PAC & GDX, providers of access control and door entry solutions, are showcasing the range and depth of their innovative technology on Stand IF2930 at IFSEC International 2019. From a single door installation to a fully integrated network based system, the company’s extensive portfolio provides unbeatable reliability and robust functionality, at a price point that enables installation in a diverse range of residential and commercial buildings. In order to provide integrators and end us...
Adarma, an independent security services company, previously ECS Security, has successfully launched following a private management buyout led by David Calder and Nathan Dornbrook with capital from Livingbridge, one of the UK’s leading mid-market private equity investors, and debt from Bank of Scotland. With over 250 staff and experience spanning over two decades, Adarma provides a broad range of IT security consulting, solution and services with deep expertise in threat management includ...
SimonsVoss Technologies GmbH, part of the Allegion group - a pioneer in digital locking and physical access control systems - enters a technology partnership in Europe with Morphean. The new technology partnership, that will utilise SimonsVoss’ digital access control system SmartIntego, extends Morphean’s cloud-based capabilities beyond video surveillance and into the access control-as-a-service (ACaaS) market, forecast to reach US$2.8b by 2024. Integrated security system We are s...
Ping Identity, global provider of identity defined security solutions, has announced updates to its data governance solution, PingDataGovernance, to better manage data security and privacy requirements for APIs and user profiles. Today’s enterprises manage many different APIs on average, meaning sensitive consumer data like banking information and healthcare records are increasingly vulnerable. This rapid growth of APIs and third-party API traffic necessitates fine-grained data protection...
Feenics Inc., an award-winning provider of the Access Control as a Service (ACaaS) Keep by Feenics cloud-hosted platform, continues to address the upward growth of its security management software solution, adding Rachel Young as Regional Sales Manager, South Central U.S. and Daniel Tercey, Business Development Manager, West. Security management solutions As Regional Sales Manager, Young will be responsible for Texas, Oklahoma, Louisiana, Mississippi and Alabama. She spent the majority of her...
Arecont Vision Costar, the provider of network-based video surveillance solutions, announces the addition of Apex Technology Sales, Inc. (Apex) to its Authorized Manufacturer’s Representative Program. A proven and experienced representative agency, Apex will provide expert pre-sales assistance for Arecont Vision Costar’s Total Video Solution offerings across the US North Central Region, including Minnesota, both North and South Dakota, and Western Wisconsin. “Mike Pride and hi...
DICE Corporation announced the launch of an all new Video Verification App at the Electronic Security Expo (ESX) in Indianapolis last week. The Video Verification App is a completely mobile browser-based tool used in conjunction with DICE’s CloudEye cloud video recording solution. If an event triggered by an alarm system occurs, app users have more control of how alarm center interaction is handled by viewing live video surveillance and other essential account information. Video Verification App The app process is simple. When an alarm is tripped, users receive an immediate notification through SMS text messages, simplifying the dispatch process and giving customers the information, they need to know to proceed. Users are then able to view live streams, determine if the alarm should be dispatched or canceled, and also speak to an operator for further assistance. Additional camera locations can also be selected from a dropdown menu to provide a well-rounded view of the premises and aid the customer in determining the best course of action. The Video Verification App can be used with most monitoring software that supports the product’s APIs Compatibility is also far-reaching with this solution. The Video Verification App is capable of being used with most monitoring software that supports the product’s APIs, including DICE’s Matrix Monitoring. Giving users more options and accessibility, central stations are able to reduce expenses from handling low priority alarms, improve operator efficiency, and encourage meaningful customer engagement through enhanced end-user communication. Compatible with video monitoring software “With over 75 percent of Americans now owning smartphones, consumers are more engaged and accessible than ever before,” said DICE Corporation President and CEO, Cliff Dice. “Advancements in new technology are opening up exciting ways to keep users connected while also offering central stations significant opportunity for growth while reducing expenses.” In addition to launching the app at ESX, the new technology also received an Innovation Award for mobile apps. “We’re pleased to bring home an award and be recognised by our peers for developing outstanding products that drive the electronic security and life safety industries,” Dice said. “By offering new products like the Video Verification App and CloudEye cloud video recording solutions, we’re cementing our reputation as one of the leading developers of video surveillance solutions for the alarm industry and beyond.”
Digital Defense, Inc. has announced the availability of its Frontline.Cloud integration with Attivo Networks, the award-winning leader in deception for cybersecurity threat detection. Digital Defense’s Frontline.Cloud vulnerability management and threat assessment platform identifies high-risk/critical assets with business context that are highly vulnerable to exploits, remain unpatched, are unpatchable or have already been infected in real-time. Integration with Attivo Networks Frontline.Cloud is the industry's only true threat asset risk posture assessment app built for hybrid cloud environments The integration with the Attivo Networks BOTsink solution allows administrators to quickly and confidently make strategic decisions on where to dynamically deploy additional deception technology assets to enhance their deception deployment and further misdirect attackers. This gives organisations the advantage of time to detect, analyse, and stop an attacker even as their risk posture and critical assets change. Frontline.Cloud is the industry's only true on-demand vulnerability and threat asset risk posture assessment app built for hybrid cloud environments. Frontline.Cloud lets security teams focus on identifying and prioritising the most important assets to proactively harden them against an attack without requiring agents. Frontline.Cloud security platform Frontline.Cloud utilises data from the BOTsink solution to provide risk-based intelligence and for dynamically deploying additional deception technology assets to augment the current deception environment. Additionally, Frontline.Cloud enables security teams to be more effective in identifying compromised assets and assets under immediate attack in order to quickly misdirect attackers and prioritise remediation of the most important systems based on business context. Securing IoT/ICS Networks A significant security capability for ICS networks and critical infrastructure is drawing attackers away from these systems and detecting how they are trying to exploit vulnerabilities. This is especially true in environments where it is often a challenge to patch systems due to limited access and minimal maintenance windows or, in many cases, no patch for a known vulnerability is even available. Attackers continue to exploit different types of vulnerabilities, compromised systems and blind spots in infrastructure" “Attackers continue to exploit different types of vulnerabilities, compromised systems and blind spots in infrastructure. We are now seeing them target critical infrastructure and IoT devices because of the difficulties in patching those assets,” said Larry Hurtado, CEO of Digital Defense. “Security teams have been challenged with identifying and tracking dynamically changing assets, understanding risk in real-time and prioritising patching efforts, while Digital Defense provides the solution to help security teams address these challenges, it is now time to turn the tables on attackers.” Effect threat detection “Attivo has an extensive deception fabric for accurately detecting and derailing threats and the partnership with Digital Defense further ups the game against attackers,” said Tushar Kothari, CEO of Attivo Networks. “The ability to automatically deploy Attivo deception based on shared vulnerability insights provides a unique and innovative way to reduce risk while increasing the difficulty of an attack. It is a powerful example of how organisations can proactively strengthen their security posture while also building out an Active Defense.”
The Department of Defense (DoD) recently invited Point3 Security to join the Persistent Cyber Training Environment (PCTE) after learning of Point3’s success in the private sector in cultivating, assessing, and identifying cybersecurity talent. For the United States military, it is imperative to have a strategic and comprehensive cybersecurity talent cultivation plan. Producing qualified personnel to meet the workforce needs of mission commanders is a top priority for the DoD. To meet the demand for technical cybersecurity operators, the DoD created the PCTE, which supports cloud-based training, team certification, and individual skills development for all military branches. Development of gamified learning solutions Point3 designs new challenges to strengthen information security’s most motivated professionalsPoint3’s success in the private sector will now be carried over into serving the mission of the PCTE through the development of gamified learning solutions. Point3 has helped organisations of all shapes and sizes with talent recruitment, retention, and upskilling through its gamified ecosystem, ESCALATE. Point3 continuously designs new challenges to strengthen information security’s most motivated professionals, and currently provides over 100 immersive, self-paced challenges for both individuals and teams. To heighten motivation and performance, members earn points, receive achievement badges, and are ranked on a community leader-board by completing offensive and defensive challenges. Members have access to a global pool of mentors and managers who have a wealth of analytical tools to measure team and individual progress. “It was most humbling to be approached by the Cyber Mission Forces, which sees our success in helping the private industry tackle the ‘cybersecurity skills gap’ and recognises ESCALATE as a best-in-class offering. Because their mission is so critical to the country, it will be a tremendous honour to share our expertise and be a part of the military’s workforce development solution,” says Evan Dornbush, CEO of Point3 Security, Inc.
Matrox Graphics Inc. is pleased to announce a series of major updates to its award-winning Matrox Maevex 6100 Series of multi-channel 4K enterprise encoders. Supporting all of today’s most widely-used streaming protocols, the Maevex 6100 Series enterprise encoder appliances and cards now include built-in HLS support that allows enterprises to deliver multiple, dynamically-optimised streams to a broad range of devices over the internet. Maevex 6100 encoders now also support IPv6 addressing that is essential for enterprises migrating to this new Internet Protocol (IP) standard. In addition, fMP4 file format support equips administrators with multi-recording redundancy functionality to reliably preserve all recordings, while the popular MOV format is ideal for video playback and video management applications. Cloud-service transcoding Matrox Maevex 6120 and Maevex 6150 dual- and quad-4K enterprise encoders will be in action at InfoComm 2019 Matrox Maevex 6120 and Maevex 6150 dual- and quad-4K enterprise encoders will be in action at InfoComm 2019, in Matrox booth 3055. In addition to multiple-protocol support for LAN, WAN, and internet streaming—including RTSP, RTP, MPEG2.TS, RTMP, and SRT—Maevex 6100 Series encoders now support on-device, multi-channel HLS stream delivery. Using adaptive bitrate streaming supported by HLS, Maevex 6100 Series encoders enable small and medium-sized enterprises to stream to multiple remote devices over the internet, adapting instantly to each device’s unique circumstances to ensure the best quality stream possible. The ability to dynamically serve optimised streams directly from Maevex encoders also allows organisations to save on cloud-service transcoding and/or additional software licensing costs. Network infrastructures Supporting the next-generation Internet Protocol standard, IPv6 offers an enormous leap to 340-undecillion unique-address-spaces to succeed the 4.3 billion addresses used in IPv4. The transition to IPv6 addressing is significant as Maevex 6100 Series encoders can now integrate seamlessly with network infrastructures and devices leveraging updated IP addressing. Maevex 6100 encoders support fMP4 file recording to both network and local USB locations simultaneously fMP4 file format support allows recordings from Maevex 6100 Series encoders to be more resilient to network and power failures and allows files to be easily recoverable when recordings are interrupted by these types of unpredictable events. Maevex 6100 encoders support fMP4 file recording to both network and local USB locations simultaneously, allowing administrators to have significant redundancy safeguards built directly into the encoder. The MOV digital multimedia format developed by Apple® meanwhile, is widely adopted for high-quality video playback or video editing and management applications. Lowest possible cost “Matrox Maevex 6100 Series encoders continue to make video capture, streaming, and recording easier and more effective for enterprises of all sizes,” says Ron Berty, business development manager, Matrox Graphics Inc. “Organisations are placing a tremendous amount of value on building, sharing, and storing data and content. With these latest updates, Maevex encoders ensure that highly-produced rich-media content is being delivered worldwide—at the lowest possible cost, at the industry’s very best quality, latency, bitrate utilisation, and reliability possible.” The new HLS, IPv6, fMP4, and MOV updates will be available as a free Maevex firmware download from the Matrox website in early Q3 2019.
From June 11th to 13th Gradiant has an important appointment in London. For a few days, the city is becoming the capital of identity recognition technologies to transact in a seamless, yet secure manner. Identity Week is the largest technology fair focused on the concept of identity in Europe and this year brings together more than 3,000 international industry actors in three world-class events: Digital:ID, Planet Biometrics and Security Document Week. Forensic and face recognition solutions In this international scenario, Gradiant is showing forensic technologies and face recognition solutions at booth D28 (Digital: EXPO, ExCel London) to automate digital onboarding and Know Your Customer (KYC) processes in a reliable way, as well as prevent document fraud on Internet. Providing security when we need access to personal data is fundamental in order to incorporate technology into the day-to-day activities we carry out in the actual digital society. Facial recognition is positioned as one of the most reliable techniques to incorporate into user registration processes Facial recognition is positioned as one of the most reliable techniques to incorporate into user registration processes, both to register new customers and to provide secure access to personal data in digital onboarding processes (electronic identification of the customer that allows the remote goods and services contract). Most of the time, these processes require to verify that the ID document - ID, passport or driver's license - registered in the system matches with the user's identity in an unmistakable way; but it is also important to incorporate other techniques that collect more information about the client and analyse possible manipulations carried out in the identity document, in order to ensure secure remote client's discharge. Valida by Gradiant forensic tool “In London we are going to show Valida, our forensic tool to detect manipulations in digital documents. In January we received our second selection to present this solution at the CES in Las Vegas and we continue to show it at MWC in Barcelona and RSA in San Francisco,” explains Daniel Ramos, International Business Development Manager at Gradiant. "Now it's time to bring Valida to the UK, to Identity Week, where the world's leading document security vendors come together.” Valida by Gradiant’s main goal is to evaluate the authenticity of digital documents to prevent fraud in online user verification, digital on boarding and Know Your Customer (KYC) processes. This technology developed by Gradiant, in collaboration with atlanTTic research center of Universidade de Vigo, allows companies to offer an extra level of security in this operations, as it automatically analyses any type of identity document (and other PDF and JPEG files such as payroll, invoices, receipts, etc.) to detect possible spoofing attacks and forgeries in the data present in these files. faceIDNN facial recognition technology Gradiant is also showing in London faceIDNN to verify user’s identity by comparing the face with the photograph in his/her ID In addition to forgery detection technology for digital documents, Gradiant is also showing in London faceIDNN to verify user’s identity by comparing the face with the photograph in his/her ID, driver’s license or passport. Using both images, techniques developed by Gradiant verify in real time if they belong to the same person. The company’s experience in facial recognition has allowed to develop techniques for anti-spoofing attacks, as well as guaranteeing verification despite significant appearance changes have happened against the photo in the ID card, or if the person has aged. faceIDNN has been co-funded by Xunta de Galicia (Galician Regional Government) by Ignicia Programme (IN8555A IGNICIA Proba de Concepto) Biometric technologies In order to complement this verification, Gradiant has developed biometrics of signature, voice and video (liveness detection) to be incorporated in the processes of digital onboarding as a second authentication factor, in order to prove the customer is who he claims to be. “Our solution focuses on taking advantage of digital onboarding process in order to collect other types of information that provide us with a higher level of security in their verification, such as their signature, voice or video," says Ramos. "We have these three biometric technologies and we can implement them together or separately.” More and more businesses are born 100% digital and more traditional ones are joining the digitised world. Some of these businesses need to verify the identity of their customers remotely and ensure. This is the case of banks, which currently can register new customers without them physically going to bank offices. Biometric verification solutions These entities have a legal obligation to know the identity of their customers as required by the 4th European Anti-Money Laundering Directive In addition, these entities have a legal obligation to know the identity of their customers as required by the 4th European Anti-Money Laundering Directive, in order to comply with the Know Your Customer (KYC) and Anti-Money Laundering (AML) requirements. This European directive aims to prevent problems such as corruption, illegal financing, and money laundering, among others, to combat illegal transactions in the digital environment. Gradiant's biometric verification solutions are a complete choice to ensure security through face, signature or voice customer identification and to prevent fraud in digital files. These solutions can also be effective in sectors such as gambling (to identify if users are old enough to access these services), sharing economies (where there is a digital transaction between at least two people), dating, telcos, insurance, e-commerce and hotels.
Check Point has announced a new suite of network security products for large enterprises and data centres, which deliver an industry-leading Tera-bps (bits per second) of Gen V Threat Prevention without compromising on network performance, up time, or scalability. Powered by the Check Point Infinity architecture, the 16000 and 26000 Security Gateways incorporate Check Point’s ThreatCloud and award-winning SandBlast Zero-Day Protection. These modular gateways come in base, plus and turbo models delivering up to 24 Gbps of Gen V Threat Prevention security throughput, support connectivity standards up to 100 Gbe, and feature expansion options for up to 64 network interfaces. “Gen V (5th Generation) cyber-attacks have impacted two billion consumers and 46% of enterprises globally, yet most organisations are still deploying 2nd and 3rd generation security,” said Gil Shwed, CEO and Founder of Check Point Software. “Our new gateways – in tandem with the Maestro Orchestrator security solution – will allow our large enterprise customers to achieve unprecedented levels of Gen V security at industry leading inspection rates.” Prevention against advanced threats R80.30 Gen V Threat Prevention protects users from malicious web downloads in real-timeThe newest release of Check Point’s R80.30 software features the industry’s first threat extraction for the web and patent-pending TLS/SSL inspection capabilities, providing practical prevention against advanced threats. With R80.30, admins will no longer have to compromise on security for productivity. R80.30 Gen V Threat Prevention protects users from malicious web downloads in real-time. Threat Extraction removes exploitable content, reconstructs files to eliminate potential threats and promptly delivers the clean content to the user. In addition, a Threat Prevention dashboard provides full visibility across networks, mobile and endpoints. The recent release of R80.30 includes new patent-pending Transport Layer Security (TLS) technologies that provide state-of-the-art SSL Inspection. This technology enables enterprises to quickly inspect SSL-encrypted network traffic, evade cyber-attack techniques like Server Name Indication (SNI) manipulation, and strike the right balance between security and privacy. Up to 90% of all web traffic is encrypted, meaning that SSL inspection capability is essential for detecting threats that would be otherwise hidden. Advanced security management software R80 is the industry's most advanced threat prevention and security management software for the data centre, cloud, mobileWith over 160 technology integrations and 100 new features, R80 is the industry’s most advanced threat prevention and security management software for the data centre, cloud, mobile and endpoint. R80.30’s innovations enable the new 16000 and 26000 gateways to achieve industry leading Threat Prevention performance while streamlining the management process through a single console. Check Point Maestro Hyperscale Orchestrator, the industry’s first hyperscale network security solution, enables a single Check Point gateway to expand to the capacity and performance of 52 gateways in minutes. This nearly limitless scalability enables cloud-level resilience and reliability along with Terabit/second firewall throughput, allowing organisations to support 5G network high data rates and ultra-low latency while securing the most demanding network computing workloads. This combination of the R80.30 software, 16000/26000 Security Gateways, and the Maestro Orchestrator enables Check Point customers to achieve hyperscale network security with tera-bit levels of threat prevention performance.
In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organisation, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR world. Large cloud environment But modern applications are difficult to secure. SaaS based, web, mobile, or custom made all work on different platforms and frameworks. It’s a headache managing all the APIs needed to automate and sync tools. This introduces risk. The greater the number of apps the broader the attack surface and therefore the greater the chance there will be blind posts. Keeping up to date with updates and new security policies is never easy There are also added hazards. Applications are always changing. Keeping up to date with updates and new security policies is never easy, but especially hard in a large cloud environment. Failure to adopt changes puts the organisation and customers at further risk. But the biggest obstacle is keeping applications and APIs out of harm’s way. It’s a near on impossible task when attack methods and sources are constantly changing. More advanced threats To be specific there are four emerging challenges when it comes to protecting apps. Firstly, managing the good and the bad bots and spotting which is which, secondly securing APIs as IoT adoption intensifies, thirdly the relationship between securing apps and DevOps and ensuring ownership of security, and finally denial of service attacks that use newer tactics such as brute force. Basic security hygiene dictates that security teams refer to the OWASP Top 10. It’s considered the ‘ten commandments’ in security circles, providing a starting point for ensuring the most common threats and vulnerabilities are managed, detected and mitigated. Web Application Firewalls also come into the fray with guidance on testing for the ways hackers exploit vulnerabilities. However, though the basics are good to have in place, there are always more advanced threats to take care of. Bots being a big one. Bot management The more sophisticated bots will go as far as to mimic human behaviourAstonishingly about half of internet traffic is bot generated. Half of it is from bad bots. Discerning the good from the bad isn’t easy though and explains why around 80% of organisations can’t make a clear distinction between the two. Bad bots can do a lot of damage like take over user accounts and payment information, scrape confidential data, or hold up inventory and skew marketing metrics. The more sophisticated bots will go as far as to mimic human behaviour and bypass tools like CAPTCHA and even device fingerprinting based protection ineffective. Securing APIs Then there’s the complications derived from machine-to-machine and internet of things (IoT) communications. The more integrated ‘things’, the more data there is, the more events there are report on, and the more activity there is reliant on APIs to make the ‘things’ useful and agile. That’s what makes them a target and the threats to API vulnerabilities include injections, protocol attacks, parameter manipulations, invalidated redirects and bot attacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks Denial of service (DoS) You might think there’s little to add to the swathes of denial of service warnings. Yet when businesses are still being targeted and feeling the ill effects it’s worth mentioning again that different forms of application-layer DoS attacks are still very effective at bringing application services down. Even the greatest application protection is worthless if the service itself can be knocked down This includes HTTP/S floods, low and slow attacks (famous examples being Slowloris, LOIC, Torshammer), dynamic IP attacks, buffer overflow, Brute Force attacks and more. The IoT botnets are the culprits and have made application-layer attacks so popular that they have become the preferred DDoS attack vector. Even the greatest application protection is worthless if the service itself can be knocked down. Continuous security It may seem easy to say but for modern DevOps, agility is valued at the expense of security. We see time and again examples of where development and roll-out methodologies, such as continuous delivery, mean applications are exposed to threats each time they are modified. There’s no doubt it is extremely difficult to maintain a valid security policy and protect sensitive data in dynamic conditions without creating a high number of false positives. But we now find that this task has gone way beyond the capability of humans. Organisations now need machine-learning based solutions that map application resources, analyse possible threats, and create and optimise security policies in real time. Reaching this level in security planning should be a big wake-up call that security automation is an essential not a nice to have. Running security plans The board needs to know that investment is critical to protect their profits It’s critical that the security solution your company adopts protects applications on all platforms, against all attacks, through all the channels and at all times. The board needs to know that investment is critical to protect their profits. As such there are six things they need to know: Application security solutions must encompass web and mobile apps, as well as APIs. Bot management solutions need to overcome the most sophisticated bot attacks. DDoS mitigation must be an essential and integrated part of application security solutions. A future-proof solution must protect containerised applications, severless functions, and integrate with automation, provisioning and orchestration tools. To keep up with continuous application delivery, security protections must adapt in real time. A fully managed service should be considered to remove complexity and minimise resources. No amount of human power will beat the bots. That last point is the most critical. Skill is essential in designing and running security plans and policies that work. But the plans can’t be executed without automated tools. There are just too many decisions to make in a split second. Combining both is the path to an effective app protection strategy and a stronger brand to boot.
Edge devices (and edge computing) are the future. Although, this does seem a little cliché, it is the truth. The edge computing industry is growing as quickly as technology can support it and it looks like we will need it to. IoT global market The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 according to a recent Forbes article titled, “10 Charts That Will Challenge Your Perspective of IoT’s growth”. IoT devices are not the only edge devices we have to deal with as the total number of connected edge devices includes the likes of devices like security devices, phones, sensors, retail sales devices, and industrial and home automation devices. The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 The sheer number of devices begins to bring thoughts of possible security and bandwidth implications into perspective. The amount of data that will need to be passed and processed with all of these devices will be massive. There needs to be consideration taken by all business owners and automation engineers into how this amount of data and processing will be conducted. Ever-expanding edge devices market As the number of edge devices in the marketplace and their use among consumers and businesses rises, the need to be able to handle the data from all of these devices is no longer going to be suitable for central server architectures. We are talking about hundreds of billions and even trillions of devices. According to IHS Markit researchers’ study, there were 245 million CCTV cameras worldwide. One has to imagine there are at least 25% of that many access control devices (61.25 million devices) based on a $344 million market cap also calculated by IHS Markit’s researchers. If all the other edge devices mentioned earlier are considered then one can see that trying to route them all through servers for processing is going to start to become difficult if it hasn’t already, -which arguably it already has, as is evidenced by the popularity of cloud-based solutions amongst those businesses that already use a lot of edge devices or are processing a lot of information on a constant basis. Cloud computing The question is whether cloud computing the most effective and efficient solution as the IoT industry grows The question is this; is cloud computing the most effective and efficient solution as the IoT industry grows and the amount of edge devices becomes so numerous? My belief is that it is not. Taking the example of a $399 USD device that is just larger than the size of a pack of cards and runs a CPU benchmarked at the same level as a mid-size desktop. This device has 8GB RAM and 64GB EMMC built-in and a GPU that can comfortably support a 4K signal at 60Hz with support for NVMe SSDs for add-on storage. This would have been unbelievable five years ago. As the price of edge computing goes down, which it has done in a dramatic way over the last 10 years (as can be seen with my recent purchase), the price to maintain a central server that can perform the processing required for all of the new devices being introduced to the world (due to the low cost of entry for edge device manufacturers) becomes more expensive. This introduces the guarantee that there will be a point where it will be less expensive for businesses, and consumers alike, to do the bulk of their processing at the edge as opposed to in central server architectures. Cloud computing is now being overtaken by edge computing, the method of processing data at the edge of the network in the devices themselves Edge computing There are a plethora of articles discussing and detailing the opposition between the two sides of the computing technology coin, cloud computing and edge computing. The gist of it is that “cloud computing” was the hot new buzzword three years ago and is now being overtaken by “edge computing.” The truth is that cloud computing is a central server architecture hosted at someone else’s location. Edge computing is going to be a necessary development in the technology industry Edge computing is the method of processing data at the edge of the network (in the devices themselves) and allowing for less resources required at a central location. There is certainly a use case for both, however the shift to edge computing amongst the general public and small to mid-sized businesses will not be a surprise to those players, who have been paying attention. One article titled, “Next Big Thing In Cloud Computing Puts Amazon And Its Peers On The Edge” by Investor’s Business Daily takes the stance that edge computing is going to completely displace centralised cloud computing and even coins the phrase, “Cloud computing, decentralised” to explain edge computing. It speaks for the stance that most experts in technology seem to be taking, including Amazon Web Services’ VP of Technology, Marco Argenti according to the same article. We know that edge computing is going to be a necessary development in the technology industry, and it is happening as I write this, and quickly at that. Cost efficiency of edge processing As time goes on, the intersection between the prices of network bandwidth, edge processing and maintaining super powerful central servers will cause edge processing to be the most efficient and cost-effective way to maintain a scalable network in any environment, including datacenters. Owning a central server or utilising edge computing become the better options As it currently stands, most residential users can only achieve a 1Gbps WAN (internet) connection, and small to medium-sized business can’t get much more but seem to get much less, based on my personal experience. When more than 1Gbps needs to be processed, cloud computing becomes very expensive at which point, owning a central server or utilising edge computing become the better options. Then you look a total cost of ownership and when the cost of edge computing is less expensive than the cost of maintaining central server architectures, edge computing becomes the single best option. So, I’ll say it again, edge devices (and edge computing) are the future.
Where are video surveillance cameras headed? At the core of next-generation Internet Protocol (IP) cameras are advanced chips with artificial intelligence (AI) at the edge, enabling cameras to gather valuable information about an incident: scanning shoppers at a department store, monitoring city streets, or checking on an elderly loved one at home. Thanks to advanced chip technology, complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras —professional to consumer — fueling the democratisation of AI in the IP camera market. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras Expanding the global IP camera market The video surveillance equipment market grew to $18.5 billion in 2018 and is expected to increase this year, according to IHS Markit. The latest research points to video everywhere, edge computing, and AI as the top technologies that will have a major impact in both commercial and consumer markets in 2019. Computing at the edge means that the processors inside the camera are powerful enough to run AI processing locally, while still encoding and streaming video, and are able to do it all at the low-power required to fit into the limited thermal budget of an IP camera. New SoC chips will be able to perform all of the processing on camera and provide accurate AI information, with no need to send data to a server or the cloud for processing. Instead, data can be analysed right in the camera itself, offering high performance, real-time video analytics, and lower latency — all critical aspects of video surveillance. This new AI paradigm is made possible by a new generation of SoCs, a key driver behind the market growth of IP cameras. Complex analytics operations are becoming more affordable across the full spectrum of surveillance cameras to fuel the advent of AI in the IP camera market Micro-processor-enabled video analytics Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time Microprocessor-enabled analytics allow users to more easily extract valuable data from video streams. How about an insider’s view into retail customer behavior? Consider video cameras at a department store, monitoring shoppers’ behavior, traffic patterns, and areas of interest. Next-generation cameras will recognise how long a shopper stays in front of a specific display, if the shopper leaves and returns, and if the shopper ultimately makes a purchase. Next-generation video cameras will be able to create heat maps of stores to see where people spend the most time, so retailers will be able to adjust product placement accordingly. Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly. By understanding customers’ behavior, retailers can determine the best way to interact with them, target specific campaigns, and tailor ads for them. Cue the coupons while the shopper is still onsite! Analytics will also help identify busy/quiet times of the day, so retailers can staff accordingly Fast processing for rapid response at city level City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations such as loitering, big crowds forming, or cars driving the wrong way.Quick local decisions on the video cameras are also used to help analyse traffic situations Quick local decisions on the video cameras are also used to help analyse traffic situations, adjust traffic lights, identify license plates, automatically charge cars for parking, find a missing car across a city, or create live and accurate traffic maps. Real-time HD video monitoring and recording When it comes to home monitoring, what will next-generation video surveillance cameras offer? Real-time monitoring and notification can detect if a person is in the back yard or approaching the door, if there’s a suspicious vehicle in the driveway, or if a package is being delivered (or stolen). Advanced video cameras can determine when notifications are and aren’t required, since users don’t want to be notified for false alerts such as rain, tree branches moving, bugs, etc. Next-generation video camera capabilities can also help monitor a loved one, person or pet, helping put families at ease if they are at work or on vacation. For example, helpful analytics may be used to detect if someone has fallen, hasn’t moved for a while, or does not appear for breakfast according to their typical schedule. City surveillance and smart cities are depending on advanced video surveillance and intelligence to keep an eye on people and vehicles, identify criminals, flag suspicious behavior, and identify potentially dangerous situations Next-gen IP cameras When evaluating next-generation IP cameras (cameras on the edge), look at the brains. These cameras will likely be powered by next-generation SoCs chips. Here is what this means to you: Save on network bandwidth, cloud computing and storage costs. There is no need to constantly upload videos to a server for analysis. Analysis can be performed locally on the camera, with only relevant videos being uploaded. Faster reaction time. Decisions are made locally, with no network latency. This is critical if you need to sound an alarm on a specific event. Privacy. In the most extreme cases, no video needs to leave the camera. Only metadata needs to be sent to the cloud or server. For example, the faces of people can be recognised in the camera and acted upon, but the video never reaches the cloud. The cameras can just stream a description of the scene to the server “suspicious person with a red sweater walking in front of the train station, has been loitering for the last 10 minutes, suggest sending an agent to check it out.” This could become a requirement in some EU countries with GDPR rules. Easier search. Instead of having to look through hours of video content, the server can just store/analyse the metadata, and easily perform searches such as “find all people with a red sweater who stayed more than five minutes in front of the train station today.” Flexibility/personalisation. Each camera at the edge can be personalised to work better for the specific scene it is looking at, compared to a generic server. For example, “run a heat map algorithm on camera A (retail) as I want to know which sections of my store get the most traffic; and run a license plate recogniser on camera B (parking lot) as I want to be able to track the cars going in/out of my parking lot.” No cloud computing required. For cameras in remote locations or with limited network bandwidth, users have the ability to perform all analytics locally, without relying on uploading video to a server/cloud. Higher resolution/quality. When AI processing is performed locally, the full resolution of the sensor can be used (up to 4K or more), while typically the video streamed to a server will be lower resolution, 1080p or less. This means more pixels are available locally for the AI engine so that you will be able to detect a face from a higher distance than when the video is streamed off camera. AI at the edge Professional-level IP cameras capable of performing AI at the edge are coming soon with early offerings making their debut at this year’s ISC West. As we enter 2020, we will begin to see the availability of consumer-level cameras enabling real-time video analytics at the edge for home use. With rapid technology advancement and increased customer demand, AI is on the verge of exploding. When it comes to image quality and video analytics, IP cameras now in development will create a next-generation impact at department stores, above city streets, and keeping an eye on our loved ones.
While most security teams are focused on preventing malicious outsider attacks, recent data suggests that close to 30 percent of confirmed breaches today involve insiders. Today’s increasingly complex networks across physical, information technology (IT) and operational technology (OT) systems make it difficult for security teams to detect and prevent insider threats. This is compounded by the proliferation of data, devices, applications, and users accessing networked resources. Rising insider malicious attacks threat As the threat landscape evolves rapidly, CISOs need to step up their game According to the 2017 U.S. State of Cybercrime Survey, 50 percent of organisations experience at least one malicious insider incident per year. And the Verizon 2018 Data Breach Report found that close to 30 percent of confirmed breaches today involve insiders. In August 2018, a tragic crash involving a Seattle airplane stolen by an employee raised awareness for the need for physical insider threat awareness (as well as more psychological screening before employment). As the threat landscape evolves rapidly, CISOs need to step up their game, says Aamir Ghaffar, Director of Solutions Engineering at AlertEnterprise. They should implement security controls that protect their company’s people, physical assets, data, intellectual property, and reputation both inside and out. And they need to do it while simultaneously satisfying industry compliance requirements. In response to our questions, Aamir Ghaffar offered some additional insights on the timely topic of insider threats. Q: We are hearing discussion about the emergence of cyber-physical security systems. What are they and how do they help organisations address insider threats? Threats now originate not only in the physical space but also in cyber environments Ghaffar: The concept of convergence has evolved in response to risk and the overall threat landscape. Threats now originate not only in the physical space but also in cyber environments – this is what is commonly referred to as blended risk. These blended risks require a converged approach and a converged view of security as a whole; connecting data, building new capabilities and gaining new insights to allow security teams to better defend against attacks. Q: How are organisations responding? Ghaffar: They are shifting towards centralisation – from the security operations center all the way to the executive level, where one C-Suite executive manages all security across physical, IT and OT domains. According to Gartner by 2023, 75% of organisations will restructure risk and security governance to address new cyber-physical systems (CPS) and converged IT, OT, Internet of Things (IoT) and physical security needs, which is an increase from fewer than 15% today. Q: How does the shift impact insider threats? Ghaffar: Unifying cyber and physical unlocks powerful new capabilities. For example, cyber-physical teams faced with a threat such as an intrusive device planted within their network environment, can quickly connect the cyber footprint to a physical location – understanding where the threats originate and identify those responsible for bringing it in. Converging physical and cyber identity through platforms that connect physical access control, IT and OT systems is an example of how organisations can better prepare for blended security threats An AI-enabled automated system is the most practical and human error-proof solution today Q: How is AI being used to protect against insider threats? Ghaffar: With increased security convergence we are now collecting such a large volume of data that relying on manual detection of insider or external threats is no longer a viable solution. An automated system, powered by artificial intelligence used with digital identities, is now the most practical and human error-proof solution today. AI and machine learning (ML) technology helps organisations map complex patterns of user behavior, process tens of millions of events within seconds to detect threats in near-real-time and respond swiftly. This benefits security operations personnel to go from distraction to action, allowing them to focus on what really matters, which are their most critical security events. Q: Sometimes the threat is about human error. Oftentimes we think the most harmful insider threats are intentionalGhaffar: Oftentimes we think the most harmful insider threats are intentional; however, unintentional user behavior and negligence could have serious ramifications for an organisation. Organisations should deploy technology that delivers automation and active policy enforcement to prevent employees from making inadvertent yet critical errors. Organisations should also do regular risk assessments – not one and done. Don’t implement a process and think you’re secure. Automated identity and access management technology can provide scheduled access reviews to help detect high-risk user profiles with accumulated or a toxic combination of access, as well as segregation of duties violations due to department change or job transfers. Q: What are the biggest misconceptions about insider threats? Ghaffar: First, that the biggest threats originate outside my company. Or that insider threats are a problem for government agencies and highly sensitive organisations, not “regular” companies like us. A company may also mistakenly think that they have limited assets that could be exposed, or that the assets are of little value; therefore, a large-scale breach is less likely to happen. And even if it does, it probably won’t have a big impact. Risk management leaders should start by developing a compelling visionQ: So, they think “it can’t happen here.”? Ghaffar: Yes, and they think their employees are inherently trustworthy, and that with basic security measures in place, the risk is small. They think that insider threats are always intentional. Or they think “it’s not my job.” Q: What next steps should security leaders take in addressing insider threats in their organisation? Ghaffar: Security and risk management leaders should start by developing a compelling vision and strategy that will resonate with key company stakeholders. They can expand the visibility they have into user activity beyond things that happen on the network. Go beyond a data-centric approach to a people-centric approach through identity behavior analysis. Improving visibility into user activity and taking a more preventive approach are the best ways to manage risk of an incident. Develop an inside-out approach to security. By converging physical, cyber and OT security you’ll gain a holistic view of your enterprise-wide security landscape.
Among the cloud’s many impacts on the physical security market is a democratisation of access control. Less expensive cloud systems are making electronic access control affordable even to smaller companies. Cloud-based access control With the growing cloud-based access control market, integrators can find more opportunities in small businesses and vertical markets that typically wouldn’t be on the radar of their sales team. Large upfront costs for a server, software and annual licensing previously made a typical electronic card access system cost-prohibitive. With cloud access, integrators can offer less expensive upfront costs with low monthly subscription fees that cover all software updates, database backups, security patches and more. The benefit for the integrator is recurring revenue that increases their profitability The benefit for the integrator is recurring revenue. While helping clients save money on server, software and IT infrastructure costs, integrators secure recurring revenue that increases their profitability. Building recurring revenue not only provides cash flow but also keeps a manufacturer’s name on the top of the minds of customers and leads to additional sales. Mobile access Continued investment in mobile access and cloud technology is essential to meet the access control needs of the booming multi-family housing and shared office-space markets. Managing access control for end users and residents in these verticals is challenging. Use of mechanical keys in these environments is too expensive and time consuming; it’s necessary to deploy wireless, technologically-advanced solutions. Managing access control for end users in different verticals is challenging, thus it’s necessary to deploy wireless, technologically-advanced solutions While the security industry has traditionally been slow to adopt IT technologies, the cloud is the exception. Large IT industry cloud players such as Amazon Web Services, Microsoft, and Google are being used by security industry professionals to provide systems that are easier to install, maintain, and administer and are far more secure and less expensive than a customer can provide on their own. Advancing cloud technology Cloud technologies give people access through their mobile phones and other devices Enterprise customers increasingly want to be able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. They seek to create trusted environments within which they can deliver valuable new user experiences; in effect, there is a demand for “digital cohesion.” Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Application programming interfaces Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. Cloud-based platforms, APIs will help bridge biometrics and access control in the enterprise “A big growth driver for the cloud is demand from enterprises that no longer look at access control simply for securing doors, data and other assets,” says Hilding Arrehed, Vice President of Cloud Services, HID Global, one of our Expert Panelists. “They want to create trusted environments within which they can deliver valuable new experiences to users. Cloud technologies make this possible by enabling people to use mobile devices for new applications and capabilities.”Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise Cloud-based platforms For example, cloud-based platforms will provide the backbone for quickly adding complementary applications like biometrics, secure print, virtual photo IDs, and vending as well as other access control use cases and emerging permission-based capabilities yet to be developed. “Cloud-based platforms facilitate new managed service models for mobile IDs and secure issuance and will fuel simplified development environments and easy integration into vertical solutions,” says Arrehed. “They have the potential to give organisations greater flexibility to upgrade and scale security infrastructure, improve maintenance and efficiency, and accelerate ROI.”
Facial recognition has seen huge breakthroughs since the U.S. National Institute of Standards and Technology (NIST) first began testing in 2010. Accuracy has seen massive gains, especially from 2013-2018. In the 2018 test, the most accurate algorithm was 20 times more accurate than the 2013 equivalent. Essentially, 95 percent of the matches that failed in 2013 now yield correct results. Compare that to 2010-2013, when the most accurate algorithm reduced its error rate by 30 percent. This reduction in error rates since 2013 is due to wholesale replacement of the old algorithms with new ones based on deep convolutional neural networks — completely revolutionising the technology. Optimal recognition results SAFR says it delivers optimal recognition results with 99.86 percent accuracy in under 100 milliseconds One entrant in the newly energised market is RealNetworks, whose SAFR for Security is an AI-based facial recognition solution for live video that integrates video management system (VMS) solutions. With 24/7 monitoring, SAFR detects and matches millions of faces accurately in real time, enabling teams to manage a watchlist across any number of video feeds. SAFR says it delivers optimal recognition results with 99.86 percent accuracy in under 100 milliseconds, even in real-world conditions where faces are in motion, at different angles, under poor lighting, or partially obscured. SAFR builds on RealNetworks’ 23-year history in video technologies. Launched in July 2018, SAFR — secure, accurate facial recognition — is enabling new applications for security, convenience, and analytics. Create security responses “We seek to be the world’s most trusted facial recognition platform and are delighted to partner with customers in the security industry and elsewhere to shape a more secure, convenient future worldwide,” says Dan Grimm, Vice President of Computer Vision and General Manager of SAFR at RealNetworks. “Security professionals are asked to keep us safe 24/7, monitoring a burgeoning number of cameras, and we help make them more effective.” SAFR targets facial recognition for live video, identifying camera-unaware faces moving in real-world conditions. In the April 2019 NIST results, SAFR tested as the fastest and most compact solution among algorithms with less than 0.022 False Non-Match Rate — 62 percent faster than the average speed, according to the company. SAFR now provides capabilities such as live video overlays alerting security professionals to events in real time, automatic bookmarks with rich metadata for investigative work, and alerts that can be customised to create security responses. SAFR uses one-sixth the compute power of competing facial recognition solutions Facial recognition algorithms Five years ago, facial recognition algorithms would struggle to match forward-facing people from still images, let alone camera-unaware moving faces from live video with variations in rotation and tilt. SAFR says they have achieved a balance of accuracy and performance for live video. A contributor to this accuracy is consistency across a range of skin tones. The algorithm was trained on a highly diverse global set of over 10 million non-simulated real-world faces. SAFR was optimised for speed and can sample a face multiple times during the same period of time as other algorithms, subsequently increasing its accuracy. SAFR achieves the performance through edge processing. Distributed architecture enables efficient bandwidth consumption, reducing the roundtrip latency of facial recognition speed to under 100 milliseconds. The savings lower total cost of ownership (TCO): SAFR uses one-sixth the compute power of competing facial recognition solutions, equating to $500,000 or so in savings on a 250-camera deployment. Integrated experience SAFR also uses off-the-shelf hardware and is optimised to leverage inexpensive GPUs SAFR also uses off-the-shelf hardware and is optimised to leverage inexpensive GPUs. SAFR can be deployed on premises or in the cloud, and supports Windows, Linux, macOS, iOS, and Android. When SAFR is paired with a VMS, such as Milestone XProtect or Genetec Security Center, the integrated experience includes 24/7 monitoring to detect and match faces in real-time. Features include live video overlays within the VMS to identify strangers, threats, concerns, unrecognised persons, VIPs, employees, or other tagged individuals in live video. Real-time alerts can be customised for when persons of interest appear on a video camera feed. Additionally, automatic bookmarks with rich metadata make for easier investigative review of security footage. Facial recognition technology is increasingly in demand to improve safety across various industry verticals. Better customer experience Large enterprises with high-visitor flows and heightened security — such as transportation hubs, stadiums, universities, and hospitals — need to know in real time when persons of interest or those on watchlists appear on camera. Sports stadiums could apply facial recognition to deny entry to banned patrons, locate lost children, or recognise VIPs to deliver a better customer experience. Hospitals need access control to restricted areas and pharmaceutical storage closets Hospitals need access control to restricted areas and pharmaceutical storage closets. Airports and transit centres value traffic flows, demographic composition, and dwell times to help improve scheduling. SAFR for Security is available worldwide, and the company partners with VMS providers such as Milestone, Genetec, Digifort, and IPConfigure by Paliton Networks. They are actively working to support additional VMS solutions and have sales teams located in major metropolitan cities around the world. Security professionals “The job of the security professional is critical in today’s world,” says Grimm. “SAFR for Security helps mitigate the challenges of the important work security professionals do to keep us all safe.” In designing and developing SAFR, RealNetworks considered diversity and the uniqueness of each person; Grimm says their massive global training data set is a competitive advantage. SAFR is designed with privacy in mind. All facial images and signatures are AES-256 encrypted in transit or at rest. “SAFR is powerful enterprise-grade software that is continuously improving through innovation and many years of expertise,” says Grimm.
Surveillance solutions business Synectics develops and delivers a solution to help enhance safety and security monitoring at Nottingham Trent University. With more than 28,000 students and 3,100 staff to protect, surveillance footage at Nottingham Trent University (NTU) is captured by over 1,300 cameras covering the estate of 75 buildings. Each of the university’s three main campuses has a 24/7 control room and its own security team, ensuring that safety measures enable free movement while protecting the community from both external and internal threats. Integrated surveillance solution Synectics deployed a tailored solution based around its Synergy 3 command A progressive development plan, coupled with the need to optimise legacy technology, meant the university required an integrated surveillance solution that would enable teams based at each control room to monitor and manage footage from both IP and analogue cameras, supporting a gradual transition to digital solutions and full-IP ambitions. In one of the UK’s first cloud-based surveillance contracts, and in collaboration with integrator PFS, Synectics deployed a tailored solution based around its Synergy 3 command and control platform to support NTU’s long-term objectives. Interactive camera map Mark Stacey, Security Systems Operational Manager, NTU, said: “Moving the university onto a sophisticated surveillance monitoring platform has significantly improved the provision of student security, saving our team vital minutes in the event of emergencies.” “As well as supporting both analogue and IP inputs, where many solutions on the market do not, Synectics’ Synergy 3 offers impressive functionality and is easy to use. The ability to import an interactive camera map means we can now bring up footage in just seconds, where operators previously had to spend time manually correlating sensor triggers to the relevant cameras – an enhancement that keeps our students safe in real time.” Cloud-based system “Synectics even created a new feature at our request, which enables us to circle an area of the on-screen map and immediately view up to nine local cameras in that zone. Furthermore, opting for a cloud-based system means we don’t have to look after a physical server, freeing up space and our resources.” The system will help us in our mission to provide an ever-safer environment for our students" “Throughout the process, Synectics has gone the distance to deliver, as highlighted by the tailored training sessions provided for the team and its commitment to support us throughout the life of the system. We’re delighted with the results and sure the system will help us in our mission to provide an ever-safer environment for our students.” Future-proof solutions Martin Bonfield, Sales Manager at Synectics, commented: “We passionately believe that command and control systems should be flexible enough to allow for the evolution of customer needs. Only then can you provide seamless, future-proof solutions that improve safety both now and in the long term.” “Working closely with the team at NTU to understand their needs, the Synergy 3 platform has been designed to ensure they have an intuitive system that saves staff-hours and significantly improves incident response times. Nottingham Trent University is nationally recognised, having received the University of the Year award three years in a row. I’m delighted that we’ve provided them with this leading-edge solution, along with support, and ongoing training, to help safeguard their students, staff, and premises.”
Trackforce has entered the retail market with a leading security workforce and activities management platform that empowers retailers to effectively manage their physical security and loss prevention environment. The platform delivers actionable data analytics to anticipate, assess, and mitigate risk; it enhances compliancy management, and helps supervisors manage more resources at multiple sites from one centralised location. Retail security and loss prevention teams operate in a challenging and complex environment" Retail Security According to Guirchaume Abitbol, CEO and Founder of Trackforce, “Retail security and loss prevention teams operate in a challenging and complex environment. To be successful they must access the best type of technology to support their security and loss prevention teams and streamline management of the entire security and risk environment. Our platform is seamless. Simpler to operate and more cost effective, it helps retailers deliver enhanced shopper safety while optimising security and loss prevention management.” Trackforce supports security and loss prevention teams by giving them predictive and historical data analytics to boost their strategic decision-making capabilities. The SaaS platform’s predictive analytics capabilities facilitate easy identification and analysis of theft patterns so that weak areas within the store can be improved to reduce risk and loss. Historic data are analysed, cross-referenced with trends and industry best practices, and then broken down. The resulting intelligence can then be used to fine tune security both within the store and externally. Trackforce SaaS platform The platform also consolidates and centralises the security command and control function, eliminating the expense of posting multiple supervisors at various sites. “Now one supervisor using the Trackforce command center is empowered with communication and management capabilities to effectively oversee security at numerous retail sites. The supervisor can communicate over multiple communication channels to security officers at all locations they are responsible for,” adds Abitbol. “This delivers major budgetary savings for the retail enterprise without compromising quality in any aspect of its security environment.” The Trackforce platform prevents loss and mitigates risks by securely maintaining digital records Security and risk management within the retail environment is complex, with numerous code and compliancy requirements. Missing a deadline can result in severe fines, increased insurance premiums, or even prosecution. The Trackforce platform prevents loss and mitigates risks by securely maintaining digital records and proactively alerting stakeholders when licenses need renewing and audits and inspections are due. The security manager commands a dashboard view of the entire regulatory and compliancy landscape across all store locations. Security and risk management “No two retail security departments are the same,” concludes Abitbol. “So we help retail clients customise their Trackforce workforce management platform based on their unique security, loss prevention, and risk environment. Trackforce eliminates the need for time-consuming paper reports and antiquated guard tour devices. It assists security officers and loss prevention officers in fulfilling their duties effectively, giving them improved capabilities to help them face their security challenges with greater efficiency and economy.”
HID Global, a global provider of trusted identity solutions, announced that Tasmania’s Old Kempton Distillery (OKD) has deployed its Internet of Things (IoT) enablement platform, HID Trusted Tag Services, to combat counterfeiting of its world class whiskeys, gins and other liquor products. HID’s innovative IoT platform for brand protection, combined with the web application developed by local integrator AusNFC, enables Old Kempton Distillery to guard against grey market activities and allows customers to authenticate their product at the point of sale. It also strengthens the appellation registration for the Australian island state of Tasmania, which boasts some of the most pristine water and climate conditions for manufacturing premium, top-shelf liquor products. Taking measures to prevent counterfeiting HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience"“Old Kempton Distillery makes one of the world’s finest whiskeys, and with counterfeiting in our industry becoming a global issue, we recognised the need to take proactive steps to protect our brand,” said Robbie Gilligan, Business Manager and Brand Ambassador for Old Kempton Distillery. “We were seeking the best brand protection technology available and a solution that would also allow us to securely engage with our customers, long after a sale. We believe that HID Trusted Tag Services and the support provided through AusNFC provide just that.” Beyond its anti-counterfeiting features, HID’s IoT offering opens a new and powerful avenue for Old Kempton Distillery to stay connected with customers via direct and hyper-personalised communications that helps the distillery build brand loyalty in a privacy-preserving, closed environment. “We find HID’s solutions to be applicable to many different industries,” said Larry Hower, CEO of AusNFC. “HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience.” Working of the system The distillery’s solution incorporates HID Trusted Tag Services into the AusNFC web application that drive the front-end mobile experience on customers’ phones. A HID cryptographically secure Near Field Communication (NFC) tag is embedded into the label of every liquor bottle, which links to HID’s cloud authentication service. By tapping their iPhone or Android phone to the bottle, the customer activates a secure communications channel that authenticates the provenance of their premium product – down to the actual bottle number. Each tap generates a unique URL, preventing counterfeiters from copying, spoofing or manipulating the URL for false verification. Combining cloud authentication with NFC tags The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied“HID’s IoT technology is enabling mass adoption of brand protection by major brands worldwide that are seeking to address more sophisticated attempts by fraudsters focussed on imitating their products,” said Mark Robinton, Director of Business Development and Strategic Innovation at HID Global. “Manufacturers and consumers alike can rest assured that their product can be authenticated at every stage of its lifecycle – from production to the shopping bag.” HID Trusted Tag Services combine HID’s cloud authentication services with its trusted NFC tags that come in many form factors for variety of product shapes and sizes requiring brand authentication. HID’s trusted NFC tags are embedded into each product during the manufacturing process, and are easily read using NFC-enabled smartphones (both Android and iOS v11 and newer). The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied, and the extended security features in HID’s cloud authentication service provide privacy-preserving brand authentication and consumer engagement in a closed and trusted environment.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announces that the Bradley Business Center, located in Chicago, has installed a 3xLOGIC infinias CLOUD access control system throughout the redevelopment project. HTML Global, an IT Managed Services Provider (MSP), oversaw system installation and continues to provide remote system management. Bradley Business Center (BBC) is the largest redevelopment project on Chicago’s north side, comprising over 500,000 square feet, spread over 22 acres. The BBC offers a unique shared office environment for entrepreneurs and professionals and boasts a wide array of features and amenities. Controlling common areas Both organisations do the day-to-day administration of the system, with HTML Global providing back-up and higher-level functions At present, the 3xLOGIC infinias system manages a total of 43 internal doors throughout the complex, split between BBC-managed doors and those for a tenant company, Compass Health Center. The two organisations manage their own access separately but use some of the same network and PoE switches. BBC doors managed are mainly those controlling common areas and shared amenities— parking, fitness facility, rooftop terrace, and others—but also data rooms and other sensitive areas within the office space. Both organisations do the day-to-day administration of the system, with HTML Global providing back-up and higher-level functions when requested. “When we started with BBC, they were looking to us for our knowledge base, and we installed a few doors at that time. Then, we built out the system as they added new offices and common areas to be managed,” explained William Hunt, Managing Director, HTML Global. Cloud-based system “The distributed Ethernet network can easily handle all the doors and that simplified installation and on-going management. The BBC property management staff don’t want a server onsite, so a cloud solution nicely fits their needs. Another advantage for BBC is our RMR services and the fact that a cloud-based system is mainly operating expenses, not hardware capital expenses—that’s economically advantageous for a property management business.” “There are so many other advantages to a cloud-based system, especially our ability to add doors when any of the resident companies want to join the system, or to expand the number of doors for existing customers—we can add one door or hundreds of doors upon request,” said Hunt. “Compass likes the system functionality and ease-of-use so much, they recently expanded it to their Northbrook location, too. That way, when staff move between the two facilities, they only need one set of credentials.” Access control system Such high-level control and ease of use is accomplished with minimal hardware on site BBC controls access by zone and/or amenity for each credential holder, administrators can add zones and close access to other zones with a few keystrokes. Door control is granular, making it easy to provide all-areas access to senior staff and highly-limited access, for example, for contractors and temporary workers. Such high-level control and ease of use is accomplished with minimal hardware on site. Many administrators were up and running on the infinias system with very little training, if any. With a cloud-based access control system, new tenants can join the system with ease, or a tenant can be removed from the system in a matter of minutes. Fix things remotely Hunt again, “As an MSP, we are overseeing a system that updates itself automatically, and because BBC management doesn’t have a full-time IT person, that’s where we come in.” The future looks bright for HTML Global with the Bradley Business Center. Current office space is nearing fully-leased status, and BBC management is looking to expand their property offerings into additional buildings located on the same parcel. Hunt is impressed with another feature of the cloud-based system, “The network is set up on PoE switches, so if a door isn’t acting properly, we can fix things remotely, we don’t need to roll a truck—that’s very cost-effective.”
Sony 4K security cameras act as ‘intelligent eyes’ at EDGE Olympic, one of Amsterdam’s most technologically advanced sustainable buildings. The rugged minidome cameras give a clear picture of the flow of workers and visitors into and around the premises. In addition, their excellent low-light sensitivity is an asset for the reinforcement of security at entrances and car parking areas. Playing a key role in EDGE Olympic’s intelligent design are thirteen Sony SNC VM772R 4K minidome cameras EDGE Olympic is an exciting landmark in sustainability. Opened in May 2018, the building constructed by EDGE offers over 11,000m2 of innovative co-working space close to Amsterdam’s Olympic Stadium. Providing a creative and energy-efficient workspace for commercial tenants, the building’s design is focused on a sophisticated digital infrastructure that connects people, devices, sensors and information via a secure cloud platform. Sony SNC VM772R 4K minidome cameras Playing a key role in EDGE Olympic’s intelligent design are thirteen Sony SNC VM772R 4K minidome cameras installed by Netherlands security specialist, Lancker Wolters. The cameras are integrated with Genetec’s video management system to create a comprehensive video security and monitoring solution. Ruggedly built for all-weather outdoor operation around the clock, the SNC VM772R camera features a large, highly sensitive 1.0-type back-illuminated Exmor R CMOS image sensor. Offering four times higher resolution than Full HD, the camera is capable of capturing smooth, crisply detailed 4K video in conditions of near darkness. This allows people and objects to be seen clearly in a wide range of lighting conditions – and thus helps to ensure round-the-clock safety and security of employees, co-workers and visitors to the building. Video data in building operations optimisation In the future, it is expected that video data will also be used to optimise building operations In the future, it is expected that video data will also be used to optimise building operations. For example, intelligent analysis of traffic patterns could enable more efficient room bookings and use of resources such as heating, lighting and cleaning services. Further, SNC-VM772R cameras monitor the EDGE Olympic car park, scanning the registration license plates of vehicles and checking the number against a database to admit authorised staff and visitors only, while automatically raising the barrier to let vehicles exit. This also allows instant confirmation whether a particular employee is present in the building: this overview can be beneficial, for example, in the event of an emergency evacuation. Sony 4K surveillance cameras "The initial price of a particular camera doesn’t matter" comments Erik Ubels, CTO, EDGE Technologies. "It’s the usability over its lifetime that makes it a better investment. That's why we chose Sony 4K cameras for this landmark building and other properties that we’re planning in the near future."
ProdataKey (PDK), an innovator of cloud-based network and wireless access control products and ASSA ABLOY, the pioneer in door opening solutions, announced the completion of a campus-wide security upgrade at Glenaire Retirement Community in Cary, North Carolina. Modern Systems, of Yadkinville, North Carolina, has installed a fully integrated wireless lock and access control solution securing 370 doors spread across the community’s main building entrances, public access areas, offices and residential apartment units. It makes use of ASSA ABLOY’s Aperio wireless locksets with PDK’s cloud access control software, providing administrators with the ability to remotely lock and unlock doors, set specific hours for maintenance workers’ access to buildings, continuously monitor door use, and easily retrieve system-wide reports. ASSA ABLOY IN100 Aperio wireless locks feature sleek readers integrated with the door hardware, helping to preserve the upscale aesthetic of Glenaire’s many buildings. Accessing PDK software from mobile device System management of PDK software can be handled completely from any mobile device or computer browserThe system will continue to grow, with expansion to all electrical rooms, storage rooms, mechanical rooms and closets, bringing the total to approximately 650 doors, as well as another 190 apartments and 40 assisted living units. As new doors come online, they will appear within the completely scalable PDK interface with no interruption to service or administrative functions. System management of PDK software can be handled completely from any mobile device or computer browser. Modern Systems was able to upload the user database from Glenaire’s legacy access control system to PDK’s cloud servers, allowing residents to retain use of their existing cards, which previously were used only to open the front doors of main buildings. With the PDK/ASSA ABLOY system, they now use those same cards to access public areas and their own private residences. ‘Guest’ cards, with more restricted access, are available for residents to give to family or friends as appropriate. Customised card permissions have also been established for staff groups, including service workers, nursing professionals and dining staff. Integrating security solutions When a resident is missing, administrators will be able to quickly call up cameras from the last door where the resident used his or her access cardModern Systems plans to soon facilitate an integration between the PDK software and several other security solutions they have installed at Glenaire. Mapping between doors and surveillance cameras, which are part of a new Milestone Systems video management solution, will not only enhance security but assist with Glenaire’s missing resident protocol. When a resident is missing, administrators will be able to quickly call up cameras from the last door where the resident used his or her access card. They also plan to connect the facility’s Situational Awareness and Response Assistant (SARA) risk management solution and mass notification system, from Status Solutions, with PDK. This integration will be important both in campus lock-down situations, as well as to assist with entry for response teams during medical emergencies. Glenaire’s Director of Facility Services, Ryan Ferguson, says he was wowed by the cloud-based PDK solution, which he says, “has the most modern, up-to-date access control software of anything I’ve seen. In addition, we were able to install the wireless PDK/ASSA ABLOY solution in about half the time it would have taken to install a wired solution, and for about half the cost.” Protection from cyber vulnerabilities The fact that all updates and security patches are automatically installed, system expansion is pain-free and limitless"Cory Jackson, PDK’s Vice President of Strategic Sales, adds, “The Glenaire project demonstrates the many ways in which our cloud solution makes sense for enterprise scale customers. “The fact that all updates and security patches are automatically installed, system expansion is pain-free and limitless – even across multiple buildings or sites, we offer seamless integration with solutions from valuable partners like ASSA ABLOY and others, and the customer’s in-house network is not exposed to any potential cyber vulnerabilities, are all reasons that PDK is gaining traction with larger customers.” “Retirement communities like Glenaire face a very unique set of challenges. The ability to provide a sense of security to residents and their families while still creating an environment that feels like home is paramount,” says Caleb Allen, electro-mechanical specialist for ASSA ABLOY Door Security Solutions. “We were happy to offer them a solution that made it easy and affordable to install comprehensive access control throughout the facility.”
Round table discussion
With the advent of online shopping, brick-and-mortar retail businesses are challenged to make transactions more convenient while enhancing the “experience” aspects that differentiate real-life shopping from the simpler route of clicking on a website. Technology is helping retailers create that differentiation, including technologies such as video systems, deep learning analytics and point-of-sale (POS) integrations that have evolved from innovation in the physical security market. For more insights, we asked this week’s Expert Panel Roundtable: What new security industry technologies are having an impact on the retail market?
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase the cybersecurity of physical security systems?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?