The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to...
The 22nd edition of inter airport Europe, the International Exhibition for Airport Equipment, Technology, Design & Services, was officially opened at the Munich Trade Fair Centre in Germany. Until Friday, 11th October 2019, a total of 659 exhibitors from 40 countries will present a unique variety of the latest airport equipment on a total net exhibition space of 33,550 square metres. This represents a 5.5% increase in floor space compared with the previous event in 2017. The most important...
ComNet, Communication Networks of Danbury, Connecticut, a USA-based manufacturer of fibre optic transmission and networking equipment, is introducing two hardened PoE power injectors for applications where higher requirements for operating power exist on an Ethernet network. The CNGE1IPS75AC (75 watt) and CNGE1IPS95AC (95 watt) hardened Ethernet PoE power injectors designed to supply PoE operating power to Powered Devices that require greater power than can be provided by IEEE 802.3at for Power...
Fugue, the company delivering autonomous cloud infrastructure security and compliance, has announced its support for Open Policy Agent (OPA), an open source general-purpose policy engine and language for cloud infrastructure. Fugue is leveraging OPA and Rego, OPA’s declarative policy language, for cloud infrastructure policy-as-code to provide customers with maximum flexibility when implementing their custom enterprise policies. The Cloud Native Computing Foundation (CNCF) accepted OPA as...
Crossword Cybersecurity plc, the technology commercialisation company focusing exclusively on the cyber security sector, is pleased to announce the signing of a two-year contract with a FTSE 250 global chemical manufacturer. The customer will use Rizikon Assurance to issue onboarding assessments to their 250 strategic suppliers, in turn displaying their key risk data in the tool’s ‘Supplier Scorecard’ feature. Rizikon Assurance will automate the supplier management process, re...
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
A new cybersecurity service brings professional 24-hour monitoring within reach of SMEs for the very first time. bluedog Security Monitoring, which has been launched by Freeparking.com founder Paul Lomax and cybersecurity expert Tim Thurlings, offers smaller firms the type of managed detection and response service previously only available to large corporates. Highly trained cybersecurity team The launch of bluedog comes as SMEs face increased pressure from customers, regulators and investors The London-based company has developed a low-cost device called Sentinel which plugs into a customer's network and uses machine learning to spot unusual activity. It then alerts bluedog's security operations centre, where a highly trained cybersecurity team can analyse and respond to potential threats. The bluedog service can detect both external and internal threats, such as phishing emails or the download of video or audio files packed with malicious malware, which often bypass traditional endpoint security and firewalls. It not only offers enhanced security and rapid response to incidents, but also helps companies comply with standards such as GDPR, Cyber Essentials or ISO/IEC 27001:2005 and keeps a full audit trail for reporting purposes. The launch of bluedog comes as SMEs face increased pressure from customers, regulators and investors as well as cyber criminals seeking ‘soft' targets. Firewalls and endpoint protection The UK government's Cyber Security Breaches Survey 2019 shows that while the number of businesses being attacked has been falling - down from 46 per cent in 2017 to 32 per cent this year - the number of attacks each victim suffers has risen from two to six over the same period. It suggests businesses with weaker defences are being targeted repeatedly. bluedog's CTO Tim Thurlings, a former ‘ethical hacker' who helped develop the EU's TIBER threat intelligence framework, says: "Firewalls and endpoint protection which SMEs have traditionally relied on are no longer adequate as experienced hackers can easily find ways round them. SMEs need to take their cybersecurity to the next level, yet at present few have a dedicated professional.” Bluedog's innovative model combines machine learning and human expertise to offer exceptional service" "bluedog gives them 24/7 access to a whole team of cyber experts for less than the cost of employing one part-time staff member. Bluedog's innovative model combines machine learning and human expertise to offer exceptional service and peace of mind." Analyst firm Gartner believes that by 2020, 15 per cent of organisations will be using services such as managed detection and response, compared to less than 1 per cent today. Combining machine learning and human expertise bluedog CEO Paul Lomax, whose Freeparking.com business was the UK's first self-service domain registrar, and who has also founded two hosting companies, says bluedog is targeting a gap in the market for SME monitoring services. "While technology is becoming more sophisticated, it still requires people to analyse the data and act on it," he explains. "Ideally all businesses should have 24/7 monitoring but with salaries for skilled professionals running into six figures, it is an expensive resource that up until now has been limited to blue-chip firms.” "With bluedog, we have developed a smarter model which enables us to revolutionise pricing and bring services within reach of SMEs for the first time. This is a $10bn untapped market and no-one else is offering a solution. bluedog's model gives us a competitive advantage and makes us well placed to become a global leader."
NEC Corporation, a pioneer in the integration of IT and network technologies, announces that its face recognition technology achieved the highest matching accuracy in the Face Recognition Vendor Test (FRVT) 2018 performed by the U.S. National Institute of Standards and Technology (NIST), with an error rate of 0.5% when registering 12 million people. NEC's technology ranked No. 1 in NIST testing for the fifth time, following its top placement in the face recognition testing for video in 2017. The high performance of NEC's technology is reflected in the test results which placed the company significantly ahead of the runner-up. Convenience of biometric authentication technology The use of face recognition technology is rapidly expanding across a wide range of fields throughout the world In recent years, the growing convenience of biometric authentication technology, improved security awareness, and the remarkable development of artificial intelligence (AI), have driven companies around the world to begin adopting biometric authentication technology. Specifically, the use of face recognition technology is rapidly expanding across a wide range of fields throughout the world. Face recognition technologies are now being used in areas that require high reliability, convenience and long-term use, such as identity verification and national infrastructure, transaction settlements, bank account establishment, and passport verification. 49 organisations, including companies from the United States, China, Russia, Europe, and Japan, participated in the NIST's FRVT 2018, where the evaluation of face recognition accuracy was performed. Reducing the identification error rate These tests are the most rigorous and fair benchmarks implemented by the NIST as each organisation is required to submit and be evaluated on programs that were developed during the same period. By performing multi-stage matching, an impressive search speed of 230 million matchings per second was achieved. NEC aims to further expand the scope of this technology's application to include store transaction settlements Furthermore, leveraging NEC's deep learning methods to significantly reduce the identification error rate, NEC accurately matched images of a subject taken over a 10 year interval with an error rate that was 4 times lower than the runner-up. Going forward, NEC aims to further expand the scope of this technology's application to include store transaction settlements, services in public facilities, such as buses, railways, airports, city offices, and hospitals; and helping to protect and care for children and the elderly. Biometric identification solutions Based on the NEC Group AI and Human Rights Principles established in April of this year, NEC gives top priority to the consideration of privacy and respect for human rights when using AI and biometric data. NEC also aims to contribute to further improvements in the usability of biometric identification and video analytics technology, including face recognition. "NEC's portfolio of biometric identification solutions, 'Bio-IDiom', which includes face recognition technology, is critical to the ways that NEC is helping to build safer and more productive societies as part of the 'NEC Value Chain Innovation'," said Hitoshi Imaoka, NEC Fellow at NEC Corporation. "These technologies create new value by sharing information on the status of communities, things, and processes across the entire value chain, and are a meaningful source of growth in our Mid-term Management Plan 2020 and 'NEC Safer Cities', which support the realisation of safe, secure, efficient, and equal cities."
The ETSI Industry Specification Group (ISG) for Network Functions Virtualisation (NFV) has started working on its next specification release, known as Release 4. While NFV-based deployments are expanding worldwide and show the benefits of network function virtualisation, new technologies are expected to be leveraged and features are being added in support of 5G and novel fixed access network deployments that are emerging in many countries. Network Functions Virtualisation-based deployments The Release 4 work programme will provide the right setting to further enhance the NFV framework The Release 4 work programme will provide the right setting to further enhance the NFV framework by considering recent technological advances, as well as ways to simplify its usage, that are aligned with the current trends in the industry towards network transformation. Release 4 addresses several new issues in the following technical areas: the evolution of the NFV framework to support the most recent cloud, software, and virtualisation techniques; novel management architectural styles and operationalisation aspects, leveraging virtualisation characteristics to simplify deployments; and increased support for automation. VNF generic operations More specifically, at its twenty-seventh plenary meeting, the ETSI ISG NFV approved, among others, new Release 4 work items to conduct a set of studies about service-based architecture design for NFV, VNF generic operations, administration and management (OAM) functions, as well as enablers for autonomous management in NFV management and orchestration (NFV-MANO). Normative work in Release 4 to enhance the support in the NFV framework for container-based deployment of VNFs was also started, addressing service interfaces for OS container management and orchestration, as well as the requirements for the management and orchestration of container cluster nodes. A better setting for the applicability to NFV of current network cloudification trends, as well as new tools to make network deployments and their operation more automatic and simpler, yet flexible, are among the expected outcomes from the new work that was launched. Network and cloud security Technical topics comprising the Release 4 scope exemplify how the NFV framework is continuously being enhanced" “The technical topics comprising the Release 4 scope exemplify well how the NFV framework is continuously being enhanced to consider existing and new technology trends and provide the demanded support by network operators and network function providers for deploying current and future network generations”, says Joan Triay, ETSI ISG NFV Technical Manager. While the ETSI ISG NFV is transitioning into the new release, the group will also continue the maintenance of Release 2 specifications, dealing with implementable protocol and data models, as well as their counterpart testing specifications to the end of 2019 and into 2020. This will ensure that bug fixes based on industry feedback are addressed, and that interoperability activities are continuously fostered. ETSI ISG NFV At the same time, protocols and data models for supporting Release 3 features are also under development. The Release 3 feature set has been frozen, after the ETSI ISG NFV delivered the specifications of the corresponding enhancements to the architecture, interface and information models in the summer of 2019.
Cobalt Iron Inc., a provider of SaaS-based enterprise data protection, and Northdoor Ltd., a London-based IT consultancy, will sponsor, exhibit, and make a presentation at the upcoming IBM Think Summit London on Oct. 16 at the Olympia London event center. Scheduled for 12:39 p.m. as part of the Cloud and Infrastructure Think Tank, the presentation is titled "Machine Learning Meets Data Protection — the unstoppable force meets the immovable object?" The companies will be exhibiting in the Cloud and Infrastructure Campus. Enterprise-ready multicloud solutions Think Summit London is IBM's annual festival of innovation, featuring tech talks, immersive experiences, topical debates, and thought-provoking guest speakers. This year's focus will be on enterprise-ready, multicloud solutions that are transforming businesses from "surviving" to "thriving," and how research and technology — including AI, blockchain, and quantum computing — are being channeled into protecting the future and helping to sustain not just business growth but also people and environments around the world. Enterprises are deploying SaaS-based models to meet service levels demanded by data-aware business executives In this presentation, Rodney Foreman, chief revenue officer of Cobalt Iron, will discuss how groundbreaking new solutions for hybrid cloud deployments pair analytics with automation to eliminate many of the performance issues normally associated with managing a legacy data protection environment. Foreman will present what the "art of the possible" looks like for companies leveraging the next generation of SaaS data protection using Cobalt Iron's Compass™ and IBM's Spectrum Protect delivered by Northdoor IT. Auto-provisioning workflows "Machine learning and data protection are a partnership made in heaven — or at least made in the cloud. Machine learning, analytics, automation, cloud, and SaaS have been aggressively deployed with massive success, delivering productivity, agility, and economic value across key IT disciplines," said Foreman, "While previously overlooked, data protection is now being brought into the fold — and the ability to integrate data protection into auto-provisioning workflows should be standard for any hybrid cloud environment." AJ Thompson, chief commercial officer for Northdoor commented, "Progressive public sector, SMB, and global enterprises are rapidly deploying SaaS-based models to meet and exceed the new service levels being demanded by cloud-savvy and data-aware business executives. We'd like to invite Think Summit London attendees to join our panel of experts as they shine a light on this opportunity."
Beyond Visual Line of Sight (BVLOS) drone operations are key for future commercial unmanned aerial vehicles (UAV) use cases, including public safety, industrial inspection and urban air mobility. Frequentis has partnered with mobile network connectivity specialist and start-up, Dimetor, to enable network connectivity for command and control (C2) and payload data links to ensure reliable and consistent data sharing. Dynamic and reliable telecommunication data The initial introduction of UAV’s to the airspace has been limited to visual line of sight (VLOS) operations. To extend commercial drone applications, BVLOS operations are essential for governmental entities as well as commercial deployments and many countries are now amending their drone policies to allow such flights. So far, the use of network connectivity and associated data have not been standardised This requires accurate, dynamic, and reliable telecommunication data and it is important to have this information from a single source. So far, the use of network connectivity and associated data have not been standardised for pre-flight assessment or regulated for operational use. However, recent drone trials in Finland and Estonia for the Gulf of Finland (GOF) U-space project uncovered this requirement and need for connectivity to enable consistent data sharing between the UAV and the UTM system. Critical data for safe BVLOS drone flights The connectivity platform from Dimetor, AirborneRF™, is deployed at the operational data centers of Mobile Network Operators (MNOs), processing highly confidential network data for assuring cellular connectivity for UAV operations. Flight planning tools like Frequentis’ CADAS-ATS and other U-space services can use the constraints in the pre-tactical/tactical phase of a BVLOS drone flight and either approve or reject the proposed flight plan. AirborneRF can also be used to demonstrate network capabilities to airspace regulators and UAV service providers. The partnership between Frequentis and Dimetor then enables the MNOs to seamlessly integrate the connectivity information into the aeronautical information management database (AIMdb), and thus to become an integral part of the developing ecosystem for commercial BVLOS drone operations. We will exchange our knowledge and work together to strengthen and develop the future airspace ecosystem" “By partnering with Dimetor, we can further explore and advance our work in the field of ATM and UTM. Through this cooperation, we will exchange our knowledge and experiences and work together to strengthen and develop the future airspace ecosystem, enabling the provision of critical data for safe BVLOS drone flights. This partnership is a significant step towards enabling our customers to keep pace with the additional growth by minimising operating costs.” says Hannu Juurakko, Frequentis Chairman of the ATM Executive Team. Highest quality and safety for BVLOS The agreement between Frequentis and Dimetor highlights the unified commitments to providing safety-critical services ensuring highest quality and safety for BVLOS and highly automated drone operations based on connectivity information. “At Dimetor we are delighted to be partnering with Frequentis. This will enable an integrated solution bringing together the 3D cellular connectivity information for safe BVLOS operations with Aeronautical Information Management (AIM) and UTM/ATM systems - on global scale”, says Thomas Wana, Dimetor Co-founder and CTO. Frequentis and Dimetor will enable drone powered business operations with a total addressable market value over 127billion USD forecasted by PricewaterhouseCoopers International (PwC).
Panorays, a rapidly growing provider of automated third-party security lifecycle management, unveiled a security intelligence solution known as Dark Web Insights. The new feature enhances Panorays’ award-winning third-party security management solution and serves as an additional layer of cyber security protection. Using Panorays’ Dark Web Insights, companies can now become proactive about knowing in advance of in-the-wild threats to their supply chain. The evaluator company automatically receives a notification when there is abnormal activity on the Dark Web regarding the third party. The new Dark Web feature checks mentions of a company’s third party on hacker forums and other nefarious marketplaces. It provides the ability to monitor potentially malicious hacker chatter about opportunities to target the third party, sell databases of personal information or take advantage of system weaknesses for financial benefit. “With the latest rash of misconfigured servers and data leaks, many companies have discovered too late that a significant breach has occurred,” said Noam Maman, VP Product of Panorays. “Many third-party security solutions assess the attack surface of vendors, but do not venture into the Dark Web. With Panorays, companies receive further necessary visibility into the security posture of their third parties.”
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organisation. Time-intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralised operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analysed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimisation easier. In most cases, digital transformation will fundamentally change how an organisation operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more.As the data from each of these sensors is collected and analysed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organisations are using for enhancement and improvements is comprehensively protected from unauthorised access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organisations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organisations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organisation, because the previously under-utilised data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organisations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognise patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviours of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimising city management and infrastructure. When video data is aggregated over time, it can be visualised into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous behaviour. A city could, for instance, analyse the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behaviour, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services. Analysing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimised based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimisation. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campus Finally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimisation – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organisations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analogue with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cyber security requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available” “We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organisations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organisations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Missed part one of our healthcare mini series? Click here.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilising so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilising a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organisation, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualisation tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organisations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson football game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analysing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organisational change is difficult, and our team hopes to make the transition process easier for our customers.”
ADT Commercial have grown organically in double digits since 2016, in addition to growing through 15 acquisitions completed since the merger of ADT and Protection One. Acquisition of integrator companies such as Red Hawk Fire and Security and Aronson Security Group have expanded ADT Commercial’s presence geographically to more areas of the country. Most of the employees of the acquired companies have stayed with ADT and “helped to create a corporate culture and a good place for employees to work,” says Dan Bresingham, Executive Vice President of ADT Commercial. Happy employees ensure good customer service. Enterprise resource planning Bresingham will lead ADT Commercial as it becomes a separate business unit in 2020 “We adapt to where our clients want us to be,” adds Joe Sanchez, Senior Vice President of Customer Operations of ADT Commercial National Accounts. “We take a strategic approach as we determine how adaptive our customers are going to be to the new technology.” I caught up with ADT Commercial at the GSX trade show in Chicago. Bresingham tells me ADT Commercial has benefitted from the calibre and breadth of leadership talent that have come along with the various acquisitions, including Mike McWilliams of Red Hawk, Bob Dale of Protection One, and Phil Aronson of Aronson Security. The transitioning of internal systems such as enterprise resource planning (ERP), billing and customer repair software will further steamline the ADT Commercial operation in the next several months. Bresingham will lead ADT Commercial as it becomes a separate business unit in 2020. We caught up with ADT at the GSX trade show in Chicago Providing new opportunities for regional integrators Additional acquisitions are also likely; in fact, growth is likely to accelerate. ADT Commercial offers a national footprint that can provide new opportunities for regional integrators it brings into the fold. New acquisitions will continue to fill out ADT’s skillset requirements in specific geographic areas where more expertise is needed. Security directors have a small staff and we help them know what they should be looking at in terms of data" “The industry doesn’t change a lot,” says Bresingham. “The technology just gets better, faster, and cheaper. As a service provider we take the best technology and combine it to provide the best solutions. We’re product-agnostic. Most of our jobs are down-and-dirty, doing the same things, but we’re pushing ourselves to be the best every day at the basics.” An emphasis at ADT is to provide customers ‘actionable’ data compiled from their various security systems. “We have a range of customers,” says Sanchez. Managing networks and video remotely “From small businesses to large data centers, there is no electronic system we cannot do. We are adaptable, from providing basic intrusion all the way to more sophisticated elements. Security directors have a small staff and we help them know what they should be looking at in terms of data.” “Our customers are our ‘true north’,” says Sanchez. A strong relationship with clients forms the basis for ADT Commercial’s success. Helping customers track data utilises ADT Commercial’s eSuite account management system, homegrown software that compiles and analyses various customer data inputs. It also allows the ability to manage networks and video remotely. “We built it from scratch for customers. It’s a web-based system that helps them manage their business,” says Bresingham. “We hold ourselves accountable. We don’t hide from data, we encourage it.” Monitoring refrigeration units The solution is different in every case, just as every customer is uniqueIn addition to data from customer systems, eSuite can compile local weather information, crime statistics and other information that can help provide trending information to guide a customer’s business. The system’s flexibility enables ADT to provide the data each customer needs. ADT helps customers manage their business beyond the security department, too. “We do a lot of things in environmental control, monitoring refrigeration units and making sure humidity and temperature readings are correct,” says Sanchez. Leaving a door open could cause product loss at a pharmaceutical company, for example. In the food industry, a freezer malfunction could cause huge losses. In either case, an alarm can draw attention to the problem in a timely manner. Other customers face regulatory requirements that demand an audit trail of compliance, which ADT’s systems can provide. At the end of the day, ADT asks customers ‘What’s your security need?’ The company then adapts and assembles its solutions using internal resources and outside vendors, to meet that need. The solution is different in every case, just as every customer is unique.
Located in Eastern China, Hangzhou is the capital and most populous city of Zhejiang Province. It has registered population of 9,800,000, with total area of 16,596 km². Jianggan District is one of the five main urban areas of Hangzhou. With a floating population of about 1.06 million, Jianggan District ranks first among Hangzhou's main urban areas. As the new administrative center of Hangzhou, it boasts the most important CBD and the largest train station and car hub in Hangzhou, bringing together various traffic elements such as highway junctions and bridges across the river. The entire Jianggan District is promoting vital transformation in urban areas Intelligent surveillance system Covering 8 streets, 141 communities and 4 villages, the entire Jianggan District is promoting vital transformation in urban areas. Nevertheless, the non-registered population, accounted for about 40% of the total population, makes it hard for the local government to improve urban management in the district. Every policeman needs to manage 1,700 citizens on average. The shortage of police force affected their work precision and led to difficulties in providing timely police response. In addition, insufficient surveillance coverage and limited intelligence system in the area resulted in inactive security measures, making it difficult for the police to achieve their goals Integrating DoT, IoT and the internet Based on the Dahua Heart of City (HOC) architecture supported by "Full Sensing, Full Intelligence, Full Computing and Full Ecosystem (4 Full) capabilities, Dahua Technology firmly focused on the construction needs of the area and built the overall plan of establishing an ‘online police’. Integrating the Internet, DoT and IoT, Dahua Technology has successfully assisted the Hangzhou Jianggan Public Security in building a multi-dimensional network that targets customer value, and combines AI, big data, and cloud computing in order to obtain accurate real-time data and strengthen the current technology of “online police” operations. Sensors and monitoring products Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network Moreover, Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network. It also set up 46 actual police investigation models to provide accurate instructions for Jianggan police, including property crimes analysis, situation analysis, vehicle management, people management, psychiatric control, online apprehension of violators, as well as missing person search, etc. Compared with traditional police operation, Dahua HOC Safe City Solution has built an “Online Police” mechanism to obtain the most authentic real-time data through information technology, and carry out accurate computer applications for a more scientific service deployment, efficient police force and powerful security control. Dahua HOC Safe City Solution It ensures that the Jianggan police can perform properly at a given time. It also promotes the transformation of police affairs from passive to active, from extensive to subtle, from imprecise to accurate, and from offline to online, gradually carrying out the prediction, early-warning, and prevention measures of police operations. Since 2016, the Dahua HOC Safe City Solution has helped Jianggan Public Security achieve outstanding results including enhanced police intelligence, reduced crime cases, increase in case closure rate and efficiency, improvement in public service, and speedy recovery of missing individuals, opening a new chapter for intelligent police operations.
Financial institutions require reliable IP video surveillance systems that provide high-performance, quality, and scalability. Unfortunately, with limited budgets, many financial institutions are still utilising outdated appliances. When security is not a priority, they are putting themselves at risk for fraud, theft, and data breaches. Security Integrators have an opportunity to help financial institutions by upgrading their systems with an up-to-date NVR server and overall video surveillance system which significantly increases performance and mitigates risk. Modern video surveillance system Integrators should utilise BCDVideo’s IP video surveillance appliances which are built for each unique project Budgets can vary depending based on the size of the financial institution. Since not all banks and credit unions have the same security budget as large institutions, it can be challenging to upgrade to a modern video surveillance system. To save on the overall cost, generic or often referred to as white-box solutions are viewed as the only reasonable option. Many white-box solutions are made without performance or quality in mind and built with miscellaneous parts. Ultimately, the end-user suffers from an unreliable system without extended warranties and support all because of short-term savings. White-box solutions are not the only option. Security Integrators should utilise BCDVideo’s IP video surveillance appliances which are purpose-built for each unique project, regardless of size. Giving customers greater security Most of their appliances offer a 5-year Keep Your Hard Drive warranty that lowers total cost of ownership. Standard warranties request that a failed hard drive be returned to the manufacturer during replacement. KYHD warranty gives customers greater security, compliance enablement, and complete control over their data BCDVideo understands that sensitive data could be compromised when the hard drive leaves the site, which is why they offer a Keep Your Hard Drive warranty. KYHD warranty gives customers greater security, compliance enablement, and complete control over their data. Security Integrators can feel confident quoting any project knowing they can turn to a live video surveillance expert to help them with network design or storage calculations. Mission-critical configurations Choose from a portfolio of products from entry level to enterprise to mission-critical configurations as well as a variety of supported architectures. There are three ways to get into contact with BCDVideo: call, email, or submit your request online. BCDVideo is the single source to troubleshoot any implementation or warranty issue. With post-sale support, save time and resources by not having to call multiple manufacturers to troubleshoot issues. Experts are on hand to answer questions or troubleshoot a system via remote access. Reduce your total cost of ownership over 5-years with BCDVideo’s lifetime tech & global on-site support warranty, in addition to a guaranteed response.
Genetec Inc., globally renowned technology provider of unified security, public safety, operations, and business intelligence has announced that the city of New Orleans (NOLA) is relying on Security Center, the company’s unified IP security platform, to improve public safety and enhance city-wide collaboration. With about 400,000 residents, New Orleans (NOLA) is the most populous city in the State of Louisiana. Like other big cities, NOLA is focused on enhancing public safety for its citizens and the 1.2 million visitors who flock to the city’s French Quarter for Mardi Gras celebrations. Using Security Center, the NOHSEP agency has saved police officers about 2000 hrs of investigative work in just a year Genetec Security Center As part of a Citywide Public Safety Improvement Plan that included the deployment of a new citywide public safety system and the construction of a Real-Time Crime Center (RTCC), the New Orleans Homeland Security and Emergency Preparedness (NOHSEP) chose the Genetec Security Center unified platform to support all city agencies. Using Security Center, the NOHSEP agency has saved police officers about 2000 hours of on-foot investigative work in just one year. “It might take a police officer over an hour to visit business locations, speak with owners, look through video, find what they are looking for, get a copy of video onto USB keys, drive back to the precinct, and then submit that into evidence." said George Barlow Brown, IT Manager at the New Orleans Real Time Crime Center. Video and ALPR cameras He adds, “So, we have essentially saved the department over 2000 hours of manual labor in physically collecting and storing video evidence. That’s more time for officers to respond to calls of service and be present in our many neighborhoods, which helps build community confidence. The ROI is there for us in terms of the efficiency,” The team can now easily retrieve evidence from over 325 city-owned video cameras and 100 automatic license plate recognition (ALPR) cameras (60 of which are Security Center AutoVu cameras) from the Real-Time Crime Center. The new security platform is integrated with other public safety solutions such as a Briefcam analytics system and a computer-assisted dispatch (CAD) system. All this information gets routed through to a central command center, speeding up emergency response. Share video access with RTCC “Our operators do the full investigative work right from within Security Center. It’s just one of the most intuitive solutions that I have ever seen. We can display up to six video tiles and hit ‘synchronise video’ to see various angles of the same scene playing at the same time. We can then select the segment of video we need and hit export. Each 10-minute segment from all the video tiles is then archived for viewing later on,” said Brown. NOLA is also leveraging Security Center to foster a true public-private partnership. The city launched a platinum version of the SafeCam project, which allows businesses to share access to external video cameras with the RTCC. Motion-detection alarms Using the Genetec Federation feature, the NOHSEP team can access video from participating companies’ systems Using the Genetec Federation feature, the NOHSEP team can access video from participating companies’ systems. Participating businesses can be identified by discrete signage at their front entrances. This tells on-the-ground officers that this business has shared their outdoor cameras with the RTCC, and there is no reason to disturb the establishment or their customers. The officer can simply call RTCC operators to get the evidence they need. Brown and his team also have motion-detection alarms set up on cameras facing some known illegal dumping sites. As soon as someone dumps refuge in these locations, the team can proactively notify the Sanitation Department so they can collect the debris. Mining video and data NOLA is making the most of its security investments to improve city life too. For one, the RTCC operates a backup emergency operations center for the city of New Orleans. The NOHSEP team has also shared video feeds with other city departments such as the Sewage and Water Board, so they can determine the rate at which an intersection floods. As plans continue to evolve, the RTCC team is taking full advantage of the new technology to keep NOLA safer. “As far as investigations and the ability to mine video and data, Security Center is hands-down the best product out there. With this platform, we’re extending greater efficiency to responding officers, and we’re also forging stronger partnerships with our community. Together, we’re all working smarter and faster to keep New Orleans safe,” concluded Brown.
The independent sensor house HENSOLDT has been commissioned by Airbus Helicopters to provide the EuroGrid Tactical Mission Computer (ETMC) for helicopters with new functions. The two-year further development contract includes a guarantee for the acquisition of 200 production units in the subsequent years. The new ETMC generation, ETMC-NG, will be based on the computer which HENSOLDT has delivered for a long time to Airbus Helicopters for integration into the NH90, Tiger and CH-53 helicopters. Higher storage capacity for future system extensions Based on the experience gained during their many years of cooperation, HENSOLDT has defined the follow-up model, ETMC-NG, together with Airbus Helicopters and has launched the process to develop this system. Apart from the elimination of obsolete characteristics, the new model will have more computing power, higher storage capacity for future system extensions and new interfaces. For example, a new function for identifying ships and boats will be incorporated, which will allow the relevant data from the crew to be shown in the ETMC-NG display and to be used for mission planning, border surveillance or maritime search and rescue operations.
Delfina Chain, Sr Associate Customer Engagement & Development at Flashpoint, discusses what resources defenders must access to in order to keep a finger on the pulse of the cybercriminal underground. Artificial intelligence (AI) is already being applied to diverse use cases, from consumer-oriented devices - such as voice-controlled personal assistants and self-directed vacuum cleaners - to ground-breaking business applications that optimise everything from drug discovery to financial portfolio management. So naturally, there is growing interest within the information security community around how we can leverage AI - which encompasses the concepts of machine learning (ML) and deep learning (DL) - to combat cyber threats. AI-enhanced cyber security The effectiveness and scalability of cybersecurity-related tasks has already been enhanced by AI The effectiveness and scalability of cybersecurity-related tasks, such as malware and spam detection, has already been enhanced by AI, and many expect ongoing AI innovations to have a transformative impact on cyber defence capabilities. However, security practitioners must also recognise that the rise of AI presents a potent opportunity for cybercriminals to optimise their malicious activities. Much like the rise of cybercrime-as-a-service offerings in the underground economy, threat-actor adoption of AI technology is expected to lower barriers to entry for lower-skilled actors seeking to conduct advanced malicious operations. A report from the Future of Humanity Institute emphasises the potential for AI to be used toward beneficial and harmful ends within the cyber realm, which is amplified by its efficiency, scalability, diffusibility, and potential to exceed human capabilities. Encrypted chat services Potential uses of AI among cybercriminals could include the development of highly evasive malware, the ability for automated systems to exhibit human-like behaviour during denial-of-service attacks, and the optimisation of activities such as vulnerability discovery and target prioritisation. Fortunately, defenders have a leg up over adversaries in this arms race to harness the power of AI technology, largely due to the time- and resource-intensive nature of deploying AI at its current stage in development. The purpose of intelligence is to inform a course of action. For defenders, this course of action should be guided by the level of risk (likelihood x potential impact) posed by a threat. The best way to evaluate how likely a threat is to manifest is by monitoring threat-actor activity on the deep-and-dark-web (DDW) forums, underground marketplaces, and encrypted chat services on which they exchange resources and discuss their tactics, techniques, and procedures (TTPs). Cobalt Strike threat-emulation software Flashpoint analysts often observe cybercriminals abusing legitimate technologies in a number of way Cybercriminal abuse of technology is nothing new, and by gaining visibility into adversaries’ ongoing efforts to develop more advanced TTPs, defenders can better anticipate and defend against evolving attack methods. Flashpoint analysts often observe cybercriminals abusing legitimate technologies in a number of ways, ranging from the use of pirated versions of the Cobalt Strike threat-emulation software to elude server fingerprinting to the use of tools designed to aid visually impaired or dyslexic individuals to bypass CAPTCHA in order to deliver automated spam. EMV-chip technology Flashpoint analysts also observe adversaries adapting their TTPs in response to evolving security technologies, such as the rise of ATM shimmers in response to EMV-chip technology. In all of these instances, Flashpoint analysts provided customers with the technical and contextual details needed take proactive action in defending their networks against these TTPs. When adversaries’ abuse of AI technology begins to escalate, their activity within DDW and encrypted channels will be one of the earliest and most telling indicators. So by establishing access to the resources needed to keep a finger on the pulse of the cybercriminal underground, defenders can rest easy knowing they’re laying the groundwork needed to be among the first to know when threat actors develop new ways of abusing AI and other emerging technologies.
Pulse Secure, the provider of software-defined Secure Access solutions, has announced the successful delivery of a project to help Hogarth Worldwide refresh its secure access platform as part of a Zero Trust approach to security. Hogarth Worldwide is a creative production business, providing marketing production and adaptation services for some of the world’s most recognisable brands and global multinationals. Security is a critical part of this service and Hogarth manages its own multi-layered secure access platform. Having grown rapidly over the last decade, the company had reached capacity on its legacy Juniper VPN solution that was also heading towards end of support. With the need to upgrade fast approaching, Hogarth decided to both refresh its secure access platforms to meet greater demand and gain access to more advanced capabilities. Requirement of VPN and NAC platform Hogarth contacted ANSecurity, a trusted cyber security advisor that it had worked with previously on several projectsPeter Smith, Global Network Architect at Hogarth, said, “We initially created a shortlist of vendors from the Gartner Magic Quadrant and started examining a few options. Our key criteria was a VPN and NAC platform that was easy to deploy and manage, with strong compatibility across a wide range of devices, plus the ability to adapt.” Hogarth contacted ANSecurity, a trusted cyber security advisor that it had worked with previously on several projects. The team at ANSecurity provided guidance to help scope the project and design a technical implementation. “We looked at a number of options, but we felt that Pulse Secure offered the best combination of features and compatibility along with the flexibility we needed to meet our current requirements and future needs,” said Smith. Pulse Connect Secure (PCS) virtual appliances Based on these requirements, Hogarth selected Pulse Connect Secure (PCS) virtual appliances deployed within its main data centres in London and several branch offices across the world to provide VPN access. This is supported by Pulse Policy Secure (PPS), a next-generation NAC appliance that enables Hogarth to gain deeper visibility and understanding of its security posture. The combined solution is deployed as part of a Zero Trust approach to security allowing Hogarth to ensure its distributed workforce is authenticated, authorised and secure when accessing applications and resources across its own data centre and cloud-based resources. The data from all these systems is passed to a SIEM to allow the IT department to quickly detect any issues The solution is integrated into its Ruckus based Wi-Fi network, Radius authentication server and multi-factor authentication which runs in Azure. The data from all these systems is passed to a SIEM to allow the IT department to quickly detect any issues and automate threat response to mitigate malware, rogue devices, unauthorised access and data leakage risks. Meeting the requirements of TISAX “The virtual appliance offered better performance than our legacy solution and the Pulse Secure VPN and NAC appliances were easy to deploy with a low management overhead,” commented Smith. “We have a high availability configuration and the built-in licence server makes it easy to add more users or devices as needed.” The new solution has also helped Hogarth to meet the requirements of TISAX (Trusted Information Security Assessment Exchange) that enables mutual acceptance of Information Security Assessments which was a key requirement for several of its clients within the automotive industry. “The upgrade to Pulse Secure has gone very smoothly, we have had no issues and the solution has delivered as expected with the potential to adapt as our security needs evolve,” Smith concluded.
Round table discussion
Along with the integration of security and other systems in an enterprise environment comes a need to centralise monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyse the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?