In the wake of recent allegations that ATM locks worldwide are vulnerable to new side-channel attacks, Sargent and Greenleaf (S&G), a manufacturer of high-quality electronic ATM locks, recently conducted vulnerability testing to provide insight and identify ways ATM owners and operators can protect their machines against side-channel attacks. Side-channel attacks, which can exploit internal components of electronic locks, first emerged in 2015 and continue to plague electronic lock users to...
A video analytics system that provides ‘behavioural understanding’ can yield more meaningful and actionable data for a range of applications. In public safety and security, such a system can alert on violent or suspicious behaviours, such as people fighting, vandalism, people with weapons, etc. In advanced traffic surveillance and monitoring, it can provide alerts to vehicle collisions (accidents), traffic hazards or vehicle that aren’t using the road properly, such as a car...
ATMs have become a cornerstone of day-to-day life for millions, but they can also be vulnerable to attack. The global ATM Industry Association reported an increase of ATM crime of 12% for 2017. And attacks, of course, often involve ATM users, potentially injuring them and causing trauma. But since, by definition, ATMs are often situated outside buildings and used at all times of the day and night, securing them is a challenge - and banks are turning to more intelligent solutions. According to A...
Johnson Controls has launched the Pro 2MP Micro camera for installations where a low-profile, high-performance surveillance camera is required. The Pro 2MP Micro includes a lens that can be placed up to 20 feet away from the power supply as well as wide dynamic range to balance scenes where bright backlighting can be a challenge. The Micro also operates at a minimum illumination of 0.01 Lux and thus facilitates excellent low light performance without the need for IR illumination. The discrete...
Honeywell is expanding its Performance Series video line with the launch of six new cameras and upgrades to 11 existing products. The enhanced Performance Series Video 2/4/8 MP IP Solution native integrated cameras deliver faster notification and verification of potential threats along with powerful insights to support small-to-medium businesses and enterprise level applications at a lower installation and operating cost. The Performance Series video cameras feature new Face Detection and Smart...
Identiv, Inc., a global provider of physical security and secure identification, has secured new agreements with two major customers in the banking vertical. The first new agreement is a three-year software and services agreement with an existing customer that has been using Identiv’s 3VR video and analytics solution for bank branch security, fraud detection and ATM skimming prevention. Expanding recurring revenue base This top 5 U.S. bank customer has contracted with Identiv to provide...
It is hard to think of somewhere with more critical security needs than a bank. While cyber-security grabs the headlines, in the day-to-day business of banking, physical security of people and assets is paramount. We’ve all seen the heist movies. Of course, in the real world, bank security is more complex than fitting the biggest titanium door you can find. Buildings, ATM housings and cash-in-transit delivery services all have totally different workflows, but each demands high-security locking they can trust, just like a vault. Could a single locking technology accommodate such a diverse range of needs? Critical infrastructure A range of high-security cylinders and padlocks for applications beyond doors maximise physical security and attack resistance For complexity and security, critical infrastructure like power grids and clean water plants set the bar for banks’ locking needs. Coincidentally, this utility sector is among the most enthusiastic adopters of CLIQ access control. CLIQ is a multi-layered locking system which combines key-operated mechanical and electronic protection. A range of high-security cylinders and padlocks for applications beyond doors maximise physical security and attack resistance. CLIQ technology then layers encrypted, user-friendly electronic security on top — adding control and convenience without the need for wires: all CLIQ locks for doors, padlocks, cabinets, lifts, gates and any relevant machines are wireless. Power to the lock’s microelectronics comes from a standard battery inside every programmable CLIQ key. Key based solution These layers of physical and electronic security work together to give banks a safety net should a key go missing. Any lost CLIQ key’s access rights are simply removed, instantly, using the system software and it no longer opens any door, vault or ATM. Because it’s a key based solution, CLIQ offers a simple step up from mechanical security to powerful access control, with no change to existing hardware like doors. Retrofitting is hassle-free. The secure CLIQ Web Manager software interface works from inside any standard browser, or on an intranet with multi-factor log-in authentication for administrators. Facility managers can control workflows by tailoring every user’s access permissions, without bulging key-chains or having to design a complicated, expensive key management system. One programmable (and reprogrammable) key covers all their needs. Special clearance Equally, the CLIQ system can generate an audit trail for any lock or user on demand, thereby streamlining incident investigation Areas requiring special clearance are easily defined and access to them restricted to specific staff. If multiple system administrators are required, CLIQ handles it — even across different sites or time-zones. Facility managers can place programming devices at strategic points — near the staff entrance, say — for employees or contractors to revalidate their permissions regularly. Shorter access rights validity instantly upgrades security in a banking hall or back-office. Equally, the CLIQ system can generate an audit trail for any lock or user on demand, thereby streamlining incident investigation. Programming devices collect audit trails at the time of reprogramming. CLIQ functionality saves you time and money. CLIQ can secure more than just doors. CLIQ cylinders are ideal for ATM housings, and bank staff or third-party vendors don’t even need to carry another key to unlock the ATM. Their single CLIQ key is programmed to open just the right ATM at the right time — a secure and controlled workflow. Secure Bluetooth connection Every opening is tracked and audited within the same Web Manager software, available on a local server or with ASSA ABLOY’s secure Software as a Service (SaaS) option. Running a cash transit department or business adds another variable to the security mix: staff and cash are always on the move and the entire workflow must be secured. If you are back at HQ to collect a key, you are wasting time and fuel. An award-winning extension of the same CLIQ system — CLIQ Connect technology — has it covered. With CLIQ Connect, a key-holder no longer needs to update access rights physically in person by returning to base or even by moving to the nearest location with a programming device. All they need is a smartphone, the CLIQ Connect app and a secure Bluetooth connection. It’s simple and agile — and quick to respond to any ‘live’ situation. Key-operated unlocking The online opening function of CLIQ Connect can even contribute to secure sequence unlocking for cash collections If you need to redirect a cash collection team while they are on the road, you just set new access permissions for a building or ATM within the CLIQ Web Manager. The key-holder makes a secure Bluetooth connection between their programmable CLIQ Connect key and the app to instantly update their permissions. They can now open the necessary locks at their new destination. The online opening function of CLIQ Connect can even contribute to secure sequence unlocking for cash collections. For example, locks can require key-operated unlocking within 60 seconds of access also being authorised by a system administrator.
Vanderbilt strives that its products meet the highest approval standards and Vectis iX is no different with UVV Kassen certification. Access to playback can be restricted by requiring two user logins. One of the users must be the 4-eye master in order to playback the video. This feature protects workers’ privacy rights as it ensures they cannot be secretly monitored by their co-workers or superiors in their working environment. A reference picture of an area within the bank (e.g. the ATM machine) can be created to compare against a live picture after a certain spell of time. This helps the bank ensure their environment has not been tampered with. A reminder can be set to regularly check this feature. Customising lengths of video recording Transaction data can be stored and linked to one or more cameras and can be reviewed in alarm mode, showing the transaction and the associated video Through the NPC II converter, Vectis has the ability to interface with ATMs. Transaction data can be stored and linked to one or more cameras. All transactions can be reviewed in alarm mode, showing the transaction and the associated video. In addition, specific information can be searched for such as amount, bank codes or bank accounts. Vectis has the ability for complete customisation of recording lengths. This feature coincides with banking laws and demonstrates an effective level of flexibility within the product for banks. Protecting sensitive data and privacy Set the system to lock itself after a certain time to avoid unauthorised access. In addition, the whole screen can be blocked to cover all live pictures. This feature essentially provides another option to ensure sensitive data and privacy can be protected. Even if there is a breach after working hours, the wrong people cannot access the cameras. Vectis is utilising the latest Codec between camera and NVR. H.265 is the successor of H.264 and saves even more storage when recording. Overwrite protection on alarm/event clips With this feature you can mark certain cameras, so that when an alarm is triggered and they automatically begin recording, those recordings are protected and cannot be overwritten. This provides peace of mind and flexibility for the bank when dealing with issues such as robberies and suspicious alarms, etc. Configure the Vectis iX to send messages to your mobile phone in case of an event or alarm. This push notification feature allows for around the clock updates and for action to be take in real-time should a situation arise.
Broco Rankin is pleased to announce the acquisition of long-time client Chamberlain Security, effective December 31, 2017. Founded in the early 1970's, Chamberlain Security is a manufacturer of high security components designed to protect the contents of safes, filing cabinets and ATMs. Chamberlain Security components are included in many commercial and residential safes as well as government GSA-rated (Government Services Administration) and UL® (Underwriters Laboratory) tested TL-15 and TL-30 safes. "Chamberlain Security has been a customer of our PMA (Protective Metal Alloys) division for over 20 years," said Richard Ferry, president of Broco Rankin. "It seemed only natural when the opportunity arose that we should bring Chamberlain Security into the Broco Rankin family of companies." Chamberlain's operations have been relocated to Broco Rankin's facility in Ontario, California, where they continue to provide products to current and new customers worldwide. Our mission is to inspire positive change in ourselves and the world with high quality products and solutions for our customers" ISO certified components "Our mission is to inspire positive change in ourselves and the world with high quality products and solutions for our customers," continued Mr. Ferry. Consistent with Broco Rankin's commitment to quality, the components manufactured by Chamberlain Security are UL 'Component Recognised.’ Similarly, processes for producing PMA and Rankin Hardfacing products are ISO 9001:2008 certified. Broco, and Rankin Industries, are celebrating milestone anniversaries in 2018. Broco marks 50 years of leadership and innovation in the underwater, tactical and industrial cutting and welding industries, and is recognised as the world leader in exothermic cutting and underwater welding systems. Nickel-tungsten buildup products Rankin celebrates 80 years of design and formulation of superior buildup and hardfacing products for maintenance and repair industries worldwide. In addition, PMA is now in its 40th year of manufacturing nickel-based and nickel-tungsten hardfacing and buildup products, and Rankin Automation's automated welding systems product line marks its 30 year anniversary.
3xLOGIC, a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, has announced the release of the VIGIL V500 Hybrid. VIGIL V500 Hybrids are fully-integrated intelligent video appliances. Pre-configured with VIGIL Video Management System (VMS) software, this hybrid represents a cost-effective video management platform that provides all the key functionality of VIGIL VMS with unrivalled ease of setup. “Our V500 Hybrid provides the perfect replacement solution for aging analogue DVRs,” said Michael Poe, Product Manager. “By combining an NVR and high-definition analogue DVR in the same chassis, we bring new technology to an old system. The VIGIL V500 NVRs represents a cost-effective video management platform that provides all the key functionality of VIGIL VMS "The legacy DVR can be replaced without requiring replacement of existing cameras. Add IP or HD analogue cameras while replacing the DVR to realise the benefit of high-resolution video while still fully leveraging your existing analogue investment.” HD video streaming to Smart Search Key features and benefits for the new release include: Ready-to-deploy solution The V500 design provides all the network components required to deploy this NVR. Not only are alarm, serial, and audio inputs built in, this hybrid also includes 16 embedded PoE ports for IP devices. The V500 integrates with the full VIGIL suite of products. Remote streaming VIGIL’s exclusive MULTIVIEW Technology and its revolutionary RapidStream video compression engine, enable users to remotely stream and view high-definition video with minimal impact on network bandwidth. View video anywhere using the powerful apps View Lite II and our VIGIL Connect system for simple connectivity. IoT solution for business Leverage the power of business intelligence to monitor the entire business by integrating to a wide variety of data sources including point-of-sale, ATM, access control, alarms, and audio devices. When this data is tied to video and made searchable, users can generate alarms based on specific criteria. The V500 enables retail customers to parlay their existing investment into an IoT solution that brings their retail business into the 21st century. Seamless integration VIGIL V500 Series NVRs feature many built-in capabilities—two-way audio, easy-to-use Smart Search, and seamless integration with VISIX V-Series analytic cameras—providing the information you need, at your fingertips. Easy Setup Wizard Designed for simple setup, the V500 Series includes the Easy Setup Wizard to allow those with no IP video experience to install the NVR and start recording and viewing video. The wizard provides plug-and-play capability with VISIX and ONVIF-S cameras for easy deployment. The new camera line greatly increases surveillance capabilities while requiring none of the additional costs of replacing analogue cabling The V500 also includes VIGIL Connect and 3xLOGIC’s easy-to-use QR code for easy setup and remote viewing. VISIX HD analogue cameras In concert with the V500 release, 3xLOGIC also announces new VISIX HD analogue cameras. A key feature of these HD cameras is they connect with the V500 without the need to replace existing analogue cabling. These cameras offer improved resolution over the traditional analogue cameras they replace. The new camera line greatly increases surveillance capabilities while requiring none of the additional costs often associated with replacing existing cabling or installing an entirely new infrastructure to support an IP camera network. The cameras work with the full suite of VIGIL products just like 3xLOGIC IP cameras. Other features include up to 1080p resolution, HD TVI, AHD, remote focus, IR, wide dynamic range (WDR), and availability in bullet or dome form factors.
Sargent and Greenleaf (S&G), a subsidiary of STANLEY Security and a manufacturer of high security locks and locking systems for safes, vaults and high-security cabinets, has appointed Keith Deaton to Chief Operating Officer. Exceeding business objectives Deaton joined STANLEY Security’s finance team in 2010, and, most recently, served as S&G’s Chief Financial Officer and interim CFO (Canada). In the security industry since 2005, Deaton brings substantial experience to his new role, and will assume the responsibilities previously managed by Brian Leary. As COO, Deaton will provide strategic leadership and day-to-day operational management for Sargent and Greenleaf, guiding the company to exceed its business objectives. “We are proud to welcome Keith into a new role within the S&G executive team,” said Jeremy Morton, President, STANLEY Access Technologies. “His extensive industry knowledge will help to further S&G’s long-standing reputation as a trustworthy and dependable manufacturer of high-security products.” Asset security with developing technology “My years of experience with S&G have primed me to lead this team into the next phase of successes and achievements,” states Deaton. “As technology evolves, S&G will continue to provide products that secure our customers’ most valuable assets.” Deaton graduated from Murray State University before attending the Kelley School of Business at Indiana University, where he graduated with an MBA in Finance and Operations Management.
Biometric technology company Zwipe has announced that it has partnered with Gemalto, a worldwide card manufacturer, to pilot the first battery-less dual-interface fingerprint activated payment card with Bank of Cyprus. 2018 upcoming pilots Gemalto has confirmed multiple upcoming pilots in 2018, with the first of these being with Bank of Cyprus. Commenting on the cooperation, Sylvie Gibert, SVP of Payment Cards at Gemalto said, “We have spent the last 18 months extensively evaluating and confirming the viability of Zwipe’s technology and we are happy that we have now seen great interest from banks all over the world for biometric technology on payment cards, having already identified several issuing banks in multiple regions to participate in the pilot program.” Fingerprint-activated payment cards are seen as the next major market innovation when looking at card-based payments. Consumers will benefit by having a more secure and convenient method of payment that utilises their own fingerprint to authenticate and complete transactions at checkout. The advanced security enabled by biometrics will remove the need for a 4-digit or longer PIN entry as well as allow for the elimination of transaction limits on contactless payments. Payments of the future Commenting on the value of the technology, Kim Humborstad, CEO and founder of Zwipe said, “Many consumers are seeking out ways to avoid having to memorise difficult to remember passwords or PINs. Looking ahead this will be seen as a blast from the past as we continue to integrate the trust of biometrics into payment. Having a more secure method of payment that does not infringe on convenience or consumer privacy is essential. Combining that with the ability to use the card for any type of transaction regardless of amount will make the card top of wallet and top of mind for the consumer.” Referencing the announcement made by Gemalto, this first-of-its-kind card being piloted by Gemalto and Bank of Cyprus is a fingerprint-activated payment card which utilises Zwipe’s unique energy harvesting capacity and biometric engine to enable the authorised user to complete contactless and contact transactions with the card, without the need for battery power. The card works with existing payments infrastructure as standard point-of-sale terminals provide the power necessary to operate. Commenting on this latest cooperation for Zwipe, Kim Humborstad said, "Receiving Gemalto’s support in bringing our technology to market is a big step for our organisation. They have an expansive customer base in every corner of the world and a leading industrialisation capacity and know-how required for such innovative products. We share a common vision about the capabilities and capacity of what Zwipe’s technology can offer to banks and consumers moving forward.”
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban on Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes a Splash with Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact of Data-Driven Smart Cities on Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing the Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends for 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How to Prevent ATM Jackpotting with Physical and Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve- how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need to Look Beyond Technology for Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organisation. 10. The Evolution of Facial Recognition from Body-Cams to Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organisation's security, whilst enhancing user convenience.Newer solutions are overcoming security and convenience hurdles to help realise the full potential of biometrics Challenges for biometric authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal amongst older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimising performance through a combination of new technology and algorithms, whilst ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimising capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimises performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimises performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template matching modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical access control integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, it is meaningless Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
Organisations across the world face a new risk paradigm: one that encompasses cyber and physical threats. We’ve heard the stories associated with ATM skimming, identity theft, data breaches, scams, and phishing. Large financial services organisations are often the victim of hackers looking to steal corporate information and transactional data or funds, and criminals continue to become more sophisticated in their approach. Growth in cyber-attacks Additionally, cyber-threats have taken a front seat in the line-up of primary risks facing financial institutions today. And it is no surprise why: according to Cybersecurity Ventures, the amount of money taken in cyber heists, both in banking and elsewhere, was estimated at $3 trillion overall for 2015, and this substantial amount is expected to double by 2021. Cyber-attacks are becoming more prevalent, more complex and harder to address The fact that cyber-attacks are becoming more prevalent isn't the only issue; they're also becoming more complex and therefore harder to address. And although the convenient interconnectivity of the Internet of Things (IoT) creates many advantages for financial institutions, with that also comes an increased risk to dangerous threats. In today’s environment, banks, credit unions, and financial organisations of all types are primary targets for hackers. But it’s not just the monetary loss that these businesses need to be concerned about — there is also a threat to the brand, customer trust, and employee safety. All of these challenges and complexities open the door to new conversations and risks. Here are the top five critical questions today’s bank leaders need to be ready to answer. Should we collaborate to mitigate these threats effectively? Over the last decade, the emergence of the Internet of Things (IoT) and a demand for more mobile capabilities has changed the way people and businesses connect. But as the need for connectivity increases, so too does the need for increased security for physical assets, networks, and valuable corporate data. As a result, a dialogue between IT and physical security is necessary to help leaders gain a greater knowledge of how to best collaborate to ensure complete protection. Leaders must communicate closely to drive strategies that help identify vulnerabilities in a more proactive manner. The result of these conversations: a truly comprehensive approach to security intelligence. It’s not just the monetary loss that banks need to be concerned about – there is also a threat to customer trust and employee safety How can I pinpoint the important data for addressing cyber threats? To maintain a high level of security and ensure business continuity around the globe, companies seek solutions that help predict and identify threats in real time. But often, there are too many alerts generated by too many systems, and none of this raw data is actionable. Linking cyber and physical security together transforms alerts into actionable intelligence, which helps users connect the pieces of any situation and present a unified risk scenario to the appropriate analysts and operators. By capturing and analysing data in real time, enterprise organisations gain a visual representation of risks across the business while accessing information related to the most critical events happening at any given time. Not only does this unified process enable a higher and more proactive level of protection, but it also helps facilitate a plan of action based within a common, unified security operations centre. How can I inform of the importance of cybersecurity? Security leaders in banks need to feel prepared by staying updated, looking at common vulnerabilities, understanding the malware and challenges, and testing the environment. And collaboration is key to mitigation: Traditional security and fraud teams must work in conjunction with cyber teams to effectively handle all aspects of a cyber-attack. Additionally, CISOs need to “sell” cybersecurity to CEOs and the board by outlining the importance of protection through emphasising the impact of a potential cyber-attack on the business. Ensure you can verbally address the most critical risks to your senior leadership, including recent botnets, scams, and cyber gangs, to receive the support, and budget you need to address these threats head on. Is my system secure? It is critical that you are knowledgeable about the steps you can take to protect your security and network infrastructure from cyber-attacks. A firewall is useful to prevent hackers from accessing critical data on internal networks and computers Changing default passwords should be a first step, as some scams target devices with hard-coded factory defaults. Ensure software and firmware is up to date because updates often include fixes for potential vulnerabilities. These updates keep your devices and network more secure and increase overall system uptime. A firewall is useful to prevent hackers and unauthorised programs from accessing the critical business information and resources on internal networks and computers. Also, minimise potential risk by closing network ports and disabling services you don’t need. With all of these instances, it is best to work closely with your integrator partner and chosen vendor to ensure that your system is as secure as it can possibly be. What solutions are best to help mitigate risks? Technology is a great force multiplier. Security — both cyber and physical solutions — helps secure an entire branch footprint, alleviates risk, ensures operational compliance, and improves fraud investigations. Video surveillance systems, analytics, threat management platforms and more can provide organisations with intelligence and unprecedented protection from fraud, all while enhancing the customer experience. Overall, there are significant benefits to collaborating to gain comprehensive risk intelligence. By bringing various leaders, departments, technologies and strategies together, we can more effectively identify threats, develop trends and quickly access important data to ensure security and safety goals are realised.
Add March Networks to the growing list of companies in the physical security market that are addressing the possibility of cyber-threats. Cybersecurity is especially relevant to two of March Networks’ primary vertical markets – banking, whose focus on money requires stringent cybersecurity; and retail, which has been the target of recent cybersecurity attacks. “People just don’t know what to do with cybersecurity,” says Dan Cremins, Global Leader, Product Management at March Networks. “The thing is, you have to figure out how to make your products, solutions and networks more secure, and then let them know what you are doing about it.” Cybersecurity mobile app As the profile of cybersecurity has increased in the physical security market, March Networks has added cybersecurity features to its GURU app. GURU is a mobile app for integrators to use when installing and diagnosing equipment in the field. Using a wireless dongle, the system can read the QR (Quick Response) code on a camera, for example, and provide installation information specific to that camera. As the profile of cybersecurityhas increased in the physicalsecurity market, March Networkshas added cybersecurity featuresto GURU GURU’s new Security Audit tool enables the app to scan a unit and check to make sure it is cybersecure; that is, the right ports have been closed and default passwords have been changed. Simple green, yellow and red coding communicates the cybersecurity status of equipment as it is being installed – and it takes less than five minutes. After installation, the GURU app can be used to conduct an extra check to ensure cybersecurity. There is also a section on the March Networks web site identifying security vulnerabilities (listed by CVE [Common Vulnerabilities and Exposures] number), explaining whether they affect March Networks equipment, and the availability of any patches. “Cybersecurity is the number one threat to any industry, including ours,” says Cremins. “We offer a tool to help people address it. We are trying to be as proactive as possible, and stay ahead of it.” Integrating inventory tracking & video There are other developments at March Networks, too, including a new integration partner in the retail sector. Tracking inventory is critical to retail loss management, and March Networks has integrated its video system with the Zebra RFID system for inventory tracking. Zebra uses radio frequency identification (RFID). Asset tags are used in combination with sensors mounted throughout a facility to keep track of where goods are transported in a retail store, warehouse or other location. If something goes missing,video of that item, tied to trackinginformation from the RFID system,is available instantly to aid withan investigation The Zebra RFID system generates inventory tracking information that is integrated with March Networks video in much the same way that point-of-sale (POS) information has been used with video. Information from inventory tracking is associated directly with each frame of video. The integration allows video cameras to watch equipment as it moves around a warehouse or retail space. If something goes missing, video of that item, tied to tracking information from the RFID system, is available instantly to aid with an investigation. In addition to retail, there are also applications of RFID inventory tracking in medical environments, where expensive equipment is used throughout a hospital, for example. Integration of video with inventory control would allow video cameras to watch medical equipment as it travels from floor to floor and room to room. Video provides a valuable investigation tool if a medical device goes missing. “They can review the video to see where it was and see what happened with it,” says Cremins. HDR cameras for banking applications At the recent ASIS show in Orlando, March Networks introduced the new ME4 series of multi-exposure, 4 megapixel cameras. The cameras are aimed at improving video image performance in situations with varied light, such as a glass-enclosed ATM enclosure, bank branch, or a retail location where bright windows can cause backlighting and other problems. In addition to better image quality and resolution, the cameras have been designed very economically, says Cremins. They strike a balance between video clarity and bandwidth and storage efficiency. The cameras use HDR (high dynamic range) technology designed for the most extreme lighting conditions. Even in an environment surrounded completely by glass, the cameras can still see the person in the foreground and details in the background. Facial details are critical in applications at banks and financial institutions.
Amid all the discussion of security integration and end-to-end solutions on the first day of IFSEC 2016 was an undercurrent of uncertainty. The international trade show opened at ExCel London just days before the historic "Brexit" vote, when Britons will decide whether to remain a part of the European union or to exit the politico-economic fusion of 28 member states. With the Brexit referendum this week, the polls are neck-and-neck, so the vote could go either way, hence the uncertainty. If "leave" wins the vote, what might it mean for business, including the security and video surveillance companies exhibiting at IFSEC? Brexit implications on security market For example, if Great Britain leaves the EU, might it increase costs of goods flowing throughout the larger European market? Would a distributor in Germany face new costs and/or more complex processes when sending equipment to Britain? EU laws would still apply during a two-year negotiation period if the UK votes to leave. Therefore, changes are unlikely to be immediate; however, long-term uncertainty can be bad for any market, whether it's the stock market, the currency market, or the security market. "Once you exit the EU, there may be different rules related to larger contracts," says Ivo Drent, Arecont Vision's Vice President of European Sales. "Suddenly a UK company quoting jobs in the EU will face a different climate." Manufacturers from other countries, including the Asia-Pacific (APAC) region, would eventually need to renegotiate export contracts with the newly independent United Kingdom. Given a skilled labour shortage in the UK integrator market, might a "leave" vote also complicate the ability of companies to recruit candidates from neighbouring countries, and thus aggravate the problem? Dominant security themes at IFSEC Although Brexit was a topic of discussion at several IFSEC stands, there were plenty of other aspects of the security market to consider, too. Manufacturers here are enthusiastic and quick to tout their new products, although many of them were shown previously in the United States last spring at ISC West. However, they're new to the international visitors to IFSEC. Also, the themes of integration, end-to-end systems, and technology partnerships dominated discussions. New products at IFSEC 2016 If "leave" wins the vote, what might it mean for business, including the security and video surveillance companies exhibiting at IFSEC? Arecont Vision was among the companies introducing actual new products here, including the new SurroundVideo Omni Mini IP Dome Camera, a 2-, 6- or 10-megapixel all-in-one camera with two sensors that are remotely user-configurable and provide true day/night video suitable for indoor/outdoor use. The low-profile camera is useful in schools, retail and banking (ATM) applications. Its small size makes it less noticeable and unobtrusive, even in environments that are sensitive to aesthetics. It replicates many of the benefits of Arecont Vision's four-sensor SurroundVideo cameras in a smaller form factor and at lower cost. "It can replace multiple single-sensor cameras or pan-tilt-zooms (PTZs), and give coverage exactly where you want it," says Jeff Whitney, VP Marketing, Arecont Vision. "If you cover a wide area, you never lose situational awareness." An emphasis on solutions rather than single products is another theme you hear repeatedly this year at IFSEC. For example, the sensor company Optex is promoting its REDSCAN mini RLS-2020I, an indoor laser scan detector that provides a 20x20-meter vertical or horizontal detection area, as an adjunct to video analytics. The sensor helps to protect assets and equipment by creating an invisible laser wall that detects any intrusion. Combined with a video analytics system, the hardware can increase reliability and eliminate false alarms. Leveraging the two technologies creates a result that is greater than the sum of the parts. A demonstration at the stand involves a display of drink glasses and spirits (as might be seen at a bar after closing). A "laser wall" protects the display: Anyone who tries to touch a glass triggers an alarm. The alarm trigger is faster and more accurate than a video analytics approach - there is no delay as pixels are processed. The detection zone can be divided into four sections, with each linked to a PTZ preset that directs camera coverage where it is needed. Technology partnerships Technology partnerships are also making news. Milestone opened the show with a press conference announcing an agreement with Dell to introduce a range of "plug and play" solutions for the surveillance market. The solutions can support 8, 16, 26 and 48 cameras and come complete with Milestone Xprotect and Microsoft Embedded licenses. There will be more to see on the second day of the show, and possibly more Brexit discussion, too. The vote is on Thursday, the last day of the show.
Product innovation may have slowed in the security market in the second half of the year. On the first day of the ASIS International Show in Anaheim, California, new product introductions seemed few and far between. In fact, most manufacturers were touting small improvements to the products they announced in the spring. Some emphasised that the products unveiled (or “previewed”) in the spring are now fully ready to be shipped. ASIS has historically been more an end user show than an integrator show, although several exhibitors noted that they are being visited by both integrators and end users. Grumbling about low attendance was common on the first day, especially booths located at the back of the hall, who were still waiting patiently late in the day for visitors to “filter through.” Without a lot of product news, the emphasis is on expanded service offerings aimed at making life easier for integrators and to improve total cost of ownership (TCO) for end users. Without a lot of product news, the emphasis is on expanded service offerings aimed at making life easier for integrators and to improve total cost of ownership (TCO) for end users QR codes for enhanced customer service There were plenty of examples of innovative approaches. For example, a QR (“quick response”) code on March Networks’ products can be scanned to provide information on the model (serial number, etc.), and also to set up an express RMA (return merchandise authorisation). The QR code also triggers a diagnostic programme that can troubleshoot a product based on which LED lights are aglow, for example, and whether they are green or red. Addition of a WiFi dongle can even allow simple remote programming of a network video recorder (NVR). Use of QR codes is part of March Networks’ emphasis on providing additional serviceability to integrators and even end users -- including its Guru smartphone app to provide service functions and in-field diagnostic support. The idea is to save integrators the cost of “rolling a truck” if possible and/or to get the integrator in and out as fast as possible. HDR imaging for ATM security On the product side, March Networks is introducing the MegaPX ATM Camera that incorporates high dynamic range (HDR), a next generation technology that samples the lightest and darkest areas and balances lighting to get the best image. It offers better performance than wide dynamic range (WDR). The new ATM camera has a compact design, robust mounting brackets and doesn’t have a tether like some cameras use to connect the lens with the imager and processor. Opening the door to the ATM frequently for service can strain the tether and cause damage to the camera -- the new self-contained model doesn’t have that problem. Adding value with online training Training is another way to add value, and Milestone is emphasising its Learning and Performance Program, the new name for the Milestone Knowledge Program. The idea is to help the reseller channel with a brand new certification program and expanded training offerings. “We want to build expertise in our channel,” says Greg Willmarth, Milestone’s manager, instructional design. “It’s not just about products, but knowledge and how to apply that knowledge. The longer an install takes, the less profit there is, and we really want to help them develop their teams to be technical superstars.” In addition to reseller training, Milestone now offers e-learning for the end user community, including a programme called “Getting Started with the XProtect Smart Client” -- available for free on a flash drive that can be plugged into a laptop. Given that there is a lot of turnover among end user employees who are tasked with operating the system, the e-learning tool quickly teaches the basics of interacting with XProtect -- how to navigate, how to export video, etc. "We want to build expertise in ourchannel. It’s not just about products,but knowledge and how to apply thatknowledge. The longer an install takes,the less profit there is, and we reallywant to help them develop their teamsto be technical superstars", says GregWillmarth, Milestone’s manager,instructional design Customer is supreme for Vanderbilt Vanderbilt is another company that emphasises customer relationships over product sales. Their approach is to maintain a relationship directly with end user customers as well as with integrators. “We came up through the integration world,” says Mitchell Kane, Vanderbilt’s president. “It’s in our DNA. It’s how we go to market. We give them attention and it’s appreciated. The end users we serve have a personal connection.” “We’re a customer service organisation,” he adds. “We also happen to manufacture products. It’s all about customer support.” On the product side, I saw an interesting product today at the Comnet booth. It’ a 1 gigabits-per-second Free Space Optical link for wireless data transmission over distances up to a mile (1.5 kilometres). Suitable for video signal backhaul type applications, the four integrated LASER transmitters provide low latency and high security to enable the units to provide a true alternative to fibere optics. There are no licensing requirements on a global basis for the full duplex Ethernet channel. More tomorrow on the second day of the show...
Columbia Bank, a Northwest community bank headquartered in Tacoma, Washington, sought to upgrade their video surveillance solution to improve image quality and retention time. They also wanted to maximise field of view to deliver a more forceful and expansive – yet, less intrusive – solution. Working with Cook Security Group, Inc., Ross Armstrong, vice president of physical security at Columbia Bank, chose to overhaul video surveillance in their 150-plus branches across the Northwest, many of which included older analogue cameras. They chose to install a mix of Hanwha Techwin models including Wisenet P series PNM-9000VQ multi-sensor / multi-directional outdoor vandal-proof dome cameras with 5 megapixel lens modules and Wisenet X series XND-8020F 5 megapixel indoor flush mount dome cameras. Surveillance cameras managed by Omnicast VMS The project, which started in June of 2018, has already deployed over 1,200 Hanwha Techwin cameras across 80 locationsColumbia Bank is in the process of the multi-phase upgrade that converts their existing branches to Hanwha Techwin video surveillance cameras managed by Genetec’s Security Center Omnicast Video Management System (VMS). The project, which started in June of 2018, has already deployed over 1,200 Hanwha Techwin cameras across 80 locations. They will complete another 60 sites in 2019, and 30 more in 2020. The video cameras serve as part of an overall physical security plan and are positioned to provide expansive coverage of bank interiors including teller lines, exteriors including parking lots and surrounding areas and ATM machines. Cameras bundled with analytics Armstrong said Columbia Bank tested out a of variety of models before deciding on Hanwha Techwin. “I didn't know which camera vendors would give us the biggest bang for the buck,” he said. “But I settled on Hanwha Techwin for a couple of reasons. One, is the price competitiveness and, two, the fact that the cameras come bundled with so many analytics that many companies want to charge extra for those licenses.” One of the analytics features the Columbia Bank security team uses with regularity is the loitering feature, specifically at their ATM machines One of the analytics features the Columbia Bank security team uses with regularity is the loitering feature, specifically at their ATM machines. “If an individual is loitering around one of our ATMs beyond the set time limit, then we have it programmed into Genetec’s Security Center to send an alert." "Omnicast snaps a photo of the loiterer and emails it to everyone designated on our security team. We then can take a quick look at that photo and quickly determine whether or not somebody is utilising the ATM as a customer or if they're doing something they're not supposed to, such as trying to break into the ATM or installing a skimmer.” Health monitoring of the cameras Armstrong said, as he tested cameras from other vendors, he noticed a consistent drop rate which he was concerned would get worse. Even though 98 percent availability seems acceptable, any downtime creates a risk of missing critical events" “Security Center provides health monitoring of the cameras, and what I looked for was if the availability started dropping below 98 percent. Even though 98 percent availability seems acceptable, any downtime creates a risk of missing critical events. One camera model we were testing was experiencing regular outages, where we would lose 30 seconds off and on throughout the day. These short loses added up quickly and we were seeing availability times dropping somewhere around 93 to 94 percent. That wasn't acceptable. “When I reviewed the data on the Hanwha Techwin model, the average availability was consistently above 99 percent, which was so impressive. It might just be a two percent difference, but it's inevitable that the one time you need it is the one time that camera is not working as expected. Columbia Bank was unwilling to accept the risk of utilising equipment that failed to meet our standards, and decided to partner with Hanwha Techwin, who provided a much more reliable end user experience.” Utilising H.265 and WiseStream compression Impact on network infrastructure and bandwidth were also determining factors for Columbia Bank as they chose to upgrade their video surveillance system. Armstrong said he was disappointed to find many camera manufacturers were not quickly integrating usage of H.265 compression technology into their products. He said he is impressed that Hanwha Techwin utilises H.265 in so many of its camera models, as well as the fact that Hanwha has incorporated its own WiseStream technology into its cameras, making them even more efficient. Hanwha Techwin Wisenet P and X series cameras use H.265/H.264/MJPEG with Hanwha’s exclusive WiseStream II compression technology Hanwha Techwin Wisenet P and X series cameras use H.265/H.264/MJPEG with Hanwha’s exclusive WiseStream II compression technology. WiseStream dynamically controls encoding, balancing quality and compression according to movement in the image. Combined with H.265 compression, the bandwidth efficiency can be improved by up to 75 percent compared to current H.264 technology. Installing non-intrusive cameras Community banks are charged with keeping employees, customers, and assets safe, but also need to present a warm and inviting environment since they are often a hub of civic activity. In-your-face video surveillance cameras in a bank can be threatening to any would-be criminal, but they are also off-putting to customers that visit banks on a day-to-day basis. This allows us to get higher quality images – and a wider field of view – while not intruding into people’s personal space"When Armstrong and his team were evaluating camera solutions across its branches, they wanted to find a way to let customers know they were providing the latest in video security without the potentially intrusive analogue cameras that often can be found just inches away from customers during transactions at the teller counter. Higher resolution 5 megapixel cameras “It’s a balance – you want customers to feel secure, but you don’t want them to feel like they are in a prison or a fishbowl,” said Armstrong. He said they removed the older analogue cameras on the teller line and replaced them with the higher resolution 5 megapixel Hanwha Techwin models, which were placed off the teller line. “This allows us to get higher quality images – and a wider field of view – while not intruding into people’s personal space,” he said. SPD-150 49 Channel Decoder for connectivity One way to convey that Columbia Bank is all business when it comes to security was with an innovative decoder offered by Hanwha Techwin. Armstrong said they wanted to have video monitors showing surveillance camera feeds in certain higher-risk locations so that customers would know they are being recorded, and that would serve as a deterrent to any would be criminals. However, with the change in hardware, they were unable to connect monitors directly to a DVR. Armstrong said Hanwha’s SPD-150 49 Channel Decoder has allowed them to connect analogue, HDMI, and VGA. Columbia Bank has provided video evidence to help law enforcement investigate a variety of incidents including drive-by shootings, traffic accidents, and arson “Being able to put one Hanwha decoder unit in a branch and run three monitors off of it – as well as the ability to hook monitors up to some cameras directly – has saved us tremendous amounts of money while adding a visual security feature.” Adding cameras outdoor to assist community Columbia Bank has long emphasized that they are a community bank that’s community minded. When Armstrong and his team decided to upgrade their video surveillance solution, they made the decision to add video surveillance cameras to the exterior of all bank locations not only to protect their customers as they come and go, but also to assist the community and law enforcement when incidents occur in areas surrounding their branches. We’re very pleased with the solution from Cook Security Group, Hanwha Techwin, and Genetec" “We look at it as the opportunity to give back to the community and provide assistance in a variety of ways,” said Armstrong. So far, Columbia Bank has provided video evidence to help law enforcement investigate a variety of incidents including drive-by shootings, traffic accidents, and arson. Satisfied with the system’s performance Columbia Bank has been well served by the Hanwha Techwin-Genetec security solution and Armstrong said they are very satisfied with the performance of the system. “Hanwha Techwin has been a phenomenal partner for us,” he said. “And that’s what I look for in a security provider – a long-term partnership. We’re very pleased with the solution from Cook Security Group, Hanwha Techwin, and Genetec and we look forward to completing all phases of the project.”
Brian Ishikawa has always kept tight control over his video surveillance system, allowing only authorised personnel within his corporate security division to access video footage. So it was a change for Ishikawa, Senior Vice President and Director of Corporate Security for the Bank of Hawaii, to get used to the idea of authorised staff from the bank’s branch division being able to review video for operational, compliance and marketing-related purposes. The insights collected from the video are helping the bank make more strategic decisions about staffing, customer service and even future branch design. Business intelligence Our March Networks surveillance platform is providing us with some significant business and non-security-related uses" “Our March Networks surveillance platform is providing us with some significant business and non-security-related uses,” Ishikawa explained. Bank of Hawaii, which operates 69 branches and 373 ATMs across Hawaii, American Samoa and the West Pacific, is currently using March Networks Searchlight for Banking software to gather business intelligence at its branches. Searchlight’s mix of surveillance video, teller/ATM transaction data and analytics delivers valuable insights into the bank’s operations, as well as helping to enhance security and uncover fraud. “Our branch division folks look at the data to get ideas on how we should do our branch operations or staffing differently,” he said. People counting data — collected by FLIR Brickstream3D sensors integrated with the Searchlight software — tells them which entrances and exits are most used so they can place marketing materials in high-traffic areas. Video surveillance products The information is also being used to help determine future branch layouts. Queue length and dwell time data, meanwhile, help them understand their busiest time of day, and day of the week, so they can staff branches appropriately. “It’s a huge plus for us,” said Ishikawa. “Our executive management team can see the benefits of the video solution, and the future possibilities for this data.” A forward-thinking bank that’s keen to try new technology, Bank of Hawaii began exploring Searchlight after its success with March Networks’ other video surveillance products. The bank first started using March Networks systems in 2015, when it was time to upgrade its legacy DVRs. At the time, Bank of Hawaii was relying on two different video platforms, and it wasn’t happy with their performance. After enlisting the help of a consultant, and doing his own research at security tradeshows, Ishikawa says the decision to go with March Networks was clear. Network video recorders 'March Networks’ products are really engineered for the banking environment" “I remember asking some of my banking counterparts, ‘Hey what are you guys using?’ And they strongly recommended March Networks,” he recalled. The consultant came to a similar conclusion. He said, "March Networks’ products are really engineered for the banking environment,’ so that helped us make the decision.” Bank of Hawaii is currently using March Networks 8000 Series Hybrid Network Video Recorders (NVRs) in about half of its banking branches. The Linux-based devices provide reliable video surveillance recording and management, and are also easy to service, which is a huge bonus for Ishikawa and his team. In addition, the 8000 Series rack mount units feature an innovative ‘dock and lock’ station that allows technicians to easily remove and service the recorder while leaving all rear connections clean and organised in place. Existing analogue cameras “With other companies, you have to power down the recorder for several minutes to service it, and that means unplugging and re-plugging all the inputs. You miss a number of minutes of recording during that time. With March Networks, we’re able to just pull out the hard drive and pop in another one without taking the NVR offline,” he said. “That’s huge for us.” According to Ishikawa, Bank of Hawaii also appreciates the 8000 Series’ hybrid support, which allowed the bank to continue using its existing analogue cameras, and the motion histograms in March Networks Command video management software, which show Ishikawa and his team where motion occurred and helps them rapidly locate video evidence. “Command’s modern interface is really user-friendly, and it’s very easy to find video,” said Ishikawa. Dynamic range technology Bank of Hawaii has installed MegaPX ATM Cameras, which are purpose-built for ATMs “When someone is telling you, ‘Hey we had a problem at this branch this morning, I don’t know what happened, but it must have been around this time’, we’re able to find that video much more quickly on a March Networks platform.” The bank’s high resolution cameras also make it easy to discern important details. In its newer branches, Bank of Hawaii is using March Networks ME4 Series IP cameras, which capture 4MP images and feature high dynamic range technology to optimise image quality in both low and bright light. The bank is also using Oncam 360° cameras for high-resolution panoramic views. For security at its bank machines, Bank of Hawaii has installed MegaPX ATM Cameras, which are purpose-built for ATMs. Video is integrated with the bank’s ATM transaction data in the Searchlight software for rapid investigations into customer complaints and potential fraud. More comprehensive oversight “It’s so easy to search,” said Ishikawa. “It takes us exactly to that transaction and the associated video so we can figure out what transpired.” The bank is also integrating its teller transaction data with video in Searchlight for more comprehensive oversight of its branches. The combination of video, transactions and analytics helps it get a more holistic view of its services. “Transaction data is not always indicative of how busy a branch is,” Ishikawa said, noting that lengthier conversations at the teller counter often create value because the customer returns later to access another bank product or service. Having video and analytics is an added layer of information. Being able to remotely access video also helps Ishikawa’s security team conduct virtual patrols. This saves them both time and money. Uniformed security member Capturing video of the incident helped underscore the serious nature of the situation “In the past, whenever there was an issue, we had a uniformed security member head out and physically check the branch. But with virtual patrols, we can do fewer physical visits and, when we do visit, it’s a more meaningful visit.” The security team, for example, can keep an eye on issues with vagrancy and loitering by simply logging into the Command software. March Networks video has helped the bank successfully address some of these issues. In one case, a person was routinely visiting a branch and causing disruptions by yelling and throwing deposit slips on the floor. “We don’t always know the situation, but if a person is yelling or displaying erratic behaviour, they pose a risk,” said Ishikawa. Capturing video of the incident helped underscore the serious nature of the situation. Investigating a fraud “We were able to show police that this was not a minor disruptive party. It was a very concerning issue for us. And it wasn’t just our bank, it was occurring in other banks, too.” Going forward, Bank of Hawaii is planning to migrate its remaining retail branches to March Networks. Given the widespread benefits of intelligent video, Ishikawa predicts that, like him, more bank security managers will receive requests to share their video surveillance securely with other departments. “In the future, it won’t just be security that’s asking for a video upgrade,” he said. “It’s going to be other parts of the business saying, ‘We want a piece of the pie too.’ Because surveillance is more than just investigating a fraud or robbery incident. Now, video surveillance is a lot more than that.”
March Networks, a global provider of video security and video-based business intelligence, is pleased to announce that one of Qatar’s top banks is deploying the company’s business intelligence software and integrated analytics to improve customer service and operations. The customer is one of six Qatari financial institutions currently using March Networks systems for advanced video surveillance and fraud prevention. The bank is already using an end-to-end March Networks video recording and management solution in all of its Qatari retail banking branches, hundreds of ATMs, and multiple corporate facilities. It is expanding that solution with Searchlight for Banking software to deliver an enhanced customer experience and strengthen its fraud investigation capabilities. Detecting suspicious transactions The software helps banks evaluate and improve customer service using dwell time, queue length and people counting analyticsMarch Networks Searchlight for Banking combines surveillance video with ATM/teller transaction data and analytics to deliver powerful fraud-fighting tools, such as the ability to rapidly detect suspicious transactions and potential cases of ATM skimming. The software also helps banks evaluate and improve customer service using dwell time, queue length and people counting analytics. The bank started using March Networks several years ago to ensure compliance with CCTV legislation first introduced by the Qatari Ministry of Interior (MOI) in 2011. The law mandates that all banks equip their locations with IP video surveillance, record at a minimum 3-megapixel resolution and 20 frames per second, and ensure 120 days of video storage. The bank, which was using an analogue video surveillance system at the time, needed an enterprise-class video solution that could meet the MOI regulation. It was also looking for a solution that offered remote video management, system health monitoring, and the ability to scale easily to accommodate future growth. Command Enterprise video management software March Networks products have proven highly reliable and are able to meet the parameters set by the Qatar Ministry of Interior regulations"When the project went to tender, only the March Networks solution performed to all of the bank’s criteria, said its group safety and security manager. “With the March Networks system, we are able to fully comply with the law. The usability and health monitoring features of the Command Enterprise video management software are also excellent, enabling us to investigate and resolve potential system issues before they become critical.” According to ISC Group Gulf, a systems integrator in Qatar with a specialised focus and expertise in the banking sector, the March Networks solution is the best choice for banks in the region. “March Networks products have proven highly reliable and are able to meet – and often exceed – the parameters set by the Qatar Ministry of Interior regulations, as our organisation has seen in our work with most of the country’s major financial brands,” said Cristian Ivan Nicolae, Project Manager, ISC Group Gulf. CCTV products for banking environments We are fortunate to be working with ISC Group Gulf, a systems integrator with a deep understanding of the video requirements of Qatari banks"“In addition, March Networks offers the sole CCTV products in Qatar purpose-built for banking environments, which means you are getting a secure, highly-professional solution that is easy to scale in complexity.” “We are proud of our long-standing partnership with this Qatari bank. It is a leader in the use of innovative video technologies, and clearly understands the value intelligent video offers to its organisation,” said Trevor Sinden, Director, Middle East and Africa Sales, March Networks. “We are also fortunate to be working with ISC Group Gulf, a systems integrator with a deep understanding of the video requirements of Qatari banks.” March Networks will showcase its security and business intelligence solution for banks, as well as its complete enterprise video portfolio, in Stand S1-J42 at Intersec 2019, January 20-22 in Dubai, UAE.
HID Global, a global provider of trusted identity solutions, is driving biometrics adoption throughout Latin America, and especially in Mexico, ahead of the October 2018 deadline set by the country’s National Banking and Security Commission (CNBV) to deploy fingerprint identification technology across financial institutions. “Banks, government services agencies and commercial entities in Latin America have embraced our biometrics solutions over the past decade because of their speed, accuracy, reliability and fraud-fighting capabilities,” said Greg Sarrail, Vice President of Global Sales, Extended Access Technologies, Biometrics with HID Global. “Now we are helping to extend these benefits across Mexico’s banking infrastructure as part of a major initiative to curb identity theft.” HID’s multispectral fingerprint devices have helped eliminate fraud in Mexico’s national vaccination program and other healthcare initiatives Enhancing the security of ATMs HID Global’s Lumidigm biometrics sensors with multispectral imaging technology are currently used in Latin America’s retail banks, financial institutions and government agencies to create a more convenient customer experience while increasing the security of ATM and other transactions. More than 115,000 multispectral fingerprint sensors are deployed in Brazil to protect billions of ATM transactions per year, with nearly 80 percent of the nation’s ATMs used by over 85 million banking customers. Financial institutions in Chile and Argentina have embraced HID’s technology to secure pension payments for over one million elderly citizens. HID’s multispectral fingerprint devices have helped eliminate fraud in Mexico’s national vaccination program and other healthcare initiatives that provide millions of underprivileged citizens with subsidies for medicine and medical care. Most reliable fingerprint capture technology The company’s biometrics sensors are also used extensively in commercial applications in Mexico, including verifying identity for more than 70,000 members of a large fitness club franchise. Now, the same technology is poised to improve banking security and convenience in Mexico as the CNVB gets closer to the October 2018 deadline for financial institutions to verify their customers’ identity using fingerprint biometrics when creating accounts, applying for loans and conducting other transactions. HID’s patented multispectral fingerprint imaging technology captures unique characteristics from both the surface and subsurface of the skin HID’s patented multispectral fingerprint imaging technology captures unique characteristics from both the surface and subsurface of the skin, providing the most reliable fingerprint capture technology available. Multispectral fingerprinting works for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions--from dirt and grease to sunlight to wet or cold conditions. Liveness detection capabilities to eliminate fraud HID Global’s Lumidigm biometrics solutions also feature field-updatable ‘liveness detection’ capabilities that help eliminate fraud by preventing the use of fake fingerprints or ‘spoof’ attacks. The devices use a top-ranked NIST certified MINEX III minutia algorithm for proven interoperability with industry-standard fingerprint template databases. HID will be demonstrating its biometrics solutions at Expo Seguridad Mexico from April 24-26 in Stand #3131 at the Centro CitiBanamex in Mexico City.
Banks and financial institutions have more complex and diverse requirements for video surveillance technology than most other organisations. From corporate buildings, to branch offices, data centres, ATMs and cash depots. Several European Banks benefit from using Mirasys Video Management Software (VMS), which provides high privacy protection and robust technology. Networking the video management system of the bank’s branch offices provides users a single logical system that can be used from any site or from an external service provider's service centre. Hence, VMS services are produced in the most cost-effective way whether it be locally, centrally or outsourced.The unique, non-fragmenting storage file system provided by Mirasys protects against hard disk failure The Mirasys VMS checks the system performance in real time and helps to prevent system failure. Enhanced multi-disk recording minimises data loss and maximises recording continuity. The unique, non-fragmenting storage file system protects against hard disk failure. Benefits to financial sector Perimeter and motion detection monitors sensitive and restricted areas, such us bank vaults or safety deposit boxes, and alerts personnel only if an important event occurs, saving time and operational costs. People counting and other data reporting enables reduction of business inefficiencies and enhances customer service. Advanced alarm management tools enable the creation of specific alarm lists based on the motion, sound or text data triggers; reducing the number of false alarms. Dwell time and stopping detects people loitering at the ATM. Automatic Number Plate Recognition (ANPR) alerts on potential threats and suspicious vehicle movement and reports on car parking utilisation.Automatic Number Plate Recognition (ANPR) alerts on potential threats and suspicious vehicle movement and reports on car parking utilisation Recorded video watermarking guarantees the integrity and authenticity of recorded and exported video data for court evidence. User authentication and setting specific user rights ensures control of system access and protects sensitive data. Also, product features such as audit trail and versatile material management and search functionality support, e.g., the new EU General Data Protection Regulation (GDPR) requirements. The purpose of the audit trail events is both to show what the user has done, and also to track other (programmatic) changes that change the user interface. Key to data security is operational policies for: account security (e.g., personal user accounts, instead of shared accounts, rename default administration accounts, etc.); password security (don't leave systems with default passwords, don't permit too short passwords, use passphrases instead, etc.), and; software and device firmware updating. Mirasys recommends that systems are kept up to date with the latest software versions. In a networked, multi-server or multi-site environment, all Mirasys VMS servers and client applications can be centrally upgraded from the Mirasys management server. Manage easily various event sources in multiple locations with the flexible Mirasys Smart Event Management platform How to protect your surveillance online For deployments, Mirasys recommends that surveillance cameras are installed, when possible, in a private camera network, where the direct camera communications take place only inside the camera network to VMS servers, and is separate from the client access (“viewing”) network (and from the public Internet, in particular). This also prevents the camera streaming and signalling from being forwarded inadvertently to any external systems not part of the VMS solution. In addition, camera access from outside the private network is thus not possible. It is also recommended to protect wide area network links with VPN (Virtual Private Networking), or other secured, connections.Integrated systems such as access control, intruder detection and fire alarm systems serve as sensors for the video management system For server-to-server and client-to-server signalling, the data communication is in Mirasys VMS both compressed and encrypted by default for sensitive data (such as usernames and passwords and other details). Integration and Internet of Things in VMS With larger video management solutions, the integration of different systems is valuable because it allows automated functionalities that eliminate human errors and delays. Integrated systems such as access control, intruder detection and fire alarm systems serve as sensors for the video management system. IoT (Internet of Things) is increasingly applied in the video management. The sensors continuously provide information and, if necessary, based on this information, the predefined decision chains automatically open a video connection to the event place without any delay or error. The resulting snapshot may be one image or a set of several images that supports decision making in a problem situation. All the information is also stored for later processing. The event picture is routed either automatically or manually for people and organisations needing the information. Also, related Standard Operating Procedures can be automatically opened.Mirasys VMS is the answer to the scalability and performance needs of new camera technologies from any manufacturer Mirasys VMS is quick and easy to install, and especially effective in networked, IP-based CCTV systems and their operational and management needs, such as centralised management and upgrading/updating of servers, drivers and client applications without requiring on-site travel to remote locations. User profiles are easy to create and change. Servers can be pre-installed and pre-configured before delivering to the deployment location. Easy-to-use user interface The Mirasys VMS user interface can be adapted to individual and specific needs and preferences and provides more visual space for videos without sacrificing any functionality. A HTML5 (Hypertext Markup Language, Version 5) based user interface in Version 8.4 offers easy access to the Mirasys system from anywhere; PCs, tablets or smartphones. Video surveillance camera features are consistently improving. Image quality can be exceptionally good compared to what it used to be only a few years ago. The newest cameras also require much less network bandwidth due to more effective encoding formats, such as H.265/HEVC (from 40% up to 60% of bandwidth and storage space savings, depending on the footage and device without any loss of quality, or increased quality at the same level with the H.264/AVC encoding) that many IP camera manufacturers have started to support. Individual servers can handle more simultaneously connected cameras than before, and the entire system has no actual upper limit. Mirasys VMS is the answer to the scalability and performance needs of new camera technologies from any manufacturer, and the Mirasys based video management system can be designed freely using the best equipment for the customer-specific requirements and can support also all future needs.
Multitone Electronics plc, a specialist in the design, manufacture and implementation of integrated communication systems, announces that its Mall Call communications system has been chosen by Canary Wharf Group for its retail facilities. Security communication management tool Peter Lomax, Director of Strategic Partnerships at Multitone, commented, “We are delighted that Canary Wharf Group has chosen to use Multitone’s Mall Call solution to manage communications with retail tenants. With over 490 Mall Call Units being installed, more than 300 stores, banks, services and restaurants over five malls will be covered. Mall Call is designed as a dedicated communications tool and is perfect for a busy and extensive large-scale site, from sending service alerts to tackling crime and managing major events.” The flexibility, reliability and security of Mall Call is perfectly suited to the needs of a large retail management team. Peter continued: “The scope of communications requirements at Canary Wharf is vast, from everyday planning messages (such as opening times or maintenance), to dealing with shoplifters or even potentially an emergency and evacuation. Mall Call enables the estate management team to instantly communicate with the security teams and retail tenants when required.” Multitone i-Message platform Lee England at Canary Wharf Shopping also commented, “The Mall Call solution was ideal for our communication needs. The system has scope far beyond that which we are utilising initially and we look forward to the benefits of a long-term partnership with Multitone.” Mall Call uses a robustand seamless touchscreen interface, which can beutilised on any suitable smart device including a smart watch Based upon Multitone’s powerful i-Message platform, Mall Call is designed to provide high levels of communications availability to all relevant teams, with a tailored interface for the bespoke requirements of the specific applications and organisation using it. Mall Call uses a robust and seamless touchscreen interface, which can be utilised on any suitable smart device including a smart watch. The whole system will be hosted on a secure fixed and wireless system at Canary Wharf for full control of communications. Multi-content facility for regular admin updates From a user’s point of view, communications centre around the Mall Call Units, which are tamper-proof, fixed tablet-style devices that fully utilise the multi-content facility of the system and will be installed with each retailer. Along with text information and audible alerts, Mall Call also allows for the sharing of graphics or photo images and documents. This could be used for regular admin updates from the facilities team, warnings on known suspects to identify criminal individuals or to find a lost child or missing person, for example. Peter Lomax concluded, “With Phase One of the project underway, we are working closely with the team at Canary Wharf Group to investigate potential ways of expanding the project in the future. For example, Mall Call can be utilised over multiple sites, which offers further scope for expansion should it be required moving forward.”
Round table discussion
We have all heard the sales pitch: Use of megapixel cameras lowers the camera count needed to provide adequate video coverage, thus making the overall system less expensive. Use of fewer cameras equates to less infrastructure, bandwidth and storage, according to the claims, and megapixel cameras provide enough detail that you don’t miss anything using fewer cameras. It’s a compelling pitch, but one that has sometimes been questioned in the market. To look beyond the marketing hype, we asked our Expert Panel: How effectively can megapixel cameras take the place of multiple standard-resolution cameras? Has the ability of megapixel technology to lower the required camera count been overstated (or oversold) in the market? Some of the answers may surprise you.