Identiv, Inc., a global provider of physical security and secure identification, has secured new agreements with two major customers in the banking vertical. The first new agreement is a three-year software and services agreement with an existing customer that has been using Identiv’s 3VR video and analytics solution for bank branch security, fraud detection and ATM skimming prevention. Expanding recurring revenue base This top 5 U.S. bank customer has contracted with Identiv to provide...
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 article...
It is hard to think of somewhere with more critical security needs than a bank. While cyber-security grabs the headlines, in the day-to-day business of banking, physical security of people and assets is paramount. We’ve all seen the heist movies. Of course, in the real world, bank security is more complex than fitting the biggest titanium door you can find. Buildings, ATM housings and cash-in-transit delivery services all have totally different workflows, but each demands high-security lo...
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent o...
Vanderbilt strives that its products meet the highest approval standards and Vectis iX is no different with UVV Kassen certification. Access to playback can be restricted by requiring two user logins. One of the users must be the 4-eye master in order to playback the video. This feature protects workers’ privacy rights as it ensures they cannot be secretly monitored by their co-workers or superiors in their working environment. A reference picture of an area within the bank (e.g. the ATM...
Broco Rankin is pleased to announce the acquisition of long-time client Chamberlain Security, effective December 31, 2017. Founded in the early 1970's, Chamberlain Security is a manufacturer of high security components designed to protect the contents of safes, filing cabinets and ATMs. Chamberlain Security components are included in many commercial and residential safes as well as government GSA-rated (Government Services Administration) and UL® (Underwriters Laboratory) tested TL-15 and TL...
3xLOGIC, a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, has announced the release of the VIGIL V500 Hybrid. VIGIL V500 Hybrids are fully-integrated intelligent video appliances. Pre-configured with VIGIL Video Management System (VMS) software, this hybrid represents a cost-effective video management platform that provides all the key functionality of VIGIL VMS with unrivalled ease of setup. “Our V500 Hybrid provides the perfect replacement solution for aging analogue DVRs,” said Michael Poe, Product Manager. “By combining an NVR and high-definition analogue DVR in the same chassis, we bring new technology to an old system. The VIGIL V500 NVRs represents a cost-effective video management platform that provides all the key functionality of VIGIL VMS "The legacy DVR can be replaced without requiring replacement of existing cameras. Add IP or HD analogue cameras while replacing the DVR to realise the benefit of high-resolution video while still fully leveraging your existing analogue investment.” HD video streaming to Smart Search Key features and benefits for the new release include: Ready-to-deploy solution The V500 design provides all the network components required to deploy this NVR. Not only are alarm, serial, and audio inputs built in, this hybrid also includes 16 embedded PoE ports for IP devices. The V500 integrates with the full VIGIL suite of products. Remote streaming VIGIL’s exclusive MULTIVIEW Technology and its revolutionary RapidStream video compression engine, enable users to remotely stream and view high-definition video with minimal impact on network bandwidth. View video anywhere using the powerful apps View Lite II and our VIGIL Connect system for simple connectivity. IoT solution for business Leverage the power of business intelligence to monitor the entire business by integrating to a wide variety of data sources including point-of-sale, ATM, access control, alarms, and audio devices. When this data is tied to video and made searchable, users can generate alarms based on specific criteria. The V500 enables retail customers to parlay their existing investment into an IoT solution that brings their retail business into the 21st century. Seamless integration VIGIL V500 Series NVRs feature many built-in capabilities—two-way audio, easy-to-use Smart Search, and seamless integration with VISIX V-Series analytic cameras—providing the information you need, at your fingertips. Easy Setup Wizard Designed for simple setup, the V500 Series includes the Easy Setup Wizard to allow those with no IP video experience to install the NVR and start recording and viewing video. The wizard provides plug-and-play capability with VISIX and ONVIF-S cameras for easy deployment. The new camera line greatly increases surveillance capabilities while requiring none of the additional costs of replacing analogue cabling The V500 also includes VIGIL Connect and 3xLOGIC’s easy-to-use QR code for easy setup and remote viewing. VISIX HD analogue cameras In concert with the V500 release, 3xLOGIC also announces new VISIX HD analogue cameras. A key feature of these HD cameras is they connect with the V500 without the need to replace existing analogue cabling. These cameras offer improved resolution over the traditional analogue cameras they replace. The new camera line greatly increases surveillance capabilities while requiring none of the additional costs often associated with replacing existing cabling or installing an entirely new infrastructure to support an IP camera network. The cameras work with the full suite of VIGIL products just like 3xLOGIC IP cameras. Other features include up to 1080p resolution, HD TVI, AHD, remote focus, IR, wide dynamic range (WDR), and availability in bullet or dome form factors.
Sargent and Greenleaf (S&G), a subsidiary of STANLEY Security and a manufacturer of high security locks and locking systems for safes, vaults and high-security cabinets, has appointed Keith Deaton to Chief Operating Officer. Exceeding business objectives Deaton joined STANLEY Security’s finance team in 2010, and, most recently, served as S&G’s Chief Financial Officer and interim CFO (Canada). In the security industry since 2005, Deaton brings substantial experience to his new role, and will assume the responsibilities previously managed by Brian Leary. As COO, Deaton will provide strategic leadership and day-to-day operational management for Sargent and Greenleaf, guiding the company to exceed its business objectives. “We are proud to welcome Keith into a new role within the S&G executive team,” said Jeremy Morton, President, STANLEY Access Technologies. “His extensive industry knowledge will help to further S&G’s long-standing reputation as a trustworthy and dependable manufacturer of high-security products.” Asset security with developing technology “My years of experience with S&G have primed me to lead this team into the next phase of successes and achievements,” states Deaton. “As technology evolves, S&G will continue to provide products that secure our customers’ most valuable assets.” Deaton graduated from Murray State University before attending the Kelley School of Business at Indiana University, where he graduated with an MBA in Finance and Operations Management.
Biometric technology company Zwipe has announced that it has partnered with Gemalto, a worldwide card manufacturer, to pilot the first battery-less dual-interface fingerprint activated payment card with Bank of Cyprus. 2018 upcoming pilots Gemalto has confirmed multiple upcoming pilots in 2018, with the first of these being with Bank of Cyprus. Commenting on the cooperation, Sylvie Gibert, SVP of Payment Cards at Gemalto said, “We have spent the last 18 months extensively evaluating and confirming the viability of Zwipe’s technology and we are happy that we have now seen great interest from banks all over the world for biometric technology on payment cards, having already identified several issuing banks in multiple regions to participate in the pilot program.” Fingerprint-activated payment cards are seen as the next major market innovation when looking at card-based payments. Consumers will benefit by having a more secure and convenient method of payment that utilises their own fingerprint to authenticate and complete transactions at checkout. The advanced security enabled by biometrics will remove the need for a 4-digit or longer PIN entry as well as allow for the elimination of transaction limits on contactless payments. Payments of the future Commenting on the value of the technology, Kim Humborstad, CEO and founder of Zwipe said, “Many consumers are seeking out ways to avoid having to memorise difficult to remember passwords or PINs. Looking ahead this will be seen as a blast from the past as we continue to integrate the trust of biometrics into payment. Having a more secure method of payment that does not infringe on convenience or consumer privacy is essential. Combining that with the ability to use the card for any type of transaction regardless of amount will make the card top of wallet and top of mind for the consumer.” Referencing the announcement made by Gemalto, this first-of-its-kind card being piloted by Gemalto and Bank of Cyprus is a fingerprint-activated payment card which utilises Zwipe’s unique energy harvesting capacity and biometric engine to enable the authorised user to complete contactless and contact transactions with the card, without the need for battery power. The card works with existing payments infrastructure as standard point-of-sale terminals provide the power necessary to operate. Commenting on this latest cooperation for Zwipe, Kim Humborstad said, "Receiving Gemalto’s support in bringing our technology to market is a big step for our organisation. They have an expansive customer base in every corner of the world and a leading industrialisation capacity and know-how required for such innovative products. We share a common vision about the capabilities and capacity of what Zwipe’s technology can offer to banks and consumers moving forward.”
We probably take critical infrastructure for granted in our day-to-day living. We turn on a tap, flick a switch, or push a button and water, light, and heat are all readily available to us. However, as critical infrastructure are managed by computerised systems this makes them vulnerable to cyberattack. As a direct consequence, this makes us as a society vulnerable too. Imagine if a cyberattack took down the power supply to an entire city without warning? Chaos would ensue. Traffic lights, ATMs and cash registers, fuel pumps, and water pumps, amongst a long list of other things, would cease to operate. The scary thing is, the scenario of a cyberattack on critical infrastructure isn’t far-fetched anymore. Two-factor authentication For example, in 2016 the WannaCry ransomware attack infected over 300,000 computers around the world. Frighteningly, the virus was spread by something as low-tech as an email. Britain’s National Health Services (NHS) was caught up in the attack. As a result, surgeries were cancelled, staff reverted to pen and paper, and only emergency patients could be treated. The most well-known example of a cyberattack on critical infrastructure was the attack on the Ukrainian power grid in December 2015 when 250,000 homes lost power as a result. Accessing the systems controlling the plant’s circuit breakers did not require two-factor authentication, thus providing a security breach for the attackers to exploit with stolen credentials. Physical security has moved from being very simple inputs and outputs, to being always-connected devices Provide best security The rapid gains that technology has made into everyday living has also changed how the security industry operates. In short, physical security has moved from being very simple inputs and outputs, to being always-connected devices. This makes the industry very much part of the IoT world. Of course, this leads to the question - how does physical security protect itself from cyber vulnerabilities? This ethos has changed how Vanderbilt think when designing and developing their own security systems, in particular SPC. FlexC, the company’s communications protocol, was redesigned from the ground up solely with cybersecurity in mind. The protocol has been designed to ensure everything is encrypted, all communications are monitored, and multiple types of attack are considered for defensive purposes to provide the best security possible. Multiple communication paths SPC has built-in protection mechanisms whereby if the system is attacked, it will go into protection mode. The system will remain operational and it will still be able to communicate out, but it will start to shut down elements of itself to protect the system from the attack. While no system is invincible, SPC has been designed so that should an attack penetrate, the system has multiple communication paths available as backup. Therefore, if one server is taken down the system can immediately switch to a backup server and then switch communication paths to bypass the attack and ensure messages still operate successfully. Targeting people opens the door to the ‘weakest link’ possibility that can uncover vulnerabilities such as lack of authentication and encryption Targeting critical infrastructure The most obvious low hanging fruit when targeting critical infrastructure is to target people. Targeting people opens the door to the ‘weakest link’ possibility that can uncover vulnerabilities such as lack of authentication and encryption, and weak password storage that can allow attackers to gain access to systems. Notably, the clear majority of hacks come down to human error whereby weak passwords, or clicking on contaminated email attachments, will expose an organisation’s security. Hackers have also been known to target contractors and simply wait until they go on-site for scheduled maintenance with their infected laptops. Spear-phishing email According to the Kaspersky Lab research, the percentage of industrial computers under attack grew from 17% in July 2016 to more than 24% in December 2016. The top three sources of infection were the internet, USBs, and email attachments. For instance, a spear-phishing email was the technique used in an attack on a German steel mill in 2014. Here, the attackers gained access to the plant’s network through an infected email attachment. The success of these non-complex methods would indicate low levels of awareness about how cyberattacks are carried out. Blocking phishing attacks Technology in day-to-day life might be growing at a rapid rate leading to fears of potential security breaches. But one must remember that technology’s growth also means that security defences are developing in parallel. At its core, security is about being continuously observant, following best practices, and being ready and able to react against a security issue. Unfortunately, in a survey of nearly 600 utility, energy, and manufacturing organizations, only half of the companies had a dedicated IT security program. A hacker waits an average of 146 days from having penetrated a system before they strike Email controls assist in blocking phishing attacks that can bypass spam filters. While regular compromise assessments will check to see if an attacker is already in the system. Currently, a hacker waits an average of 146 days from having penetrated a system before they strike. Therefore, regular assessments give the opportunity to root out penetrations before they strike. Following best practices However, one of the most obvious places to start is to choose equipment from reliable suppliers that have a knowledge and interest in cybersecurity and are focused on protecting your data. When your security system is designed from the ground up to protect against cyberattacks, naturally your organisation will be in a much better place. So how do we best protect against the darker side of an increasingly connected world? By being open and transparent in exposing and reporting vulnerabilities. The best way to avoid attacks is to keep systems up-to-date, change passwords regularly, provide employee training and be diligent in safeguarding facilities through firewalls and following best practices in network maintenance. Keeping up with security updates allows us to make the most of the new technologies available today and into the future.
March Networks, a global provider of intelligent IP video solutions, announced the results of an independent survey exploring how fraud, customer service and security perceptions are impacting U.S. banking consumer decisions. Key results from the survey, commissioned by March Networks and conducted by leading market research firm Ipsos earlier this year, reveal that 15% of consumers experienced fraudulent bank account activity in 2016. Banks and credit unions responded successfully, however, with 85% of those consumers saying they were satisfied with how their financial institution handled the incident. Security influence on banking decisions Survey results also show that a continued focus on customer experience remains critical for banks and credit unions when it comes to retention, with 1 in 5 respondents (and a higher 1 in 4 Millennials) confirming they have switched banks in the past because of poor in-branch service. In addition, banking choices are influenced by how secure consumers feel when conducting transactions, either in their local branch, at an ATM or online. A majority of consumers (98%) felt most secure when conducting transactions at their local banking branch, compared with 92% when conducting transactions online and 85% using a mobile phone app. Further, 90% of consumers said they feel safer when they can see video surveillance cameras in their bank or credit union, and would choose a financial institution with surveillance over one without, all other things being equal. Key findings from the survey: Nearly half of consumers said waiting more than 5 minutes for service is unreasonable While poor customer service was the top reason consumers switched to a new bank, other drivers included the branch nearest them closing (14%), fraudulent bank account activity (9%) and safety concerns (9%) Half of consumers walked away from an ATM without conducting their intended transaction because someone was loitering in the vestibule 90% of consumers think that visible surveillance cameras help deter crimes 60% of consumers noticed a fraudulent transaction before their financial institution, leaving plenty of opportunity for banks and credit unions to be more proactive when it comes to identifying and notifying customers about potential fraud Intelligent video solutions “Banks and credit unions recognise that today’s consumers want a mix of in-person and online banking service options, and have very high expectations when it comes to security and customer service,” said Peter Strom, President and CEO, March Networks. “The positive takeaway from this survey is that financial institutions are meeting these expectations at present, however will need to get even more strategic to retain customers and attract new business in their extremely competitive environment.” For nearly two decades, March Networks’ intelligent video solutions have helped many of the world’s leading banks and credit unions address real-world business challenges efficiently and cost-effectively. More than 500 financial institutions rely on the company’s solutions to enhance security in their banking branches, corporate facilities and at ATMs; proactively identify and reduce losses from theft and fraud; and improve operations and corporate policy compliance. Using March Networks’ video-based business intelligence software, which integrates video with transaction data and analytics, financial institutions are also realising significant improvements in customer service, workforce management and operations.
Now in its 4th year The Commercial UAV Show has released the full conference agenda which includes contributions from NASA, BP and the UK Ministry of Defence. Marcus Johnson, Research Aerospace Engineer, Aviation Systems Division, at the NASA Ames Research Center is discussing developing an autonomous ATM system and defining the future of the drone industry. Joe Little, Technology Principal, at BP plc is giving a snapshot view into how UAVs have revolutionised the oil industry. Al Cunningham, Project Engineer for Watchkeeper Unmanned Air System, at the UK Ministry of Defence is offering insights into building the case for the safe use of UAS in international airspace. The Commercial UAV Show is two events: a world-class conference focused on the progression of the UAV industry; and, a technology exhibition showcasing the latest hardware and software innovations from the mega tech companies to the latest start-ups. The Show takes place 15-16 November at the ExCel in London.
Organisations across the world face a new risk paradigm: one that encompasses cyber and physical threats. We’ve heard the stories associated with ATM skimming, identity theft, data breaches, scams, and phishing. Large financial services organisations are often the victim of hackers looking to steal corporate information and transactional data or funds, and criminals continue to become more sophisticated in their approach. Growth in cyber-attacks Additionally, cyber-threats have taken a front seat in the line-up of primary risks facing financial institutions today. And it is no surprise why: according to Cybersecurity Ventures, the amount of money taken in cyber heists, both in banking and elsewhere, was estimated at $3 trillion overall for 2015, and this substantial amount is expected to double by 2021. Cyber-attacks are becoming more prevalent, more complex and harder to address The fact that cyber-attacks are becoming more prevalent isn't the only issue; they're also becoming more complex and therefore harder to address. And although the convenient interconnectivity of the Internet of Things (IoT) creates many advantages for financial institutions, with that also comes an increased risk to dangerous threats. In today’s environment, banks, credit unions, and financial organisations of all types are primary targets for hackers. But it’s not just the monetary loss that these businesses need to be concerned about — there is also a threat to the brand, customer trust, and employee safety. All of these challenges and complexities open the door to new conversations and risks. Here are the top five critical questions today’s bank leaders need to be ready to answer. Should we collaborate to mitigate these threats effectively? Over the last decade, the emergence of the Internet of Things (IoT) and a demand for more mobile capabilities has changed the way people and businesses connect. But as the need for connectivity increases, so too does the need for increased security for physical assets, networks, and valuable corporate data. As a result, a dialogue between IT and physical security is necessary to help leaders gain a greater knowledge of how to best collaborate to ensure complete protection. Leaders must communicate closely to drive strategies that help identify vulnerabilities in a more proactive manner. The result of these conversations: a truly comprehensive approach to security intelligence. It’s not just the monetary loss that banks need to be concerned about – there is also a threat to customer trust and employee safety How can I pinpoint the important data for addressing cyber threats? To maintain a high level of security and ensure business continuity around the globe, companies seek solutions that help predict and identify threats in real time. But often, there are too many alerts generated by too many systems, and none of this raw data is actionable. Linking cyber and physical security together transforms alerts into actionable intelligence, which helps users connect the pieces of any situation and present a unified risk scenario to the appropriate analysts and operators. By capturing and analysing data in real time, enterprise organisations gain a visual representation of risks across the business while accessing information related to the most critical events happening at any given time. Not only does this unified process enable a higher and more proactive level of protection, but it also helps facilitate a plan of action based within a common, unified security operations centre. How can I inform of the importance of cybersecurity? Security leaders in banks need to feel prepared by staying updated, looking at common vulnerabilities, understanding the malware and challenges, and testing the environment. And collaboration is key to mitigation: Traditional security and fraud teams must work in conjunction with cyber teams to effectively handle all aspects of a cyber-attack. Additionally, CISOs need to “sell” cybersecurity to CEOs and the board by outlining the importance of protection through emphasising the impact of a potential cyber-attack on the business. Ensure you can verbally address the most critical risks to your senior leadership, including recent botnets, scams, and cyber gangs, to receive the support, and budget you need to address these threats head on. Is my system secure? It is critical that you are knowledgeable about the steps you can take to protect your security and network infrastructure from cyber-attacks. A firewall is useful to prevent hackers from accessing critical data on internal networks and computers Changing default passwords should be a first step, as some scams target devices with hard-coded factory defaults. Ensure software and firmware is up to date because updates often include fixes for potential vulnerabilities. These updates keep your devices and network more secure and increase overall system uptime. A firewall is useful to prevent hackers and unauthorised programs from accessing the critical business information and resources on internal networks and computers. Also, minimise potential risk by closing network ports and disabling services you don’t need. With all of these instances, it is best to work closely with your integrator partner and chosen vendor to ensure that your system is as secure as it can possibly be. What solutions are best to help mitigate risks? Technology is a great force multiplier. Security — both cyber and physical solutions — helps secure an entire branch footprint, alleviates risk, ensures operational compliance, and improves fraud investigations. Video surveillance systems, analytics, threat management platforms and more can provide organisations with intelligence and unprecedented protection from fraud, all while enhancing the customer experience. Overall, there are significant benefits to collaborating to gain comprehensive risk intelligence. By bringing various leaders, departments, technologies and strategies together, we can more effectively identify threats, develop trends and quickly access important data to ensure security and safety goals are realised.
The global market for security as a service is set to grow from $921 million in 2016 to $1.49 billion by 2020 The global security as a service market is made up of video surveillance as a service (VSaaS) and access control as a service (ACaaS). With video surveillance as a service, the user pays on a yearly, quarterly or monthly basis for the ability to view live or recorded surveillance data. Using access control as a service, the customer pays a subscription to have a server which manages the access control system. The global market for security as a service is set to grow from $921 million in 2016 to $1.49 billion by 2020, according to a new report. Market research company Technavio says the market for security as a service will grow by a compound annual growth rate of 12.7% a year during the period 2016-2020. Currently, according to its new report ‘Global Security as a Service Market 2016-2020’, the Americas is by far the largest region showing 2016 revenues at $595 million; with Asia-Pacific at $142 million; and Europe, Middle East and Africa at $185 million. “The increasing need for high-level data and identity security in corporate firms, coupled with an increasing amount of critical and confidential data, is compelling large enterprises and SMEs to implement ACaaS,” explains Technavio analyst Amrita Choudhury. “The increased use of mobile devices for professional and personal use makes the devices vulnerable to attacks. Enterprises are adopting ACaaS for greater control over access to applications and sensitive information from remote locations.” Fighting retail shrinkage with VSaaS Choudhury says the market is split into three end-user segments – commercial, government, and residential. The commercial sector is the largest, accounting for around 56% of the market. Within this sector, retail firms are the biggest users of security as a service, as many already have in place video surveillance, electronic article surveillance and radio frequency identification systems. Increasing retail shrinkage will encourage more retailers to adopt effective strategies such as the installation of advanced surveillance systems to enhance their security Retail shrinkage in the US rose from around 1.27% of sales in 2013-2014 to over 1.96% of sales during 2014-2015. Shoplifting was the biggest cause of retail shrinkage in most countries in 2015. Since users in the retail sector need to have significant space for video storage and tamper-proof or tamper-evident systems, it is not surprising that they are major potential users of security as a service. Increasing retail shrinkage will encourage more retailers to adopt effective strategies such as the installation of advanced surveillance systems to enhance their security solutions. These are increasingly using high resolution cameras which are bandwidth hungry and more expensive than conventional surveillance cameras. Similarly, the financial sector is a big user of security systems such as surveillance in banks and at ATMs. US to dominate international markets In the United States, the increasing demand for real-time identification of threats and transmitting information to law enforcement officials is driving the adoption of advanced security systems in the region. Analysts estimate that the Americas will account for more than 64% of the total revenue share of the market by 2020 and will also dominate the market throughout the forecast period. “From criminal activity to predictive analytics and marketing, organisations in the public as well as the private sector are benefitting from video surveillance,” says Choudhury. “The accuracy of the video surveillance technology has completely changed the way criminal cases are being tried. End-users are becoming aware about the benefits of video surveillance that provide a good amount of information to help manage, monitor and resolve some of the critical situations.” Suppliers of video products and solutions are also upbeat about video surveillance as a service. “The two main advantages of VSaaS for the customer are function and finance,” says Xander van Baarsen, Marketing Manager for Panasonic Cloud Management Service Europe. “VSaaS comes with low start-up costs and low recurring costs, making it easy to start and easy to scale. Because of constant development, the customer is never out of date: every month comes with new features, bug fixes and application updates.” One brake on the rapid growth of video surveillance as a service is the cost of providing a hosted video service Measured growth for VSaaS But despite the optimism, van Baarsen sounds a note of caution. “VSaaS hasn't yet shown a rapid growth but it has been proven to have both functional [and] financial advantages compared to traditional systems. In the coming years, we expect to see growth for VSaaS in the SME and SOHO markets. With upcoming features like improved, user-friendly software and cameras that connect not only over Wi-Fi but also via mobile networks, we predict the VSaaS market will grow beyond the traditional [user markets].” Panasonic offers several VSaaS products, such as Cameramanager, a cloud-based surveillance solution which comes with desktop and mobile applications, as well as a range of indoor and outdoor cameras. The Cameramanager video stream is available as an API, so it can be integrated into range of solutions. In addition, the recently launched Nubo – claimed to be the world’s first monitoring camera that connects over 4G – opens the market to areas which may be isolated or outside Wi-Fi locations. Meanwhile Bosch Security Systems, which offers a range of remote video services for central monitoring stations, says with its cloud-based monitoring services, central monitoring stations can prevent damage, verify intruder alarms, increase the safety of employees and support business processes – all remotely. "VSaaS hasn't yet shown rapidgrowth but has been proven tohave both functional andfinancial advantages comparedto traditional systems" “The central monitoring station does not have to invest in an expensive video platform to do remote video monitoring,” says Bosch’s Head of Cloud-based Services Michael Gürtner, “and due to the seamless integration of our solution in the existing alarm automation platform, the CMS can operate the video services very efficiently. Customers benefit from less hardware costs and less installation time compared with traditional on-site surveillance, since no DVR and no VPN is needed. The camera connects directly and securely to the cloud and can be configured remotely.”Barriers to expansion So are there any barriers to the rapid deployment of security as a service around the world? While the security systems market is becoming increasingly global, expanding business across Europe is still problematic, due to the “complex and restrictive nature of security product certification” in these countries, according to Technavio’s Amrita Choudhury. “Manufacturers are facing uncertainty regarding the standards against which the security solutions should be developed,tested, and certified.” Another brake on the rapid growth of video surveillance as a service is the cost of providing a hosted video service. Another is the nature of broadband connections – many are asymmetric, meaning that the upload speed is often much lower than the download speed. India is one of the fastest growing markets in the region, with Indian organisations using on average around 250 cameras per installation. The surveillance market in India is expected to grow at a rapid pace because of the country's focus on developing smart cities and the increasing need for better security and safety. “The primary reason for the growth of the region's market is the emergence of many SMEs, which are rapidly adopting video surveillance devices. The region is also predicted to adopt new technologies such as cloud-based services.” Save Save
It is more complicated to search through video compared to text-based data Since the launch of Google’s search engine in 1998, Internet search has grown and expanded from desktops to mobile devices, generating over 3.5 billion searches of text, images and videos per day. One likely reason for this popularity is the search engine’s ability to immediately produce relevant results based on search criteria. The security industry, in contrast, has not always taken advantage of such innovations in search. The right search technology exists to help loss prevention and fraud investigators find security video evidence of criminal activity. Yet today, most investigators are watching endless hours of video instead of leveraging specific criteria to pinpoint the moment an event of interest occurs. Why can’t security video search perform like Google? Challenges with searching relevant video footages Consider a large bank with locations around the globe and 150,000 cameras monitoring these locations. With just one hour of recorded video per day per camera, the bank is generating over 50 million hours of video per year. Yet the fraud team staff is comprised of only 10 full time reviewers. With 2000 work hours per year, this team is only capable of reviewing 20,000 hours of video per year, or just .04 percent of what is being captured. This example illustrates a common problem in security today. Most investigators conduct linear timeline searches, meaning they either watch live feeds of specific cameras or recorded video from a specific day when an event occurred. This often requires downloading the entire day’s video from a central storage server and then watching countless hours of video to find events of interest. As in the global bank example, there is simply too much video to watch for this approach to be successful. Not to mention the toll this can take on the corporate network, with bandwidth heavy video downloads interfering with critical application performance. "Businesses can leverage videodata to learn about customerbehaviour, improve operationsand enhance other importantdata sources" Although video is the fastest growing type of big data today, it is more complicated to search video compared to text-based data. Keywords and descriptions of videos must be either automated or entered manually in contrast to text-based data that inherently includes keywords. Visual data such as video is complex, with layers of information and context about how people behave and interact. Software can deliver an unbiased analysis of this behaviour whereas humans will naturally insert bias when searching and viewing video. All of these factors make it more challenging to efficiently search video footage. VMS for effective and efficient video search Today’s explosive growth in the amount of video data is driving demand for more effective and efficient video search. Recent advances in video management systems (VMS) are now making it possible to leverage surveillance video data for both loss and fraud prevention, as well customer insights, such as in-store buying habits and trends. Leading VMS solutions include the basic store and record functionality plus a plug-in framework for analytics, enterprise search and case management, all in one system. A more effective search capability allows investigators to quickly search vast volumes of video and find relevant evidence in minutes by using specific criteria such as facial surveillance, license plate recognition and object tracking analytics. Many VMS products also include context integrations that can correlate video footage with Access Control, ATM or POS transaction data. Leading businesses are now taking advantage of this same technology to analyse video data to better understand customer behaviour and operational metrics. Analytics such as people counting, dwell patterns, demographics and directional heat maps can be used to improve the customer experience, optimise staffing levels, increase conversion rates and analyse performance across locations. Forensic search capability In one example, a commercial parking firm had been relying on cameras recording the number of cars parked in their facilities to ensure this matched the tickets issued at the entry gate. Even with this video recorded, employees were still required to walk the garages every night to manually record every car by colour and license plate to accurately charge those cars that were left overnight. Once the facility switched to a newer VMS that included a more efficient search capability and license plate recognition analytic, the system was able to automatically capture all license plates that entered the garage. So if a customer loses their ticket, they can simply provide their license plate number so customer service reps can run a search and verify how long the car has been in the lot. This enables the company to accurately charge customers, preserve revenue, and save countless employee hours of walking the garages every night. A more effective search capability allows investigators to quickly search vast volumes of video and find relevant evidence in minutes This type of forensic search capability has also helped to reduce employee theft and shoplifting investigation times for a major retailer. The company had a team of five loss prevention managers working at maximum capacity to investigate activity at over 1200 stores. By implementing a more effective video search solution, they were able to reduce investigation times from one week to 20 minutes and reduce shrink by 60%. The newer VMS solutions are also so cost effective that this company achieved a return on investment in less than 10 months. Simplifying business administration via analytics In addition to improvements in security, businesses can leverage this same video data to learn about customer behaviour, improve operations and enhance other important data sources such as POS or ATM and teller transaction data. Retail stores are leveraging video analytics to more accurately measure in-store traffic, analyse associated traffic patterns (including demographics) and conversion rates to improve product placement and compare store performance across locations. Queue management analytics can help businesses improve store operations with more efficient staff planning. Merchandising management can also benefit from a better understanding of accurate conversions based upon day and time to manage inventories and product placement. For businesses that are ready to consider an upgrade to their security and surveillance system, and take advantage of these new capabilities to improve loss investigations and better understand customer behaviour, be sure to evaluate different solutions using the following VMS checklist: Handle the basics of store and record Deliver LP and BI leveraging one platform Enterprise scale and capabilities Analytics and context integration platform Advanced search architecture Multiple deployment options (hardware, software, on-premise, cloud) Easily configured and administered By choosing a VMS that meets these criteria, businesses can experience video search that parallels the Google experience.
Add March Networks to the growing list of companies in the physical security market that are addressing the possibility of cyber-threats. Cybersecurity is especially relevant to two of March Networks’ primary vertical markets – banking, whose focus on money requires stringent cybersecurity; and retail, which has been the target of recent cybersecurity attacks. “People just don’t know what to do with cybersecurity,” says Dan Cremins, Global Leader, Product Management at March Networks. “The thing is, you have to figure out how to make your products, solutions and networks more secure, and then let them know what you are doing about it.” Cybersecurity mobile app As the profile of cybersecurity has increased in the physical security market, March Networks has added cybersecurity features to its GURU app. GURU is a mobile app for integrators to use when installing and diagnosing equipment in the field. Using a wireless dongle, the system can read the QR (Quick Response) code on a camera, for example, and provide installation information specific to that camera. As the profile of cybersecurityhas increased in the physicalsecurity market, March Networkshas added cybersecurity featuresto GURU GURU’s new Security Audit tool enables the app to scan a unit and check to make sure it is cybersecure; that is, the right ports have been closed and default passwords have been changed. Simple green, yellow and red coding communicates the cybersecurity status of equipment as it is being installed – and it takes less than five minutes. After installation, the GURU app can be used to conduct an extra check to ensure cybersecurity. There is also a section on the March Networks web site identifying security vulnerabilities (listed by CVE [Common Vulnerabilities and Exposures] number), explaining whether they affect March Networks equipment, and the availability of any patches. “Cybersecurity is the number one threat to any industry, including ours,” says Cremins. “We offer a tool to help people address it. We are trying to be as proactive as possible, and stay ahead of it.” Integrating inventory tracking & video There are other developments at March Networks, too, including a new integration partner in the retail sector. Tracking inventory is critical to retail loss management, and March Networks has integrated its video system with the Zebra RFID system for inventory tracking. Zebra uses radio frequency identification (RFID). Asset tags are used in combination with sensors mounted throughout a facility to keep track of where goods are transported in a retail store, warehouse or other location. If something goes missing,video of that item, tied to trackinginformation from the RFID system,is available instantly to aid withan investigation The Zebra RFID system generates inventory tracking information that is integrated with March Networks video in much the same way that point-of-sale (POS) information has been used with video. Information from inventory tracking is associated directly with each frame of video. The integration allows video cameras to watch equipment as it moves around a warehouse or retail space. If something goes missing, video of that item, tied to tracking information from the RFID system, is available instantly to aid with an investigation. In addition to retail, there are also applications of RFID inventory tracking in medical environments, where expensive equipment is used throughout a hospital, for example. Integration of video with inventory control would allow video cameras to watch medical equipment as it travels from floor to floor and room to room. Video provides a valuable investigation tool if a medical device goes missing. “They can review the video to see where it was and see what happened with it,” says Cremins. HDR cameras for banking applications At the recent ASIS show in Orlando, March Networks introduced the new ME4 series of multi-exposure, 4 megapixel cameras. The cameras are aimed at improving video image performance in situations with varied light, such as a glass-enclosed ATM enclosure, bank branch, or a retail location where bright windows can cause backlighting and other problems. In addition to better image quality and resolution, the cameras have been designed very economically, says Cremins. They strike a balance between video clarity and bandwidth and storage efficiency. The cameras use HDR (high dynamic range) technology designed for the most extreme lighting conditions. Even in an environment surrounded completely by glass, the cameras can still see the person in the foreground and details in the background. Facial details are critical in applications at banks and financial institutions.
Amid all the discussion of security integration and end-to-end solutions on the first day of IFSEC 2016 was an undercurrent of uncertainty. The international trade show opened at ExCel London just days before the historic "Brexit" vote, when Britons will decide whether to remain a part of the European union or to exit the politico-economic fusion of 28 member states. With the Brexit referendum this week, the polls are neck-and-neck, so the vote could go either way, hence the uncertainty. If "leave" wins the vote, what might it mean for business, including the security and video surveillance companies exhibiting at IFSEC? Brexit implications on security market For example, if Great Britain leaves the EU, might it increase costs of goods flowing throughout the larger European market? Would a distributor in Germany face new costs and/or more complex processes when sending equipment to Britain? EU laws would still apply during a two-year negotiation period if the UK votes to leave. Therefore, changes are unlikely to be immediate; however, long-term uncertainty can be bad for any market, whether it's the stock market, the currency market, or the security market. "Once you exit the EU, there may be different rules related to larger contracts," says Ivo Drent, Arecont Vision's Vice President of European Sales. "Suddenly a UK company quoting jobs in the EU will face a different climate." Manufacturers from other countries, including the Asia-Pacific (APAC) region, would eventually need to renegotiate export contracts with the newly independent United Kingdom. Given a skilled labour shortage in the UK integrator market, might a "leave" vote also complicate the ability of companies to recruit candidates from neighbouring countries, and thus aggravate the problem? Dominant security themes at IFSEC Although Brexit was a topic of discussion at several IFSEC stands, there were plenty of other aspects of the security market to consider, too. Manufacturers here are enthusiastic and quick to tout their new products, although many of them were shown previously in the United States last spring at ISC West. However, they're new to the international visitors to IFSEC. Also, the themes of integration, end-to-end systems, and technology partnerships dominated discussions. New products at IFSEC 2016 If "leave" wins the vote, what might it mean for business, including the security and video surveillance companies exhibiting at IFSEC? Arecont Vision was among the companies introducing actual new products here, including the new SurroundVideo Omni Mini IP Dome Camera, a 2-, 6- or 10-megapixel all-in-one camera with two sensors that are remotely user-configurable and provide true day/night video suitable for indoor/outdoor use. The low-profile camera is useful in schools, retail and banking (ATM) applications. Its small size makes it less noticeable and unobtrusive, even in environments that are sensitive to aesthetics. It replicates many of the benefits of Arecont Vision's four-sensor SurroundVideo cameras in a smaller form factor and at lower cost. "It can replace multiple single-sensor cameras or pan-tilt-zooms (PTZs), and give coverage exactly where you want it," says Jeff Whitney, VP Marketing, Arecont Vision. "If you cover a wide area, you never lose situational awareness." An emphasis on solutions rather than single products is another theme you hear repeatedly this year at IFSEC. For example, the sensor company Optex is promoting its REDSCAN mini RLS-2020I, an indoor laser scan detector that provides a 20x20-meter vertical or horizontal detection area, as an adjunct to video analytics. The sensor helps to protect assets and equipment by creating an invisible laser wall that detects any intrusion. Combined with a video analytics system, the hardware can increase reliability and eliminate false alarms. Leveraging the two technologies creates a result that is greater than the sum of the parts. A demonstration at the stand involves a display of drink glasses and spirits (as might be seen at a bar after closing). A "laser wall" protects the display: Anyone who tries to touch a glass triggers an alarm. The alarm trigger is faster and more accurate than a video analytics approach - there is no delay as pixels are processed. The detection zone can be divided into four sections, with each linked to a PTZ preset that directs camera coverage where it is needed. Technology partnerships Technology partnerships are also making news. Milestone opened the show with a press conference announcing an agreement with Dell to introduce a range of "plug and play" solutions for the surveillance market. The solutions can support 8, 16, 26 and 48 cameras and come complete with Milestone Xprotect and Microsoft Embedded licenses. There will be more to see on the second day of the show, and possibly more Brexit discussion, too. The vote is on Thursday, the last day of the show.
Product innovation may have slowed in the security market in the second half of the year. On the first day of the ASIS International Show in Anaheim, California, new product introductions seemed few and far between. In fact, most manufacturers were touting small improvements to the products they announced in the spring. Some emphasised that the products unveiled (or “previewed”) in the spring are now fully ready to be shipped. ASIS has historically been more an end user show than an integrator show, although several exhibitors noted that they are being visited by both integrators and end users. Grumbling about low attendance was common on the first day, especially booths located at the back of the hall, who were still waiting patiently late in the day for visitors to “filter through.” Without a lot of product news, the emphasis is on expanded service offerings aimed at making life easier for integrators and to improve total cost of ownership (TCO) for end users. Without a lot of product news, the emphasis is on expanded service offerings aimed at making life easier for integrators and to improve total cost of ownership (TCO) for end users QR codes for enhanced customer service There were plenty of examples of innovative approaches. For example, a QR (“quick response”) code on March Networks’ products can be scanned to provide information on the model (serial number, etc.), and also to set up an express RMA (return merchandise authorisation). The QR code also triggers a diagnostic programme that can troubleshoot a product based on which LED lights are aglow, for example, and whether they are green or red. Addition of a WiFi dongle can even allow simple remote programming of a network video recorder (NVR). Use of QR codes is part of March Networks’ emphasis on providing additional serviceability to integrators and even end users -- including its Guru smartphone app to provide service functions and in-field diagnostic support. The idea is to save integrators the cost of “rolling a truck” if possible and/or to get the integrator in and out as fast as possible. HDR imaging for ATM security On the product side, March Networks is introducing the MegaPX ATM Camera that incorporates high dynamic range (HDR), a next generation technology that samples the lightest and darkest areas and balances lighting to get the best image. It offers better performance than wide dynamic range (WDR). The new ATM camera has a compact design, robust mounting brackets and doesn’t have a tether like some cameras use to connect the lens with the imager and processor. Opening the door to the ATM frequently for service can strain the tether and cause damage to the camera -- the new self-contained model doesn’t have that problem. Adding value with online training Training is another way to add value, and Milestone is emphasising its Learning and Performance Program, the new name for the Milestone Knowledge Program. The idea is to help the reseller channel with a brand new certification program and expanded training offerings. “We want to build expertise in our channel,” says Greg Willmarth, Milestone’s manager, instructional design. “It’s not just about products, but knowledge and how to apply that knowledge. The longer an install takes, the less profit there is, and we really want to help them develop their teams to be technical superstars.” In addition to reseller training, Milestone now offers e-learning for the end user community, including a programme called “Getting Started with the XProtect Smart Client” -- available for free on a flash drive that can be plugged into a laptop. Given that there is a lot of turnover among end user employees who are tasked with operating the system, the e-learning tool quickly teaches the basics of interacting with XProtect -- how to navigate, how to export video, etc. "We want to build expertise in ourchannel. It’s not just about products,but knowledge and how to apply thatknowledge. The longer an install takes,the less profit there is, and we reallywant to help them develop their teamsto be technical superstars", says GregWillmarth, Milestone’s manager,instructional design Customer is supreme for Vanderbilt Vanderbilt is another company that emphasises customer relationships over product sales. Their approach is to maintain a relationship directly with end user customers as well as with integrators. “We came up through the integration world,” says Mitchell Kane, Vanderbilt’s president. “It’s in our DNA. It’s how we go to market. We give them attention and it’s appreciated. The end users we serve have a personal connection.” “We’re a customer service organisation,” he adds. “We also happen to manufacture products. It’s all about customer support.” On the product side, I saw an interesting product today at the Comnet booth. It’ a 1 gigabits-per-second Free Space Optical link for wireless data transmission over distances up to a mile (1.5 kilometres). Suitable for video signal backhaul type applications, the four integrated LASER transmitters provide low latency and high security to enable the units to provide a true alternative to fibere optics. There are no licensing requirements on a global basis for the full duplex Ethernet channel. More tomorrow on the second day of the show...
March Networks, a global provider of video security and video-based business intelligence, is pleased to announce that one of Qatar’s top banks is deploying the company’s business intelligence software and integrated analytics to improve customer service and operations. The customer is one of six Qatari financial institutions currently using March Networks systems for advanced video surveillance and fraud prevention. The bank is already using an end-to-end March Networks video recording and management solution in all of its Qatari retail banking branches, hundreds of ATMs, and multiple corporate facilities. It is expanding that solution with Searchlight for Banking software to deliver an enhanced customer experience and strengthen its fraud investigation capabilities. Detecting suspicious transactions The software helps banks evaluate and improve customer service using dwell time, queue length and people counting analyticsMarch Networks Searchlight for Banking combines surveillance video with ATM/teller transaction data and analytics to deliver powerful fraud-fighting tools, such as the ability to rapidly detect suspicious transactions and potential cases of ATM skimming. The software also helps banks evaluate and improve customer service using dwell time, queue length and people counting analytics. The bank started using March Networks several years ago to ensure compliance with CCTV legislation first introduced by the Qatari Ministry of Interior (MOI) in 2011. The law mandates that all banks equip their locations with IP video surveillance, record at a minimum 3-megapixel resolution and 20 frames per second, and ensure 120 days of video storage. The bank, which was using an analogue video surveillance system at the time, needed an enterprise-class video solution that could meet the MOI regulation. It was also looking for a solution that offered remote video management, system health monitoring, and the ability to scale easily to accommodate future growth. Command Enterprise video management software March Networks products have proven highly reliable and are able to meet the parameters set by the Qatar Ministry of Interior regulations"When the project went to tender, only the March Networks solution performed to all of the bank’s criteria, said its group safety and security manager. “With the March Networks system, we are able to fully comply with the law. The usability and health monitoring features of the Command Enterprise video management software are also excellent, enabling us to investigate and resolve potential system issues before they become critical.” According to ISC Group Gulf, a systems integrator in Qatar with a specialised focus and expertise in the banking sector, the March Networks solution is the best choice for banks in the region. “March Networks products have proven highly reliable and are able to meet – and often exceed – the parameters set by the Qatar Ministry of Interior regulations, as our organisation has seen in our work with most of the country’s major financial brands,” said Cristian Ivan Nicolae, Project Manager, ISC Group Gulf. CCTV products for banking environments We are fortunate to be working with ISC Group Gulf, a systems integrator with a deep understanding of the video requirements of Qatari banks"“In addition, March Networks offers the sole CCTV products in Qatar purpose-built for banking environments, which means you are getting a secure, highly-professional solution that is easy to scale in complexity.” “We are proud of our long-standing partnership with this Qatari bank. It is a leader in the use of innovative video technologies, and clearly understands the value intelligent video offers to its organisation,” said Trevor Sinden, Director, Middle East and Africa Sales, March Networks. “We are also fortunate to be working with ISC Group Gulf, a systems integrator with a deep understanding of the video requirements of Qatari banks.” March Networks will showcase its security and business intelligence solution for banks, as well as its complete enterprise video portfolio, in Stand S1-J42 at Intersec 2019, January 20-22 in Dubai, UAE.
HID Global, a global provider of trusted identity solutions, is driving biometrics adoption throughout Latin America, and especially in Mexico, ahead of the October 2018 deadline set by the country’s National Banking and Security Commission (CNBV) to deploy fingerprint identification technology across financial institutions. “Banks, government services agencies and commercial entities in Latin America have embraced our biometrics solutions over the past decade because of their speed, accuracy, reliability and fraud-fighting capabilities,” said Greg Sarrail, Vice President of Global Sales, Extended Access Technologies, Biometrics with HID Global. “Now we are helping to extend these benefits across Mexico’s banking infrastructure as part of a major initiative to curb identity theft.” HID’s multispectral fingerprint devices have helped eliminate fraud in Mexico’s national vaccination program and other healthcare initiatives Enhancing the security of ATMs HID Global’s Lumidigm biometrics sensors with multispectral imaging technology are currently used in Latin America’s retail banks, financial institutions and government agencies to create a more convenient customer experience while increasing the security of ATM and other transactions. More than 115,000 multispectral fingerprint sensors are deployed in Brazil to protect billions of ATM transactions per year, with nearly 80 percent of the nation’s ATMs used by over 85 million banking customers. Financial institutions in Chile and Argentina have embraced HID’s technology to secure pension payments for over one million elderly citizens. HID’s multispectral fingerprint devices have helped eliminate fraud in Mexico’s national vaccination program and other healthcare initiatives that provide millions of underprivileged citizens with subsidies for medicine and medical care. Most reliable fingerprint capture technology The company’s biometrics sensors are also used extensively in commercial applications in Mexico, including verifying identity for more than 70,000 members of a large fitness club franchise. Now, the same technology is poised to improve banking security and convenience in Mexico as the CNVB gets closer to the October 2018 deadline for financial institutions to verify their customers’ identity using fingerprint biometrics when creating accounts, applying for loans and conducting other transactions. HID’s patented multispectral fingerprint imaging technology captures unique characteristics from both the surface and subsurface of the skin HID’s patented multispectral fingerprint imaging technology captures unique characteristics from both the surface and subsurface of the skin, providing the most reliable fingerprint capture technology available. Multispectral fingerprinting works for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions--from dirt and grease to sunlight to wet or cold conditions. Liveness detection capabilities to eliminate fraud HID Global’s Lumidigm biometrics solutions also feature field-updatable ‘liveness detection’ capabilities that help eliminate fraud by preventing the use of fake fingerprints or ‘spoof’ attacks. The devices use a top-ranked NIST certified MINEX III minutia algorithm for proven interoperability with industry-standard fingerprint template databases. HID will be demonstrating its biometrics solutions at Expo Seguridad Mexico from April 24-26 in Stand #3131 at the Centro CitiBanamex in Mexico City.
Banks and financial institutions have more complex and diverse requirements for video surveillance technology than most other organisations. From corporate buildings, to branch offices, data centres, ATMs and cash depots. Several European Banks benefit from using Mirasys Video Management Software (VMS), which provides high privacy protection and robust technology. Networking the video management system of the bank’s branch offices provides users a single logical system that can be used from any site or from an external service provider's service centre. Hence, VMS services are produced in the most cost-effective way whether it be locally, centrally or outsourced.The unique, non-fragmenting storage file system provided by Mirasys protects against hard disk failure The Mirasys VMS checks the system performance in real time and helps to prevent system failure. Enhanced multi-disk recording minimises data loss and maximises recording continuity. The unique, non-fragmenting storage file system protects against hard disk failure. Benefits to financial sector Perimeter and motion detection monitors sensitive and restricted areas, such us bank vaults or safety deposit boxes, and alerts personnel only if an important event occurs, saving time and operational costs. People counting and other data reporting enables reduction of business inefficiencies and enhances customer service. Advanced alarm management tools enable the creation of specific alarm lists based on the motion, sound or text data triggers; reducing the number of false alarms. Dwell time and stopping detects people loitering at the ATM. Automatic Number Plate Recognition (ANPR) alerts on potential threats and suspicious vehicle movement and reports on car parking utilisation.Automatic Number Plate Recognition (ANPR) alerts on potential threats and suspicious vehicle movement and reports on car parking utilisation Recorded video watermarking guarantees the integrity and authenticity of recorded and exported video data for court evidence. User authentication and setting specific user rights ensures control of system access and protects sensitive data. Also, product features such as audit trail and versatile material management and search functionality support, e.g., the new EU General Data Protection Regulation (GDPR) requirements. The purpose of the audit trail events is both to show what the user has done, and also to track other (programmatic) changes that change the user interface. Key to data security is operational policies for: account security (e.g., personal user accounts, instead of shared accounts, rename default administration accounts, etc.); password security (don't leave systems with default passwords, don't permit too short passwords, use passphrases instead, etc.), and; software and device firmware updating. Mirasys recommends that systems are kept up to date with the latest software versions. In a networked, multi-server or multi-site environment, all Mirasys VMS servers and client applications can be centrally upgraded from the Mirasys management server. Manage easily various event sources in multiple locations with the flexible Mirasys Smart Event Management platform How to protect your surveillance online For deployments, Mirasys recommends that surveillance cameras are installed, when possible, in a private camera network, where the direct camera communications take place only inside the camera network to VMS servers, and is separate from the client access (“viewing”) network (and from the public Internet, in particular). This also prevents the camera streaming and signalling from being forwarded inadvertently to any external systems not part of the VMS solution. In addition, camera access from outside the private network is thus not possible. It is also recommended to protect wide area network links with VPN (Virtual Private Networking), or other secured, connections.Integrated systems such as access control, intruder detection and fire alarm systems serve as sensors for the video management system For server-to-server and client-to-server signalling, the data communication is in Mirasys VMS both compressed and encrypted by default for sensitive data (such as usernames and passwords and other details). Integration and Internet of Things in VMS With larger video management solutions, the integration of different systems is valuable because it allows automated functionalities that eliminate human errors and delays. Integrated systems such as access control, intruder detection and fire alarm systems serve as sensors for the video management system. IoT (Internet of Things) is increasingly applied in the video management. The sensors continuously provide information and, if necessary, based on this information, the predefined decision chains automatically open a video connection to the event place without any delay or error. The resulting snapshot may be one image or a set of several images that supports decision making in a problem situation. All the information is also stored for later processing. The event picture is routed either automatically or manually for people and organisations needing the information. Also, related Standard Operating Procedures can be automatically opened.Mirasys VMS is the answer to the scalability and performance needs of new camera technologies from any manufacturer Mirasys VMS is quick and easy to install, and especially effective in networked, IP-based CCTV systems and their operational and management needs, such as centralised management and upgrading/updating of servers, drivers and client applications without requiring on-site travel to remote locations. User profiles are easy to create and change. Servers can be pre-installed and pre-configured before delivering to the deployment location. Easy-to-use user interface The Mirasys VMS user interface can be adapted to individual and specific needs and preferences and provides more visual space for videos without sacrificing any functionality. A HTML5 (Hypertext Markup Language, Version 5) based user interface in Version 8.4 offers easy access to the Mirasys system from anywhere; PCs, tablets or smartphones. Video surveillance camera features are consistently improving. Image quality can be exceptionally good compared to what it used to be only a few years ago. The newest cameras also require much less network bandwidth due to more effective encoding formats, such as H.265/HEVC (from 40% up to 60% of bandwidth and storage space savings, depending on the footage and device without any loss of quality, or increased quality at the same level with the H.264/AVC encoding) that many IP camera manufacturers have started to support. Individual servers can handle more simultaneously connected cameras than before, and the entire system has no actual upper limit. Mirasys VMS is the answer to the scalability and performance needs of new camera technologies from any manufacturer, and the Mirasys based video management system can be designed freely using the best equipment for the customer-specific requirements and can support also all future needs.
Multitone Electronics plc, a specialist in the design, manufacture and implementation of integrated communication systems, announces that its Mall Call communications system has been chosen by Canary Wharf Group for its retail facilities. Security communication management tool Peter Lomax, Director of Strategic Partnerships at Multitone, commented, “We are delighted that Canary Wharf Group has chosen to use Multitone’s Mall Call solution to manage communications with retail tenants. With over 490 Mall Call Units being installed, more than 300 stores, banks, services and restaurants over five malls will be covered. Mall Call is designed as a dedicated communications tool and is perfect for a busy and extensive large-scale site, from sending service alerts to tackling crime and managing major events.” The flexibility, reliability and security of Mall Call is perfectly suited to the needs of a large retail management team. Peter continued: “The scope of communications requirements at Canary Wharf is vast, from everyday planning messages (such as opening times or maintenance), to dealing with shoplifters or even potentially an emergency and evacuation. Mall Call enables the estate management team to instantly communicate with the security teams and retail tenants when required.” Multitone i-Message platform Lee England at Canary Wharf Shopping also commented, “The Mall Call solution was ideal for our communication needs. The system has scope far beyond that which we are utilising initially and we look forward to the benefits of a long-term partnership with Multitone.” Mall Call uses a robustand seamless touchscreen interface, which can beutilised on any suitable smart device including a smart watch Based upon Multitone’s powerful i-Message platform, Mall Call is designed to provide high levels of communications availability to all relevant teams, with a tailored interface for the bespoke requirements of the specific applications and organisation using it. Mall Call uses a robust and seamless touchscreen interface, which can be utilised on any suitable smart device including a smart watch. The whole system will be hosted on a secure fixed and wireless system at Canary Wharf for full control of communications. Multi-content facility for regular admin updates From a user’s point of view, communications centre around the Mall Call Units, which are tamper-proof, fixed tablet-style devices that fully utilise the multi-content facility of the system and will be installed with each retailer. Along with text information and audible alerts, Mall Call also allows for the sharing of graphics or photo images and documents. This could be used for regular admin updates from the facilities team, warnings on known suspects to identify criminal individuals or to find a lost child or missing person, for example. Peter Lomax concluded, “With Phase One of the project underway, we are working closely with the team at Canary Wharf Group to investigate potential ways of expanding the project in the future. For example, Mall Call can be utilised over multiple sites, which offers further scope for expansion should it be required moving forward.”
PVcomBank, one of Vietnam’s fastest growing and most progressive banks, has acquired a cutting-edge March Networks video surveillance system. Established in 2013 through a merger of PetroVietnam Finance Corporation and WesternBank, the Hanoi-based financial institution is a joint stock commercial bank with 115 branches throughout the country. Shareholders include Petro Vietnam with a 52 percent stake and Morgan Stanley with a 6.7 percent strategic interest. Prior to selecting the March Networks technology, PVcomBank had a variety of different video surveillance systems installed throughout its branch network. The bank wanted to upgrade to a high-performance solution it could eventually standardise on for all of its retail branches, ATMs and corporate offices, and centrally manage from its headquarters in Hanoi. “The March Networks system gives us the central management capability that we didn’t have before. It’s also reliable, user friendly and provides us with excellent quality video.” Enterprise-class video surveillance The enterprise-class March Networks system PVcomBank is now deploying consists of 8000 Series Hybrid NVRs, Command Enterprise video management software and hundreds of March Networks IP cameras, including MegaPX WDR MiniDomes Zs and MegaPX Indoor IR Domes.More than 450 banks and credit unions worldwide rely on March Networks’ intelligent IP video solutions to keep their customers and employees safe PVcomBank relied on the advice of Intelligent Building Solutions (IBS), a security systems integrator and March Networks certified partner with offices in Hanoi, Ho Chi Minh City, Singapore and Phnom Penh. “We wanted to upgrade to a high quality, enterprise system with central management and health monitoring,” said Nguyen Manh Hai, PVcomBank. “IBS recommended March Networks because of its track record as a global leader in the delivery of video surveillance solutions to the financial sector.” More than 450 banks and credit unions worldwide rely on March Networks’ intelligent IP video solutions to keep their customers and employees safe, and help reduce losses due to fraud, theft and liability claims. IBS, a supplier of security and building automation products, including video surveillance, access control and intrusion detection systems, began rolling out the March Networks system across PVcomBank’s branch network in June 2015 and expects to complete the deployment by the end of 2016. Hybrid capability results in lower costs The hybrid capability of the March Networks 8000 Series NVRs is ideal because, in addition to approximately 250 new March Networks IP cameras, PVcomBank opted to continue using analogue cameras from its previous video surveillance systems. Continuing to use its existing cameras with the March Networks system kept costs down and resulted in noticeably improved video quality from the analogue cameras. Access to video is restricted to the bank’s security staff and used to obtain evidence of burglaries, fraud and other reported incidents. Eight and 16-channel NVRs are equipped with 6 and 8 TB of onboard storage, respectively — sufficient for approximately 60 days of video retention. The 8000 Series recorders are available in 4, 8, 16 and 32 channel models and can accommodate two simultaneous recording streams — one lower resolution stream for viewing online, and another full resolution, full frame rate version for investigation purposes. Built for maximum reliability, they feature a secure Linux operating system to better protect against viruses and malware, and an internal battery backup for systematic shutdown in the event of power loss.The 8000 Series recorders can accommodate two simultaneous recording streams The 8000 Series recorders are also designed for easy maintenance with docking station architecture that keeps all cables securely connected to the back of the unit for faster, more convenient installation and servicing. Technicians can also take advantage of March Networks’ industry-first GURU Smartphone Application to scan the QR code on any 8000 Series NVR to quickly find the recorder’s serial number and warranty status, speed troubleshooting, link to video tutorials and use an installation audit feature to run automated reports on the video system’s configuration complete with camera field-of-views. Simplifying day-to-day system administration The Command Enterprise video management software used by PVcomBank simplifies day-to-day system administration with centralised management and mass configuration tools, and provides real-time health monitoring that alerts administrators to performance issues. A customisable user interface with motion histogram and thumbnail images allows investigators to quickly zero in on video evidence. “We are very pleased with our March Networks video surveillance system,” said Nguyen Manh Hai. “We worked closely with IBS, our security systems integrator, to select a system that would meet all of our needs. The March Networks system gives us the central management capability that we didn’t have before. It’s also reliable, user friendly and provides us with excellent quality video.”
Dahua Technology, a world-leading manufacturer and supplier of video surveillance products headquartered in Hangzhou, China has delivered an IP-based security solution for SANASA Development Bank in Sri Lanka. Founded in 1997, SANASA Development Bank (SDB) is a unique financial institution, committed to rising the standard of living for low income Sri Lankan families with its range of microfinance activities. SDB is a national cooperative bank, with over 82 branches covering all of Sri Lanka. A large proportion of the bank’s clientele consists of farmers, fishermen, labourers and small vendors and business owners, making it truly a bank dedicated to the people it serves, focusing on their improvement and development. As its business was growing consistently, SDB decided it needed to upgrade its security system. IR dome network cameras for monitoring After examining SDB’s unique requirements and concerns, Dahua provided the bank with a cost-effective, customised, high-definition IP security solution, designed for stability and reliability. The new system includes surveillance cameras and DVRs, as well as intelligent security software. A number of different camera models were chosen to cover all areas of the bank, including offices, counters, and ATM kiosks. The majority of cameras used in the SDB system are Dahua’s small IR dome network cameras. These feature a 1/4-inch 1-Megapixel CMOS sensor which outputs clear, crisp 720p images at 25/30 frames per second, and supports multiple network monitoring options, including web viewer, video management software (including Dahua’s DSS or PSS) and DMSS remote viewing. The domes also feature infrared sensors with a range of up to 30 meters – excellent for monitoring the bank during the dark hours of night. IP66-rated weather-proofing and dust-proofing ensures the cameras can withstand even the harshest weather conditions, and IK10-rated vandal-proofing effectively prevents violent attacks on the domes. All of these factors meant that Dahua’s small IR dome network camera made an ideal choice for SDB’s interior and exterior monitoring. Improving security and operational efficiency To record the video images provided by the small IR network domes, Dahua provided its 5000 series NVRs. These 8-, 16- or 32-channel network video recorders can receive up to 160Mbps of footage, and support HD resolution of up to 5MP for camera input, record, live view and playback. Crucially, Dahua’s 5000 series NVR offers Power over Ethernet (PoE), which allows the cameras to be powered via data cables rather than necessitating the installation of additional power cables. For its video management, SDB uses Dahua’s Smart Pro Surveillance System software which supports video wall control and is easily connected to smart IP cameras. The Smart PSS provides a host of functions, including device management, real-time viewing, video recording, remote search and playback, and much more. SDB is the first bank in Sri Lanka to adopt a fully IP solution for its entire security system, and Dahua’s IP solution is helping to improve both security levels and operational efficiency for the bank. As the world-leader in advanced video surveillance solutions, Dahua offers a complete range of high-level banking security systems and equipment, for both large financial institutions like SDB and for smaller credit unions.
Round table discussion
We have all heard the sales pitch: Use of megapixel cameras lowers the camera count needed to provide adequate video coverage, thus making the overall system less expensive. Use of fewer cameras equates to less infrastructure, bandwidth and storage, according to the claims, and megapixel cameras provide enough detail that you don’t miss anything using fewer cameras. It’s a compelling pitch, but one that has sometimes been questioned in the market. To look beyond the marketing hype, we asked our Expert Panel: How effectively can megapixel cameras take the place of multiple standard-resolution cameras? Has the ability of megapixel technology to lower the required camera count been overstated (or oversold) in the market? Some of the answers may surprise you.