There’s no denying that cyber-crime is one of the biggest threats facing any organisation with the devastating results they can cause painfully explicit. Highly publicised cases stretching from the US government to digital giant Facebook has made tackling cyber security a necessity for all major organisations. The consequences of breaches have just become more severe, with new GDPR rules meaning any security breach, and resultant data loss, could cost your organisation a fine of up to four...
Johnson Controls is announcing two new camera models to the Illustra Pro line, with the Pro Compact Mini-Domes in 2MP and 3MP resolution, ideal for applications such as retail stores, healthcare facilities and banks where low profile and aesthetics are important. The Illustra 2MP and 3MP Pro Compact Mini-Domes are equipped with various viewing angles including corridor mode, a 9x16 field of view aspect ratio for vertically oriented scenes, which is optimal for hallways, aisles or any area where...
Physical security solution provider Safetell has entered into a partnership with blast protection and forced entry providers ABBEY PROTECT to distribute their SECURABLINDS product-line. SECURABLINDS provides patented blast and forced entry protection for doors and windows, creating an impervious barrier between an attack and the inside of the property in a fraction of a second. The solution, which is triggered by the positive phase of the blast wave emitted by an explosion, is the result of 18...
HID Global, a global provider of trusted identity solutions, is at the Temenos Community Forum 2018 Conference this week showcasing the company’s work with its growing ecosystem of fintech partners. This includes collaborating with fellow Temenos partner Fiorano Software to enable a variety of new data-driven and more customer-centric financial services that deliver a seamless user authentication experience. “The fintech revolution is accelerating innovation and creating exciting ne...
From big data to AI era, to transform a great amount data into useful information to improve business or social benefits, Data Retention technology is becoming the planning and acceptance of most projects due to it allows data to be kept intact for long time. Surveon Data Retention Solutions provide four advantages, including large capacity for 365-day recording, advanced RAID + spare drive for data security, unique failover for continuous record when NVR fails, robust data replication for doub...
To provide a practical solution to the monitoring of transportation infrastructure, where maximum situational awareness is paramount, Bosch Building Technologies have combined the innovation behind their video security cameras with the video management expertise of Intelligent Security Systems (ISS). ISS is a developer of video management and video intelligence solutions. Their video management platform, SecurOS, focuses on securing large mission-critical applications such as industrial and man...
STANLEY Product and Technology, a provider of security, access control and door entry solutions, will be showcasing the latest innovations from its PACOM and PAC GDX brands at IFSEC 2018. Specialising in integrated security solutions, for over 35 years PACOM has been trusted by some of the most prestigious organisations around the world in sectors such as banking and finance, healthcare, education, critical infrastructure, logistics, telecommunications and utilities. By visiting Stand F222 visitors will be able to find out more about the PACOM range of products including the Graphical Management System (GMS), which is engineered to communicate over an IP network and has technology tailored specifically for multi-site environments. The PACOM GMS allows the integration of access control, alarm monitoring, video surveillance and many other security services. To show its flexibility and functionality, RightCrowd’s automated workflow management software and EyeLocks’ iris-based identity authentication products will be integrated into the GMS platform and demonstrated on the stand. Unison is the solution of choice for organisations within verticals such as healthcare, universities, commercial buildings, airports and shipping ports Improving operational efficiency Alongside the PACOM GMS will be PACOM Unison – an open and integrated security management platform that enables the management of access control, intrusion detection, fire detection, intercom and video from one single user interface. Unison is the solution of choice for organisations within verticals such as healthcare, universities, commercial buildings, public facilities, municipalities, airports and shipping ports. Helping to protect people, property and assets, it also helps to improve operational efficiency and streamline processes to drive organisational excellence across campus environments. Remote configuration With 40 years’ experience in designing, engineering and manufacturing access control and door entry products for the commercial and residential markets, taking centre stage for PAC GDX will be PAC8 – a simple solution that redefines the way access control is installed, set-up and managed using a dedicated app and the cloud. PAC8 can be remotely configured via Apple iOS or Google Android smart devices, and provides end users with complete flexibility in terms of how they operate the system. In fact, PAC8 is so advanced that it boasts 90 per cent of the features normally only associated with PC-based systems. Ease of management Alongside PAC8 will be PAC's SecureNet integrated security software solution, which is reliable, scalable and can be adapted to suit every access control installation. Easily configured to operate on a standalone PC or across a corporate network, it displays detailed, real-time events information including alarms as they occur across the facility. With the ability to monitor alarm points, control elevators, manage fire doors or even control IP-based CCTV cameras, PAC SecureNet provides unprecedented ease of management. GDX7 SIP can be used to manage local alarms that are reported both locally and at the concierge Door-entry solutions Visitors to Stand F222 will also be able to see a preview of GDX7 SIP, which heralds the next stage in our cutting-edge door entry solutions. The SIP system can be provided with a Windows-based concierge function and enables management of multiple buildings over a large area. It can also be used to manage local alarms that are reported both locally and at the concierge. This functionality can be used to support residents who may be frail or require assisted living by having smoke or panic alarms linked in to the system. Data security and privacy Last but certainly not least, experts from PAC GDX will be available to discuss its Secure Hosting of Access Control Data service, which is the ideal solution for those in the residential sector that find the storing and maintaining of important site and keyholder information to be a financial burden as well as a potential cyber security flaw. It enables end users to manage the operation of their system internally but safe in the knowledge that all data is securely stored. James Ford, marketing director at STANLEY Product and Technology, concluded, “As the key event in the UK’s security calendar, IFSEC International 2018 provides an excellent platform to further highlight our credentials.” “The last 12 months has been a period of considerable activity for us, with a number of significant additions to our ever-expanding portfolio, and we look forward to welcoming visitors to Stand F222, where our team of experts will be available to talk through the features and benefits of our cutting-edge innovations and discuss the advantages of working with us.”
ISC West in Las Vegas kicked off with a bang on Wednesday, reflecting a healthy physical security industry with an overall upbeat outlook on the future. Driving the optimism is a pending new wave of product innovation, propelled largely by developments in artificial intelligence (AI) and deep learning. Some of that new wave is evident at ISC West, but much of the talk still centres on what’s to come. Attendees flocked to the first day of the show to check out the newest technologies, and they were rewarded with a wide range of innovations. Tempering the optimism are ongoing concerns about ensuring the cybersecurity of IP-based physical security systems. Cybersecurity standards for physical security At least one news announcement is related to cybersecurity at the show: Johnson Controls is the first company to achieve UL (Underwriters Laboratories) certification 2900-2-3 for cybersecurity of life safety and security products and systems for their VideoEdge network video recording platform from American Dynamics. The UL brand ensures that the certification involves a standards-based and scientific approach to evaluating cybersecurity, and that JCI’s certified products meet the requirements. “We were able to be first because we understand issues of cybersecurity, and the UL standard matches very closely to what we have been doing in cybersecurity,” says Will Brown, Senior Engineering Manager, Cyber Protection at Johnson Controls. Tempering the optimism are ongoing concerns about ensuring the cybersecurity of IP-based physical security systems Neil Lakomiak, Director of Business Development and Innovation at Underwriters Laboratories, says relatively few companies have invested sufficiently in cybersecurity, and much of UL’s work in the physical security market is to help manufacturers develop a roadmap to meet cybersecurity goals. “A lot of companies have not invested, but Johnson Controls has,” said Lakomiak. He speculated that it could be some time before another security company achieves the certification; there certainly won’t be a rush of additional companies to do so in the near term, based on the progress he has seen to date, says Lakomiak. “Cybersecurity is a topic that has hit the Board of Directors level,” says Lakomiak. “They are definitely inquiring about it and trying to understand what their posture should be. The leadership teams of companies will be asking a lot of questions.” In terms of cyber-consciousness among the integrator community, Brown estimates about 10 percent are “on board” with the issue. Among the manufacturing community, more than half of the companies are pursuing cybersecurity goals, although the levels of those efforts run a full gamut, says Lakomiak. Vertical markets that are especially cyber-aware are enterprise, government, and critical infrastructure. Financial and retail companies are also coming on board, as well as companies — even small companies — in regulated industries such as utilities Cybersecurity is a topic that has hit the Board of Directors level Cybersecurity in the cloud Another company emphasising cybersecurity at ISC West is access control company Isonas. “What’s really new at the show for us is that we are being very transparent about the levels of cybersecurity we are applying to our cloud software platform and our IP network hardware,” says Rob Lydic, Isonas Global Vice President of Sales. “The levels of complexity we are putting into our cybersecurity, including the fact that we host our software on Amazon web services, ensures a really high level of security. We are taking painstaking efforts to subject ourselves to third-party penetration testing to give us the visibility of what is going on with our cybersecurity — are we actually as cybersecure as we believe?” The answer: “They have come back to us to say we have an amazing strategy for cybersecurity; the surface that is attackable is minuscule, and the complex layers underneath really prevent anybody from hacking the product.”We are being very transparent about the levels of cybersecurity we are applying to our cloud software platform" Lydic says he sees higher levels of awareness about cybersecurity at the show, especially among end users. Several other exhibitors agree. Because edge devices have often been targeted in cybersecurity attacks, they are especially an area of concern. “We’re raising that conversation, saying we are a cloud service provider that uses edge devices, and it is core to us to make sure we have a great cybersecurity profile, so the customer can be assured we are doing what we say we are doing and delivering on those promises,” says Lydic. Awareness is filtering through channel: Isonas is seeing many customers who want to have that cybersecurity conversation at the show. “We have had probably 20 or 30 conversations with end users at the show who want to understand what it means to be in the cloud, to understand how the level of communication is encrypted between devices,” says Lydic. Many end users at ISC West want to understand what it means to be in the cloud Ambitions for growth Successful companies often increase their ISC West booth size as a reflection of their ambition to grow as a company and their success in sales so far. One such company is Paxton Access Inc., which has increased its booth size from a 20x40-foot booth last year to a 30x50-foot space this year. Beyond the show, another reflection of Paxton’s growth is addition of personnel to cover 11 U.S. sales territories that have been newly restructured. New regional sales managers will work with dealers locally. At the show, Paxton is introducing its Net2 Entry Premium monitor, the latest addition to the company’s Net2 Entry line of door entry products. “The show is definitely a great way to promote who we are and what we offer,” says Linda Soriano, Paxton Marketing Communications Coordinator. “It’s great to meet new customers and interact with existing customers, to build new relationships. It’s an opportunity to promote the new things we have going on.” Paxton measures success at ISC West in terms of how many people they interact with at the show. In addition to welcoming booth visitors, the company is signing up attendance at free training through a show promotion. Anyone who signs up for training at the show is entered into a drawing for a $500 Visa gift card and a $1,000 discount off MSRP of Paxton products. Tim Shen, Director of Marketing at Dahua Technology USA, one of the larger exhibitors, says the company is emphasising solutions at ISC West, just one element of the successful international business model they are bringing to the United States.With AI and business analytics in transportation and retail markets, we are letting the market know that we can build solutions" Another topic for Dahua is artificial intelligence. “With AI and business analytics in transportation and retail markets, we are letting the market know that we can build solutions,” he says. Dahua sponsored a keynote address Wednesday on AI, including a presentation from Intel about AI trends. “AI is the future, but what can we use it for now?” asks Shen. “We need to give a very clear strategy of what we think about AI.” Dahua will bring AI cameras and an AI network video recorder to the U.S. market in the second quarter; in effect, they will be testing the water to see how well the AI concept is embraced here. Other new products from Dahua include multi-image and thermal cameras. In the thermal category, Dahua has developed their own chipset to help bring the price down and provide affordable thermal cameras to the U.S. market. Another focus will be e-POE (extended Power over Ethernet), which Dahua sees as a big differentiator. [Main photo credit: Abbey Masciarotte | Larry Anderson]
Cybersecurity talk currently dominates many events in the physical security industry. And it’s about time, given that we are all playing catch-up in a scary cybersecurity environment where threats are constant and constantly evolving. I heard an interesting discussion about cybersecurity recently among consultants attending MercTech4, a conference in Miami hosted by Mercury Security and its OEM partners. The broad-ranging discussion touched on multiple aspects of cybersecurity, including the various roles of end user IT departments, consultants, and integrators. Factors such as training, standardisation and pricing were also addressed as they relate to cybersecurity. Following are some edited excerpts from that discussion. The role of the IT department Pierre Bourgeix of ESI Convergent: Most enterprises usually have the information technology (IT) department at the table [for physical security discussions], and cybersecurity is a component of IT. The main concern for them is how any security product will impact the network environment. The first thing they will say, is “we have to ensure that there is network segmentation to prevent any potential viruses or threats or breaches from coming in.” The main concern for IT departments is how any security product will impact the network environment”They want to make sure that any devices in the environment are secure. Segmentation is good, but it isn’t an end-all. There is no buffer that can be created; these air gaps don’t exist. Cyber is involved in a defensive matter, in terms of what they have to do to protect that environment. IT is more worried about the infrastructure. The role of consultants and specifiers Phil Santore of DVS, division of Ross & Baruzzini: As consultants and engineers, we work with some major banks. They tell us if you bring a new product to the table, it will take two to three months before they will onboard the product, because they will run it through [cybersecurity testing] in their own IT departments. If it’s a large bank, they have an IT team, and there will never be anything we [as consultants] can tell them that they don’t already know. But we all have clients that are not large; they’re museums, or small corporations, or mom-and-pop shops. They may not be as vulnerable from the international threat, but there are still local things they have to be concerned about. It falls on us as consultants to let them know what their problems are. Their IT departments may not be that savvy. We need to at least make them aware and start there. Wael Lahoud of Goldmark Security Consulting: We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels. At the procurement stage, we as consultants must select and specify products that have technology to enable cybersecurity, and not choose products that are outdated or incompatible with cybersecurity controls. We also see, from an access control perspective, a need to address weaknesses in databases. Specifying and having integrators that can harden the databases, not just the network itself, can help. The impact of physical security products on the network environment was a dominant topic at the MercTech4 consultants roundtable discussion The need for standards on cybersecurity Jim Elder of Secured Design: I’d like to know what standards we as specifiers can invoke that will help us ensure that the integrator of record has the credentials, knows what standards apply, and knows how to make sure those standards are maintained in the system. I’m a generalist, and cybersecurity scares the hell out of me.We’re not just talking about access to cameras, we are talking about access to the corporate network and all the bad things that can happen with that. My emphasis would be on standards and compliance with standards in the equipment and technology that is used, and the way it is put in. It can be easier for me, looking at some key points, to be able to determine if the system has been installed in accordance. We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels"I’m taking the position of the enforcement officer, rather than the dictator. It would be much better if there were focused standards that I could put into the specification— I know there are some – that would dictate the processes, not just of manufacturing, but of installation of the product, and the tests you should run accordingly. Pierre Bourgeix: With the Security Industry Association (SIA), we are working right now on a standard that includes analysed scoring on the IT and physical side to identify a technology score, a compliance score, a methodology, and best-of-breed recommendation. Vendor validation would be used to ensure they follow the same process. We have created the model, and we will see what we can do to make it work. Terry Robinette of Sextant: If a standard can be written and it’s a reasonable process, I like the idea of the equipment meeting some standardised format or be able to show that it can withstand the same type of cyber-attack a network switch can withstand. We may not be reinventing the wheel. IT is the most standardised industry you will ever see, and security is the least standardised. But they’re merging. And that will drive standardisation. Jim Elder: I look to Underwriters Laboratory (UL) for a lot of standards. Does the product get that label? I am interested in being able to look at a box on the wall and say, “That meets the standard.” Or some kind of list with check-boxes; if all the boxes are checked I can walk out and know I have good cybersecurity threat management. IT is the most standardised industry you will ever see, and security is the least standardised" The role of training Phil Santore: Before you do any cybersecurity training, you would need to set the level of cybersecurity you are trying to achieve. There are multiple levels from zero to a completely closed network. Wael Lahoud: From an integrator’s perspective, cybersecurity training by the manufacturer of product features would be the place to start – understanding how to partner the database, and the encryption features. We see integrators that know these features are available – they tick the boxes – but they don’t understand what they mean. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation. That would be a good starting point. The role of integrators Wael Lahoud: Integrators like convenience; less time means more money. So, we see some integrators cut corners. I think it is our role (as consultants) to make sure corners are not cut. If you rely solely on integrators, it will always be the weak password, the bypass. We have seen it from small projects to large government installations. It’s the same again and again. Even having an internal standard within an organisation, there may be no one overseeing that and double-checking. Tools will help, but we are not there at this point. I will leave it up to manufacturers to provide the tools to make it easy for consultants to check, and easier for integrators to use the controls. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation - so training is very important The impact of pricing Pierre Bourgeix: The race to the cheapest price is a big problem. We have well-intended designs and assessments that define best-of-breed and evaluate what would be necessary to do what the client needs. But once we get to the final point of that being implemented, the customer typically goes to the lowest price – the lowest bidder. That’s the biggest issue. You get what you pay for at the end of the day. With standards, we are trying to get to the point that people realise that not all products are made the same, not all integrators do the same work. We hope that through education of the end user, they can realise that if they change the design, they have to accept the liability.It’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it" The big picture Wael Lahoud: The Windows platform has a lot of vulnerabilities, but we’re still using it, even in banks. So, it’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it. That’s where the cybersecurity program comes into play. There are many vulnerable products in the market, and it’s up to professionals to properly secure these products and to design systems and reduce the risk. Pierre Bourgeix: The access port to get to data is what hackers are looking for. The weakest link is where they go. They want to penetrate through access control to get to databases. The golden ring is the data source, so they can get credentialing, so they can gain access to your active directory, which then gives them permissions to get into your “admin.” Once we get into “admin,” we get to the source of the information. It has nothing to do with gaining access to a door, it has everything to do with data. And that’s happening all the time.
HSI Sensing, an Oklahoma-based manufacturer of custom reed switch and sensor technology, announced at ISC WEST 2018 that its high-security sensors product line – Sentinel – now includes four new UL 634 certified sensors. HSI launched its Sentinel sensors line in 2017 as an enhanced technology for high-security intrusion detection. “We are excited to offer an expanded line of Sentinel products to our customers,” said Ryan Posey, CEO of HSI Sensing. “Sentinel is tried and true as a leader in high-security uses, but we pride ourselves on constant innovation to meet our clients’ ever-changing needs. We look forward to continuing to grow this line and providing exceptional solutions and service to clients.” Two of the new models - recessed & retro – carry the UL 634 Level 2 High Security certification Anti-tampering features HSI’s Sentinel sensors utilise Solid State technology and are designed with a wide range of anti-tamper features that allow them to resist physical, electrical and magnetic tampering. Sentinel is intended to be a door contact sensor and entry-point alarm where failure is not an option, like at government facilities, prisons, banks, weapon sites and other high-security areas. The Sentinel product line received a substantial expansion for ISC West 2018 with the addition of the four new UL 634 certified products. Two of the new models - recessed & retro – also carry the UL 634 Level 2 High Security certification. The new products build upon the market-leading technology HSI introduced in 2017 with the original Sentinel surface mount. Sensors for residential and commercial security The recessed version is a concealed mount for use inside door frames, and the retro version is compliant with existing models on the market to facilitate the ease of replacing outdated technology with the newest innovations. The other two new sensors are SRC+ products and are door and window contacts for the high-end residential and commercial markets – they feature much greater resistance than standard market products currently available. The expanded Sentinel high security sensors line is certified and available for delivery now. HSI is also working on several other developments, which will be released in the coming months.
Kogniz, a California-based technology company, announced the introduction of the company’s first product, AICam. The technology offers businesses fully artificial intelligence surveillance cameras that identifies people and threats in real-time, using video-based facial recognition and object detection. “In business environments, surveillance requires identifying problematic people and situations in real time, something humans aren’t good at. Kogniz leverages computer vision, artificial intelligence, and machine learning to identify people and threats in real-time with extraordinary accuracy,” said Daniel Putterman, Co-CEO and Head of Business for Kogniz. AICam is based on the Kogniz Edge Platform, a unique combination of advanced camera processing and cloud services Kogniz Edge Platform AICam is based on the Kogniz Edge Platform, a unique combination of advanced camera processing and cloud services. This architecture allows cameras to be added on-demand without any additional hardware or infrastructure, with multiple cameras working in unison to provide cross-location people identification and recognition. “While we have seen high innovation from companies such as Nest and Ring in the consumer realm, there has been a lack of breakthrough technology and products for enterprise,” added Putterman. Key features include: Visual Watchlists - Kogniz instantly identifies people of concern, such as a known criminal, shoplifter or ex-employee. Using highly accurate facial recognition, Kogniz alerts the business when that person is identified. Threat Detection - Kogniz is designed to detect potential threats, immediately warning when it recognises a weapon or dangerous object. Access Control - Kogniz can watch over a secure area such as a data centre, stock room, etc., and notify users when an unauthorised person comes into view. Suspect Watch - Kogniz identifies and remembers suspicious behaviours, allowing it to track visit patterns, dwell-time and other attributes that can help to identify patterns of suspicious behaviour. Smart Recording - Kogniz stores relevant video in a private and secure cloud vault that can be accessed from anywhere. Kogniz products are currently in pilot programs with various law enforcement, government agencies, banks and corporations.
Security dealers and integrators don’t have the time or money to wade through dozens of security platforms and programs from various manufacturers. Think about all the training necessary for support, sales and technicians required when using multiple management platforms. It can become overwhelming. The single solution to meet the needs for all your customers and projects in every market vertical is Connect ONE from Connected Technologies, LLC. Cloud-hosted Connect ONE is the complete package—and an enabling technology for managed services and new monthly recurring revenue streams. It lets security dealers offer security, access control, mobile credential access, video and critical environmental monitoring and more from one simplified user interface. There’s no having to learn a different program for each project, because Connect ONE does it all. There are no upfront costs or software to install and maintain and dealers only pay for the services they use. The Connect ONE dealer portal lets dealers add services or provide support and upkeep without having to roll a truck, a huge cost and labour savings Installing and managing services With Connect ONE and the cloud you can add new services in a snap—like thermostat/energy management control for the bank or financial institution that’s closed on holidays, saving money on energy costs; weather reporting capabilities that automatically send information to devices to trigger closing skylights or overhead doors in the event of a storm; or even detailed history and systems reporting so customers have all the operational metrics they need at their fingertips. Connect ONE makes it simple for security dealers to sell, install and manage all their services and information from one source. The Connect ONE dealer portal lets them add services or provide support and upkeep without having to roll a truck, a huge cost and labour savings. Not only is it easier for the dealer, but it’s simpler for the end-user who wants to manage all or some of their own services. Capabilities and integrations offered by Connect ONE: Connect ONE interfaces with the complete line of Bosch Security, DMP, Elk Products and Honeywell Turbo controls and provides an easy way to add managed services through the cloud. DoorBird Video Doorbell integration, for residential and commercial customers, notifies users to their smartphones when an entrance button is pressed. Using the app, they can view live video, open doors and even initiate two-way-audio. The Connect ONE Ticket Module streamlines the tracking of critical event responses, incidents and repair tickets at one or multiple locations. It interfaces directly with the Connect ONE security system application or can be deployed as a standalone service, with no control or on-site equipment. ScanPass Mobile Credential convenience application provides quick access control in a barcode-sticker solution that doesn’t require card readers or door controller hardware. Any smartphone, tablet or other connected device provides entrance accessibility. Connect ONE also supports popular Nest indoor and outdoor cameras, allowing users to view and control all cameras from the single interface, even multiple locations at the same time. The Connect ONE Gateway Module gets security dealers entrenched in the growing internet of Things. This easy to install and monitor module lets dealers track temperature, humidity and critical environmental devices for agricultural, hospitality and other vertical markets. Emails and reports sent in real time alert managers with information about out-of-normal ranges or levels. Integrated security and access control services With Connect ONE, you don’t have to shop numerous vendors. It’s all in one platform. Connected Technologies excels at serving the dealer community and can help you work through any new challenges you might have so you can provide customers the individualised integrated security and access control services they are looking for. We are receptive and responsive, giving dealers the timely service they deserve so they can continue on their way to greater profitability. One common interface makes everything simpler and can make you a hero with your customer—as you can add what they need now or easily in the future. Contact us today so we can help you earn greater profitability while you boost your revenue base through managed services—with one single solution—Connect ONE.
Dahua Technology, manufacturer and supplier of video surveillance products provides its patented HDCVI solution to secure Lulu Hypermarket in Muscat, Oman. Lulu Hypermarket is a hypermarket chain and retail venture started by Lulu Group International in 2000. It has over 30,000 employees of various nationalities. Lulu Hypermarket is one of the largest retail chains in Asia and is the biggest in the Middle East, with 115 outlets in the Gulf Cooperation Council (GCC) countries and one in Kochi, India. It is amongst the world’s 50 fastest growing retailers, according to research firm Deloitte. Dahua’s security solution Dahua provided HDCVI technology to secure the branch of Lulu Hypermarket in Muscat with cooperation from its system integrator China Communications Services. This is the first time that Dahua and China Communications Services have cooperated for an entire CCTV project. The two teams’ deep experience in CCTV resulted in a smooth and successful implementation for Lulu. Lulu mainly used Dahua HDCVI Professional series products, including HDCVI cameras, HDCVI DVRs, VMS, IP storage, video wall, etc. Around 250 HDCVI cameras, including bullet, dome and PTZ, were provided by Dahua. A video wall display unit was used in the control centre and IP SAN storage devices are used to meet 90 days recording requirements.Dahua appreciated the teamwork with China Communications Services, which made the project successful and was happily accepted by Lulu Hypermarket" Dahua HDCVI Professional series adopts the patented DH5000 chipset and high-performance CMOS sensor. The camera retains the ease-of-use of an analogue system while offering up to 1080P HD video output. Pro series is suitable for the users who want to secure small-and-medium-scale applications like airports, hospitals, schools, upscale hotels or banks. Collaborations for success "HDCVI is Dahua-patented technology featuring HD analogue video transmission over coaxial cable, allowing reliable long-distance HD transmission at lower cost. As for the Lulu Hypermarket, we provided our HDCVI professional series products to protect the whole market,” said Rio Mao, Sales Director of APAC at Dahua Technology. “Dahua appreciated the teamwork with China Communications Services, which made the project successful and was happily accepted by Lulu Hypermarket. We are obviously looking for further cooperation with China Communications Services for more projects.” "We really appreciate this great support from Dahua, and we have more confidence to work with Dahua together in the whole Middle East market,” said Zhu Linghua, Manager of Overseas Department at China Communications Services. “I believe we can achieve more mutually-beneficial project starts from this successful case and continue cooperation with each other in the near future.”
Banks and financial institutions have more complex and diverse requirements for video surveillance technology than most other organisations. From corporate buildings, to branch offices, data centres, ATMs and cash depots. Several European Banks benefit from using Mirasys Video Management Software (VMS), which provides high privacy protection and robust technology. Networking the video management system of the bank’s branch offices provides users a single logical system that can be used from any site or from an external service provider's service centre. Hence, VMS services are produced in the most cost-effective way whether it be locally, centrally or outsourced.The unique, non-fragmenting storage file system provided by Mirasys protects against hard disk failure The Mirasys VMS checks the system performance in real time and helps to prevent system failure. Enhanced multi-disk recording minimises data loss and maximises recording continuity. The unique, non-fragmenting storage file system protects against hard disk failure. Benefits to financial sector Perimeter and motion detection monitors sensitive and restricted areas, such us bank vaults or safety deposit boxes, and alerts personnel only if an important event occurs, saving time and operational costs. People counting and other data reporting enables reduction of business inefficiencies and enhances customer service. Advanced alarm management tools enable the creation of specific alarm lists based on the motion, sound or text data triggers; reducing the number of false alarms. Dwell time and stopping detects people loitering at the ATM. Automatic Number Plate Recognition (ANPR) alerts on potential threats and suspicious vehicle movement and reports on car parking utilisation.Automatic Number Plate Recognition (ANPR) alerts on potential threats and suspicious vehicle movement and reports on car parking utilisation Recorded video watermarking guarantees the integrity and authenticity of recorded and exported video data for court evidence. User authentication and setting specific user rights ensures control of system access and protects sensitive data. Also, product features such as audit trail and versatile material management and search functionality support, e.g., the new EU General Data Protection Regulation (GDPR) requirements. The purpose of the audit trail events is both to show what the user has done, and also to track other (programmatic) changes that change the user interface. Key to data security is operational policies for: account security (e.g., personal user accounts, instead of shared accounts, rename default administration accounts, etc.); password security (don't leave systems with default passwords, don't permit too short passwords, use passphrases instead, etc.), and; software and device firmware updating. Mirasys recommends that systems are kept up to date with the latest software versions. In a networked, multi-server or multi-site environment, all Mirasys VMS servers and client applications can be centrally upgraded from the Mirasys management server. Manage easily various event sources in multiple locations with the flexible Mirasys Smart Event Management platform How to protect your surveillance online For deployments, Mirasys recommends that surveillance cameras are installed, when possible, in a private camera network, where the direct camera communications take place only inside the camera network to VMS servers, and is separate from the client access (“viewing”) network (and from the public Internet, in particular). This also prevents the camera streaming and signalling from being forwarded inadvertently to any external systems not part of the VMS solution. In addition, camera access from outside the private network is thus not possible. It is also recommended to protect wide area network links with VPN (Virtual Private Networking), or other secured, connections.Integrated systems such as access control, intruder detection and fire alarm systems serve as sensors for the video management system For server-to-server and client-to-server signalling, the data communication is in Mirasys VMS both compressed and encrypted by default for sensitive data (such as usernames and passwords and other details). Integration and Internet of Things in VMS With larger video management solutions, the integration of different systems is valuable because it allows automated functionalities that eliminate human errors and delays. Integrated systems such as access control, intruder detection and fire alarm systems serve as sensors for the video management system. IoT (Internet of Things) is increasingly applied in the video management. The sensors continuously provide information and, if necessary, based on this information, the predefined decision chains automatically open a video connection to the event place without any delay or error. The resulting snapshot may be one image or a set of several images that supports decision making in a problem situation. All the information is also stored for later processing. The event picture is routed either automatically or manually for people and organisations needing the information. Also, related Standard Operating Procedures can be automatically opened.Mirasys VMS is the answer to the scalability and performance needs of new camera technologies from any manufacturer Mirasys VMS is quick and easy to install, and especially effective in networked, IP-based CCTV systems and their operational and management needs, such as centralised management and upgrading/updating of servers, drivers and client applications without requiring on-site travel to remote locations. User profiles are easy to create and change. Servers can be pre-installed and pre-configured before delivering to the deployment location. Easy-to-use user interface The Mirasys VMS user interface can be adapted to individual and specific needs and preferences and provides more visual space for videos without sacrificing any functionality. A HTML5 (Hypertext Markup Language, Version 5) based user interface in Version 8.4 offers easy access to the Mirasys system from anywhere; PCs, tablets or smartphones. Video surveillance camera features are consistently improving. Image quality can be exceptionally good compared to what it used to be only a few years ago. The newest cameras also require much less network bandwidth due to more effective encoding formats, such as H.265/HEVC (from 40% up to 60% of bandwidth and storage space savings, depending on the footage and device without any loss of quality, or increased quality at the same level with the H.264/AVC encoding) that many IP camera manufacturers have started to support. Individual servers can handle more simultaneously connected cameras than before, and the entire system has no actual upper limit. Mirasys VMS is the answer to the scalability and performance needs of new camera technologies from any manufacturer, and the Mirasys based video management system can be designed freely using the best equipment for the customer-specific requirements and can support also all future needs.
Ward Security has been appointed as the security provider for British Arab Commercial Bank following a competitive tender process. The appointment will see the team manage the security at BACB’s Mansion House premises in London, supplying both concierge and security guarding personnel. The British Arab Commercial Bank is a UK regulated bank that has operated for more than 40 years with an expertise in international finance and a focus on helping companies to develop and grow trade in new markets with confidence. Kevin Ward, Managing Director of Ward Security said, “We are delighted to have been awarded such a prestigious contract by the bank. We believe our philosophy of providing people who are both professional and dedicated to delivering high quality standards closely matches the principles of the bank. All our clients need bespoke solutions that consider the key security needs both today and, in the future, and our tender clearly communicated that to the bank. We look forward to working with them.”A key speciality of Wards Security is the provision of search and guard dogs Dog guarding projects Steve Cook, Director of Facilities at British Arab Commercial Bank said, “We have been impressed with the high standards and accreditations that Ward Security work to and maintain but mostly this company is clearly very passionate about what they do." "Not only have they identified efficiencies and new ways to work they have delivered a proposal to us with fresh enthusiasm. The team at Ward Security are already integrating well into our team and we are pleased with the appointment of them as our new security provider.” From its headquarters in London Ward Security provides a full range of security services to high profile companies nationwide and it has regional offices covering Kent, The Midlands and South East England regions employing a team of over 900 security personnel. A key speciality of the company is the provision of search and guard dogs. It works closely with the City of London Police and both Bromley and Bexley Borough Councils on a number of specialist dog guarding projects.
Fifth Third Bancorp, one of the top 15 banks in the U.S., is well on its way toward completing a major upgrade of its March Networks video surveillance system. A customer since 2004, Fifth Third has deployed 12,000 March Networks cameras and approximately 1,400 March Networks 8000 Series Hybrid NVRs over a period of 36 months. Identification and apprehension of suspects “By the end of 2016, we’ll have a total of 1,600 new 8000 Series recorders,” said Mike Neugebauer, Fifth Third’s Vice-President and Director of Corporate Security, who oversees security for 1,300 full-service retail branches, as well as data centres, corporate offices and cash handling facilities across 12 states. The combination of March Networks MegaPX WDR MiniDome Z IP cameras, Analog WDR Indoor Domes and the 8000 Series Hybrid NVRs with advanced video compression allows Fifth Third to provide law enforcement authorities with high-quality video for the identification and apprehension of suspects. Video verification improves urgency “Bank robberies and break-ins appear to be trending higher nationally,” said Neugebauer. “Much of it is a consequence of the heroin epidemic. Typically, they’ll go through a window in the middle of the night to see what there is to steal.Security staff in our 24-hour monitoring centre can verify an alarm and tell responding law enforcement officers what we see" “We constantly get compliments from law enforcement about the quality of our video. Even if the bad guys show up with hoodies or masks, we can zoom in on clothing patterns and brand logos, partial facial features, tattoos or other distinguishing marks.” “Security staff in our 24-hour monitoring centre can verify an alarm and tell responding law enforcement officers what we see,” said Neugebauer. “Video verification is huge. It changes law enforcement’s urgency to respond.” Crystal-clear images In minutes, Fifth Third security staff can email crystal clear images of a suspect to police, dramatically improving the chances of apprehension. The March Networks MegaPX WDR MiniDome Z IP camera’s wide dynamic range and progressive scan in high resolution delivers excellent image quality even in bright backlit situations, while its H.264 compression technology reduces bandwidth and storage costs. The MiniDome Z also features Power-over-Ethernet and is ONVIF-compliant, allowing it to be used with a variety of third-party video surveillance systems. Linking video with teller and ATM transaction data allows fraud investigators to quickly establish the identity of an individual associated with a transaction The Analog WDR Indoor Dome also features wide dynamic range, progressive scan in high resolution and low light sensitivity, making it ideal for capturing quality images in a variety of lighting conditions. Mix of analogue and IP The 8000 Series Hybrid recorder is a perfect fit for Fifth Third, accommodating a mix of analogue and IP cameras and offering up to 16 TB of onboard storage across four hard drive slots. “Typically, we’ll have two IP MiniDomes and 14 analogue cameras per branch, but we’re starting to use more exterior-mounted IP cameras in our elevated risk branches, so storage is important to us,” said Neugebauer. “The other thing we like about the 8000 Series is how it gives us sharper images from our analogue cameras.” The availability of the 8000 Series Hybrid NVR in 4, 8, 16 and 32-channel configurations is also a plus because it allows Fifth Third to acquire a fit-for-purpose unit for every application. Compatibility issues The decision to standardise on March Networks cameras frees Fifth Third from having to worry about any compatibility issues. “When we weren’t buying March Networks cameras, it made management of the cameras a lot harder for us,” said Neugebauer. “That was especially the case for IP megapixel cameras and managing the software patches that have to go on them. The fact that our March Networks cameras work in concert with our NVRs means we don’t have to do any software loads like we had to do when we were buying another camera brand. We were managing many pieces of software instead of just one platform.” Transitioning to Command Enterprise and Searchlight Next on the agenda for Fifth Third is a transition to March Networks Command Enterprise video management software and the acquisition of March Networks’ Searchlight for Banking software. Fifth Third security staff can email crystal clear images of a suspect to police, dramatically improving the chances of apprehension Command Enterprise features a user-friendly, browser-based interface that provides support for up to 10,000 recorders and 128,000 video channels, while Searchlight for Banking is a suite of tools to speed fraud investigations and capture business intelligence such as tracking customer behaviour. Linking video with teller and ATM transaction data, for example, allows fraud investigators to quickly establish the identity of an individual associated with a transaction. Searchlight advantages “On the retail side, we also hope to take advantage of Searchlight to help us make better business decisions,” said Neugebauer. Using Searchlight’s queue length monitoring analytics, Fifth Third will be able to gather and compare metrics on branch traffic and speed of service. It can also be used to track self-serve kiosk usage and gather data on how long customers linger in front of marketing displays. Concurrent with the introduction of Searchlight, Fifth Third is also planning to acquire March Networks’ new MegaPX Indoor Analytics Dome camera with built-in intelligence. “We’ve just done some testing and we’re very pleased with it,” said Neugebauer. While security remains the primary application for video surveillance at Fifth Third, other “lines of business” are taking advantage of it. Weather damage and alarms “In the past, security directors were always hesitant to share their video surveillance system, but we share our system with our facilities and retail groups”, said Neugebauer. “They use it to see if the sidewalk has been shovelled or if the parking lot has been plowed in our northern branches. In Florida, where we’ve had some severe storms, they use it to see if the windows have been blown out or if we have water damage. “Our facilities group has really embraced it. We’ll put cameras in mechanical rooms, for example, so they can see the indicator light configurations on the control panels. It often saves them from making a trip to the site. If a technician gets an alarm from an HVAC system or a generator, for example, he can diagnose the problem remotely and take the necessary steps to resolve it.When we weren’t buying March Networks cameras, it made management of the cameras a lot harder for us" “Retail uses the system to look at compliance with opening and closing procedures. Or, they may have a teller who’s great at selling and go in to look at best practices for training purposes.Sharing their March Networks video surveillance system with other departments “makes funding easier for us,” said Neugebauer. Longer lifecycle However, underlying Fifth Third’s choice of a video surveillance supplier is March Networks’ track record for product durability. Fifth Third began retiring the 4000 C Series recorders it acquired in 2004 two years ago and will only complete the transition to new 8000 Series units in 2016. “Some of my peers in the industry are buying new recorders every three years,” said Neugebauer. “Everything has a lifecycle and we feel the lifecycle for March Networks products is significantly longer than most of the other systems out there.”
MOBOTIX has announced a raised focus on cyber security by implementing the “MOBOTIX Cactus Concept.” The concept aims to deliver a comprehensive approach to protecting MOBOTIX products against the threat of cyber-attacks along with education and tools to help customers and partners build and maintain secure video surveillance and access control environments. Multimedia cybersecurity campaign The objective of the Cactus Concept is to implement a multimedia cyber security campaign in order to raise awareness among potential and existing MOBOTIX customers of the importance of data security in network-based video security systems and how organisations can protect themselves through cost-efficient and intelligent solutions. The Cactus Concept protects every element of the design, manufacture and operation of each device End-to-end encryption with no blind spots is required, from the image source via the data cables and the data storage through to the video management system on the user’s computer. Like a cactus, whose every limb is covered in thorns, all of the modules (camera, storage, cables, VMS) in the MOBOTIX system have digital thorns that protect them from unauthorised access. Protecting people, places and property “Modern video surveillance and access control technologies help protect people, places and property across the world but they are increasingly targeted by criminals aiming to infiltrate, take-over or disable these vital systems,” says Thomas Lausten, Chief Executive Officer of MOBOTIX. “With the Internet of Things trend adding billions of IP connected devices each year, our industry must lead the way in creating secure platforms that can reduce the risk posed by these damaging attacks.”MOBOTIX uses the services of SySS, a third-party security-testing company that examines the security of both software and hardware elements As an important company within digital video surveillance, MOBOTIX believes in its “Cactus Concept” that protects every element of the design, manufacture and operation of each device along with end-to-end encryption across the entire usage and management cycle. SySS third party security testing To ensure the highest levels of security, MOBOTIX uses the services of SySS, a highly-regarded and independent third-party security-testing company that examines the security of both software and hardware elements. SySS customers include Basler Versicherungen, Bundeswehr, CreditPlus Bank AG, Daimler, Deutsche Bank, Deutsche Flugsicherung, Festo, Hewlett Packard, Innenministerium/LKA Niedersachsen, SAP, Schaeffler, Schufa, T-Systems and Union Investment. Sebastian Schreiber, SySS CEO said: “MOBOTIX has a contract with us to provide further penetration testing of its technology elements. The initial platform testing on a current camera model revealed very positive results and we will continue security testing as an ongoing process.” “Cyber security has been and will continue to be a core focus for MOBOTIX,” adds Lausten, “and we look forward to working with our peers in the industry, customers and government agencies to protect the very technologies and systems that help make society safer for all.”
BNP Paribas is a European-centred banking group with over 190,000 employees in 74 countries. Like other banks, BNP Paribas Fortis is facing a range of threat vectors like robbery, vandalism and card fraud. Similarly, bank staff members require safeguarding from potential aggressors. Previously, the bank relied for video security on a fleet of analogue CCTV cameras. However, low-image quality frequently made it difficult to identify suspects, especially in dimly-lit and harsh backlight conditions, such as direct sunlight through a window or reflected by wet ground. Upgrading CCTV system To upgrade its current CCTV system, BNP Paribas Fortis opted to move to the benefits of an IP-based network video security solution to be able to directly integrate cameras into existing network infrastructure, as well as enable remote video monitoring.BNP Paribas Fortis has installed more than 4,400 Sony IP network cameras Working with security solutions provider SERIS technology and Stanley Security Benelux, BNP Paribas Fortis has installed more than 4,400 Sony IP network cameras. The reliable, high-performance cameras have been installed at the bank’s Belgian headquarters and commercial buildings all over the country. Designed for large-scale mission-critical security A blend of discrete minidome cameras (SNC-EM630, SNC-EM631, SNC-EM600, SNC-EM601 and SNC EM641) protects BNP Paribas Fortis premises. The cameras’ sensitive Exmor R CMOS sensor ensures crisp images with HD or Full HD resolution, while selected models offer IK10 resistance standards against unwanted tampering and vandalism. Hemispheric SNC-HM662 cameras offer a 360-degree all-round view in self-banking zones and bank lobbies. As well as deterring unauthorised loitering, it provides situational awareness of potentially aggressive customers who may be a threat to employees.As well as offering excellent image quality, their efficiency and reliable operation make a real contribution to lowering long-term ownership costs" Protected against harsh weather and vandalism, ruggedised SNC-WR602 and SNC-WR632C rapid dome cameras provide round-the-clock surveillance of outdoor areas. The cameras’ high dynamic range ensures clear images in a wide range of lighting conditions, accommodating extremes of bright light and shade in the same scene. The cameras are integrated using the XProtect Corporate IP Video Management Software (VMS) platform from Milestone Systems. Designed for large-scale mission-critical security applications, this manages convenient recording and sharing of video from multiple sites. Minimisation of hack risk BNP Paribas Fortis also values the Sony IP cameras’ excellent network security provision, with the risk of attacks from hackers minimised by regular firmware updates. “Sony cameras were the obvious choice to improve our video security capabilities”, confirms Michaël Thys, Expert Security Equipments at BNP Paribas Fortis. “As well as offering excellent image quality, their efficiency and reliable operation make a real contribution to lowering long-term ownership costs.” “The retail banking industry presents several challenges for any security solution,” adds Petra Swinnen, regional account manager for Sony Video Security Solutions. “This large-scale migration to Sony IP cameras has allowed BNP Paribas Fortis to protect its front-line operations, while giving valuable extra peace of mind to employees and customers alike.”