PSA, the consortium of professional systems integrators, announces the addition of viisights to its approved technology partners. viisights adds behavioural recognition systems for real-time video intelligence to the PSA offerings. “PSA is excited to be able to offer such an in-depth and advanced AI service to our integrators,” said Chris Salazar-Mangrum, PSA’s vice president of technology partners. Video surveillance systems “viisights is providing a technology that t...
Facial recognition is a mature technology that continues to change and evolve. New innovations such as artificial intelligence (AI) are expanding facial recognition capabilities, even as privacy concerns, though often misguided, undermine wider acceptance in the market. We asked this week’s Expert Panel Roundtable: What are the new developments in facial recognition?
Identiv, Inc, a pioneer in digital identification and security, will showcase its recently expanded visual intelligence and operating expense (OPEX)-focused solutions at ISC West 2021, including its innovative video management system (VMS) and access-control-as-a-service (ACaaS) offerings. Attendees will be able to view Identiv’s complete product portfolio, including physical access control and cybersecurity, video and data analytics, door readers, and radio-frequency identification (RFID...
Active Witness Corp., a provider of artificially intelligent, cloud-based visitor management solutions introduces its SIMA multi-factor access control system that stops unauthorised access and redefines how access control is deployed. Conventional facial recognition systems require a person to present his/her face, then search a database and present the closest match and identity. That process is slow and can lead to incorrect identity authorisation and privacy concerns. Quick identity identif...
Novaira Insights – a new video surveillance market research provider releases its first report, ‘The World Market for Video Surveillance Hardware and Software – 2021 edition’. It is sometimes said that the video surveillance market is recession-proof. That when economic conditions deteriorate, there continues to be spending on security hardware and software. However, market conditions in 2020 were unprecedented. Restrictions in response to the COVID-19 pandemic meant tha...
3xLOGIC, Inc., a globally renowned provider of integrated, intelligent security solutions, is introducing its Gunshot Detection solution, which features a reliable dry contact that allows it to be easily integrated into existing security systems. Gunshot Detection solution Rather than utilising microphones, infrared sensors, or complex analytics, the self-contained device relies on affordably simple concussive force recognition sensors to detect gunshots. When a gun is fired, the bullet create...
Cloud Gateway, a cloud-native networking and security solutions provider, has appointed tech industry veteran Raif Mehmet as the Chief Revenue Officer (CRO), in order to fuel the company's growth in the Secure Access Service Edge (SASE) market. Raif Mehmet has extensive experience in bringing disruptive technologies to market within networking and security. His experience in sales leadership and partner channels has achieved multi-million pounds growth, in both privately held and publicly quoted companies, such as Cato Networks, Aruba Networks (Aruba), Aryaka Networks and most recently, Bitglass. Widening industry reach With Cloud Gateway clients ranging across multiple industries, including the Public Sector, Financial Services, Insurance and Healthcare, Raif will look at widening the company's industry reach, as well as substantially increase focus to grow the company's channel business. Justin Day, the Chief Executive Officer (CEO) of Cloud Gateway, said “In a period of high growth focus for the company, Raif's direction will catapult the business forward, staying focused on achieving our growth targets and keeping us ahead of our competition in a noisy market.” Secure Access Service Edge (SASE) solutions My focus is now on ensuring Cloud Gateway's leading position in the market" Raif Mehmet commented, “Secure Access Service Edge (SASE) solutions are the future. My focus is now on ensuring Cloud Gateway's leading position in the market and proving our solution's performance and return on investment to partners, customers and prospects, who are inevitably looking for the best solution for their requirements.” PRISM platform As the UK's first SASE solution, Cloud Gateway's PRISM platform provides the security and performance needed today, for the cloud services of tomorrow, helping customers to improve performance, reduce cost and complexity and strengthen security as part of their digital transformation plans. The SASE solution secures all remote access, internet and network traffic, with government grade security, rapid deployment and flexibility, in order to future proof the IT network and the business. The platform is an award-winning solution that provides businesses with both the mechanism and resource support to adopt, develop and operate cloud, hybrid cloud and multi-cloud environments.
The smartphone is changing access control and security management at every scale and level, from global corporations to small companies. Making the switch to mobile access control, however, can seem daunting. Questions may arise around cost, practicality and the potential need for new door hardware. Yet going mobile is actually a lot simpler and quicker than many think, as one new guide explains. Data from the recent Wireless Access Control Report 2021 suggests almost two-thirds of organisations have already adopted mobile access control, or plan to do so within two years. Industry analysts Omdia estimate that downloads of mobile credentials grew by 220% between 2018 and 2019 alone. Mobile access control The main benefits of mobile access control, the report suggests, are convenience, cost and security. All three of these advantages apply for any scale of organisation. The user convenience of replacing plastic key-cards with secure ‘mobile keys’ on a smartphone is obvious. Identical benefits have already brought a mobile-first ethos to banking, travel booking, food delivery and many more sectors. The ability to get the job done efficiently from anywhere is becoming essential From a business perspective, too, the option for facilities managers to use their own smart device to issue, amend or revoke an employee’s mobile key brings added flexibility. It frees security staff from the desk and its dedicated admin PC. As the work patterns become fluid — IBM estimates 1.87 billion people will be mobile workers by 2022 — the ability to get the job done efficiently from anywhere is becoming essential. Access management via smartphone offers this. Reissuing mobile credential Secondly, mobile credentials are simpler and quicker to administer than key-cards, which brings significant cost savings. Deploying mobile keys on employee smartphones removes any need to purchase plastic cards or pay for their printing. Any missing plastic credential needs replacing; cancelling and reissuing a mobile credential is essentially costless. Mobile access control also enables a business to reduce its use of non-recyclable plastics. Third, the security of mobile credentials improves on traditional card-based access control. More than 17% of respondents to a recent survey admitted losing an RFID card or fob in the previous 12 months. Such an event obviously threatens site security. How quickly would an employee notice this missing plastic key-card? The survey did not ask, but everyone would notice a missing phone more quickly. Electronic access control Access permissions can be cancelled or amended over the air without any need for updaters Security managers can react fast when credentials are mobile. Access permissions can be cancelled or amended over the air without any need for updaters, for example. Everything happens instantly inside the credential app. Even if a missing phone is not spotted quickly, almost every device now has a built-in failsafe: Biometrics, fingerprint or face ID screen-locks, stop any casual thief from using a phone’s mobile keys. But what of the challenges of switching standard electronic access control for mobile access — especially for businesses which may not have a large or specialist in-house security team? In truth, if businesses choose the right solution, the challenges of upgrading to mobile keys and access management are far fewer than many imagine. Electronic door locks In many cases, there will be no disruption to existing doors or door hardware, and no drilling at all around the door. Some electronic door locks are compatible out the box with both RFID and mobile credentials. The same reader can be used interchangeably with standard plastic cards and a smartphone. User experience at the door is identical: Just tap or move the phone close a reader to unlock. The same reader can be used interchangeably with standard plastic cards and a smartphone In most places, employees can use their own phones. A system offering access via a secure iOS or Android app presents no obstacles to many Bring Your Own Device (BYOD) policies. In the assessment of the recent Wireless Access Control Report 2021, the move to mobile may not result in any wholesale changes to current lock and reader systems.’ Access control system With the right mobile access control system and technology, businesses save the costs involved in replacing lost or damaged credentials. Facilities staff save time previously wasted in handover meetings, getting new or replacement plastic key-cards to the right people. Mobile access based on a secure app streamlines the process of system management. Updating, revoking or adding new access rights takes place instantly over the air. Many app-based systems offer the ability to store keys for several sites within one secure environment. Keyholders can travel to multiple locations contact-free. Mobile access solution Many businesses have already followed an easy upgrade path to mobile access" “The Openow mobile access solution for SMARTair, for example, enables security managers and site users to manage all their mobile keys from one app,” says Mikel Gaztañaga, SMARTair Sales Manager at ASSA ABLOY Opening Solutions EMEA. “Many businesses have already followed an easy upgrade path to mobile access. SMARTair wireless locks are deployed in buildings and businesses all over the world. The whole system makes switching to mobile simple and cost-efficient. Existing SMARTair systems don’t even need new hardware to upgrade.” For users, the benefits are clear. The device in their pocket does the job of one or several plastic cards. If they’re carrying their phone, they already have their keys with them — secure, convenient and almost cost-free.
Ping Identity, the intelligent identity solution for the enterprise, showcases a continued commitment to open standards through the achievement of the Financial-grade API Client Initiated Back-Channel Authentication (FAPI-CIBA) certification. This certification enables enterprises to improve the consumer experience during authentication and authorisation for financial transactions. FAPI-CIBA is a security and interoperability standard from the OpenID Foundation for financial, insurance, healthcare, and other industries that require stronger API security when doing business with customers. Ping Identity is one of five identity security vendors - and the first enterprise-class vendor - to achieve the new Open Banking certification. Decoupled user authentication FAPI-CIBA is an authentication flow that improves the user experience by streamlining how users give digital consent when engaging with an enterprise. It decouples the interaction between devices people use to authenticate themselves from the device that requests access. FAPI-CIBA is an authentication flow that improves the user experience For example, when a customer makes an online purchase from a merchant, the user immediately receives a push notification sent to the financial institution's native mobile app, allowing the customer to avoid confusing redirects via web browsers. The new FAPI-CIBA certification means that enterprises can use Ping Identity's product suite to enable secure decoupled user authentication and payment approvals, with the assurance that it meets the rigorous FAPI conformance testing requirements. Advanced technical standards In addition to improving the customer experience, enterprises can leverage and stay ahead of evolving Open Banking standards. It also makes it easier for them to comply with the advanced technical standards as they are introduced. "Ping Identity is committed to improving the security of financial services through Open Banking standards," said Andre Durand, CEO and founder, Ping Identity. "From mobile banking to online purchasing to the use of third-party financial data aggregators, customers expect control over how and when they share their personal financial data. Ping Identity's FAPI-CIBA certified solutions give them the tools to meet those demands."
Korea’s renowned video technology solutions provider, IDIS is stepping up its presence in key growth markets in the Middle East, North Africa (MENA) and Turkey regions, with the confirmation of two senior appointments. Overseeing the new video projects and growing market potential in the country of Turkey, Koray Ozyildirim has been appointed as Country Manager. Koray is working closely with IDIS’s established supply network and will also develop relationships with major Turkish security installers, including new IDIS integration partners, as well as supporting customers in the wider market. Solutions sales expert Koray will bring this vast experience with him, as he promotes IDIS’s end-to-end video solutions Koray Ozyildirim brings with him a track record of solutions sales success gained from various roles with vendors, who specialise in converged and smart city technology, as well as ten-year tenure experience with a renowned European surveillance manufacturer. Koray will bring this vast experience with him, as he promotes IDIS’s end-to-end video solutions for banking, retail, education, logistics and other private, and public sector sectors. Network cameras, recorders and VMS provider Koray Ozyildirim stated, “IDIS’s full line up of network cameras, recorders, enterprise-level VMS and deep learning analytics is viewed positively in Turkey. There’s real appetite for Korean-made high-performance end-to-end solutions to meet sector specific needs and deliver on the promise of future-proof scalability and a low total cost of ownership.” He adds, “I am delighted to now be leading IDIS operations in Turkey and supporting integration partners as we meet this demand.” Koray Ozyildirim will report to Dennis Choi, IDIS’s newly promoted General Manager for the MENA (Middle East and North Africa) region. Dennis Choi first joined IDIS in 2013, as a Sales Manager for Europe, when he was also actively involved in the launch of the IDIS brand globally. Long-term security partnerships across Europe Dennis Choi was instrumental in establishing long-term partnerships across Europe and emerging markets with distributors and large systems integrators. He now brings the same focus and expertise to his role, overseeing operations in the Middle East and North Africa regions, and building on recent major successes in the MENA region. “IDIS has grown our presence here consistently, year on year, since entering the Middle East market in 2014,” said Dennis Choi, adding “We passed another milestone this year when we were named best security equipment manufacturer in the OSPA awards, and we have earned market trust by working with our integration partners, to deliver end-to-end solutions in sectors, including retail, hospitality, and finance.” SAMA compliant solution The company has also seen recent success with global retail brands across The Levant Two years ago, IDIS video was chosen for the largest ever upgrade project undertaken in the region’s banking sector, a Saudi Arabia Monetary Authority (SAMA) compliant solution for the National Commercial Bank in Saudi Arabia, and has been used to secure the Central Bank of Jordan, as well as other risk-critical sites. The company has also seen recent success with global retail brands across The Levant, which is now moving to adopt IDIS Deep Learning Analytics, to increase their surveillance investment and gain valuable insight into customer behaviour. Cyber-secure technology Dennis Choi said, “Our growing list of successful projects demonstrates the appeal of IDIS’s robust, cyber-secure technology with built-in failover, which allows users to comply with the most stringent standards, while our highly accurate AI solutions are allowing customers to overcome common challenges and meet specific security, safety, and operational requirements.”
Tassat, a provider of financial technologies and products for digital payments, announces it has appointed Barbara Kissner as its Chief Information Security Officer (CISO) to oversee the company’s infrastructure, technology and data security. As Tassat undergoes rapid growth, Ms. Kissner will be responsible for devising the company’s overall information security strategy, maintaining oversight for all security processes and ensuring robust due diligence practices. Managing security programs Ms. Kissner is a specialist in technology transformation, cybersecurity, risk management, organisational resiliency and governance, and brings over 25 years of experience building and managing security programs for financial services firms to her role at Tassat. Ms. Kissner has extensive expertise technology and digital transformation projects Throughout her career she has held multiple executive roles including EVP and Chief Information Officer (CIO) for Amalgamated Bank, and SVP, CIO and Chief Compliance Officer at International Fidelity Insurance Company. Ms. Kissner has extensive expertise technology and digital transformation projects, managing cyber security programs for multinational organisations, and driving enterprise-level resiliency and disaster recovery strategy. “Financial institutions today are acutely focused on cyber security and third-party risk. We are thrilled to welcome an executive of Barbara’s calibre to our executive team to recognise and respond to the evolving cyber security requirements of our banking clients,” said Ron Totaro, CEO, Tassat. Sophisticated banking clients “Tassat is committed to partnering with our clients and that includes our unwavering commitment to comprehensive security measures that help protect their businesses and reputations. Our clients trust us with their most critical digital payments applications, and Barbara’s deep expertise and unique experience in the financial sector make her the perfect fit to help us streamline our processes and ensure we and our clients are protected and have the most robust risk posture.” “I’m excited to join this talented team,” said Ms. Kissner. “I look forward to helping Tassat deliver the comprehensive security practices our sophisticated banking clients require for their critical payments applications.”
Banks and other financial institutions regularly face a gamut of threats: fraud, complying with ever-changing regulatory requirements and cyber crime to name a few — all while being expected to adopt innovative technology that addresses customer experience demands. To that end, on May 6 at 2:00-3:00 EST industry experts from Verint, STS Group, Hancock Whitney Bank and TCF Bank will offer an inside look at how Verint Op-Centre’s newest features and key benefits allow banks to efficiently tackle security issues through a single graphical interface. Intelligent software platforms Though banking customers are demanding more all-digital banking options, when it comes to security, the transition to largely digital isn’t always so simple. Many banks have struggled to adopt a proactive approach to video security, causing a major drain on time and resources. Banks are looking to make the switch to intelligent software platforms and innovative technology that boosts efficiencies, thereby helping them achieve the coverage necessary to reduce fraud while also enhancing the customer experience and reaching operational goals. Many banks have struggled to adopt a proactive approach to video security Enter: Verint Op-Centre. The video management solution for modern-era financial organisation, Verint Op-Centre is an advanced enterprise-class video management solution that enables organisations to monitor and manage Verint-networked NVRs from a central location in a secure, centralised manner. Developed to meet the unique needs of the financial services market, Op-Centre reduces the complexity of video system management across geographically dispersed locations. Video system administration It simplifies video system administration and empowers users to institute a more proactive, efficient approach to maintenance. Its benefits include, but are not limited to: Maintaining vigilance in cyber defence and data protection Adhering to regulatory audit compliance Automating operational tasks for improved efficiency and reaching operational goals Strengthening risk management In the upcoming panel discussion, attendees will get an inside look at how Verint customers are leveraging Op-Centre’s newest features and key benefits. Thousands of financial institutions across the U.S. turn to Verint to identify the best ways to strengthen risk management across domains with technology that simplifies, automates and modernises their fraud and safety programs. “Financial institutions of today need a security solution that truly does it all: enhanced cybersecurity, modernised data visualisation with charts and graphs, and the ability to centrally monitor and maintain NVRs in any number of locations,” Verint GM Matt Tengwall said. “Verint Op-Centre allows security leaders to work smarter and more efficiently.”
As a leader, I am a big proponent of using what’s happened in the past — and is currently happening in the present — to better prepare our business and our customers for what’s to come. Applying this mindset in the financial industry is particularly helpful. The emergence of various technologies and trends enables us to determine what we can optimise for the highest efficiency and satisfaction level. The past few years have been focused on the Internet of Things (IoT), data and analytics, and enhancing proactivity to mitigate the increasingly significant threat of fraud and cyber risks. While each of these elements will continue to play an essential role in the industry moving forward, we’re starting to see two common threads that will rise above all in the coming years: collaboration and convergence. When broken down in terms of its relevance for banks and credit unions, we can expect to see these trends in certain areas in the future. Security and customer engagement We’re starting to see two common threads that will rise above all in the coming years: collaboration and convergence There's no overstating the importance and value of one's hard-earned money. When it comes to keeping it safe, consumers demand their relationship with a financial institution is built on one powerful characteristic: trust. Customers must feel confident in placing their funds in someone else's hands, with the comfort and understanding that the institution's primary goal is to meet their needs while safeguarding information at all times. The digital transformation and incorporation of intelligent technology into the banking environment have undoubtedly changed how trust is defined in this industry. As customers become more tech-savvy, their idea of a trustworthy and engaging banking partner begins. We're seeing the necessity of digital services for elevating customer satisfaction, such as mobile banking, chat features, and intelligent virtual assistants, complementing in-person service, and modernising customer engagement. Now that customers are becoming more aware of some of the risks imposed by technology, simplifying and automating programs is more critical for banks than ever before. To address and mitigate customer concerns about data security and privacy, financial organisations must prioritise deploying an integrated, end-to-end solution that considers the vulnerability of the Internet of Things (IoT) and the risks of the cyber world. A security-led strategy But the aspect of security must remain at the centre of this strategy. As both the financial industry and the threats it faces become more complex, the promise of secure housing and management of one of our most sensitive assets is always top-of-mind. Ensuring adequate security, surveillance, and investigative processes are the key for banks to establish superior customer engagement and develop a healthy relationship based on protection. It’s a simple fact: Financial institutions can’t drive exceptional customer service without security having a seat at the table. In general, the customer experience is typically made up of these two elements above all else, and loyal customers place their trust in banks to demonstrate an apparent dedication to understanding how both sides impact one another — which is in more ways than one. Financial institutions can’t drive exceptional customer service without security having a seat at the table As we start to see the physical layouts of branches evolve to become more productive for customer engagement, it’s imperative to ensure that security is considered in these changes. For example, many bank environments are transitioning to be more liberal and free-flowing, which we will all take advantage of after the pandemic is behind us. These new environments could introduce various risks when it comes to employee and asset protection, making it paramount for security to react to this adjustment accordingly from a safety and fraud perspective. Physical security and IT By now, you’re probably more than familiar with the term “convergence.” The evolution of the threat landscape and the significance of risks that today’s banking and financial providers face have made the word top-of-mind. Organisations worldwide demand a more holistic approach to security to ensure they’re consistently protecting consumer data, employees, brand reputation, and infrastructure. Though this type of convergence has already begun to occur, the integration of physical and IT security will only become more critical in the years ahead. The use of advanced networked and cloud-based technologies in financial institutions — primarily through wireless network connections — has led to IT’s increased involvement in security decisions and operations, which is the right path to follow if a bank or credit union wants to ensure its solutions are protected against cyber threats. The collaboration between physical and IT security teams must exist at every level of the process; from procurement to installation to maintenance over time, it’s crucial that IT personnel are involved and asking the right questions. In the future, physical security groups will likely rely on IT professionals to help them solve problems regarding the technical and cyber sides of security solutions. Collaboration is key Whether it's due to the evolving risk landscape financial institutions face or the desire to adhere to customer demands, it’s become clear that collaboration will be the key to success for banks and credit unions in the future. A modernised customer engagement strategy must incorporate a focus on security, and that element of safety must be comprised of both physical and IT components. A modernised customer engagement strategy must incorporate a focus on security But while the traditional definition of convergence may seem simple to understand, we must look beyond these words to determine how exactly the practice can and should be implemented. In a more detailed sense, convergence can be defined as a marrying of cyber and physical security capabilities to form a comprehensive approach to identify potential threats and expand awareness for better event response. This level of “converged collaboration” fuels a unified and cohesive security strategy built with all areas of security in mind and can lead to better incident management and faster response. And with the potential impact of today’s security threats on a bank’s people, property, and brand, this approach is necessary to ensure that no stone is left unturned.
The explosive expansion of IT infrastructure has led to the identity and access management market gaining substantial momentum. As the onslaught of information technology continues, organisations are able to offer users quick and easy access to systems and information from any place, at any time. However the ease of access is inherently associated with the risk of security breach. Organisations must find a balance between fulfilling user demands and doing so in a manner that is safe enough so that cybercriminals cannot take advantage of the system, thus strengthening identity and access management market trends. The prominence of IAM solutions in the BFSI sector In 2016, the world was shocked by the news of the Bangladesh bank heist in which cybercriminals were successful in conducting unauthorised money transfer from Bangladesh Central Bank to banks in Philippines, Sri Lanka and other parts of Asia. In the heist, criminals used Society for Worldwide Interbank Financial Telecommunication (SWIFT) credentials of Bangladesh Bank's employees to carry out more than three dozen fraudulent transactions and extracted $81 million from Bangladesh Central Bank. More than three dozen fraudulent transactions and extracted $81 million from Bangladesh Central Bank. More recently in 2018, hackers were able to siphon nearly $20 million from Mexican banks. Analysts point out that targeted bank systems had security holes that made access to internal servers much easier. Lack of strong access controls were also used by hackers to use credentials of a compromised employee to gain considerable mileage in the siphoning. Identity and access management industry has therefore registered a lot of interest through the financial sector and banks as financial institutions need to prove themselves reliable of customers’ trust. Banks and other financial institutions are rapidly adopting identity and access management solutions capable of providing strong security starting at authentication level and extending to application and data layers. IAM solutions make it possible for financial institutions to integrate new applications and deploy to cloud with greater ease and rapidity. With versatile hybrid deployment model provided by leading IAM solutions, connectivity to SaaS applications as well as legacy enterprise web applications happens more quickly as well as securely. IAM solutions make it possible for financial institutions to integrate new applications and deploy to cloud The significance of cloud and its impact on IAM market outlook Just as the banking sector is facing the challenge of identity authentication as customers around the world are demanding any time access, the proliferation of IoT and cloud technologies is changing the very essense of society in multiple ways. With advancement in IoT technologies, the advent of smart cities has gathered considerable traction. While sensors have been installed in New York that can detect gunshots and alert police, the city of Boston has developed a mobile app to help citizens report civic problems such as burnt out streetlights and potholes. Cities like Paris, Oslo and Hong Kong have large internet-connected statues that are filled with moss to absorb air pollution and notify operators about malfunctions. The network of connected devices continues to expand and the rise of 5G connectivity is anticipated to connect traffic signals, air quality sensors, police patrol cars, etc., over the coming years. Reportedly there would be billions of connected devices around the world by 2020 which will naturally create immense opportunities for identity and access management industry players. This is because new security threats will continue to surface, as without efficient security all connected devices are at the risk of being hacked. The evolution of the smart era – how will it impact IAM market dynamics? Connected devices that constitute the very fabric of smart cities are essentially IoT devices that would be in the field for the next ten fifteen years and therefore identity and access management must be built into the system from the beginning. As identities, keys and tokens have to be managed every time new devices are added, or old ones are removed and the cloud ecosystem is updated, the security components within devices have to be managed well to extend their lifecycle. Identity and access management must be built into the system from the beginning Not only cities but factories are also getting smarter. The term Industry 4.0 came to be first used when the German government used it to define the country’s strategy towards increased digitization in manufacturing. As technologies like IoT and cloud computing continued to expand, they came to be included in the term, and Industry 4.0 came to represent the ecosystem of Internet-connected machines with streamlined and automated workforce and reduced production costs. As the ecosystem continued to expand, trust and identity became important issues in order to ensure the integrity of a smart factory. Healthcare is rapidly becoming a fully digital environment IAM solutions – Influencing the coveted medical domain Other fields like healthcare have also not been impervious to the effects of technological transition. Healthcare is rapidly becoming a fully digital environment that has reaped the benefits of sophisticated IT tools in delivery of care. This has however exposed sensitive healthcare data to cybercriminals who had attempted to hold critical systems and patient records of hospitals to ransom. Healthcare is rapidly becoming a fully digital environment In recent years more than 80% of healthcare institutions have reported that they registered some degree of cyberattacks. Providers and users are increasingly operating from multiple locations, many of which are outside the hospital premises. With users demanding to access systems through a variety of devices, identity and access management has come to witness greater traction from healthcare providers. Over the coming years, the world will be rapidly adopting 5G networks. Though 5G promises much more speedy services for users and business ecosystems, the technology is also expected to impose greater responsibilities on confidentiality of user data and integrity of applications. Identity and access management industry players had been investing in expansive R&D as cyber threats continue to evolve and introduction of new technologies and advent of IoT drastically changes the relationship that users have with their devices. Identity and access management is expected to be useful when much more than personal information is at stake. When cyber criminals have the power to hold hospitals or traffic signals to ransom and disrupt daily lives, health and safety become a priority for authorities and security measures have to be tightened. For instance, after the bank heists in Mexico, the Mexican bank authorities have come to recognize the inevitability for the need of greater control and security of banking networks. Mexican banks have invested heavily over the last year in strengthening their defenses. As such measures against cyberattacks become the norm, identity and access management market is expected to register massive gains over the ensuing years.
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organisations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains. User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anything like the 5.4 billion user IDs on haveibeenpwned.com, their login has already been compromised. If it's not listed, it could be soon. Recent estimates state that 8 million more credentials are compromised every day. Ensuring safe access Data breaches, ransomware and phishing campaigns are increasingly easy to pull off. Cyber criminals can easily find the tools they need on Google with little to no technical knowledge. Breached passwords are readily available to cyber criminals on the internet. Those that haven’t been breached can also be guessed, phished or cracked using one of the many “brute-force” tools available on the internet. It's becoming clear that login credentials are no longer enough to secure your users' accounts. Meanwhile, organisations have a responsibility and an ever-stricter legal obligation to protect their users’ sensitive data. This makes ensuring safe access to the services they need challenging, particularly when trying to provide a user experience that won’t cause frustration – or worse, lose your customers’ interest. After GDPR was implemented across the European Union, organisations could face a fine of up to €20 million, or 4% annual global turnover Importance of data protection So how can businesses ensure their users can safely and simply access the services they need while keeping intruders out, and why is it so important to strike that balance? After GDPR was implemented across the European Union, organisations could face a fine of up to €20 million, or 4% annual global turnover – whichever is higher, should they seriously fail to comply with their data protection obligations. This alone was enough to prompt many organisations to get serious about their user’s security. Still, not every business followed suit. Cloud security risks Breaches were most commonly identified in organisations using cloud computing or where staff use personal devices According to a recent survey conducted at Infosecurity Europe, more than a quarter of organisations did not feel ready to comply with GDPR in August 2018 – three months after the compliance deadline. Meanwhile, according to the UK Government’s 2018 Cyber Security Breaches survey, 45% of businesses reported breaches or attacks in the last 12 months. According to the report, logins are less secure when accessing services in the cloud where they aren't protected by enterprise firewalls and security systems. Moreover, breaches were most commonly identified in organisations using cloud computing or where staff use personal devices (known as BYOD). According to the survey, 61% of UK organisations use cloud-based services. The figure is higher in banking and finance (74%), IT and communications (81%) and education (75%). Additionally, 45% of businesses have BYOD. This indicates a precarious situation. The majority of businesses hold personal data on users electronically and may be placing users at risk if their IT environments are not adequately protected. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine Hacking methodology In a recent exposé on LifeHacker, Internet standards expert John Pozadzides revealed multiple methods hackers use to bypass even the most secure passwords. According to John’s revelations, 20% of passwords are simple enough to guess using easily accessible information. But that doesn’t leave the remaining 80% safe. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine. Brute force attacks are one of the easiest methods, but criminals also use increasingly sophisticated phishing campaigns to fool users into handing over their passwords. Users expect organisations to protect their passwords and keep intruders out of their accounts Once a threat actor has access to one password, they can easily gain access to multiple accounts. This is because, according to Mashable, 87% of users aged 18-30 and 81% of users aged 31+ reuse the same passwords across multiple accounts. It’s becoming clear that passwords are no longer enough to keep online accounts secure. Securing data with simplicity Users expect organisations to protect their passwords and keep intruders out of their accounts. As a result of a data breach, companies will of course suffer financial losses through fines and remediation costs. Beyond the immediate financial repercussions, however, the reputational damage can be seriously costly. A recent Gemalto study showed that 44% of consumers would leave their bank in the event of a security breach, and 38% would switch to a competitor offering a better service. Simplicity is equally important, however. For example, if it’s not delivered in ecommerce, one in three customers will abandon their purchase – as a recent report by Magnetic North revealed. If a login process is confusing, staff may be tempted to help themselves access the information they need by slipping out of secure habits. They may write their passwords down, share them with other members of staff, and may be more susceptible to social engineering attacks. So how do organisations strike the right balance? For many, Identity and Access Management solutions help to deliver secure access across the entire estate. It’s important though that these enable simplicity for the organisation, as well as users. Organisations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so Flexible IAM While IAM is highly recommended, organisations should seek solutions that offer the flexibility to define their own balance between a seamless end-user journey and the need for a high level of identity assurance. Organisations’ identity management requirements will change over time. So too will their IT environments. Organisations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so. Importantly, the best solutions will be those that enable this flexibility without spending significant time and resource each time adaptations need to be made. Those that do will provide the best return on investment for organisations looking to keep intruders at bay, while enabling users to log in safely and simply.
Combining artificial intelligence (AI) with cloud video creates systems that are smarter, safer and more cost-effective. Furthermore, adding AI capabilities can widen the advantage gap of cloud video systems compared to on-premise systems, especially for cost-conscious end users. “We strongly believe the total cost of ownership (TCO) for cloud systems is more affordable,” says Ken Francis, President of cloud video surveillance company Eagle Eye Networks. “And introducing really powerful AI will expand the cost differences.” Combining AI and cloud video To finance realisation of their vision to combine AI and cloud video, Eagle Eye Networks has raised $40 million of Series E funding from venture capital firm Accel. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end users,” says Francis. In effect, end users have maximum flexibility to manage and analyse their video data however they wish The system sends captured video to the cloud, where a variety of AI or video analytics systems can extract valuable data from the captured video. Eagle Eye offers an application programming interface (API) to enable integration of best-in-breed third-party AI and analytics systems to leverage the video. In effect, end users have maximum flexibility to manage and analyse their video data however they wish. Delivering lower costs In addition to offering integration with third-party systems, Eagle Eye is investing in its own AI development, and hiring additional development and customer service personnel. As new technologies become part of the Eagle Eye platform, customers benefit from lower costs because of economies of scale. Keeping the emphasis on development of cloud systems, Eagle Eye also offers customers maximum flexibility in choosing their cameras. Eagle Eye’s on-premise cyber-hardened “bridge” can connect to almost any camera from thousands of manufacturers, including those connecting with HD-over-coax. The COVID-19 pandemic has expanded the need for end users to view their premises remotely, and in the process has highlighted shortcomings of their existing video systems. As a result, video manufacturers - including Eagle Eye Networks - are seeing a surge in end users updating their systems. Cloud video surveillance Given the costs of installing and maintaining hard drives for local storage (and additional challenges during a pandemic lockdown), more end users are opting to use cloud systems. In effect, the COVID-19 pandemic is accelerating installation of cloud video surveillance. “Our industry is the most resilient in the world,” says Francis. Eagle Eye Networks was on track to double their growth in the first quarter, and then COVID slowed everything down As a whole, 2020 has been a successful year for the cloud system provider. Eagle Eye Networks was on track to double their growth in the first quarter, and then the COVID lockdown slowed everything down. During the second quarter, their revenue from setup fees and appliances fell by 35% or so, but subscriptions increased slightly including customers looking to keep watch over their shuttered businesses. Temperature alerting solutions The third quarter saw another big uptick in business; August and September were booming, and not just from projects that were delayed from Q2. There has also been a spike in customers looking to apply temperature alerting solutions, says Francis. In uncertain economic times, cloud systems require around 40% less up-front costs, and provide flexibility to eliminate the system (and the expense) at any time without losing a large financial investment. Cloud video has reached a tipping point in the United States, Mexico, and the United Kingdom, among other locales, but the technology lags in some other geographic areas such as France. Driving adoption is availability and cost of sufficient upload speed and bandwidth. In addition to Eagle Eye’s branded growth, the company also provides the OEM engine behind a half dozen or so cloud systems offered by other manufacturers. Backing multi-site enteprises About eight years old, Eagle Eye Networks has focused squarely on the small- and middle-sized business (SMB) market, especially multi-site businesses such as retail, banking and healthcare. They also work with local governments and K-12 schools. Moving forward, the company will seek to expand more into multi-site enterprise customers, some of which have 1,000 locations around the world and need to store their video locally to meet regulatory requirements. Multi-site businesses, benefit from the cloud by eliminating the need for local IT equipment and expensive staff Multi-site businesses, especially, benefit from the cloud by eliminating the need for local IT equipment and expensive staff. As internet connectivity becomes less expensive than installing new cable infrastructure, cloud systems will become more attractive to large campus environments such as colleges and airports, says Francis. The advent of 5G connectivity will also be a plus. All Eagle Eye products are NDAA compliant. Premium support services Further expanding its services, Eagle Eye Networks is poised to launch “Premium Support Services,” in which the cloud provider’s employees will proactively monitor and service customer sites for a minimum additional monthly fee. The cloud structure enables most problems to be addressed and solved remotely without needing to send personnel to a site. The new investment from Accel, a funding partner of top-tier tech companies such as Facebook, Dropbox and Spotify, is Accel's first investment in the security industry. In addition to investing in AI, Eagle Eye also plans to leverage the funding to expand into new regional markets with new data centres and additional staff in business development, sales and support roles.
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilising the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualisation and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
Most customers interface with their financial institutions using automated teller machines (ATMs), which have security issues. However, there are solutions available to combat all current security threats, and the cost of protection is coming down. The ATM industry is therefore in a position to minimise losses, while ensuring consumers continue to get the vital cash they need to lead their daily lives. It is important for the ATM industry to constantly innovate to meet new security challenges. So what innovations are we going to see in the next five years? Contactless technology Contactless technology will be a great help against ATM skimming, in which criminals steal personal information at ATM machines. Contactless is already being used in some European countries, and the number is increasing. Not having to insert a card into the ATM removes the opportunity to trap cards and also gets around the problem of “foreign” devices installed to read cards. So contactless technology, which some saw as the end of cash, can help make ATMs and cash more secure. Not having to insert a card into the ATM removes the opportunity to trap cards Biometrics are certain to be used increasingly to bolster ATM security. Finger, palm, vein, iris and facial recognition all have potential in this respect. Any of these may in the future be used with or without cards, PINs and one-time codes. Speed of operation in relation to biometrics could ultimately govern their use at ATMs. There may also be privacy issues that need to be addressed. The ATM vestibule environment must add security with proper security and surveillance equipment. ATM vestibules, or lobbies, are installed for many good reasons. For one, more convenient, 24/7 locations equals better customer retention for a bank, offering comfort and convenience. 24/7 access to ATMs, night drops, coin counters, online banking kiosks, and other self-service solutions are very much in demand. Second, ATM vestibules protect customers from inclement weather and provide a more comfortable banking environment (however, vagrancy can be an issue; therefore ATM vestibules should require card access). Security and surveillance solutions can’t just be for show. ATMs and crime A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and the United States. Rough estimates place the total amount of global losses at up to $60 million. The protection of ATMs ATMs in supermarkets and pharmacies tend to be targeted because they may not be as well-protected, and store personnel likely would not know who is authorised to work on the ATM. In contrast, anyone approaching an ATM at a bank location would be more likely to be challenged. ATM jackpotting originated back in 2010 when Barnaby Jack, a New Zealand hacker and computer expert, demonstrated how he could exploit two ATMs and make them dispense cash on the stage at the Black Hat computer security conference in Las Vegas. Since then, malware has been created and made available on the “Dark Web” that can instruct an ATM to dispense all its cash on demand. ATM jackpotting ATM jackpotting is a combination of a physical crime and a cyberattack. Typically, a criminal with a fake ID enters a grocery shop or pharmacy posing as an ATM technician, then uses a crowbar to open the top of the ATM – the “top hat” – to gain access to the personal computer that operates the machine. Once he or she has access to the PC, they remove the hard drive, disable any anti-virus software, install a malware program, replace the hard drive and then reboot the computer. The whole operation takes about 30 seconds. The malware then enables the thief to remotely control the ATM and direct it to dispense all its cash on command. If a legitimate customer approaches the machine in the meantime, it can operate as usual until activated otherwise by the malware.
Visa chooses Callsign, as their preferred behavioural biometric digital and device intelligence identity provider. Under the agreement, Visa will introduce Callsign's behavioural biometric and device fingerprinting solutions to the Visa network of financial institutions, payment service providers (PSPs), and merchants across Europe. Callsign joins the Visa Fintech Partner Connect programme giving banks, merchants, and the wider card ecosystem access to Callsign's Intelligence-driven authentication solutions which positively identify consumers using inherent behavioural biometrics whilst detecting and preventing fraud. Allowing genuine access via MFA Callsign technology helps banks, merchants, and PSPs to answer two questions; is the user who they say they are? And are they permitted to access the service they are requesting? Callsign combines behavioural biometrics, device intelligence with MFA to help authenticate users' identities Using machine learning techniques Callsign combines behavioural biometrics, device intelligence, and geo-location with multi-factor authentication to help authenticate users' identities. This approach helps banks, merchants, and PSPs to secure and authenticate users' identities frictionlessly, stopping fraud early and only letting genuine customers access their service and transact safely and seamlessly. Need for secure and accurate user experience The agreement comes at a time of spiralling fraud, according to a recent report, every second fraudulent transaction in the finance industry was account take over. Card, not present fraud (CNP) accounted for 79% of all card fraud across the Single European Payments Area and, figures from UK finance suggest that in the money lost to Authorised Push Payment (APP) scams totalled nearly half a billion (479 million) in 2020. "The need to accurately identify users online for digital payments and online banking is critical due to the shift to online transactions in the past 18 months. Financial services organisations are looking for the technology that provides the most secure, accurate, and seamless user experience to incorporate into their solutions. We are pleased to be joining the Visa Fintech Partner Connect to work with Europe's leading fintech," concluded Amir Nooriala, Chief Commercial Officer, Callsign.
Reiknistofa Bankanna (RB) is a provider of mission-critical IT systems for Icelandic financial institutions, responsible for the country’s central clearance and settlement system and several multi-tenant core banking solutions. It also operates an e-invoicing and e-payment system for corporates and consumers. It is jointly owned by the three main Icelandic banks, two saving banks, the Icelandic Savings Bank Association, and the three main payment card processors in Iceland. RB’s clients are these banks, the Central Bank of Iceland, and other financial institutions as well as the government and public entities. With solutions operated in multiple data centres and a shared multi-bank environment, RB sought a flexible technology partner that could ensure the highest levels of operational security, cost efficiency, and resilience. The challenge RB had traditionally protected its data centres and offices via disparate video and access control systems. These siloed technologies must be operated and maintained separately, creating a convoluted and inefficient user experience. They were also very old, and maintenance was becoming both a financial and an operational issue. They were also very old, and maintenance was becoming both a financial and an operational issue Sourcing reliable technical support and compatible hardware when something went wrong were becoming increasingly difficult, with replacement parts often taking at least two weeks to arrive. Something needed to change to prevent the corresponding disruptions to security and operations. Upon inheriting responsibility for the security infrastructure Geir Sæmundsson, Datacentre Manager at RB set out a clear vision for the requirements across all of RB’s facilities. “I wanted a unified all-in-one system that wouldn’t restrict my hardware choices going forward. The system needed to deliver long-term value so I wasn’t prepared to limit RB’s options to just one manufacturer of security cameras or door readers.” A unified interface RB required a modern, reliable system that brought video and access control into a single solution, all displayed easily for operators to understand what was happening, when; to provide business-wide value. Mr. Sæmundsson, therefore, approached Hafliði Jónsson, a security consultant he had worked with for many years, to advise on the enabling technologies that could best support these ambitions. Upon consultation, it quickly became apparent that a Genetec solution, driven by Security Centre was the optimal choice. As an open platform, with native video and access control capabilities, it could simplify daily security operations and allowed for further integration with other tools such as RB’s heating and cooling systems. Furthermore, it would enable RB to undertake a phased evolution of its infrastructure, relieving budget pressures without delaying implementation timelines. For example, RB initially retained all of its existing security cameras and is upgrading to newer more sophisticated Mobotix devices over 3 years. Generating ROI with customised alerts RB provides operators with customised dashboards that quickly alert them to matters requiring their attention “From day one we wanted a unified system which could help our teams understand the situation, quickly; alerting them if anything required their attention. The Genetec solution does just this, and is allowing us to build in customised alerts so we gain business intelligence – providing us with better ROI,” said Geir Sæmundsson, Datacentre Manager at RB. Since bringing its security solutions under one system, RB has been able to provide operators with customised dashboards that quickly alert them to matters requiring their attention. For example, an unauthorised access attempt or sudden rise in temperature inside the data centre generates a notification within Security Centre for an employee in the monitoring room to respond to and investigate. The ease of the transition and the ease of use of the solution means that RB is planning to install the Genetec solution into its offices soon also, as the business is keen to have one solution across all of its buildings yet are compatible with a range of integrated technologies. Direct communication fuelling a brighter future The solution has been immensely successful, and RB is looking ahead to a bright future with Genetec. The process of implementation and configuration was shorter than anticipated and as a fully cloud-based system, the process of adding new devices or facilities to the network has proved very straightforward. One year into its operation RB is running its system autonomously with little need to call in external support. One of the key reasons for this is the ability of RB and its system integrator Hafnes Ehf to communicate directly with Genetec rather than having to go through a third party – as was the case with its previous security platform. Plug and play solution Added to the fact it’s easy to install and get lots back from the system, it’s been a worthwhile investment “Given the high-security requirements of RB’s data centres I was keen to cut out any middlemen to ensure any integration issues could be more quickly and easily resolved,” commented system integrator Hafliði Jónsson. “RB has saved a lot of time and money as this direct relationship gives RB much more control.” Geir Sæmundsson, Datacentre Manager at RB, commented, “The time savings delivered by Genetec has been immense. The fact it’s plug and play, and therefore up and running in a matter of hours is fantastic. Added to the fact it’s easy to install and we get lots back from the system, it’s been a worthwhile investment, especially as it can evolve with us, and allows us to move at our chosen speed.” Appetite for more With the initial requirements met, RB is exploring ways to extract further value from its unified platform. Next on the roadmap is the introduction of Genetec ClearID that will streamline the process of managing facility access requests and automate the creation of monthly client access reports. Making use of the access control infrastructure already in use throughout the facility, Genetec ClearID allows authorised visitors to easily request and be granted appropriate access in line with RB’s security and compliance policies and the individual’s access rights. With the roll-out of the unified Genetec platform also expected to extend to future datacentres and RB’s offices, it seems the partnership is set to go from strength to strength. “RB is the backbone of Icelandic Financial Services. We can’t afford to have security breaches or downtime, as it’s not just us that will be affected. We needed a failsafe solution, and so far, Security Centre and Genetec have enabled this. Considering its ease of use, deep integration, and leading analytics, we look forward to continuing the partnership over years to come,” concluded Sæmundsson.
In an increasingly sophisticated business environment, clients need law firms that have the experience and depth to handle significant matters. This law firm in California is staffed by attorneys who offer diverse legal, business and governmental backgrounds. Its practice areas are focused on specific legal disciplines, but the firm also has teams that are equipped to address the needs of particular industries, including healthcare, banking and finance, gaming, environmental, manufacturing, governmental, and pharmaceutical, and telecommunications. Ensuring continued protection When the law firm relocated its corporate headquarters to a new building three years ago, founding partners knew they would need to invest in technology, education, and services to ensure top-tier security and security measures. It had previously worked in a space in which security was managed centrally across the building but now it had to develop its own program. The management team quickly realised that they were not interested in building their own security team Stakeholders were not only interested in managing access to the facility, it also wanted to ensure that alarms, video, and security operations were managed by experts to ensure continued protection across physical and network infrastructure. As they were evaluating options, the management team quickly realised that they were not interested in building their own security team from scratch. Rather, they wanted to work with an expert team that could quickly bring their security efforts up to par. Security systems monitoring The law firm connected with Ryan Schonfeld, Founder, and CEO of risk management services and operations firm RAS Watch. After speaking with Schonfeld and he provided an overview of what a robust security effort should entail, the firm quickly identified a plan. “RAS Watch provided us with the expertise we needed to quickly determine what our security efforts should entail,” the founding partner said. “The entire team are experts in what they do, they understand the changing risk landscape, are experienced and proactive, and therefore, were the ideal choice to support our efforts.” The corporation contracted with RAS Watch to deliver a managed service security program that provides training, risk assessments, security systems monitoring, alarm management, and more. Managed service operations RAS Watch is a unique managed service operations and risk mitigation centre RAS Watch is a unique managed service operations and risk mitigation centre, offering companies the opportunity to benefit from a mission-critical security program without investing significant capital, allocating real estate, administering technology, or managing a comprehensive operation. The RAS Watch suite of services uses state-of-the-art tools to protect a company's people, assets, and brand, providing actionable intelligence in real-time through a service-based security program model. While RAS Watch offers a wide range of services and solutions, the organisation opted for a layered approach to security — one that incorporated monitoring services, crisis training, and remote SOC support. The training was rolled out in stages, first to the law firm’s leadership team and then to managers and employees. Employees continuously learn how to deal with potential security issues, de-escalation techniques, and how to respond in an active shooter incident. Emergency mass communications RAS Watch also operates as the legal team’s security operations centre from a separate facility along with educating and training staff. The SOC is online 24/7, allowing operators to coordinate with the alarm company, provide information and assistance for any security concerns or questions, and handle emergency mass communications and responses for the firm. In early 2020, as the coronavirus pandemic began to impact California, RAS Watch was also able to help address concerns about COVID-19. It offered the company ideas on integrating wellness protocols with existing security plans and taking advantage of technology to simplify processes. "RAS Watch has gone above and beyond to help us ensure the safety and security of our facility," the partner said. "We value their insight, ideas, and suggestions, and they have become an integral part of our business."
As Thailand’s oldest bank, Siam Commercial Bank (SCB) has successfully navigated more than a century of change. But more recently, as the tech-savvy Thai market eagerly embraced the digital revolution, SCB found itself falling behind. One pain point was correcting errors in its ATM network; refunds were taking up to a week. It was a delay the bank’s customers were unwilling to endure. How did SCB fix its ATM woes? It brought in a team of Blue Prism digital workers. Challenge While the overall incidence of ATM errors is low at SCB, it operates 10,000 ATMs across Thailand, so errors were still occurring with enough frequency to be a problem. Every time an error did occur, SCB found itself dealing with an unhappy customer while simultaneously needing to dedicate significant resources to fix the issue. Solution Instead of waiting seven days, customers have the missing money back in their accounts in under 10 minutes Now, when a customer contacts the call center to report an error, the operator passes the report to a Blue Prism digital worker. That worker then coordinates a team of digital workers who start by verifying that the transaction occurred. Next, they check the ATM error log to confirm the error. When an error is confirmed, another digital worker automatically notifies the customer that a refund is due, usually in less than three minutes from the customer’s initial call. And now, instead of waiting seven days, customers have the missing money back in their accounts in under 10 minutes. What’s more, the entire process is fully automated with no human worker intervention. Authority comment "We’re now testing how we can make ATM error detection proactive, so even before a customer realises there was a mistake, we can inform them with an SMS," said Christian Roland, Former Head of Transformation.
Rebel Energy is a new entrant in the UK energy market and will soon supply 100% clean and affordable energy to all UK households. Rebel’s mission is to drive the nation’s energy transition agenda toward renewable power generation, ensuring poorer households are not left behind. But in an already cluttered and highly competitive market, how is Rebel giving itself the best chance for a successful launch? They’re hardwiring intelligent automation into their business. Challenge Rebel had to find a smarter, more efficient way to bring its products and vision to market Rebel Energy is on a mission to drive the UK’s power transition agenda, making 100% renewable energy available to all. However, Rebel is by no means the first utility to tout its environmentally friendly credentials. And having conducted a rigorous pre-launch process assessment, Rebel was keenly aware that most of the processes it had to use were standard across the industry. To launch successfully, Rebel had to find a smarter, more efficient way to bring its products and vision to market. Solution Rebel was entering a highly competitive marketplace. But it had one key advantage. As a new enterprise, Rebel wasn’t encumbered by outdated or existing legacy systems. So, after conducting a comprehensive process audit, Rebel made the astute decision to bring in Blue Prism digital workers from the start. It’s a decision that will pay big dividends. For Rebel, it means they’ll enjoy increased operational efficiencies, providing superior service for customers while significantly reducing the cost to serve. As data is generated by and about its customers, Rebel can leverage that information, helping it to support disadvantaged UK households as they transition to clean energy.
A UK bank has an impressively long history, and throughout they have looked for ways to innovate and improve their business. When COVID-19 struck, they found themselves well-positioned to help customers in need of mortgage relief. How? With a Blue Prism intelligent digital workforce. Challenge The lockdown and shelter-in-place mandates that were issued early in the COVID-19 pandemic led to widespread unemployment and financial worries. Homeowners with mortgages were left wondering if they could pay the bills next month. The British government recognised the stress and developed a programme to help its citizens. Mortgage customers were offered the opportunity of a three-month payment holiday. The bank aimed to respond to its customers quickly but knew that phone lines would be busy and request queues would be long. It is estimated that many thousands of customers would request a repayment holiday. Solution Business owners were able to quickly and easily reuse code from other mortgage processes The bank had an important tool at its disposal. A Blue Prism digital workforce was already hard at work in the mortgage area of the business. Business owners were able to quickly and easily reuse code from other mortgage processes to create a new process for approving payment holidays. Incredibly the team had the process up and running in just two days. Result The bank developed an online form for the customers to complete. A digital worker picked up the form from a mailbox, checked the details provided by the customer, and performed validation checks. If the customer met the requirements, the digital worker would apply for the mortgage payment holiday and send an SMS advising the customer. In the end, digital workers had processed 500,000 requests.
Round table discussion
Artificial intelligence is more than just the latest buzzword in the security marketplace. In some cases, smarter computer technologies like AI and machine learning (ML) are helping to transform how security operates. AI is also expanding the industry’s use cases, sometimes even beyond the historic province of the security realm. It turns out that AI is also a timely tool in the middle of a global pandemic. We asked this week’s Expert Panel Roundtable: How is artificial intelligence (AI) changing the security market?
The role of video surveillance is expanding, driven by all the new ways that video – and data culled from video – can impact a business. As a growing population of video cameras expands into new fields of view, we asked this week’s Expert Panel Roundtable: What is the most unusual application of surveillance cameras you have seen recently?
Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?
Protecting dormitory residents and assetsDownload
Protecting Critical Infrastructure through facial recognitionDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download