The awarding ceremony of the highest honour given at the CPSE 2019 – Golden Cauldron Award – was held in Shenzhen, China. As the only product award in the public safety industry authorised by CPSE, the Golden Cauldron Award is undoubtedly of great importance. With professional evaluation team's overall assessment on quality, performance, market performance, application value and other product factors, Dahua Hubble panoramic network camera received the prestigious award, fully affirm...
Hikvision, the provider of innovative video security products and solutions, exhibited its latest innovative technologies, products and solutions at the China Public Security Expo (CPSE) 2019 in Shenzhen from October 28 to 31. This year marked the second anniversary of Hikvision’s AI Cloud. Hikvision’s presentation was dubbed ‘Fusing Data for a Smarter World’ and showcased its AI Cloud platform which supports integration of IoT and information network data designed to em...
Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emot...
SecuX Technology Inc., a blockchain security company, is going to participate in BlockShow Asia 2019 and exhibit at the startups stand of Marina Bay Sands in Singapore on November 14-15. SecuX will launch its new cryptocurrency point-of-sale payment ecosystem and demonstrate how a consumer uses SecuX Merchant Payment App to pay at the physical (brick-and-mortar) stores or on the vending machines via QR Code Scan/NFC/Bluetooth from the mobile phone that using the crypto-coins/tokens for an immed...
MOBOTIX is making the next big advance in intelligent video technology, furthering its mission statement of going ‘Beyond Human Vision’. By launching its new MOBOTIX 7 open solution platform and the M73 high-end camera that uses it, the company is once again cementing its position as a pioneer in this technology. Supported by artificial intelligence and application solutions based on deep learning, the new generation of video cameras not only enables an unlimited set of functions; i...
GlobalPlatform, the standard for secure digital services and devices, announces the launch of IoTopia, a comprehensive framework for IoT security. Building on GlobalPlatform’s previous work to secure the IoT, IoTopia proposes a common framework for standardising the design, certification, deployment and management of IoT devices. IoTopia device security will be testable and meet vertical and geographical market requirements by building upon the following four foundational pillars: Secu...
IP 3000i cameras offer something that the market has never seen before in such competitively-priced cameras; built-in Essential Video Analytics as standard. It opens up new possibilities for IoT applications and smart data capture that help to improve security and even go beyond it with video analytics features such as detecting blocked emergency exits or queue notification. Smart solutions that until now, have not been available to customers looking for a cost-effective video surveillance solution. Advanced intrusion detection Previously, built-in intelligence was only available from the IP 4000i range and above. But, true to our philosophy of offering intelligent systems for everyone, applications suitable for such cameras can now also benefit from solutions that go beyond security and obtain valuable data for business intelligence. The IP 3000i portfolio includes a range of four form factors that are highly affordable Essential Video Analytics is perfectly suited to these smaller applications because it can be used for advanced intrusion detection such as identifying a person entering a pre-defined field, loitering, or leaving an object behind. Another use case for Essential Video Analytics is it can be used to enforce detected blocked exits or analyse behaviour including people counting which can be used to improve customer service. So in addition to a competitive price tag, IP 3000i cameras add even more value for businesses. Everyday surveillance in standalone installations The IP 3000i portfolio includes a range of four form factors that are highly affordable. It offers complete flexibility for everyday surveillance in standalone installations such as small retail stores or for general surveillance in commercial buildings, offices and banks. Even general security applications rely on excellent image quality to safeguard people, premises, and property. With this in mind, Bosch IP 3000i cameras offer resolutions from 1080p up to 5MP, up to 30 fps and a High Dynamic Range of 120dB. The outdoor models also have built-in infrared as standard, enabling them to capture high-quality images – even in complete darkness. The FLEXIDOME IP turret camera also has this infrared feature for indoor surveillance. Providing greater protection One of the key advantages of choosing Bosch security cameras is ease of installation. The IP 3000i cameras are no exception. Mounting and cabling for these cameras are split into three easy steps, eliminating the need to juggle the camera and power tools and making the whole process significantly easier. IP 3000i cameras can easily be combined with DIVAR hybrid and network units for a plug and play solution The mini dome and turret versions come with a new mounting plate that helps to achieve this. The bullet base already behaves as a mounting plate and the micro-dome is directly mounted. The FLEXIDOME IP 3000i IR is also compatible with our modular accessories. Also, the ‘pigtail’ on all form factors has been replaced with cable management that enables clean, streamlined installation through a grommet with a smaller hole to provide greater protection against water ingress. Video security solution An RJ45 connector can be threaded through the grommet using a special tool bundled with every camera. This eliminates the need for installers to terminate the RJ45 cable during mounting. Finally, should a complete video security solution be required, IP 3000i cameras can easily be combined with DIVAR hybrid and network units for a plug and play solution. IP 3000i cameras offer Intelligent Dynamic Noise Reduction and intelligent streaming, combined with H.265 video compression. Depending on the content of the scene, this reduces bitrate by up to 80%. It helps to keep video data manageable, while substantially reducing network strain and storage requirements – all without compromising the quality of the video being captured. In addition, like all Bosch network cameras, the IP 3000i models are designed with various hardware and software measures to keep video data secure, including a built-in Trusted Platform Module to safeguard encryption keys.
Redvision’s VEGA™ 2010, rugged camera housing includes a PoE-driven wiper option. The wiper removes rain and dirt from the housing’s camera window, ensuring a clear view, whatever the weather conditions. Not surprisingly, the wiper has made the VEGA™ 2010 the first-choice camera housing for outdoor and rugged camera installations in the UK, where wet weather is a reality. “We have many VEGA™ 2010’s fitted on top of CCTV towers, exposed to the elements”, explains Stephen Lightfoot, Technical Director of Redvision. Polycarbonate camera window and Visor Extension “A housing without a wiper is useless in exposed applications like these, as the inevitable rain, or a build-up of grime, will eventually compromise the camera view. Crime doesn’t stop when it rains, so installers must allow for it! We have also developed a tough, pedestal, mounting bracket for the VEGA™ 2010, which fits directly to the tower top.” “Like the wall bracket, it protects and hides cabling from the weather and possible vandal attack. Other modular options for the VEGA™ 2010 include a polycarbonate camera window and Visor Extension.” The VEGA™ 2010 is made from tough, die-cast aluminium, finished with a marine-grade plating, followed by a durable powder-coating. It is cable-managed, with an integral junction box. Wiring connections are made within the housing and brackets using ‘easy-connect’, cable terminals. This ensures the VEGA™ 2010 is IP67 weather-proof rated and IK10 impact rated for vandal-resistance. This makes it ideal for installations in tough and demanding environments and why it has been used in prison, marine, transport, industrial and many other public space applications already.
SecuX Technology Inc., a blockchain security company, has released a new firmware 2.0 upgrading SecuX V20, W20 and W10 crypto hardware wallets that support a new coin DigiByte (DGB) for cryptocurrency users to securely store and manage their DigiByte assets through the military-grade Secure Element (SE) to protect their Private Key and Device PIN of SecuX hardware wallets from all kinds of crypto physical and cyber attacks. Faster than Bitcoin “Our technical teams are delighted to be a Recommended Hardware Wallet provider and officially tested by DigiByte core developers eventually. DGB is 40x faster than Bitcoin in terms of the transaction speed in average. “SecuX is more than happy to cooperate with DigiByte to provide more secure digital assets in the highly decentralised blockchain. All types of DigiAssets such as documents, videos, music, photos, and IoT data with the smart contract can be issued, sent & received through DigiByte coins.” said Dr. Woody Cheng, Special Assistant to the Chairman & Business Director, SecuX Technology Inc. “To celebrate the collaboration with DigiByte, we're going to give away SecuX Crypto Hardware Wallets on our Facebook fan page. Please stay tuned to SecuX’s latest new updates.”
Lattice Semiconductor, the low power programmable pioneer, announced its MachXO3D™ FPGAs for secure system control received the National Institute of Standards and Technology’s (NIST) Cryptographic Algorithm Validation Program (CAVP) certification. CAVP validates that critical MachXO3D cryptographic algorithms are compliant with Federal Information Processing Standards (FIPS), the U.S. federal government’s standard for cryptographic software. By complying with both the CAVP and NIST’s Platform Firmware Resilience specifications, the MachXO3D FPGA’s security mechanisms can protect, detect and recover the device and other system components from unauthorised firmware access throughout its entire operating life: from the device’s initial integration, through system shipment, installation and its entire operational life. Industrial, automotive and computing markets “Securing hardware against unauthorised access is critical to preventing the potentially catastrophic damage caused by data and design theft, product cloning and overbuilding, and device tampering or hijacking. However, as the threat landscape is constantly evolving, it’s difficult for OEMs to confirm their system’s hardware is truly protected,” said Jim Tavacoli, Senior Director of Product Marketing, Lattice Semiconductor. Lattice addresses many of the hardware security concerns the industrial, automotive and computing markets currently face" “By obtaining CAVP certification for our MachXO3D FPGAs, Lattice addresses many of the hardware security concerns the industrial, automotive and computing markets currently face by assuring OEMs that their systems are protected by cryptographic solutions independently confirmed to be compliant with stringent U.S. government regulations.” Flexibility of programmable logic MachXO3D is the only FPGA on the market that combines the design flexibility of programmable logic with a secure dual-boot configuration block to provide easy application design, establish a hardware-based Root of Trust to ensure system components only boot from authorised firmware, and enable secure delivery of firmware updates in the field. Key features of the MachXO3D include: Up to 9K look-up tables for implementing logic that instantly configures at power up from on device flash memory On-device regulator for single 2.5/3.3-volt power supply operation Support for up to 2700 Kbits of user Flash memory and up to 430 Kbits sysMEM™ embedded block RAM to provide more flexible design options Up to 383 I/Os, configurable to support LVCMOS 3.3 to 1.0, and designed to integrate into a wide variety of system environments with features such as hot-socketing, default pull-down, input hysteresis, and programmable slew rate Embedded security block that provides pre-verified hardware support for cryptographic functions such as ECDSA256, ECIES, AES, SHA, HMAC, TRNG, Unique Secure ID and Public/Private Key Generation Embedded secure configuration engine to ensure only FPGA configurations from a trusted source can be installed Dual on-device configuration memories to enable fail-safe reprogramming of component firmware in the event of compromise
Hanwha Techwin has introduced a significantly updated version of its Wisenet WAVE Video Management Software (VMS) platform. Packed with a long list of new features designed to improve the user experience, interoperability and cyber security, Wisenet WAVE 4.0 has an enhanced system architecture which ensures high availability and supports scalable deployments by allowing up to 100 servers to be merged into a single system. Queue management analytics Wisenet WAVE 4.0 enables systems registered on WAVE Sync to be merged from an online dashboard Wisenet WAVE 4.0 enables systems registered on WAVE Sync to be merged from an online dashboard, which eliminates the need to configure port-forwarding for remote merges. A comprehensive update of the Wisenet WAVE user interface includes a revamp of the notifications panel which now includes tabs for motion detection, bookmarks, events and objects, as well as quick and easy ways to search and filter each respective tab. A new ‘Layout-as-an-Action’ feature enables a predefined screen layout to be automatically opened when an event occurs, whilst WAVE 4.0 now offers support for queue management analytics running on Wisenet cameras, as well as shock detection on Wisenet X Plus series cameras and temperature change detection on Wisenet thermal cameras. Wearable cameras and drones Management of the latest generation of Wisenet cameras has also been improved, providing the ability for operators to remotely control PTZ and focus functions of Wisenet models equipped with motorised varifocal lenses. Operators can now import offline video files captured by action cameras, wearable cameras and drones. By associating them as a virtual camera, they can be managed in the same way as video captured by any other cameras which are connected to a system. Wisenet WAVE 4.0 is configurable to ensure the system only uses HTTPS and encrypts video traffic For high security applications, Wisenet WAVE 4.0 is configurable to ensure the system only uses HTTPS and encrypts video traffic, whilst a password protection option has been added for .nov and .exe formats. Metadata SDK and Plugins - A new software development kit (SDK) available in support of WAVE 4.0 enables rapid integration of intelligent third-party systems and devices. Video surveillance systems It includes a comprehensive feature set designed for any third-party system or application, including artificial intelligence (AI) and deep learning driven computer vision applications, focused on object recognition and automation. Using the Metadata SDK, developers can create Plugins which take advantage of key new features, including metadata search by attributes, time interval or region of interest, object overlays on live video and playback and camera-specific video analytics settings. Commenting on the launch of WAVE 4.0, Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe, said: “The new features are intended to further assist users to achieve maximum benefit from their video surveillance systems, whilst the availability of the SDK ensures that WAVE is future proof in terms of enabling users to take advantage of emerging technologies such as AI.”
The 22nd edition of inter airport Europe, the International Exhibition for Airport Equipment, Technology, Design & Services, was officially opened at the Munich Trade Fair Centre in Germany. Until Friday, 11th October 2019, a total of 659 exhibitors from 40 countries will present a unique variety of the latest airport equipment on a total net exhibition space of 33,550 square metres. This represents a 5.5% increase in floor space compared with the previous event in 2017. The most important exhibitor countries, besides Germany, are France, Great Britain, the USA, Italy, the Netherlands, China, Spain, Sweden and Austria. Further technical development Many of the new products and systems here at the show focus upon cost-efficiency, low or zero emission" Nicola Hamann, Managing Director of the organisers, Mack Brooks Exhibitions, opened the exhibition and greeted the speakers at the ceremony: Dr. Michael Kerkloh, President & CEO Munich Airport and Kay Bärenfänger, President GATE - German Airport Technology & Equipment e.V. In her speech Nicola Hamann mentioned the increase in passenger figures in international air transport and this year’s motto of inter airport Europe: “Global passenger figures continue to grow; according to ACI World, projections for passenger numbers state more than 20 billion passengers by 2040. For manufacturers and providers of airport equipment and services at this year’s show, this is a driver for innovation and further technical development. Thus, many of the new products and systems here at the show focus upon cost-efficiency, low or zero emission, enhanced passenger experience, automation and digitalisation”, said Nicola Hamann. Annual passenger traffic “As the world’s leading one-stop-shop for the global airport industry, inter airport Europe is predestined to drive interconnectedness and data flow between the different areas and services at the airport, from terminal operations, passenger and cargo handling through to ground handling”. In his speech, Dr. Michael Kerkloh gave a review of the history and passenger numbers at Munich airport over the last decades: “In the period from 1950 to 1976 alone, for example, the annual passenger traffic in Munich increased from 70,000 to around 5 million per year. During those 26 years, approximately 48.4 million passengers passed through the old airport in Riem / Munich. That number matches the total passenger number that we will handle at today's Munich Airport in 2019.” Artificial intelligence and autonomous driving The conditions at the airport are more demanding than in normal road traffic" Following from that, he introduced a project to reduce emissions at airports: “Under the heading ‘Net Zero Carbon 2050’, the goal is for airports to reduce their own CO2 emissions to practically zero by 2050 and to use technology to remove the remainder from the atmosphere”. Kay Bärenfänger, president of GATE, German Airport Technology & Equipment e.V., spoke about the future demands of the airport industry: sustainability, artificial intelligence and autonomous driving. He mentioned a battery storage system for various applications at the airport, which focusses particularly on runway lighting, and discussed autonomous driving at airports: “The opportunities this offers are high, but so are the challenges. The conditions at the airport are more demanding than in normal road traffic. After all, it is not only cars that can cross the road, but also aircraft. For this reason, vehicles must also be able to detect aircraft wings or engines hanging in the air”. inter airport Europe excellence awards Dieter Heinz, the honorary president of GATE, who has been participating in inter airport since the first show in Frankfurt, received a special honour for his contribution: “I think it is not exaggerated to say that without Dieter Heinz the journey that inter airport had made to become the leading platform for the airport industry, would have been a different one. His industry knowledge, his sense of trends and his passion for airports has had a major impact on the development of inter airport”, said Nicola Hamann. The inter airport Europe Excellence Awards were announced and handed over to the winning companies After the opening ceremony, the inter airport Europe Excellence Awards were announced and handed over to the winning companies. The Award winners were once again selected via an online voting system on the inter airport Europe show website. Exhibitors submitted their entries in the four exhibition categories interTERMINAL, interDATA, interRAMP and interDESIGN. Lead-on control system with fibre optic A fifth prize was awarded in the category interFUTURE, covering the recent trend in the airport industry, the airport of the future. More than 50 innovations were posted by exhibiting companies on the show website and the international airport community was invited to vote for their favourite entry in each of the categories. Award winner 2019 for the interTERMINAL category is Daifuku Airport Technologies from the United Kingdom. Daifuku is awarded for their Sym3 Operator to visualise a 3D render of the baggage handling system. State-of-the-art features allow users to accurately track bags. Special to Sym3 is the ability to view and access data on any device via a web interface. The award in the interDATA category went to Alpha-CIM from France. They are awarded for ISAC, a stop bar & lead-on control system with fibre optic. Cutting-edge technology solution The Linde Safety Guard detects other vehicles or pedestrians before they recognise each other This innovative and cutting-edge technology solution brings a more responsive and reliable equipment to airport's operators than most current basic powerline products. The main benefits of ISAC compared to usual current systems are its excellent response time and ease of implementation. Award winner 2019 for the interRAMP category is Linde Material Handling GmbH from Germany for Linde Safety Guard. The Linde Safety Guard detects other vehicles or pedestrians before they recognise each other. It can reduce speed automatically in defined areas and can be configured to suit many dangerous scenarios. Active alarms triggered by hazards enable operators and pedestrians to react immediately. The innovative assistance system thus increases safety of all parties working in close proximity to each other. End-to-end baggage logistics VRR from the Netherlands received the award in the category interDESIGN, the inflatable Air5. The inflatable Air5, which weighs approximately 68kg (150 lbs), folds out automatically and takes shape in just 30 seconds using air pressure. To collapse the container, air is released, which takes just two people and one minute. The fifth award in the new category interFUTURE went to Vanderlande from the Netherlands By using materials and techniques that originate from similar applications where operated in extreme environments, no concessions have been made with regard to the structure’s weight, robustness, strength or safety. The fifth award in the new category interFUTURE went to Vanderlande from the Netherlands. The BAGFLOW end-to-end baggage logistics encompasses the complete bag journey from the moment it is handed over by the passenger to the point where it is loaded on to an aircraft. Predictive data analytics It makes use of the world’s best proven technology with cutting-edge innovations in autonomous vehicle technology, artificial intelligence and predictive data analytics to maximise operational excellence. This is supported by airport-wide baggage controls. Nicola Hamann closed the opening and awards ceremony: Visitors can expect a comprehensive seminar programme for the first time “I would like to thank the award winners for their participation and their fantastic new products and services. Let me wish all exhibitors at this year’s 22nd edition of inter airport Europe a successful and prosperous show and all visitors a rewarding time here at the exhibition.” At this year’s show, visitors can expect a comprehensive seminar programme for the first time. The seminars will take place in hall C6 and are free to attend for all visitors. The sessions and presenting companies cover a vast variety of topics regarding the digitalisation of the airport over the four exhibition days. Specialised hardware and software Until Friday, 11th October 2019 visitors can expect to see all aspects of airport-related technology and services at inter airport Europe. The exhibition profile of inter airport Europe comprises four exhibition categories: interRAMP (ground support equipment), interTERMINAL (technical terminal installations and services), interDATA (specialised hardware and software) and interDESIGN (architecture and furnishings). Tickets for inter airport Europe are now available to purchase via the Online Ticket Shop at favourable prices. The price for a day ticket via the Online Ticket Shop is €42 instead of €52 on-site; the price for a season ticket online is €62 instead of €72 on-site. Season tickets are valid for all four exhibition days.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organisation. Time-intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralised operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analysed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organisation, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR world. Large cloud environment But modern applications are difficult to secure. SaaS based, web, mobile, or custom made all work on different platforms and frameworks. It’s a headache managing all the APIs needed to automate and sync tools. This introduces risk. The greater the number of apps the broader the attack surface and therefore the greater the chance there will be blind posts. Keeping up to date with updates and new security policies is never easy There are also added hazards. Applications are always changing. Keeping up to date with updates and new security policies is never easy, but especially hard in a large cloud environment. Failure to adopt changes puts the organisation and customers at further risk. But the biggest obstacle is keeping applications and APIs out of harm’s way. It’s a near on impossible task when attack methods and sources are constantly changing. More advanced threats To be specific there are four emerging challenges when it comes to protecting apps. Firstly, managing the good and the bad bots and spotting which is which, secondly securing APIs as IoT adoption intensifies, thirdly the relationship between securing apps and DevOps and ensuring ownership of security, and finally denial of service attacks that use newer tactics such as brute force. Basic security hygiene dictates that security teams refer to the OWASP Top 10. It’s considered the ‘ten commandments’ in security circles, providing a starting point for ensuring the most common threats and vulnerabilities are managed, detected and mitigated. Web Application Firewalls also come into the fray with guidance on testing for the ways hackers exploit vulnerabilities. However, though the basics are good to have in place, there are always more advanced threats to take care of. Bots being a big one. Bot management The more sophisticated bots will go as far as to mimic human behaviourAstonishingly about half of internet traffic is bot generated. Half of it is from bad bots. Discerning the good from the bad isn’t easy though and explains why around 80% of organisations can’t make a clear distinction between the two. Bad bots can do a lot of damage like take over user accounts and payment information, scrape confidential data, or hold up inventory and skew marketing metrics. The more sophisticated bots will go as far as to mimic human behaviour and bypass tools like CAPTCHA and even device fingerprinting based protection ineffective. Securing APIs Then there’s the complications derived from machine-to-machine and internet of things (IoT) communications. The more integrated ‘things’, the more data there is, the more events there are report on, and the more activity there is reliant on APIs to make the ‘things’ useful and agile. That’s what makes them a target and the threats to API vulnerabilities include injections, protocol attacks, parameter manipulations, invalidated redirects and bot attacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks Denial of service (DoS) You might think there’s little to add to the swathes of denial of service warnings. Yet when businesses are still being targeted and feeling the ill effects it’s worth mentioning again that different forms of application-layer DoS attacks are still very effective at bringing application services down. Even the greatest application protection is worthless if the service itself can be knocked down This includes HTTP/S floods, low and slow attacks (famous examples being Slowloris, LOIC, Torshammer), dynamic IP attacks, buffer overflow, Brute Force attacks and more. The IoT botnets are the culprits and have made application-layer attacks so popular that they have become the preferred DDoS attack vector. Even the greatest application protection is worthless if the service itself can be knocked down. Continuous security It may seem easy to say but for modern DevOps, agility is valued at the expense of security. We see time and again examples of where development and roll-out methodologies, such as continuous delivery, mean applications are exposed to threats each time they are modified. There’s no doubt it is extremely difficult to maintain a valid security policy and protect sensitive data in dynamic conditions without creating a high number of false positives. But we now find that this task has gone way beyond the capability of humans. Organisations now need machine-learning based solutions that map application resources, analyse possible threats, and create and optimise security policies in real time. Reaching this level in security planning should be a big wake-up call that security automation is an essential not a nice to have. Running security plans The board needs to know that investment is critical to protect their profits It’s critical that the security solution your company adopts protects applications on all platforms, against all attacks, through all the channels and at all times. The board needs to know that investment is critical to protect their profits. As such there are six things they need to know: Application security solutions must encompass web and mobile apps, as well as APIs. Bot management solutions need to overcome the most sophisticated bot attacks. DDoS mitigation must be an essential and integrated part of application security solutions. A future-proof solution must protect containerised applications, severless functions, and integrate with automation, provisioning and orchestration tools. To keep up with continuous application delivery, security protections must adapt in real time. A fully managed service should be considered to remove complexity and minimise resources. No amount of human power will beat the bots. That last point is the most critical. Skill is essential in designing and running security plans and policies that work. But the plans can’t be executed without automated tools. There are just too many decisions to make in a split second. Combining both is the path to an effective app protection strategy and a stronger brand to boot.
The past decade has seen unprecedented growth in data creation and management. The products and services that consumers use every day – and the systems businesses, large and small, rely on – all revolve around data. The increasing frequency of high-profile data breaches and hacks should be alarming to anyone, and there’s a danger data security could worsen in the coming years. According to DataAge 2025, a report by IDC and Seagate, by 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half of it will actually be secured. Nuanced approach to data security Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its securityThe rapid proliferation of embedded systems, IoT, real-time data and AI-powered cognitive systems – as well as new legislation like the European Union’s GDPR – means that data security has to be a priority for businesses like never before. With data used, stored and analysed at both the hardware and software level, we need a new and more nuanced approach to data security. Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its security. What this means in practice is renewed focus on areas of hardware and software protection that have previously not been top of mind or received large amounts of investment from businesses, with security at the drive level being a prime example. The importance of data-at-rest encryption In a world where data is everywhere, businesses need always-on protection. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways A recent report from Thales Data Threat found that data-at-rest security tools can be a great way to help protect your data. However, it’s important to note that this must be used in conjunction with other security measures to ensure that those that fraudulently gain access to your key management system can’t access your data. Ensuring drives to be Common Criteria compliant One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliantDespite the clear benefits, this kind of encryption lags behind other areas, such as network and endpoint security, in terms of the investment it currently receives. The same Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security. One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliant. Common Criteria is an international standard for computer security certification, and drives that meet this standard have a foundational level of protection which users can build on. Providing an additional layer of security The retail industry has seen a spate of security breaches recently, with several major US brands suffering attacks over the busy Easter weekend this year. As frequent handlers of consumer card information, retailers are particularly vulnerable to attack. Data-at-rest encryption could enhance security in these instances, providing an additional layer of security between customer records and the attacker The advanced threats retailers face can often evade security defences without detection. Such a breach could grant attackers unrestricted access to sensitive information for possibly months – some breaches are known to have been detected only after consumer payment details appeared on the dark web. These types of undetected attacks are highly dangerous for retailers, which are relatively helpless to protect consumer information once their defences have been compromised. Data-at-rest encryption could significantly enhance security in these instances, providing an additional layer of security between customer records and the attacker which has the potential to make the stolen data valueless to cyber criminals. Industries in need of data-at-rest encryption Healthcare organisations, which hold highly sensitive customer and patient information, have a strong use case for data-at-rest encryption. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack. Recent research from the American Medical Association and Accenture revealed that 74% of physicians are concerned over future attacks that may compromise patient records. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack The financial sector would also benefit from further investment in data-at-rest encryption, given 78% of financial services firms globally are planning on increasing their spending on critical data, according to Thales’ Data Threat Report. It’s helpful to view security as a circle in which every piece of hardware and software handling the data plays its part SMEs and enterprises are not immune to security threats either – with growing numbers of people traveling for work or working remotely, the risk of sensitive business data becoming exposed via device theft is heightened. Usernames and passwords have little use if thieves can simply remove unencrypted hard drives and copy data across. Securing every hardware and software Technology vendors often focus on aspects of hardware and application security that are within their control. This is understandable, but it risks proliferating a siloed approach to data security. There is no single line for data security -- rather, it’s helpful to view it as a circle in which every piece of hardware and software handling the data plays its part. There’s a clear need for more industry dialogue and collaboration to ensure data security is effectively deployed and connected throughout the security circle and across the value chain.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customise the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-time access control security updates Furthermore, once healthcare facilities are able to digitise all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analogue to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change – is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorised staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more. Missed the rest our healthcare mini series? Read part one here and part two here.
A video analytics system that provides ‘behavioural understanding’ can yield more meaningful and actionable data for a range of applications. In public safety and security, such a system can alert on violent or suspicious behaviours, such as people fighting, vandalism, people with weapons, etc. In advanced traffic surveillance and monitoring, it can provide alerts to vehicle collisions (accidents), traffic hazards or vehicle that aren’t using the road properly, such as a car that stops in the middle of the junction. For enterprise and campus security, it can provide advanced anti-tailgating and detect unauthorised activity. Video surveillance infrastructure viisights was founded by a group of entrepreneurs with track records in developing technology businesses These uses are among the benefits of viisights’ video analytics technology based on behavioural understanding of video content. “It means we can extract more meaningful data from the huge amount of video content that is captured, and we can transform that data to actionable insights that eventually justify the massive investment in video surveillance infrastructure,” says Asaf Birenzvieg, CEO of viisights. Their behavioural understanding systems for real-time video intelligence leverage artificial intelligence technology. viisights was founded by a group of serial entrepreneurs with track records in developing technology businesses. The Israeli company’s founders recognised a growing global need for intelligence to make physical and virtual public areas safer – and realised the role that smart video understanding technology can play. Developing artificial intelligence technologies viisights is committed to developing artificial intelligence technologies that facilitate human-like video understanding, which in turn serves as the basis for fully autonomous video intelligence systems powered by pattern prediction technology. “Behavioural recognition is the future of video analytics and the next generation of the object classification analytics systems that hold the majority of the market today,” says Birenzvieg. viisights has developed a video understanding technology for real-time video processing “To date most video analytics systems still base their product features on static analysis of objects from images using image recognition, even the ones that use ‘AI analytics.’ Products built using such object classification technology are extremely limited.” For example, object classification analytics cannot recognise behavioural events in a video such as people fighting or a car collision because such behaviours can’t accurately be concluded in large scale from analysing a single static image/frame. Video understanding technology viisights has developed a video understanding technology for real-time video processing. The technology can process live video feeds. In addition to recognising a particular object (e.g., person) and its attributes (e.g., red shirt), the system can understand an object’s actions, interactions with other objects (events), the scene being viewed (i.e., crowd is gathering, riots) and the context (a car is driving on the road or on the sidewalk). The main verticals are smart cities, enterprises and campuses, banks and ATM security “Basically, we are able to extract more meaningful data from a live video feed and therefore create actionable insights and greater ROI,” says Birenzvieg. The company focuses mostly on security and safety use-cases. The main verticals are smart cities, enterprises and campuses, banks and ATM security, security guard companies and transportation hubs. The company is working on a new product for in-vehicle monitoring mostly for security, safety, vehicle protection and proper vehicle use; it monitors passengers’ behaviour inside a bus, train, or taxi. The product will come to market next year. Video management system viisights’ video analytics offering is currently optimised for server-side deployment, and the integration architecture is similar to most video analytics systems. From one side it is integrated with the video management system (VMS). They are a Milestone verified partner and soon will be part of Milestone's marketplace. From the other end, it is connected to a command-and-control system for processing the data and presenting the alerts to the end-user. The analytics company makes most sales through system integrators. They have partnerships with big system integrators like Motorola Solutions and NEC and are also working with smaller ones. They are looking to expand their system integrator network, mostly in the USA and Europe. Behaviours can have many variations and they can be very diverse Cloud video surveillance “We will continue to invest in performance and accuracy, meaning higher recall and lower false positive rate,” says Birenzvieg. “Since our major value proposition is in behaviour recognition, behaviour events many times are not clearly defined, which is very different from object classification. Behaviours can have many variations and they can be very diverse.” An example is a simple behaviour like a person falling on the floor. A person can fall on the floor in many ways, but the challenge is to ignore similar behaviours that are not a person falling and that confuse the system, such as a person bending over to tie his shoelaces. With cloud video surveillance becoming a trend, viisights is also looking into offering some of their advanced functionalities in a video-analytics-as-a-service-model.
As a security service provider with a rich history in manguarding, Allied Universal is launching a new technology platform to increase productivity and accountability of security officers and to transform guard service operations from an ‘observe and report’ mission to a ‘detect and respond’ function. Mark Mullison, Allied Universal’s Chief Information Officer (CIO), says the new Heliaus platform also uses artificial intelligence (AI) to analyse data, predict outcomes, and prescribe optimum responses. The platform includes a smart phone app that guides security officers to ensure post orders are followed and provides a ‘virtual’ coach or supervisor to guide security officers throughout the day. “The walls between technology and people need to come down in the future,” says Mullison. “We need an ecosystem in which people and technology can cooperate well and respond to threats and drive outcomes.” Real-time situational awareness Technology plays an increasing role in security and safety, but it will never replace humans"Heliaus is a step in that direction. It has two components – the mobile app used by security officers; and a cloud-based portal, like a command and control centre that compiles information from the app and other inputs and performs AI analysis of data. Heliaus is an add-on for Allied Universal customers and is offered for a per-device subscription fee of $199 per month. A customer company’s managers can also access the portal for data visualisation tools and real-time situational awareness, or to input data such as ‘approving’ an incident report or action. “Technology plays an increasing role in security and safety, but it will never replace humans,” says Mullison. “It will augment and enhance the workflow and make people more effective.” “We are focussing on delivering better outcomes for safety and security,” he adds. “The impacts are as broad and diverse as the clients we serve.” Customisation of forms enables the system to collect and use any information that was previously collected on paper. Monitoring and Response Center (MaRC) A system is effective only to the extent that it is used, and Allied Universal has engineered the user experience to make the mobile app easy – almost fun – to use, says Mullison. Elements of ‘gamification’ drive greater user adoption. “It is designed to support the work [security officers] do and make information collection a by-product of people doing their jobs.” The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design Effective AI depends on data, and Heliaus pulls data from Allied Universal’s Monitoring and Response Center (MaRC), where a cloud server integrates the company’s managed security services, including access control, video surveillance and video analytics. It also incorporates current weather information and forecasts, and information specific to the industry segment. Additional data is generated as officers enter data through the mobile app. The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design. It provides insight into the drivers of risk, makes recommendations about how to reduce incidents, and, through dynamic workflow automation, ensures that those recommendations are implemented. Location awareness is a combination of the global positioning system (GPS), Bluetooth beacons, and near-field communication (NFC) tags. Improves the accuracy of responses AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response“Information is organised to facilitate AI analysis. If you have the right knowledge representation then problem-solving is easy,” says Mullison, echoing a common principle of artificial intelligence. AI works to analyse data and make predictions and recommendations to guide responses by security personnel. AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response. The AI system also learns and improves the accuracy of responses with more data and over time. Responses come much faster than older ‘trial and error’ models of analysis. Another element of Heliaus is a ‘robust workflow engine’ that ensures recommendations are carried out, either by a security professional on site or by the client. Mullison says implementation of the system can result in a 20% reduction of security and safety incidents. Multiple applications of Heliaus Heliaus is already being used by some Allied Universal customers. For example, a major Hollywood production studio is using it to identify and address workplace hazards such as stray electrical cords, dripping water hoses, etc., across a 50-acre area. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard A manufacturer created a custom compliance application using the platform to track more than 140 unique incident types, such as monitoring elevated temperature in a truck trailer or drivers without proper identification. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard. The flexibility of the platform can enable expansion to incorporate other technologies in the future, too. For example, sources of data for the system could include robots, drones or various Internet of Things (IoT) sensors; or workflow engines could be used to dispatch a robot or drone to handle a situation (rather than a human).
The city of Bologna has chosen Wisenet video surveillance cameras to help it create a smart traffic management system. Bologna is the seventh most populous city in Italy. It is at the centre of a metropolitan area of approximately one million people with a diverse range of travelling requirements within a very large area. The City has always invested in traffic control and monitoring systems with the aim to make travel easier and faster for its citizens. An example of this is a centralised traffic light management system which has been in operation since 2013 and has helped reduce travel times within the urban area. Video surveillance solution The purpose was to provide a tool to allow authorities to take strategic planning measures The City wanted to invest in a video surveillance solution which would allow the monitoring of 12 vehicle access gates to the city in order to provide authorities with reliable real-time information about urban mobility. The purpose was to provide a tool to allow authorities to take strategic planning measures and optimally redistribute the traffic load on the road network. After extensive research, which included the evaluation of a wide range of possible solutions, a decision was made to procure a total of 89 Wisenet cameras manufactured by Hanwha Techwin. The implemented solution consists of cameras dedicated to vehicle counting and classification, and ANPR cameras which have been installed on strategic gates. The cameras monitor both directions of travel to allow local authorities to study the most important and strategic vehicle access flows to the city. Detecting illegally parked vehicles This is made possible thanks to the latest generation of Wisenet cameras. By integrating high image quality and advanced video algorithms, Wisenet ‘intelligent’ cameras are able to enhance the value of video surveillance by supporting mobility and security in Smart Cities. 24 of the cameras installed are Wisenet XNO-6120R/TD bullet cameras equipped with Traffic Data 24 of the cameras installed are Wisenet XNO-6120R/TD bullet cameras equipped with Traffic Data, an edge based application developed in cooperation with Sprinx Technologies which facilitates the collection of statistical data about vehicle flow. By tracking the vehicles moving in a camera field of view, the application is able to provide information on vehicle counts, classification and average speed. 24 of the other cameras installed are Wisenet XNO-6120R/FNPs. These feature Roadway Licence Plate Recognition application which is able to help the local authority’s control room operators detect illegally parked vehicles and other traffic infringements. Built-in IR illumination Effective with all European number plate formats, the application has more than a 95% recognition accuracy whatever the environmental conditions, even when vehicles are moving at speeds of up to 150 km/h. The Wisenet XNO-6120R is a 2 megapixel bullet camera which is able to capture high definition images with the help of a 12x optical zoom, digital image stabilisation with built-in Gyro sensor, a Defog feature and built-in IR illumination. Part of the Wisenet X camera series, the XNO-6120R features the World’s best Wide Dynamic Range (WDR), which performs at up to 150dB to produce clear images from scenes that contain a challenging mix of bright and dark areas and normally result in overexposed or underexposed images. Real time automatic incident detection The Wisenet X series provides an opportunity to run on-board third-party video analytics plug-ins The processing power of the Wisenet 5 chipset incorporated into the Wisenet X series provides an opportunity to run on-board third-party video analytics plug-ins for different applications, such as number plate recognition, vehicle counting/classification and real time automatic incident detection. Completing the camera line-up are 41 Wisenet SNP-L6233RH 2 megapixel 23x IR PTZ dome cameras which have been carefully located at major road junctions throughout the city, in order to allow control room operators to zoom in to see close up detail of any incidents. Traffic management solution “We are delighted with how easy it has been to successfully integrate the Wisenet cameras with our existing video management platform and our other supervision monitoring systems,” said Alberto Nuzzo, Head of Office 'Digital Infrastructure and Telecommunications', at Comune di Bologna, when commenting on the success of the traffic management solution. “The data captured by the Traffic Data and ANPR applications running onboard the cameras, is allowing us to far better manage the existing levels of traffic, whilst also helping us capture and store valuable data which we will be able to analyse to assist us to plan for the future. Our control room operators have been particularly impressed with the exceptional clarity of the images captured by the cameras and the data analytics capabilities of the system, which are enabling them to accurately visually verify what may be occurring and quickly take appropriate action.”
ANSecurity, a specialist in advanced network and data security, announces the successful delivery of a project with New College Oxford to streamline its network architecture and strengthen its security by moving to a Zero Trust model. Founded in 1379, New College is one of the largest Oxford colleges, with some 430 undergraduates and 360 graduates. The college, together with 37 other academic institutions across Oxford, uses the University’s switched Gigabit backbone along with some centralised services, such as e-mail for students, backup, remote access, VPN systems and more while the individual colleges runs their own core servers and applications. Good technical knowledge The project aim was to join two separate networks that had multiple subnets in the same native VLAN The college decided it needed to upgrade its ageing 3COM networking kit and after an evaluation process selected ANSecurity to help it specify, design and upgrade to new switches and a firewall from Juniper. James Dore, IT officer of New College at Oxford University, commented: “ANSecurity was a great company to deal with. It had good technical knowledge around the Juniper products and managed the project efficiently from start to end.” The project aim was to join two separate networks that had multiple subnets in the same native VLAN. This was overcomplicating the network because of how the VLANs had to be tagged and untagged when traversing the networks. As part of the move to a Zero Trust model, all users and server VLANs would be routed through the firewall. In addition, the project would also free up IP addresses from one of the subnets in order to re-allocate them to other colleges. High availability solution ANSecurity implemented a high availability solution using technology from Fortinet and designed and implemented a VLAN migration processes that by leaving the hosts in their original VLAN, allowed them to pick up IP addresses from a different subnet freeing up addresses to be re-allocated. The team from ANSecurity was easy to work with and had a deep knowledge of the network" “The design allows us to set up VLANs in a much simpler fashion, and is easier to manage while allowing us to better share resources across multiple colleges,” said Dore. “The team from ANSecurity was easy to work with and had a deep knowledge of the network and all the technologies we used. They have fielded questions from us at odd hours of the day and have kept us updated about new technologies on a regular basis.” Reducing annual charges It is estimated that the project will reduce annual charges related to client licences, hardware and maintenance fees by several thousand pounds annually. The project would also offer the benefit of allowing three of the colleges to share access to core security platforms to better utilise the technology and reduce upfront and ongoing maintenance contract costs. The successful project, delivered on time and within budget, allowed the college to refresh its infrastructure and start a relationship with ANSecurity that resulted in it becoming the trusted provider for the college’s networking and security needs. “It is fair to say that they have never let us down and we value the relationship which is now into its 7th year and look forward to working with them on future projects,” concluded Dore.
Ping Identity, the provider of Identity Defined Security, announces its successful completion of the Financial-grade API (FAPI) conformance testing, as part of the process defined by Open Banking Ltd. This builds on Ping Identity’s previous success as the first identity platform to pass all 70 technical security tests, as set by Open Banking Ltd., with zero warnings. The most recent set of FAPI conformance testing evaluated the latest versions of the Ping Intelligent Identity platform, including PingFederate, PingAccess and PingDirectory, within a mock banking environment. Additional technical requirements It switches to an API model with structured data that utilises a token model such as Open Authorisation The inclusion of FAPI within the Ping Identity solution for Open Banking helps allow banks to overcome insecure practices such as screen scraping by using stored user credentials. Instead, it switches to an API model with structured data that utilises a token model such as Open Authorisation. FAPI is a technical specification developed as a multi-industry standard by the FAPI Working Group of OpenID Foundation (OIDF). It leverages OAuth 2.0 and OpenID Connect (OIDC) to define additional technical requirements for the financial industry and other sectors requiring higher security. For banks specifically, FAPI provides various advantages. This includes enabling applications to securely interact with financial accounts, while also enhancing the user’s ability to control security and privacy settings. Secure identity requirements In concurrence with the specification, OpenID Foundation maintains a cloud-based testing suite for conformance testing by banks, certified third-party security providers and platform vendors—such as Ping Identity. The Ping Intelligent Identity platform is used by hundreds of financial services enterprises, including many of the CMA 9 and Open Banking Ltd. itself. Additionally, FAPI is of increasing relevance to the growing number of new fintech start-ups in areas such as investment, wealth management, insurance, payments and even real estate. “This is significant beyond the Open Banking and financial services sector,” explains Rob Otto, EMEA Field CTO, Ping Identity. “Other digitally-focused sectors, with similar secure identity requirements, now have a proven template that can allow them to quickly deploy their own security controls, which have been stringently tested by the largest financial institutions in the UK.”
Everbridge, Inc., the global pioneer in critical event management, announced that it has been awarded a multi-year contract to support the deployment of Australia’s next-generation national early warning system. In combination with Australia’s major telecommunications companies, the Everbridge Public Warning solution will be used to power Emergency Alert in Australia, providing population-wide alerting to help reach the country’s over 25 million residents and approximately 9 million annual visitors. If residing within an area where a sudden, critical event occurs such as fire, extreme weather or a terror attack, residents and visitors to Australia will receive location-based SMS notifications on their mobile phones, in addition to smart phone mobile app notifications and fixed line voice alerts, among other modalities. Supports first responder communications Everbridge Public Warning leverages telecom infrastructure to reach everyone within a geographic area Everbridge Public Warning leverages existing telecom infrastructure, with no opt-in required, to reach everyone within a geographic area to reduce disaster risk, support first responder communications, and analyse disaster communication effectiveness for subsequent mitigation activities. “Our Public Warning solution enables government organisations and public safety agencies to immediately connect with every person in an affected area during a critical event regardless of nationality, residency or mobile telephone handset type,” said Jaime Ellertson, Chief Executive Officer and Chairman of Everbridge. “Australia has served as a model example for population-wide alerting and emergency preparedness over the past decade, and we are honoured to support them on the evolution of their national system.” The next-generation system is scheduled to become operational in 2020.
Everbridge, Inc., the global pioneer in critical event management software that helps keep people safe and businesses running, announced that its mass notification solution will be used to power alerts for Nashville and Davidson County, Tennessee in times of emergency. The Metro Emergency Alert & Notification System (MEANS) will deliver safety instructions via cell phone, landline, and SMS for localised emergencies such as flooding, public health emergencies or active shooter situations. “This is an important way for us to keep the community updated on incidents happening in Nashville and Davidson County,” said Chief William Swann, Director, Nashville Fire Department. “The Everbridge system will be leveraged by Metro Government to communicate directly to the public. Residents and visitors can feel confident that when they receive alerts, they are getting accurate information straight from a Metro public safety agency.” Everbridge Mobile App delivers alerts to cell phones based on a user’s physical location during emergency Receiving alerts on cell phones Metro officials also urge residents to download the Everbridge Mobile App, which brings the added security of delivering alerts to cell phones based on a user’s physical location at the time of an emergency. “The Everbridge app provides Metro with a key alerting capability because it enables us to send safety instructions to residents who happen to be in the vicinity of an emergency in real time,” said Department of Emergency Communication’s Director Michele Donegan. Nashville joins a growing list of America’s largest cities, counties, and entire states that have rolled out the Everbridge platform including the cities of New York, Philadelphia, New Orleans, Atlanta, Houston, Phoenix, San Francisco, Tampa, and Washington, DC; hundreds of counties including Napa, Sonoma, Ventura, Miami-Dade, Palm Beach, Cook, Harris, and Maricopa; and the states of Florida, Connecticut, Vermont, and New York.
Mobile-device and application-security technology company Trustonic announces that Hyundai Motor America will demonstrate its new Digital Key app, secured by Trustonic Application Protection, at the New York International Auto Show 2019. The Digital Key will launch with the all-new 2020 Hyundai Sonata in the fall. Hyundai’s Digital Key is a downloadable smartphone app that can replace a traditional car key by leveraging Near Field Communication (NFC) to detect an authorised smartphone. An NFC antenna is located in the driver’s door handle for locking and unlocking while a second antenna for starting the engine is located in the wireless charging pad in the centre console. Seamless vehicle sharing The Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication Once authorised, the Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication. A user can lock and unlock the vehicle, activate panic alert and start the engine within a range of about 30 feet of the car. The new Digital Key can be utilised by up to four authorised users, facilitating seamless vehicle sharing. Users’ preferred settings are also stored in the car, meaning that when a user is recognised, the vehicle automatically adjusts settings for side mirrors, radio presets, sound settings, and seat positioning. Hyundai is using Trustonic Application Protection (TAP) to secure the Digital Key. TAP ensures that Digital Key transfer requests are securely displayed to and approved by a real, authenticated user on a trusted device. Cybersecurity approach TAP utilises a multilayered industry-recognised security approach for communication to and from the customer’s phone. “Hyundai has been a leader in connected car technology for a long time now, with new features like Apple CarPlay, Android Auto, Smartwatch and Smart-speaker integration into our vehicles,” said Manish Mehrotra, director of digital business planning and connected operations, Hyundai Motor America. “Digital Key adds convenience for 2020 Sonata owners and allows us to be ready for future shifts in the mobility space, such as car sharing. We chose Trustonic because of their multilayered, industry recognised cybersecurity approach.” Vehicle-function permissions Hyundai’s Digital Key will enable easy car sharing and improved user experiences" Car owners have a deeper level of access than other authenticated users, enabling them to set vehicle-function permissions and the duration of access for each shared user. This enables uses beyond car sharing, such as enabling couriers to access the trunk within a pre-agreed window of time to deliver a package. Future uses that the app could enable include car rentals, triggering an alarm when a vehicle travels outside a designated area and remote control of features, such as autonomous parking. Ben Cade, CEO, Trustonic, adds, “Consumers expect to be able to manage their lives on their smartphones, and this includes their vehicles. Hyundai’s Digital Key will enable easy car sharing and improved user experiences for drivers—and as international leaders in app security, it’s up to us to ensure this can happen in a scalable and secure way.”
Round table discussion
Ethical hackers are familiar to the world of cybersecurity. As cybersecurity awareness increases in physical security, they are also playing a larger role to ensure the safety of networked and information technologies used in our market. We asked this week’s Expert Panel Roundtable: What is the role of ‘ethical hackers’ to ensure cybersecurity of networked products in the physical security market?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?