Technology provider and smartcard manufacturer CardLab and the software house TrustSec have released a dual interface Biometric FIDO2 card that features Fingerprints’ T-Shape sensor module for a secure, tokenised authentication. FIDO2 is a strong tool for digital access and by integrating it in a biometric card it will enable password-less authentication and protect individual’s’ identity and enterprises against unauthorized access.
Dahua Technology, a front-runner video-centric smart IoT solution and service provider, is proud to announce that the Dahua Global Virtual Innovation Centre is now available to its global customers. By demonstrating its latest technologies, products and solutions through an online virtual showroom, the centre can support customers in designing excellent security systems. Due to the drastic impact of COVID-19, people are having difficulties in gaining access and experiencing the development of p...
Telguard, a front-runner in cellular alarm communication for security and life safety systems, has increased its support of the pro-installed channel and ESA by boosting the strategic partnership with the association from Gold to Platinum for 2021. “Moving up to the Platinum level is a natural step in the progression of our brand,” Telguard President, George Brody, says. “We look forward to a very prosperous 2021 for our dealers, distributors, central stations, employees and E...
The Genetec Channel Partner program has partnered with Credly to award verified digital badges to European channel partners who complete Genetec certification courses. Badges provide an easy way to share and validate the skills, experience and technical knowledge. Digital badges are the best tool to highlight Genetec certifications and achievements on the website, social media, profiles and more. Think of the badges as a bonus for the hard work—there's no extra cost involved. What is a d...
Hanwha Techwin America, a global supplier of IP and analogue video surveillance solutions, unveiled two new Wisenet X series NVRs that support the industry’s first video playback and recording of up to 8K super-high-resolution images. 8K recording can cover large areas with sufficient pixel density to allow operators to zoom in digitally and investigate image details in real-time or forensically and still retain a clear image. Recording capacity and storage The new NVRs in the Wisenet X...
With the continued absence of face-to-face trade events during the pandemic, Dahua Technology launches an innovative, feature-rich virtual experience dubbed the Virtual Innovation Centre. The innovation centre features immersive virtual reality, where visitors are able to walk through a large, spacious pavilion and see Dahua’s latest product and technology innovations. Visitors can select an automatic tour of the entire pavilion to get an overview on what is on offer, with the option of s...
Genetec Inc., a foremost technology provider of unified security, public safety, operations, and business intelligence solutions, announced that it is broadening its portfolio of FICAM-(Federal Identity, Credential and Access Management) certified options for its Security Center Synergis™ access control system with the support of Veridt Stealth access control readers. Traditionally, the options for Federal Government organisations to replace a non-FICAM compliant system or to secure a new site were restricted to a limited choice of proprietary solutions. Because Security Centre Synergis is a FICAM-approved open platform access control system, customers can choose from a range of non-proprietary choices to efficiently validate Personal Identity Verification (PIV, PIV-I, CAC, and TWIC) for federal employees and contractors. Cost-effective solutions “By bringing these new non-proprietary options to market with partners such as Veridt, HID and Mercury, we are offering government customers a choice of simple-to-deploy and cost-effective solutions so that they can easily comply with FICAM requirements while leveraging the most robust and extensible software solution on the market,” said Justin Himelberger, Enterprise Systems Business Development Manager, Federal & DOD at Genetec. Access management solution Veridt Stealth Series™ readers provide a full complement of capability enabling identity and access management solutions for traditional and trusted PACS using PIV, TWIC and CAC based credentials. This family of readers encompasses both biometric and non-biometric configurations while offering fixed, wireless, and mobile platforms. Veridt readers are well known for their compact design and operating capability in the harshest environments. Identifying federal standards “We are pleased to work with Genetec to offer our joint US-Federal market customers FICAM-compliant solutions that will enable them to comply with the most stringent access and identity federal standards as well as the flexibility to maintain and protect their investment for years to come,” said Bryce Lamers, Director of Sales and Marketing at Veridt.
Exabeam, the security analytics and automation company, announced a partnership with Snowflake, the Data Cloud company, to augment Snowflake data lakes with Exabeam security analytics and automation. The partnership enables organisations to identify risks and respond swiftly to incidents across their entire business ecosystem. The COVID-19 pandemic has accelerated digital transformation, expediting the move to the cloud and increasing demand for improved productivity and efficacy through automation. Organisations can now quickly move data and security to the cloud by migrating to Snowflake Data Cloud and Exabeam SaaS Cloud. Automating workflow Security teams can quickly detect, investigate and respond to complex threats with the help of analytics and automation skills By adding the analytics and automation capabilities of Exabeam to the data stored within Snowflake, security teams can quickly and efficiently detect, investigate and respond to complex threats. The combination of both solutions advances an organisation’s security posture by automating the entire workflow from data collection through response, enabling fast and consistent outcomes. Cloud-based security analytics “With demand for cloud technology surging amid the shift to remote working, we proudly welcome Snowflake to our partner network,” said Adam Geller, Chief Product Officer, Exabeam. “Using the combination of the Exabeam Cloud Connector for Snowflake with Exabeam Advanced Analytics, joint customers can easily apply intelligence and automation capabilities to their data stored within Snowflake's platform. This addresses the increasing market need for cloud-based security analytics on third-party logs sent to Snowflake.” Identifying cyberthreats “Security data continues to grow in size and complexity, and a fragmented architecture keeps many organisations struggling to mobilise it for protecting the enterprise,” said Omer Singer, Head of Cybersecurity Strategy at Snowflake. “Snowflake’s unique architecture eliminates data silos, providing organisations a single scalable and cost-effective platform for all their data, while Exabeam’s security analytics adds intelligence and automation to strengthen an organisation’s ability to identify and respond to cyberthreats across subsidiaries, geographies and public cloud providers.” Case study In 2020, several large-scale corporate data breaches centered around compromised credentials of cloud-based data stores. In one example, more than 5 million guests of Marriott hotels were impacted when cybercriminals stole the login credentials of Marriott employees, likely through phishing or credential stuffing. The information was then used to siphon personal customer details such as birth dates, contact information, as well as hotel and airline loyalty program accounts. Technical integration Exabeam provides real-time mapping of logs stored within Snowflake and attributes all activity and behaviour to users and devices Combining Exabeam’s security analytics with Snowflake’s data platform can provide protection against credential-based attacks, including insider threats. The technical integration between the Exabeam SaaS Cloud and Snowflake Data Cloud is done through the new Exabeam Cloud Connector for Snowflake, which allows for easy ingestion of data stored in Snowflake. Exabeam provides continuous, real-time mapping of logs stored within Snowflake and attributes all activity and behaviour to users and devices. This attribution, with additional data and context, provides visibility into abnormal or risky activity to detect malicious insiders or attacks involving compromised credentials. As a new addition to the 40-plus existing Exabeam Cloud Connectors, the Cloud Connector for Snowflake also allows for monitoring of Snowflake audit logs in Exabeam Advanced Analytics to detect anomalous account behaviours within the application itself. Assisting security operations “The proliferation of data is central to all businesses, and so is the need to guard against malicious attacks – especially now, as enterprises rely so heavily on data clouds like Snowflake,” added Chris Stewart, Senior Director, Business Development for Exabeam. “This partnership advances our mission to assist security operations teams in quickly detecting, investigating and responding to incidents throughout the enterprise.”
News of the UK’s largest cash counterfeit scam has focused fresh attention on the vital importance of stepping up investment in effective security devices to protect banknotes, says a global trade body. According to the International Hologram Manufacturers Association (IHMA), news that three men have received jail sentences for their part in printing fake banknotes worth millions of pounds, adds to concerns about sophisticated criminals looking to defraud people and cash in on advancements in specialist printing techniques. Counterfeit money Counterfeiting is a multibillion-dollar global problem and this latest development, says the IHMA, shows that banknotes continue to be under threat even, perhaps more so, during the pandemic. Specifically, counterfeiters are looking to take advantage to print and distribute fake banknotes, spurred on by the prospect of pumping millions of pounds of counterfeit money into the UK economy. It’s likely that the impact of counterfeit money would have been felt by unsuspecting members of the public across the UK, adds the IHMA. Holograms Holograms play a crucial role in issuing authorities’ strategies to tackle counterfeiting activity Holograms have featured successfully on banknotes for decades and according to an industry report continue to play a crucial role in issuing authorities’ strategies to tackle counterfeiting activity. The annual global volume of banknotes produced is in excess of 125 billion, so the reward for hologram producers capable of providing the technology to overcome the technical challenges is potentially highly lucrative. Cash counterfeiting scam Dr. Paul Dunn, Chairman, IHMA, says the cash counterfeiting scam has put the effective protection of banknotes into sharp focus. He said “Holography is an effective weapon in the battle to thwart counterfeiters, continually evolving as an effective first line of defence feature for modern banknotes. The new generation of polymer notes entering into global circulation are examples of this evolution and illustrate some of the best and most technically innovative holograms on banknotes, which combine with other features to deliver value-added solutions.” “So, even as questions are being asked about the future of cash in society, there will always be a central role for banknotes and the need for secure, cost-effective features that the public recognise, and trust remains paramount.” Security feature The success of holograms for both banknotes has been down to their role as a level one security feature that’s instantly recognisable, the technology remains to the fore as part of an array of overt features. These make it easy for not only the general public but also cashiers and those operating cash tills in stores, to recognise whether a banknote is bonafide. Increasing adoption of holography on banknotes reinforces the hologram’s position as a pre-eminent security feature in the global anti-counterfeiting fight. The use of sophisticated anti-counterfeiting features means that the banknotes are more secure because they include a larger area for holograms to be featured, New Zealand was among the countries that reported a fall in counterfeiting after it introduced new hologram banknotes.
A new range of Wisenet Public View Monitors (PVMs) equipped with a built-in SSL connected 2-megapixel camera have been introduced to help retailers deter fraudsters and shoplifters. Offering a choice of 10”, 27” and 32” monitors, the 3 new PVMs are designed to be located at store entrances, shopping aisles, till points or self-checkout pay points. With an SD/SDHC/SDXC slot that can facilitate up to 512GB of data storage, the PVMs provide store management with the opportunity to display a slide show which can include supplier adverts, own-brand product promotions and special offers. A default blinking recording in progress message is superimposed over the displayed graphics to let would be thieves know they are on camera, with operators having the option to customise the message and configure its size, colour, opaqueness and positioning on the monitor. Face detection Face and motion detection feature can be configured to switch the display to live view to make people aware they are being watched Supported by the Wisenet WAVE and SSM video management platforms as well as Wisenet NVRs, the ONVIF Conformant PVMs can be programmed so that images captured by the cameras are either continuously recorded or when prompted to do so by built-in face or motion detection video analytics. The face and motion detection feature can also be configured to switch the display to live view to make people aware they are being watched, as they will be able to see themselves on the monitor as they enter a store or walk down a shopping aisle. The display reverts to the slide show after a specified number of seconds. The PVMs, which can be integrated with tagging (EAS) systems to record images of people who might be leaving the store with stolen items, also provide support for the AI-Masking, AI-Bio, AI-Face-Detect and AI-Occupancy video analytics applications, developed by Hanwha Techwin’s technology partner, A.I. Tech. Video evidence Regardless of whether they are displaying live images or a slide show, or the monitor has been turned off by someone using a remote control, the PVMs will continuously stream images to a control room where they can be viewed via video management software (VMS), as well as continue to be recorded on an on-site or remotely located NVR. The ultra-low light capabilities of the new PVMs, together with Wide Dynamic Range (WDR) technology performing at up to 150dB, enables the built-in camera to capture clear, sharp images in strongly contrasting light conditions at, for example, store entrances where strong sunlight may be streaming in. Power over Ethernet All three PVMs can be powered by 12V DC, with the Wisenet SMT-1030PV also offering the option to utilise Power over Ethernet (PoE+) if there isn’t an existing power supply close to where the PVM is being installed. A single cable of up to 100m is all that is needed to provide both powers to the SMT-1030PV and for network communications. The three new Wisenet PVMs, which can be mounted by using standard VESA brackets, are as follows: SMT-1030PV: 10” monitor with LED backlight and 1024 x 600 display resolution. SMT-2730PV: 27” monitor with LED backlight, HDMI input and Full HD display. SMT-3230PV: 32” monitor with LED backlight, HDMI input and Full HD display. Loss prevention strategy “With retailers increasingly relying on PVMs to play an important role within their strategic approach to loss prevention, we have designed our new models to make it quick and easy, as well as cost-effective, to deploy them across a large number of stores,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “As the only PVMs available which, for cyber security and data protection purposes, are supplied with a complete built-in SSL connected camera, they eliminate the need for system integrators to install and connect a separate supporting camera, which some other manufacturers’ PVMs require." "By building in an intuitive user interface, we have also made it extremely easy for busy store managers to take full advantage of the PVM’s functionality, including the ability to utilise the monitor for advertisement and signage using the slide show mode.”
The COVID-19 pandemic has changed the way one lives their lives and the way one does business. Restrictions have been implemented to protect ones health, affecting one as individuals and the operations of the healthcare systems, companies, organisations and schools, as well as public and private institutions. Many new behaviours, such as physical distancing, virtual meetings and improved hygiene measures, will most likely linger as one gradually gets back to normal. With smart solutions, one can help each other stick to the new routines. Axis tried and tested solutions are designed to increase security and maximise business performance and operational efficiency. In addition, they offer improved safety – never more important than in times of a pandemic. They allow us to carry on with ones daily business while protecting ourselves and the people around us. Solutions range from touchless access to buildings, public address systems for voice messages and reminders, remote communication to keep physical distance to crowd and occupancy management to monitor and control the flow of people. They also include live streaming and broadcasting to keep operations running, as well as remote services to manage sites from a distance - solutions that support safe behaviours over time. Touchless access control With AXIS Visitor Access there is no need to open doors, visitors will get a QR code instead of an access card to be allowed into a building A system for touchless access control makes it easier to comply with physical distancing and increased hygiene requirements. With AXIS Visitor Access there is no need to physically open doors to trusted visitors or buzz them in – visitors will get a QR code instead of an access card to be allowed into a building. They can be granted access at specific times, and should someone change the schedule or cancel, it is possible to revoke or adjust their access as needed. This way, one is always completely in control, knowing when the visitor has arrived and left the building. Public address systems With public address systems, you can manage messages and updates in environments like schools, retail stores, hotels, public buildings and city environments. These include scheduled regular reminders, event-triggered announcements or live voice messages when a situation arises that requires immediate action. It is, for example, possible to run a recurrent message in scheduled intervals to remind people to wash their hands and use hand sanitizers as well as to keep physical distance or to stay at home when they are feeling sick. Event-triggered announcements can be used to tell people that an entrance now has become an exit and that they need to enter through another door, or to inform them that the maximum number of people allowed in a certain area has been reached and that they cannot enter right now. Live voice messages are used when a situation arises that requires immediate action, for example, to remind people to keep physical distance when a room or site is getting too crowded. Remote communication To meet the requirements of physical distancing, it is possible to communicate remotely and get a visual status, grant access from a distance and make live announcements. Axis network door stations let you speak with visitors face-to-face from remote locations, offering secure, hassle-free access to premises for employees and known visitors. Door stations can be used as information points or as emergency phones within a larger area like a city, park, or a school or as a flexible alternative to traditional front desk receptions. They also allow hospital staff to monitor and communicate with patients without having to enter the room. This means fewer changes into protective clothing and reduced use of protective equipment for the staff – without compromising patient safety. Have a look at Axis cooperation with the Nemours Children's Hospital in Orlando, Florida, to see how it works. Crowd control AXIS People Counter counts the number of people who enter and exit a building or site, and when they do it By not allowing too many people in one place at the same time, it is easier to follow physical distancing restrictions. Systems for people counting, crowd control and occupancy estimation help manage visitor traffic. For example, by setting thresholds it’s possible to handle how many people are allowed in a certain space at a time. They can also be used to trigger actions, such as cleaning, stopping the flow of people, calling for extra staff to manage queues etc. AXIS People Counter counts the number of people who enter and exit a building or site, and when they do it. By analysing the numbers, it is easy to plan accordingly, make informed decisions, take immediate action, improve services and operational efficiency. It can also be used to trigger an action – for example, to set up a number-based alert to trigger the desired action when a certain number of people have entered the premises. Occupancy estimation AXIS Occupancy Estimator provides real-time data on how many people are present in a building or site. It is possible to synchronise multiple units within a building and add additional cameras anytime. Remote configuration, management and monitoring make it easy to view statistics from several cameras and locations at the same time, while AXIS Queue Monitor is a cost-efficient application for queue management and analysis. It provides real-time data that can help identify where bottlenecks occur, understands service-cycle timing and improves visitors' overall experience in stores, hotels, public buildings, banks etc. Live streaming and broadcasting Always a practical solution, but especially useful when there are travel and meeting restrictions in force, live streaming and broadcasting make it possible to share information with a broader audience in auditoriums, classrooms and places of worship, for example, while adhering to requirements for physical distancing. And since it minimises unnecessary travel, this is also environmentally sustainable. Remote services Axis Secure Remote Access simplifies the installation of remote access to surveillance systems Remote services make it easier to follow physical distancing restrictions and avoid unnecessary visits to a site, using remote connection, planning and device management. Security installers and system administrators can avoid a physical visit to the site but still successfully design a surveillance system, connect to remote cameras, manage devices, upgrade firmware or renew certificates. AXIS Device Manager is a highly effective on-premise tool that promotes physical distancing by allowing remote monitoring of all devices. Security installers and system administrators can manage all major installation, security and maintenance tasks remotely. It is compatible with most Axis network cameras, access control and audio devices, and allows for management of multiple sites from one central location, including updates of product firmware and certificate management and renewal. The Axis Secure Remote Access is a service that significantly simplifies the installation of remote access to surveillance systems. It is a technology that makes it possible for a smartphone or PC client to access Axis network cameras when the client and the cameras are located on different local networks. Connecting to remote cameras can be a challenge, especially when the cameras are located behind routers or firewalls. Once enabled it is automatically configured and removes the need for manual port-forwarding and router configuration. Impact for the short- and long-term Axis offers innovative and available solutions that increase security and maximise business performance and operational efficiency, and, above all, allow one to carry on with ones daily business while protecting oneselves and the people around – today and tomorrow.
The Security Industry Association (SIA) has named five young security professionals as the recipients of the 2021 SIA RISE Scholarship, a programme offered through SIA’s RISE community, which supports the education and career development goals of young industry talent. Through this scholarship programme, open to SIA student members and RISE members who are employees at SIA member companies each awardee will receive a $3,000 scholarship to use toward continuing education and professional development courses, SIA programme offerings and/or other academic or education programmes. Scholarship funds can be used to expand knowledge in the areas of business, human resources (HR), information technology (IT), marketing, sales, project management, security engineering and/or risk management. Young security professionals “The 2021 SIA RISE Scholarship awardees are an extraordinary group of young security professionals who represent tomorrow’s industry leaders,” said SIA CEO Don Erickson. “SIA is proud to help foster the careers of these talented honourees, and I look forward to seeing their many accomplishments and successes to come.” Winners for the 2021 SIA RISE Scholarship Nadim Hammoud, Software Developer, Feenics As a key member of the software development at Feenics, Nadim Hammoud has contributed to multiple new features in production and bug fixes, built proofs of concept for prospective clients and contributed new tests to the automated testing of the company’s web API. Hammoud plans to use the SIA RISE Scholarship funds toward a computer and network security course and certification in AI He has a strong interest in the latest technologies, including cloud computing and machine learning. Prior to his time at Feenics, Hammoud served as a teaching assistant at Carleton University and held engineering and software development positions at Bertrandt and Tactical Technologies Inc. He holds bachelor’s degrees in computer science and biomedical and mechanical engineering from Carleton University. Hammoud plans to use the SIA RISE Scholarship funds toward a computer and network security course, a professional certification in the field of artificial intelligence and attendance at industry events. Olivia Peralta, Account Executive, Allegion In her role as an account executive at Allegion, Olivia Peralta works with teams around the world to plan and sell access control projects – from teaching the company’s security software to implementing hardware installations hosted on the cloud for physical security end-users. Prior to her time at Allegion, she served as an account executive at ISONAS Access Control and completed communications internships at Western Resource Advocates and the Oregon Natural Desert Association. She holds bachelor’s degrees in environmental sciences and communication and environmental studies from Northern Arizona University and a continuing education certification from Colorado Water Education’s Water Educator Network and is IPVM University Access Control certified. Peralta plans to use the scholarship funds toward earning SIA’s Certified Security Project Manager certification and pursuing an education that bridges the gap between strategy, design and product delivery. Matthew Rios, Regional Sales Manager, Axis Communications Rios plans to use the scholarship funds toward completing the EC-Council MasterClass Certified Ethical Hacker certification In his role at Axis Communications, Matthew Rios promotes the use of IP video and Axis cameras to integrators, distributors, consultants and end-users and maintains fluid and enthusiastic relationships with current and prospective customers. Prior to his time at Axis Communications, Rios held sales management roles at Hanwha Techwin America, Honeywell and R&D Lock and Alarm. He holds master’s and bachelor’s degrees in cybersecurity from Fordham University and a bachelor’s degree in the homeland and corporate security from St. John’s University. Rios plans to use the scholarship funds toward completing the EC-Council MasterClass Certified Ethical Hacker certification. Mary Sharp, HRA, Stanley Access Technologies As a key member of the HR team at Stanley Access Technologies, Mary Sharp is responsible for over 220 professional hourly, non-union service and install technicians and provides support on major change management and organisation redesign efforts and issues pertaining to team cohesiveness, dynamics and management. Prior to her time at Stanley Access Technologies, she held HR and administrative roles at Stanley Healthcare, Infrasource Underground Construction and Frontline Private Security. She holds a bachelor’s degree in ethics and public policy from the University of Iowa. Sharp will use the scholarship funds toward obtaining the Society for Human Resource Management’s SHRM-CP certification. Trevor Zuerlein, System Designer, VTI Security Zuerlein plans to use the scholarship funds to pursue further education in IT, become a member of (ISC)² and to earn CISSP credential Trevor Zuerlein started at VTI Security in 2017 as a security systems technician and now serves as a system engineer; Zuerlein is skilled in access control security systems, security cameras, computer repair, computer science, technical writing and AC/DC electronics. Before his time at VTI Security, he held IT and sales roles with Time Warner Cable, Mead Lumber and Archer Daniels Midland Company. Zuerlein holds an associate’s degree in information technology from Central Community College. He plans to use the scholarship funds to pursue further education in the IT field, become a member of (ISC)² and work toward his goal of earning the Certified Information Systems Security Professional credential. Networking events SIA RISE is a community that fosters the careers of young professionals in the security industry. In addition to awarding the annual SIA RISE Scholarship, SIA RISE offers fun networking events for young professionals, created the RISE Microlearning Series of mini-webinars on top professional development topics, hosts career growth webinars and trade show education tracks. Mentorship programme The recently launched the Talent Inclusion Mentorship Education (TIME) mentorship programme for early and mid-career professionals in the security industry and presents the annual AcceleRISE conference, an essential experience designed to ignite new thinking, strengthen leadership and sharpen business acumen in young security talent. RISE is available to all employees at SIA member companies who are young professionals under 40 or have been in the security industry for less than two years.
As a leader, I am a big proponent of using what’s happened in the past — and is currently happening in the present — to better prepare our business and our customers for what’s to come. Applying this mindset in the financial industry is particularly helpful. The emergence of various technologies and trends enables us to determine what we can optimise for the highest efficiency and satisfaction level. The past few years have been focused on the Internet of Things (IoT), data and analytics, and enhancing proactivity to mitigate the increasingly significant threat of fraud and cyber risks. While each of these elements will continue to play an essential role in the industry moving forward, we’re starting to see two common threads that will rise above all in the coming years: collaboration and convergence. When broken down in terms of its relevance for banks and credit unions, we can expect to see these trends in certain areas in the future. Security and customer engagement We’re starting to see two common threads that will rise above all in the coming years: collaboration and convergence There's no overstating the importance and value of one's hard-earned money. When it comes to keeping it safe, consumers demand their relationship with a financial institution is built on one powerful characteristic: trust. Customers must feel confident in placing their funds in someone else's hands, with the comfort and understanding that the institution's primary goal is to meet their needs while safeguarding information at all times. The digital transformation and incorporation of intelligent technology into the banking environment have undoubtedly changed how trust is defined in this industry. As customers become more tech-savvy, their idea of a trustworthy and engaging banking partner begins. We're seeing the necessity of digital services for elevating customer satisfaction, such as mobile banking, chat features, and intelligent virtual assistants, complementing in-person service, and modernising customer engagement. Now that customers are becoming more aware of some of the risks imposed by technology, simplifying and automating programs is more critical for banks than ever before. To address and mitigate customer concerns about data security and privacy, financial organisations must prioritise deploying an integrated, end-to-end solution that considers the vulnerability of the Internet of Things (IoT) and the risks of the cyber world. A security-led strategy But the aspect of security must remain at the centre of this strategy. As both the financial industry and the threats it faces become more complex, the promise of secure housing and management of one of our most sensitive assets is always top-of-mind. Ensuring adequate security, surveillance, and investigative processes are the key for banks to establish superior customer engagement and develop a healthy relationship based on protection. It’s a simple fact: Financial institutions can’t drive exceptional customer service without security having a seat at the table. In general, the customer experience is typically made up of these two elements above all else, and loyal customers place their trust in banks to demonstrate an apparent dedication to understanding how both sides impact one another — which is in more ways than one. Financial institutions can’t drive exceptional customer service without security having a seat at the table As we start to see the physical layouts of branches evolve to become more productive for customer engagement, it’s imperative to ensure that security is considered in these changes. For example, many bank environments are transitioning to be more liberal and free-flowing, which we will all take advantage of after the pandemic is behind us. These new environments could introduce various risks when it comes to employee and asset protection, making it paramount for security to react to this adjustment accordingly from a safety and fraud perspective. Physical security and IT By now, you’re probably more than familiar with the term “convergence.” The evolution of the threat landscape and the significance of risks that today’s banking and financial providers face have made the word top-of-mind. Organisations worldwide demand a more holistic approach to security to ensure they’re consistently protecting consumer data, employees, brand reputation, and infrastructure. Though this type of convergence has already begun to occur, the integration of physical and IT security will only become more critical in the years ahead. The use of advanced networked and cloud-based technologies in financial institutions — primarily through wireless network connections — has led to IT’s increased involvement in security decisions and operations, which is the right path to follow if a bank or credit union wants to ensure its solutions are protected against cyber threats. The collaboration between physical and IT security teams must exist at every level of the process; from procurement to installation to maintenance over time, it’s crucial that IT personnel are involved and asking the right questions. In the future, physical security groups will likely rely on IT professionals to help them solve problems regarding the technical and cyber sides of security solutions. Collaboration is key Whether it's due to the evolving risk landscape financial institutions face or the desire to adhere to customer demands, it’s become clear that collaboration will be the key to success for banks and credit unions in the future. A modernised customer engagement strategy must incorporate a focus on security, and that element of safety must be comprised of both physical and IT components. A modernised customer engagement strategy must incorporate a focus on security But while the traditional definition of convergence may seem simple to understand, we must look beyond these words to determine how exactly the practice can and should be implemented. In a more detailed sense, convergence can be defined as a marrying of cyber and physical security capabilities to form a comprehensive approach to identify potential threats and expand awareness for better event response. This level of “converged collaboration” fuels a unified and cohesive security strategy built with all areas of security in mind and can lead to better incident management and faster response. And with the potential impact of today’s security threats on a bank’s people, property, and brand, this approach is necessary to ensure that no stone is left unturned.
The explosive expansion of IT infrastructure has led to the identity and access management market gaining substantial momentum. As the onslaught of information technology continues, organisations are able to offer users quick and easy access to systems and information from any place, at any time. However the ease of access is inherently associated with the risk of security breach. Organisations must find a balance between fulfilling user demands and doing so in a manner that is safe enough so that cybercriminals cannot take advantage of the system, thus strengthening identity and access management market trends. The prominence of IAM solutions in the BFSI sector In 2016, the world was shocked by the news of the Bangladesh bank heist in which cybercriminals were successful in conducting unauthorised money transfer from Bangladesh Central Bank to banks in Philippines, Sri Lanka and other parts of Asia. In the heist, criminals used Society for Worldwide Interbank Financial Telecommunication (SWIFT) credentials of Bangladesh Bank's employees to carry out more than three dozen fraudulent transactions and extracted $81 million from Bangladesh Central Bank. More than three dozen fraudulent transactions and extracted $81 million from Bangladesh Central Bank. More recently in 2018, hackers were able to siphon nearly $20 million from Mexican banks. Analysts point out that targeted bank systems had security holes that made access to internal servers much easier. Lack of strong access controls were also used by hackers to use credentials of a compromised employee to gain considerable mileage in the siphoning. Identity and access management industry has therefore registered a lot of interest through the financial sector and banks as financial institutions need to prove themselves reliable of customers’ trust. Banks and other financial institutions are rapidly adopting identity and access management solutions capable of providing strong security starting at authentication level and extending to application and data layers. IAM solutions make it possible for financial institutions to integrate new applications and deploy to cloud with greater ease and rapidity. With versatile hybrid deployment model provided by leading IAM solutions, connectivity to SaaS applications as well as legacy enterprise web applications happens more quickly as well as securely. IAM solutions make it possible for financial institutions to integrate new applications and deploy to cloud The significance of cloud and its impact on IAM market outlook Just as the banking sector is facing the challenge of identity authentication as customers around the world are demanding any time access, the proliferation of IoT and cloud technologies is changing the very essense of society in multiple ways. With advancement in IoT technologies, the advent of smart cities has gathered considerable traction. While sensors have been installed in New York that can detect gunshots and alert police, the city of Boston has developed a mobile app to help citizens report civic problems such as burnt out streetlights and potholes. Cities like Paris, Oslo and Hong Kong have large internet-connected statues that are filled with moss to absorb air pollution and notify operators about malfunctions. The network of connected devices continues to expand and the rise of 5G connectivity is anticipated to connect traffic signals, air quality sensors, police patrol cars, etc., over the coming years. Reportedly there would be billions of connected devices around the world by 2020 which will naturally create immense opportunities for identity and access management industry players. This is because new security threats will continue to surface, as without efficient security all connected devices are at the risk of being hacked. The evolution of the smart era – how will it impact IAM market dynamics? Connected devices that constitute the very fabric of smart cities are essentially IoT devices that would be in the field for the next ten fifteen years and therefore identity and access management must be built into the system from the beginning. As identities, keys and tokens have to be managed every time new devices are added, or old ones are removed and the cloud ecosystem is updated, the security components within devices have to be managed well to extend their lifecycle. Identity and access management must be built into the system from the beginning Not only cities but factories are also getting smarter. The term Industry 4.0 came to be first used when the German government used it to define the country’s strategy towards increased digitization in manufacturing. As technologies like IoT and cloud computing continued to expand, they came to be included in the term, and Industry 4.0 came to represent the ecosystem of Internet-connected machines with streamlined and automated workforce and reduced production costs. As the ecosystem continued to expand, trust and identity became important issues in order to ensure the integrity of a smart factory. Healthcare is rapidly becoming a fully digital environment IAM solutions – Influencing the coveted medical domain Other fields like healthcare have also not been impervious to the effects of technological transition. Healthcare is rapidly becoming a fully digital environment that has reaped the benefits of sophisticated IT tools in delivery of care. This has however exposed sensitive healthcare data to cybercriminals who had attempted to hold critical systems and patient records of hospitals to ransom. Healthcare is rapidly becoming a fully digital environment In recent years more than 80% of healthcare institutions have reported that they registered some degree of cyberattacks. Providers and users are increasingly operating from multiple locations, many of which are outside the hospital premises. With users demanding to access systems through a variety of devices, identity and access management has come to witness greater traction from healthcare providers. Over the coming years, the world will be rapidly adopting 5G networks. Though 5G promises much more speedy services for users and business ecosystems, the technology is also expected to impose greater responsibilities on confidentiality of user data and integrity of applications. Identity and access management industry players had been investing in expansive R&D as cyber threats continue to evolve and introduction of new technologies and advent of IoT drastically changes the relationship that users have with their devices. Identity and access management is expected to be useful when much more than personal information is at stake. When cyber criminals have the power to hold hospitals or traffic signals to ransom and disrupt daily lives, health and safety become a priority for authorities and security measures have to be tightened. For instance, after the bank heists in Mexico, the Mexican bank authorities have come to recognize the inevitability for the need of greater control and security of banking networks. Mexican banks have invested heavily over the last year in strengthening their defenses. As such measures against cyberattacks become the norm, identity and access management market is expected to register massive gains over the ensuing years.
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organisations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains. User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anything like the 5.4 billion user IDs on haveibeenpwned.com, their login has already been compromised. If it's not listed, it could be soon. Recent estimates state that 8 million more credentials are compromised every day. Ensuring safe access Data breaches, ransomware and phishing campaigns are increasingly easy to pull off. Cyber criminals can easily find the tools they need on Google with little to no technical knowledge. Breached passwords are readily available to cyber criminals on the internet. Those that haven’t been breached can also be guessed, phished or cracked using one of the many “brute-force” tools available on the internet. It's becoming clear that login credentials are no longer enough to secure your users' accounts. Meanwhile, organisations have a responsibility and an ever-stricter legal obligation to protect their users’ sensitive data. This makes ensuring safe access to the services they need challenging, particularly when trying to provide a user experience that won’t cause frustration – or worse, lose your customers’ interest. After GDPR was implemented across the European Union, organisations could face a fine of up to €20 million, or 4% annual global turnover Importance of data protection So how can businesses ensure their users can safely and simply access the services they need while keeping intruders out, and why is it so important to strike that balance? After GDPR was implemented across the European Union, organisations could face a fine of up to €20 million, or 4% annual global turnover – whichever is higher, should they seriously fail to comply with their data protection obligations. This alone was enough to prompt many organisations to get serious about their user’s security. Still, not every business followed suit. Cloud security risks Breaches were most commonly identified in organisations using cloud computing or where staff use personal devices According to a recent survey conducted at Infosecurity Europe, more than a quarter of organisations did not feel ready to comply with GDPR in August 2018 – three months after the compliance deadline. Meanwhile, according to the UK Government’s 2018 Cyber Security Breaches survey, 45% of businesses reported breaches or attacks in the last 12 months. According to the report, logins are less secure when accessing services in the cloud where they aren't protected by enterprise firewalls and security systems. Moreover, breaches were most commonly identified in organisations using cloud computing or where staff use personal devices (known as BYOD). According to the survey, 61% of UK organisations use cloud-based services. The figure is higher in banking and finance (74%), IT and communications (81%) and education (75%). Additionally, 45% of businesses have BYOD. This indicates a precarious situation. The majority of businesses hold personal data on users electronically and may be placing users at risk if their IT environments are not adequately protected. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine Hacking methodology In a recent exposé on LifeHacker, Internet standards expert John Pozadzides revealed multiple methods hackers use to bypass even the most secure passwords. According to John’s revelations, 20% of passwords are simple enough to guess using easily accessible information. But that doesn’t leave the remaining 80% safe. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine. Brute force attacks are one of the easiest methods, but criminals also use increasingly sophisticated phishing campaigns to fool users into handing over their passwords. Users expect organisations to protect their passwords and keep intruders out of their accounts Once a threat actor has access to one password, they can easily gain access to multiple accounts. This is because, according to Mashable, 87% of users aged 18-30 and 81% of users aged 31+ reuse the same passwords across multiple accounts. It’s becoming clear that passwords are no longer enough to keep online accounts secure. Securing data with simplicity Users expect organisations to protect their passwords and keep intruders out of their accounts. As a result of a data breach, companies will of course suffer financial losses through fines and remediation costs. Beyond the immediate financial repercussions, however, the reputational damage can be seriously costly. A recent Gemalto study showed that 44% of consumers would leave their bank in the event of a security breach, and 38% would switch to a competitor offering a better service. Simplicity is equally important, however. For example, if it’s not delivered in ecommerce, one in three customers will abandon their purchase – as a recent report by Magnetic North revealed. If a login process is confusing, staff may be tempted to help themselves access the information they need by slipping out of secure habits. They may write their passwords down, share them with other members of staff, and may be more susceptible to social engineering attacks. So how do organisations strike the right balance? For many, Identity and Access Management solutions help to deliver secure access across the entire estate. It’s important though that these enable simplicity for the organisation, as well as users. Organisations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so Flexible IAM While IAM is highly recommended, organisations should seek solutions that offer the flexibility to define their own balance between a seamless end-user journey and the need for a high level of identity assurance. Organisations’ identity management requirements will change over time. So too will their IT environments. Organisations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so. Importantly, the best solutions will be those that enable this flexibility without spending significant time and resource each time adaptations need to be made. Those that do will provide the best return on investment for organisations looking to keep intruders at bay, while enabling users to log in safely and simply.
Combining artificial intelligence (AI) with cloud video creates systems that are smarter, safer and more cost-effective. Furthermore, adding AI capabilities can widen the advantage gap of cloud video systems compared to on-premise systems, especially for cost-conscious end users. “We strongly believe the total cost of ownership (TCO) for cloud systems is more affordable,” says Ken Francis, President of cloud video surveillance company Eagle Eye Networks. “And introducing really powerful AI will expand the cost differences.” Combining AI and cloud video To finance realisation of their vision to combine AI and cloud video, Eagle Eye Networks has raised $40 million of Series E funding from venture capital firm Accel. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end users,” says Francis. In effect, end users have maximum flexibility to manage and analyse their video data however they wish The system sends captured video to the cloud, where a variety of AI or video analytics systems can extract valuable data from the captured video. Eagle Eye offers an application programming interface (API) to enable integration of best-in-breed third-party AI and analytics systems to leverage the video. In effect, end users have maximum flexibility to manage and analyse their video data however they wish. Delivering lower costs In addition to offering integration with third-party systems, Eagle Eye is investing in its own AI development, and hiring additional development and customer service personnel. As new technologies become part of the Eagle Eye platform, customers benefit from lower costs because of economies of scale. Keeping the emphasis on development of cloud systems, Eagle Eye also offers customers maximum flexibility in choosing their cameras. Eagle Eye’s on-premise cyber-hardened “bridge” can connect to almost any camera from thousands of manufacturers, including those connecting with HD-over-coax. The COVID-19 pandemic has expanded the need for end users to view their premises remotely, and in the process has highlighted shortcomings of their existing video systems. As a result, video manufacturers - including Eagle Eye Networks - are seeing a surge in end users updating their systems. Cloud video surveillance Given the costs of installing and maintaining hard drives for local storage (and additional challenges during a pandemic lockdown), more end users are opting to use cloud systems. In effect, the COVID-19 pandemic is accelerating installation of cloud video surveillance. “Our industry is the most resilient in the world,” says Francis. Eagle Eye Networks was on track to double their growth in the first quarter, and then COVID slowed everything down As a whole, 2020 has been a successful year for the cloud system provider. Eagle Eye Networks was on track to double their growth in the first quarter, and then the COVID lockdown slowed everything down. During the second quarter, their revenue from setup fees and appliances fell by 35% or so, but subscriptions increased slightly including customers looking to keep watch over their shuttered businesses. Temperature alerting solutions The third quarter saw another big uptick in business; August and September were booming, and not just from projects that were delayed from Q2. There has also been a spike in customers looking to apply temperature alerting solutions, says Francis. In uncertain economic times, cloud systems require around 40% less up-front costs, and provide flexibility to eliminate the system (and the expense) at any time without losing a large financial investment. Cloud video has reached a tipping point in the United States, Mexico, and the United Kingdom, among other locales, but the technology lags in some other geographic areas such as France. Driving adoption is availability and cost of sufficient upload speed and bandwidth. In addition to Eagle Eye’s branded growth, the company also provides the OEM engine behind a half dozen or so cloud systems offered by other manufacturers. Backing multi-site enteprises About eight years old, Eagle Eye Networks has focused squarely on the small- and middle-sized business (SMB) market, especially multi-site businesses such as retail, banking and healthcare. They also work with local governments and K-12 schools. Moving forward, the company will seek to expand more into multi-site enterprise customers, some of which have 1,000 locations around the world and need to store their video locally to meet regulatory requirements. Multi-site businesses, benefit from the cloud by eliminating the need for local IT equipment and expensive staff Multi-site businesses, especially, benefit from the cloud by eliminating the need for local IT equipment and expensive staff. As internet connectivity becomes less expensive than installing new cable infrastructure, cloud systems will become more attractive to large campus environments such as colleges and airports, says Francis. The advent of 5G connectivity will also be a plus. All Eagle Eye products are NDAA compliant. Premium support services Further expanding its services, Eagle Eye Networks is poised to launch “Premium Support Services,” in which the cloud provider’s employees will proactively monitor and service customer sites for a minimum additional monthly fee. The cloud structure enables most problems to be addressed and solved remotely without needing to send personnel to a site. The new investment from Accel, a funding partner of top-tier tech companies such as Facebook, Dropbox and Spotify, is Accel's first investment in the security industry. In addition to investing in AI, Eagle Eye also plans to leverage the funding to expand into new regional markets with new data centres and additional staff in business development, sales and support roles.
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilising the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualisation and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
Most customers interface with their financial institutions using automated teller machines (ATMs), which have security issues. However, there are solutions available to combat all current security threats, and the cost of protection is coming down. The ATM industry is therefore in a position to minimise losses, while ensuring consumers continue to get the vital cash they need to lead their daily lives. It is important for the ATM industry to constantly innovate to meet new security challenges. So what innovations are we going to see in the next five years? Contactless technology Contactless technology will be a great help against ATM skimming, in which criminals steal personal information at ATM machines. Contactless is already being used in some European countries, and the number is increasing. Not having to insert a card into the ATM removes the opportunity to trap cards and also gets around the problem of “foreign” devices installed to read cards. So contactless technology, which some saw as the end of cash, can help make ATMs and cash more secure. Not having to insert a card into the ATM removes the opportunity to trap cards Biometrics are certain to be used increasingly to bolster ATM security. Finger, palm, vein, iris and facial recognition all have potential in this respect. Any of these may in the future be used with or without cards, PINs and one-time codes. Speed of operation in relation to biometrics could ultimately govern their use at ATMs. There may also be privacy issues that need to be addressed. The ATM vestibule environment must add security with proper security and surveillance equipment. ATM vestibules, or lobbies, are installed for many good reasons. For one, more convenient, 24/7 locations equals better customer retention for a bank, offering comfort and convenience. 24/7 access to ATMs, night drops, coin counters, online banking kiosks, and other self-service solutions are very much in demand. Second, ATM vestibules protect customers from inclement weather and provide a more comfortable banking environment (however, vagrancy can be an issue; therefore ATM vestibules should require card access). Security and surveillance solutions can’t just be for show. ATMs and crime A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and the United States. Rough estimates place the total amount of global losses at up to $60 million. The protection of ATMs ATMs in supermarkets and pharmacies tend to be targeted because they may not be as well-protected, and store personnel likely would not know who is authorised to work on the ATM. In contrast, anyone approaching an ATM at a bank location would be more likely to be challenged. ATM jackpotting originated back in 2010 when Barnaby Jack, a New Zealand hacker and computer expert, demonstrated how he could exploit two ATMs and make them dispense cash on the stage at the Black Hat computer security conference in Las Vegas. Since then, malware has been created and made available on the “Dark Web” that can instruct an ATM to dispense all its cash on demand. ATM jackpotting ATM jackpotting is a combination of a physical crime and a cyberattack. Typically, a criminal with a fake ID enters a grocery shop or pharmacy posing as an ATM technician, then uses a crowbar to open the top of the ATM – the “top hat” – to gain access to the personal computer that operates the machine. Once he or she has access to the PC, they remove the hard drive, disable any anti-virus software, install a malware program, replace the hard drive and then reboot the computer. The whole operation takes about 30 seconds. The malware then enables the thief to remotely control the ATM and direct it to dispense all its cash on command. If a legitimate customer approaches the machine in the meantime, it can operate as usual until activated otherwise by the malware.
Singapore’s Changi Airport Group, one of the most innovative and technologically advanced airports in the world, has selected Genetec, Inc., a foremost technology provider of unified security, public safety, operations, and business intelligence solutions to enhance and upgrade its security system. The three-year project, which is expected to be completed by the end of 2023, will see Genetec™ Security Centre, a unified security platform that blends IP security systems within a single intuitive interface, underpinning the airport’s security operations, with a specific focus on the video surveillance system across its terminals. The contract was awarded to Genetec following a rigorous competitive tender process. “Increasingly, our airport customers are understanding the deep business insights Security Centre is capable of delivering, its ability to inform and create value for multiple areas of an airport business operation and improve the overall passenger and employee experience,” said Giovanni Taccori, Commercial Lead Transportation, APAC at Genetec, Inc.
Kumbh Mela is one of the most sacred pilgrimage festivals of India and is organised at a grand scale at Nashik, Haridwar, Ujjain and Prayag. As Kumbh Mela is being celebrated after a period of 12 years in Nashik, 100 million people are expected to visit, security is a major concern for the Government bodies. Nashik will be getting an opportunity to host these guests from July 14 to September 25 and no stone will be left unturned in hosting the massive gathering. Challenges Nashik Railway Station authorities wanted video surveillance devices that would not consume larger areas when it comes to installing them as the railway station had congested platforms. Moreover, they wanted a surveillance solution that gave them superior image quality and at the same time did not consume heavily on the bandwidth. Furthermore, the authorities wanted to monitor the whole place centrally and gain central control of the entire place. Installing devices and control room in the congested platforms Restricted allotted bandwidth for the video surveillance solution Requirement Prompt and smooth installations of cameras and hybrid video recorders within 30 days Setting up the control room for monitoring railway station entrance, platforms and connecting bridges High reliability of the solution for utmost security Storage of the entire 4-month period as evidential proof Matrix offering Installation was completed within 20 days with highly skilled manpower. Cascading of all the connected devices with sequencing for central monitoring on TVs in the control room to reduce the overall solution cost. 4 months scheduled backup of all cameras is configured centrally for storing all the streams. Matrix being an Indian brand, efficient pre-and post-sales support is a part of the solution. Results Secured entry and exit from the city with 24x7 video surveillance of the railway station Installation of the solution done within the defined time frame Products offered SATATYA HVR1624P SATATYA CIBR13FL40CW SATATYA CIDR13FL40CW SATATYA CIDRP20VL130CW SATATYA Centralised Monitoring Software (CMS)
St Louis-headquartered insurance brokerage Crane Agency is to roll out CyberCube’s Broking Manager, the cyber risk analytics platform for insurance intermediaries. Crane Agency is a US top 100 retail insurance broker, the oldest west of the Mississippi. Established in 1885, the business is licensed in 50 states and has four other offices in Missouri with over 250 staff. Broking Manager is the first software-as-a-service application CyberCube has built specifically for the insurance broking community. It offers a streamlined approach to generating financial exposure impact that helps clients make informed decisions on coverages and limits. Financial impact of cyber risk Broking Manager will allow Crane’s team to quantify and explain to their clients the sources and financial impact of cyber risk exposure. The platform also produces reports that can be used to educate prospects and clients on potential sources of loss, recent and relevant cyber events, and peer-to-peer benchmarking. Authority comments Pascal Millaire, CEO for CyberCube, said, “Crane Agency is a forward-looking insurance business that sees much potential in the cyber market. It’s been a pleasure to work with them and we’re thrilled they’ve chosen to use Broking Manager to assist with understanding their clients’ needs.” Beth Martin, Management Liability and Cyber Practice Leader, Crane Agency, said, “We’re very excited to be partnering with CyberCube. It’s our firm belief that Broking Manager will provide exceptional insights for our clients at a time when the cyber risk landscape is changing markedly.” “The pandemic and the shift in working patterns it has generated mean new risks, new modes of cyber-attack and new vulnerabilities. With businesses coming to terms with these changes, we see considerable potential for growth in the cyber insurance market.” Portfolio Manager and Account Manager Broking Manager complements CyberCube’s two other products, Portfolio Manager and Account Manager, which are designed for risk carriers and are used by foremost companies across the insurance ecosystem.
HID Global, the globally renowned company in trusted identity solutions, has announced that Collectors Universe, Inc. has added HID Trusted Tag Services to its Professional Coin Grading Service (PCGS) coins and banknote holders, so as to enable collectors to quickly and easily validate the authenticity, grade, and condition of their PCGS collectibles, with a tap of their NFC-enabled smartphone. Product authentication technology With the rare coin market exceeding US$ 3 billion, product authentication technology has swiftly become a necessity to prevent counterfeit coins and banknotes without compromising the encapsulation or condition of the collectibles. Collectors Universe first launched HID Trusted Tag Services with approximately 100,000 coins and received overwhelmingly positive feedback from customers. The company has purchased an additional two million HID Trusted NFC Tags to embed into broader segments of the PCGS inventory. HID Trusted Tag Services HID Trusted NFC tags are embedded into PCGS’s coin and banknote holders using discreet wet inlays “HID Trusted Tag Services is the single biggest leap forward for third-party grading since the inception of the collectibles market. I hope that every third-party grading service in the industry considers integrating similar technology into their product lines as well. It’s simply that important for the hobby as a whole,” said Brett Charville, President of Professional Coin Grading Service. HID Trusted NFC tags are embedded into PCGS’s coin and banknote holders using discreet wet inlays. Collectors just tap their phone to a holder to authenticate their collectible through the HID Cloud Authentication service. Anti-counterfeiting technology Each tap generates a unique one-time URL that automatically launches Collectors Universe’s proprietary PCGS Cert Verification app or opens a web browser to display information about the collectible’s authenticity. The single-use URLs help prevent threats such as spoofing or other attempts to circumvent the HID Trusted Tag Services. “With the HID solution, Collectors Universe is the first in the numismatic industry and among the first in any of the collectibles fields to utilise this type of anti-counterfeiting technology at scale,” said Collectors Universe Chief Information Officer, John Nelson, adding “The technology provides peace of mind to customers who seek reassurance that their investment is going toward a verifiable collectable.” NFC technology and cloud authentication services “HID Trusted Tag Services was specifically designed for Internet of Things use cases that benefit from combining our trusted NFC technology and cloud authentication services to enable new, convenient experiences for customers,” said Mark Robinton, Vice President of IoT Services with HID Global. Mark adds, “Product authentication and brand protection are some of the many applications we automate by leveraging smartphones to streamline and simplify processes that were previously manual and paper-based.”
The 100 Mount Street premium-grade office tower completed in May 2019, is the tallest (152m) building in North Sydney. With an innovative cross-braced exoskeleton structure and a soaring glass curtain wall, the tower celebrates Sydney‘s history of excellence in architecture and structural engineering. The 35-story office tower offers panoramic views of Sydney Harbour, Sydney Opera House and Sydney Harbour Bridge, and is occupied by some of Sydney’s best-known companies. The site also benefits from its proximity to key transport infrastructures with a train station, bus stops, ferry wharf and taxi stand all within walking distance. This high traffic location required a convenient and secure way to ensure controlled access for the 2,000 people entering the building everyday, while maintaining the aesthetics of the 8 metres-high ceiling lobby. Efficient control access to the building In order to efficiently control access to the building, the security contractor supplied top quality COMINFO EasyGate SPT entrance control gates equipped with IDEMIA’s MorphoWave™ Compact high-end biometric contactless devices. COMINFO is an experienced manufacturer of turnstiles and speed gates. EasyGate SPT models were installed, equipped with the latest MDD motor technology (Magnetic Direct Drive: no gearbox, no oil, no brush) and advanced infrared optical sensors which ensure safe passage and detect tailgating and cross-over, to ensure that only authorised people can pass through the gates. MorphoWave Compact™ is the flagship biometric device for physical access control from IDEMIA, the front-runner in Augmented Identity. The terminal performs a 3D scan and verification of 4 fingerprints in less than 1-second, in a quick and easy touchless wave gesture. Aesthetic integration The features of the product are particularly well-suited for high traffic locations with the capability to authenticate up to 50 people per minute thanks to advanced algorithms based on Artificial Intelligence. COMINFO carried out an aesthetical integration of MorphoWave™ Compact into EasyGate SPT, resulting in a powerful solution that brings the latest physical access control system using only a simple wave of a hand. The project was deployed by Centaman, COMINFO’s partner for Australia/New Zealand. First to implement biometric technology Dexus and Dexus Wholesale Property Fund who owned the building were the first to implement this biometric technology in office buildings and have now more than 2,000 people registered with their biometrics, removing the need for physical access cards or touching anything when entering or leaving the secured premises. The installation is highly acclaimed by employees who appreciate the frictionless and hygienic use of MorphoWave™ Compact and EasyGate SPT.
Malwarebytes, a provider of advanced endpoint protection and remediation solutions, announced that it was selected by NatWest Group to deliver premium cybersecurity security solutions to the bank’s consumer and business banking customers worldwide. NatWest Group customers will now be able get a free license to install Malwarebytes Premium to protect their digital experiences from within their Online Banking portal. “Keeping our customers safe and secure is of paramount importance to us,” said Alasdair MacFarlane, Head of Fraud Prevention NatWest. “We are the only UK bank to offer premium virus protection to our customers for free and are working with Malwarebytes to deliver this.” Increase awareness among customers New customer offering is experiencing positive adoption rates, quickly reaching the initial target of NatWest Group The new customer offering is experiencing positive adoption rates, quickly reaching the initial target of NatWest Group. The program has over 100,000 customer downloads to date and further efforts are planned to increase awareness amongst their customer base. “Providing digital protection, productivity, and peace of mind to customers is increasingly critical for companies and consumers as the threat landscape continues to rapidly evolve,” said Marcin Kleczynski, CEO of Malwarebytes. “Malwarebytes has been a champion of security since our inception and we’re thrilled to be able to partner with innovative, socially responsible organisations like NatWest Group who are going above and beyond to ensure the safety of their customers.” Malwarebytes for NatWest Group is available for personal customers on up to ten devices and for business customers on up to thirty devices. Users can download Malwarebytes from their online banking portal after logging in. This offering is available for customers of NatWest, Royal Bank of Scotland, Isle of Man Bank, NatWest International and Ulster Bank.
Round table discussion
Artificial intelligence is more than just the latest buzzword in the security marketplace. In some cases, smarter computer technologies like AI and machine learning (ML) are helping to transform how security operates. AI is also expanding the industry’s use cases, sometimes even beyond the historic province of the security realm. It turns out that AI is also a timely tool in the middle of a global pandemic. We asked this week’s Expert Panel Roundtable: How is artificial intelligence (AI) changing the security market?
The role of video surveillance is expanding, driven by all the new ways that video – and data culled from video – can impact a business. As a growing population of video cameras expands into new fields of view, we asked this week’s Expert Panel Roundtable: What is the most unusual application of surveillance cameras you have seen recently?
Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?
How to ramp up perimeter security with license plate reader technologyDownload
Solve access control challenges in the healthcare sectorDownload
Getting the most value from Software Subscription AgreementsDownload
Shifting trends in operation centers and control rooms for 2021Download