throughout Secutech at stand C6 from the 25th to the 27th April 2019 at the Bombay Exhibition Centre, Mumbai.
Related white papers
Hybrid hyperconverged systems benefit growing storage and retention needs
Five things to consider for AI with video technology
Making your surveillance cyber secure
Smart security cameras: excellence in retailDownload
5 reasons to integrate mobile technology into your security solutionDownload
Automatic vehicle identification: State of the industry 2020Download
- IDIS video surveillance solutions strengthens the video infrastructure of Newman University
- Houston Independent School District installs Salient Systems’ IP video surveillance system
- Avigilon Surveillance System provides hi-tech protection for residents at Desert Highlands
- Dahua Technology's video surveillance solution employed at Cedr Factory to improve security level