GDPR
Appdome, the mobile app economy’s one-stop shop for mobile defense, announced it has enhanced its award-winning Geo-Fraud Detection service to include two new defences: Geo-Location Fencing and Geo DeSync Attack Detection. Combined with other Geo-Compliance features available on the Appdome platform, mobile app developers and enterprises can eliminate location-based fraud, ensure geo-compliance and deliver location-relevant user experiences in mobile apps free from location spoofing, fake...
As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres empowered by a new generation of data-driven technologies are emerging as an effective force multiplier. Real-time crime centres Real-time crime centres (RTCCs) serve as centralised hubs where dedicated personnel leverage pioneering-edge technologies to analyse diverse data streams and provide critical support t...
Black Kite, the pioneer in third-party cyber risk intelligence, announced that it has integrated the European Union (EU) Digital Operational Resilience Act (DORA) framework into the Black Kite Platform. The regulations, which go into effect on January 17, 2025, are designed to improve resilience and cybersecurity posture in organisations operating in the financial sector. Third-party data breaches The financial industry is one of the most highly targeted industries for cyber attacks due to t...
Own Company, the industry pioneer for SaaS data protection and activation, strengthens its commitment to US government agencies with FedRAMP-authorised backup and recovery solution for ServiceNow. Own’s backup and recovery solution for ServiceNow, Own Recover, is now a FedRAMP-authorised data protection solution. In recent years, U.S. government agencies have made significant strides in modernising and adopting Software as a Service (SaaS) applications to enhance their efficiency and serv...
Matrix, a trailblazer in advanced security and telecom solutions, successfully participated in the Police Expo 2024, held on July 4th and 5th at Pragati Maidan, New Delhi. This esteemed event provided a platform for Matrix to unveil its latest innovations in IP Video Surveillance, Access Control, Time-Attendance, and Telecom Solutions to a diverse audience of industry professionals and stakeholders. Advanced security solutions During the Police Expo 2024, Matrix showcased a comprehensiv...
In the digital age, businesses are constantly looking for new methods to boost communication efficiency and productivity. As technology advances, IP telephony systems have gained popularity for their flexibility, advanced features, and cost-effectiveness. However, before deciding to invest in an IP telephony system, it's essential to understand the latest trends, the factors influencing IP telephony, and the available solutions. Let's explore these aspects to help them make a well-informed dec...
News
By combining innovative radar, camera and software technologies, Navtech and Dallmeier Electronic now offer an integrated solution for optimised airside security at airports. By integrating the two systems, airport operators can achieve a very high level of objective security against a wide range of threat scenarios at a low total cost of ownership. Airside violations are a major security problem in air traffic. The scenario of possible threats ranges from disruptions of flight operations by activists to serious threats from terrorist activities. By integrating the innovative Navtech radar systems into Dallmeier’s Hemisphere® software suite, airport operators can now implement an optimal solution to improve airside security. Superior detection and “friend or foe” differentiation AdvanceGuard provides Hemisphere® users with the ability to create multiple virtual zones Navtech AdvanceGuard high-resolution sensors automate critical airside tasks such as general Perimeter Protection, Critical Part (CP) Line Monitoring, runway incursion detection, Surface Movement Radar (SMR) and Foreign Object Debris (FOD) detection. AdvanceGuard provides Hemisphere® users with the ability to create multiple virtual zones and alerts operators in advance, enabling proactive threat management. A “friend or foe” integration distinguishes between legitimate and non-legitimate activities, reducing false alarms and increasing operator confidence. The long-range 360° sensors cover large areas with minimal infrastructure, ensuring cost efficiency and effective deployment. Automatic tracking and effective event handling If one or more intruders are detected by the Navtech radar system, the system automatically controls connected Dallmeier or third-party cameras responsible for the area. Hemisphere® users can now conduct visual verification of the event and track the intruded persons or objects. Thanks to the bi-directional integration into the Dallmeier Hemisphere® software suite, users benefit from an extremely powerful workflow for handling alarms triggered by the Navtech system. Incidents can be managed from either of the systems. Maximum security performance, GDPR and NDAA compliance End users can rely on many years of experience of both casts providing keys in airport security The integrated solution of Navtech AdvanceGuard and the Dallmeier Hemisphere® software suite minimises the risk of human error and increases objective security by combining two superior technologies that complement each other perfectly. End users can rely on many years of experience of both companies providing solutions in airport security. With a high level of user-friendliness, excellent overview and high degree of automation, the integrated solution also requires comparatively low personnel costs. Both manufacturers follow the “Privacy and Security by Design” principles set out in the GDPR and are NDAA-compliant, ensuring maximum security against cyber-threats and compliance towards existing and upcoming legal regulations. Advanced camera and software systems “At a time when threats are constantly evolving, airside security is critical,” says Simon Mikuzis, Security Segment Leader of Navtech. “By combining our radar technology with Dallmeier’s advanced camera and software systems, we provide airport operators with a comprehensive solution that enables real-time threat analysis and management.” “We are pleased to partner with Navtech to offer our airport customers an even more comprehensive security solution,” says Karlheinz Biersack, Business Development Director Airports of Dallmeier electronic. “The integration of Navtech’s radar technology into the Dallmeier Hemisphere® software suite and our camera world marks a significant step in the development of integrated security solutions for airports. It emphasises the commitment of both companies to ensuring effective aviation security.”
Corelight, a pioneer in open network detection and response (NDR), published a new research paper highlighting the strong divide among European IT pioneers over the suitability of generative AI (GenAI) for use by their cybersecurity teams. The latest study has found that, although 46% of respondents state that they are proactively looking at how to incorporate the technology in their cybersecurity approaches, 44% also believe that the sensitive nature of the data involved – along with engrained enterprise silos – will in fact make it difficult to use GenAI. Of the approximately one-third of responding organisations not currently using GenAI technology for threat detection and response, 37% cite C-suite concerns as the reason. AI-powered products “Our research highlights a fair degree of market scepticism and a clear need for further education, particularly amongst C-level executive teams,” says Matt Ellison, Technical Director of EMEA, Corelight. “However, we know that GenAI will give SOC teams a major boost in delivering the insights analysts need to enhance productivity and bridge skills gaps.” He continued: “Security vendors must work hard to build sufficient guardrails into their AI-powered products, so more organisations can enhance threat detection and response with this transformative technology.” Perception of GenAI Corelight found European ITDMs were split down the hub in their perception of GenAI Corelight found European ITDMs (IT Decision Makers) were split down the middle in their perception of GenAI use for cybersecurity and exactly half (50%) of the responding ITDMs believed GenAI would have the biggest impact on providing alert context and analysis. They also cite the following potential use cases: Maintaining compliance policies (41%) Recommending best practices on domain-specific languages like identity and access management policy (36%) Unstructured vulnerability information (35%) Providing remediation guidance (35%) Unstructured network connection and process information (32%) Implementation of GenAI A further 28% plan to incorporate these abilities into more use cases in the future Alongside some clear concerns and question marks about the practical use and implementation of GenAI in a security environment, 68% of respondents with dedicated threat hunters say it’s already helping their threat detection and protection efforts. A further 28% plan to incorporate these capabilities into more use cases in the future. Despite the legitimate concerns of many European ITDMs, many have a positive view of the future. More than 40% of respondents claim AI and automation are central to creating “the perfect security formula”. Interact with the GenAI model “Generative AI has been successfully applied for alert enrichment and contextualisation, providing SOC analysts with enhanced incident response capabilities,” added Ignacio Arnoldo, Director of Data Science, Corelight. He continued: “GenAI's adoption is hindered by concerns over data confidentiality and model accuracy. As models improve in overall reasoning capacity and cybersecurity knowledge, and as more LLM deployments include structural privacy protections, GenAI is set to become integral to security operations.” Corelight helps customers mitigate data protection concerns by establishing a functional firewall so that customer-specific data cannot interact with the GenAI model. Pre-vetted GenAI prompts are used to contextualise alerts and provide analysts with investigative recommendations.
The ALSO UK Cloud Summit 2024 hosted a panel of security industry experts this month to explore the latest trends, developments and challenges in artificial intelligence (AI) and cybersecurity for cloud resellers and British SMEs. The expert panel looked at the importance of generative AI (GenAI) in the modern cloud landscape, revealing that 87% of organisations believe AI offers a competitive edge. 2024 has been a big year for generative AI (GenAI), specifically with the launch of Microsoft Copilot for the SMB market. And with continual advancements in technology innovation, it is important that MSPs and cloud resellers not only keep up but stay ahead of the curve. Keynote speakers at this year’s event included David Bowen, Global Business Development Director for Microsoft, and Robert Pritchard, founder of The Cyber Security Expert. Best practices in 2024 and beyond “The ALSO UK Cloud Summit 2024 is a celebration of our key security vendor partners and an opportunity for cybersecurity industry leaders to continue the conversation on best practices in 2024 and beyond,” commented Mark Appleton, Chief Customer Officer for ALSO Cloud UK. “Through bringing together industry experts from our top security vendor partners, ALSO is pioneering the conversation in presenting a unified security strategy for MSP cyberteams." “One message was clear: generative AI presents the biggest security challenges to British MSPs and SMEs. New cyber threats are rapidly developing as GenAI has become more accessible for cyber actors to exploit. The bar of entry for cyberattacks has been lowered, with ransomware attempts becoming easier to create – as they are no longer limited to those with advanced cyber skills to enact them.” 87% of organisations believe AI offers a competitive edge Microsoft’s David Bowen discussed the benefits of Microsoft’s long-term partnership with ALSO In addition to the security challenges posed by GenAI, it is also a key source of business growth for the future of SME operations. In his opening keynote, Microsoft’s David Bowen discussed the benefits of Microsoft’s long-term partnership with ALSO, and how MSPs can support their customers in implementing AI and Copilot tools successfully to accelerate growth. “ALSO and Microsoft have been successful partners for over 25 years, and we are unified in our missions to empower people and organisations to achieve more through technology,” said Bowen. “With Copilot we expect to continue the value add of AI to organisations and we are working with ALSO and their partners to develop the best customer use cases for AI. It’s important that AI and Copilot projects are more successful when partners support projects to securely implement, support and deliver AI ROI for customers. ALSO partner ecosystem Bowen added: “In the latest Work Trends Index published in May, we found that 79% of organisations believe AI is a business imperative, however, 60% of companies lack a plan and vision to implement the technology, this is where the ALSO partner ecosystem can support customers develop a strategy that quantifies the productivity gains of AI. " “The study also found that 75% of workers are already using AI, and of these 78% are bringing their own AI tools for tasks. These lack the needed levels of security, data protection and compliance, leaving organisations' data exposed. MS Copilot is already enabling much greater productivity levels, allowing teams to spend less time on repetitive tasks and spend more time working on more creative and impactful work." "Employees are also advised to look at developing AI Skills, the study highlighted that 66% of leaders would not hire staff unless they have AI skills. The ALSO AI Academy is a fantastic resource for partners to ensure AI training is accessible for employees to develop capability and support the Era of AI.” The importance of GenAI in the modern cloud landscape Robert Pritchard, founder of The Cyber Security Expert highlighted the importance of AI in the modern cloud landscape. “The world has changed completely in recent years, with cloud-first dominating as the best solution, even though securing it is not without challenges. The old model (‘on-prem’ and trusted network) is outdated, and legislation for service providers is coming as the risk to critical infrastructure now dependent on modern technology services needs protection more than ever.” Other highlights from the ALSO UK Cloud Summit ‘24 included: Cybersecurity expert Acronis showcasing the dangers of AI-boosted ransomware attempts, as well as the latest AI tools being developed to counter malicious actors. Password manager LastPass outlined the ongoing compromised credential crisis and the urgent need to address poor cyber-hygiene practices. Security awareness solutions expert Vade explained how easy and accessible hacking has become with GenAI with their “10 mins to make you a hacker” talk. CrowdStrike demonstrated the potential of GenAI tools when used for good in boosting cybersecurity efforts. AvePoint outlined the business expansion benefits of tools such as Copilot for MS365. Future of enterprise security ALSO’s Mark Appleton summarised: “Since ALSO launched in the UK last year, we have cemented ties with our trusted security vendor partnerships. These alliances are not just a benefit but a necessity, and this year’s ALSO UK Cloud Summit has been a great way to celebrate our partners and our unique offering whilst paving the way for the future of enterprise security." “Our security vendor partners provide the very best cybersecurity for their clients. By working closely with all of our partners, we not only share insights and collaborate on the best security methods but also provide the very best tailored options for our client base. ALSO is committed to offering solutions that aid in protecting modern businesses across the channel and beyond.”
Secure email and file transfer provider Zivver has announced a new strategic partnership with data privacy consulting firm Lex Dinamica, specialising in data protection and AI end-to-end solutions and advisory. Email security is one of the biggest challenges facing organisations now. The UK Government Cyber Security Breaches Survey found that 50% of businesses report having experienced a breach, with phishing emails identified as the most common mode of attack. Added to this is the risk of human error, which accounts for more than 80% of data breaches, according to the ICO. Data protection regulations Lex Dinamica’s diverse client base in drives such as financial services, FMCG, and health and life sciences Through this partnership, Lex Dinamica’s diverse client base in industries such as financial services, FMCG, and health and life sciences, will have access to Zivver’s range of cloud-based digital communication products, including Zivver Secure Email and Secure File Transfer. All comply with data protection regulations, including GDPR and DORA, making it the ideal solution for organisations looking to add to their security suite while also managing compliance with existing and emerging regulations. Challenges posed by AI adoption Rick Goud, Founder and CIO at Zivver: “The role of IT teams is ever-expanding and the expectation for them to safeguard organisations against inbound and outbound threats no doubt adds an increasing amount of pressure. Implementing a secure email infrastructure with a smooth user experience will help boost productivity and ultimately reduce time spent firefighting. It’s always a proud moment to start a partnership with an organisation whose focus on growth and understanding of the regulatory environment aligns with ours. We look forward to and will continuously work towards helping Lex Dinamica deliver innovative products to their customers.” Lex Dinamica specialises in data privacy, data governance and AI solutions Lex Dinamica specialises in data privacy, data governance and AI solutions. Founded in 2021 with a focus on addressing regulatory compliance and the challenges posed by AI adoption, cloud transitions, and hybrid work models, Lex Dinamica partners with clients globally to provide sustainable, impactful solutions. Digital communication solutions Alex Nugeé, Manager at Lex Dinamica added: “We looked at Zivver because they have a proven track record in providing secure digital communication solutions to a broad range of sectors. Whether it be a public or private organisation, Zivver can adapt and implement its technology to fit the structure. We felt like this was the ideal commercial and cultural fit for Lex Dinamica." “Similar to us, they pride themselves on remaining on top of evolving regulations and when we choose to collaborate with an organisation, we look for those who understand and recognise the global impact of changing legislations so that we can meet the needs of our international client base.”
Colt Technology Services, the digital infrastructure company, published its third Sustainability Report. The report tracks progress for Colt Group-comprising Colt Technology Services and Colt Data Centre Services-against targets set for the 12 months ending 31st December 2023 in the areas of Environmental, Social and Governance (ESG), and against longer-term targets to net zero. The past 12 months have seen Colt launch an ambitious new ESG strategy; secure the highest EcoVadis rating for the second consecutive year; and achieve ‘A-' and ‘A’ CDP (Carbon Disclosure Project) ratings for sustainability and supplier engagement. New technologies and geographies Other achievements are highlighted in the report as Colt welcomes 1000 new employees These and other achievements are highlighted in the report as Colt welcomes 1000 new employees and integrates new technologies and geographies following its acquisition of Lumen EMEA in November 2023–a strategic move to provide customers with global scale and technology innovation, and to generate sustained growth for Colt. Keri Gilder, CEO, Colt Technology Services said, “Colt is a company that cares deeply, which is why we focus on sustainability by design. 'We can change the world’ is one of our values and it informs, shapes and inspires everything we do. Nowhere is this better reflected than in our latest Sustainability Report. The passion and tremendous energy we have as a business to do better for our planet, our people and our customers can be seen on every page, in every metric and in every stride towards our goal to reach net zero greenhouse gas emissions by 2045. I’m incredibly proud of the progress we’re making to build a better world.” Key progress Key progress to reach net zero highlighted in the report includes: 34% reduction in CO2e emissions against the 2019 baseline, 6% against the previous year 71.5% reduction in Colt Group's Scope 1 and Scope 2 emissions compared to the 2019 base year; a reduction of 22.5% year-over-year 6% reduction in Scope 3 emissions compared to 2022 78% of the Scope 2 electricity procured for Colt’s global sites is renewable; a 4% improvement since 2022 30% of Colt’s fleet is now fully electric and a further 38% are Plug-In Hybrid Electric Vehicles 89% of suppliers have signed Colt’s Code of Business Conduct 40% of Colt’s Scope 3 emissions are with suppliers that have already set a Science Based Target Colt is now a participant in the UN Global Compact, a voluntary initiative, based on CEO commitments, to implement universal sustainability principles and to take steps to support the UN Goals. Colt has been involved in a Scope 3 emissions workstream through the Global Enabling Sustainability Initiative (GeSI), the cross-industry sustainability initiative to create digital solutions for society’s most pressing challenges. In conjunction with the International Telecommunications Union (ITU) and GSMA, GeSI and its members have developed new guidance specifically for the telecommunications sector on reporting Scope 3 emissions produced by the suppliers. The Scope 3 guidance for telecommunication operators provides an extensive understanding of categories for Scope 3 evaluation and establishes guiding principles for telecommunications operators to allocate, calculate, and report the emissions in their supply chain Further highlights Further highlights from around the Colt business outlined in the 2023 report include: The launch of a Global Social Impact Strategy that aims to empower Colt’s communities through digital education and inclusion A 24% year-over-year increase in employee volunteering days; 867 days given by employees to volunteer at external charities and initiatives in 2023 Flexible First, Connection Days and Culture Buddy programme as positive contributors to inclusive company culture Programmes and plans including Gender Action Plan to improve gender balance throughout the business RISE–programme for emerging talent from underrepresented backgrounds Allyship in Action programme aimed at bringing allyship to life Optimising Accessibility–five-year accessibility improvement plan Neurodiversity research and awareness Menopause Reframed-menopause awareness campaign Pride cross-company collaboration, supporting LGBTQ+ colleagues in tech Participation in TC4RE-the technology community for Racial Equality In 2023, Colt was awarded the ISO27701 certification for its privacy information management system, which is an extension of ISO27001. This Global standard provides the framework for organisations looking to put in a system to support compliance with the EU GDPR and other Data Privacy Requirements. Colt received the highest level of certification under Spain’s Esquema Nacional de Seguridad (ENS), the National Security Scheme. This achievement reflects Colt's commitment to the protection of information and the customers’ security Colt has joined Stop Scams UK, an industry-led collaboration of responsible businesses from across the banking, telecoms and technology sectors who have come together to ‘help stop scams at source’.
Matrix, a pioneer in advanced security and telecom solutions, is thrilled to announce its participation in the upcoming Police Expo 2024. Scheduled for July 4th-5th at Pragati Maidan, New Delhi, this premier event will serve as a platform for Matrix to exhibit its innovative IP Video Surveillance, Access Control, Time-Attendance, and Telecom Solutions. OWASP ASVS 4.0 L2 standards Revolutionising Security with Advanced Solutions At Police Expo 2024, Matrix will demonstrate its robust security portfolio designed to meet the diverse needs of modern enterprises. Matrix will present its extensive security portfolio, meticulously designed to cater to the dynamic needs of contemporary enterprises. Matrix will display its Project Series and Professional Series Bullet and Dome Cameras A highlight of the exhibit will be the newly launched Ruggedised IP Camera, conforming to EN50155 standards, making it ideal for demanding environments such as roadways and railways. These cameras deliver superior video quality, remarkable low-light performance, and versatile monitoring capabilities, including the ability to capture images from fast-moving vehicles. Additionally, Matrix will display its Project Series and Professional Series Bullet and Dome Cameras, known for their cybersecurity features that comply with OWASP ASVS 4.0 L2 standards, verified by STQC, Delhi. Complementing these are Matrix’s Network Video Recorders and Enterprise-grade Network Video Recorders (NVRs) with integrated Video Management System (VMS). Integrated access control and time-attendance solutions Terminal supports seamless connectivity options, including PoE and Ethernet The Access Control and Time-Attendance solutions provide a unified approach to managing and securing physical access while ensuring accurate time-keeping and workforce management. Matrix’s Access Control and Time-Attendance solutions offer a cohesive approach to managing physical access and ensuring precise workforce management. Key products include GDPR-compliant systems and the latest feature of WhatsApp integration for real-time alerts and notifications. A major attraction will be the state-of-the-art facial recognition time-attendance terminal, COSEC ARGO FACE200T, celebrated for its exceptional accuracy, rapid identification, and extensive user capacity. This terminal supports seamless connectivity options, including Power over Ethernet (PoE) and Ethernet. Top-notch Telecom Solutions With decades of expertise in the telecom sector, Matrix will showcase its cutting-edge Telecom Solutions designed to enhance business communications and operational efficiency. The range includes IP-PBX systems, Unified Communication servers, and VoIP gateways, which support scalability and provide reliable, robust communication infrastructure essential for modern enterprises. Expanding market presence in New Delhi Police Expo 2024 offers an excellent opportunity for Matrix to engage with industry stakeholders Matrix has been actively expanding its market presence in Delhi and its neighbouring regions. Dedication to delivering high-quality, dependable, and scalable solutions has fostered a growing customer base in this vibrant metropolis. The Police Expo 2024 offers an excellent opportunity for Matrix to engage with industry stakeholders, display our comprehensive suite of solutions, and further solidify our presence in the Northern Indian market. Kaushal Kadakia, Marketing Head-Matrix Comsec, expresses enthusiasm for the event, stating, “We are eager to demonstrate the features and applications of our latest products to key personnel in the police forces. We aim to provide insights into how our solutions can enhance the efficiency and effectiveness of law enforcement agencies.” Visit at Police Expo 2024 Matrix cordially invites all attendees to visit booth: A97-A98, Pragati Maidan, New Delhi to experience firsthand the latest innovations in security and telecom solutions. The expert team will be available for live demonstrations, to address queries, and to discuss how the solutions can be customised to meet specific business requirements.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Open platform video technology software is more than just a product; it's a tool that helps customers achieve their desired business outcomes. Safety, round-the-clock security, and increased operational efficiencies are now the norm due to video technology. Responsible Technology Despite humanity’s impressive technological advances, we also recognise the immense responsibility that comes with technological innovation. It's not enough to focus solely on the positive impact video technology can make, we must also be vigilant in identifying and addressing any potential negative consequences it can have on society and its citizens. This is the role of Responsible Technology. Data privacy We want to use all the good things that technology innovation brings, whether it be video, AI, ML, facial recognition, etc. We want to use all the good things that technology innovation brings, whether it be video, Artificial Intelligence, machine learning, facial recognition, etc. to serve people in societies in a responsible way. That means making sure that we regulate technology in a way that respects human rights and data privacy. Addressing the challenges The challenge is, that rather often technology leaders and policymakers either have conflicting interests or collaborate too late. To be responsible, business leaders must support their societies and policymakers in making regulations in the interest of the common good. At Milestone Systems, we are actively looking at how we develop our software responsibly, how our partners responsibly sell our software, and very importantly, how our customers use our software with a responsible mindset. Ensuring good corporate governance As a long-time partner within the security industry, we’re celebrating our 25th Anniversary this year, we are supporting the regulation of video technology for the good of society. However, it of course needs to strike the fine line between the right legislation and not hindering innovation. UNGP The UNGP is the most authoritative and widely adopted set of principles for responsible business At Milestone Systems, we want to play an active role in this and that is why we have pledged our support to the UN's Guiding Principles on Business and Human Rights (UNGP). The UNGP is the most authoritative and widely adopted set of principles for responsible business. The principles call on governments and companies to identify, prevent, mitigate, and remedy actual and potential human rights abuses. Since its launch in 2011, the UNGPs have received wide support from states, civil society organisations, and the private sector, making them the key global foundation for business and human rights. Protect, respect, and remedy Through this commitment, we are taking steps to ensure good corporate governance and ethical standards in the development of our technology. We're generating mechanisms to prevent misuse and we are building educational practices internally. Based on the UNGP’s three pillars: protect, respect, and remedy, we are developing a set of Responsible Technology Principles and procedures for the development, selling, and use of our products. Need for video technology regulation In addition, we are currently evaluating all the various technology areas in which our video software can be used, such as with third-party integrations that utilise e.g., facial recognition. We are mapping out the advantages and disadvantages for societies. One key area of concern is how local authorities are mapping and storing data about us as individuals. This is the reason why we're inviting more legislation to regulate video technology rather than less. Engaging With policymakers We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard We are proactively reaching out to and connecting with policymakers and other relevant stakeholders to discuss our approach to and take on Responsible Technology and encouraging the political landscape to work with us around regulation and legislation. We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard and where we can openly weigh the advantages and the challenges of technology, whether it is video, facial recognition, machine learning, Artificial Intelligence, or other technologies. Striking a balance Implementing Responsible Technology is a journey, not a destination. To give it the focus needed, we have created a dedicated team to implement this initiative at Milestone Systems. At the same time, we are reaching out to the political landscape to discuss how we balance regulation without hindering innovation. Video technology used ethically We are a global company with worldwide operations, and we are having dialogues about how video technology is being used and how we can have meaningful talks about what regulation and legislation should look like. However, we don’t necessarily want to limit access to the technology itself. Facial recognition We encourage the policymakers to engage with us in the industry so that together we can strike the fine line Facial recognition is a great example of this. The EU is considering making live facial recognition illegal. That would be a huge inhibitor of proactive terrorism prevention. For example, if a well-known terrorist is walking down the street and is being mapped out against Interpol’s most wanted list, the authorities should be able to react. However, if a person walking down the street but is not mapped out or does not have any priors then the city should not be allowed to store the data of that individual’s whereabouts at that point in time. This potential legislation is concerning to me as a citizen of Europe. Instead, we encourage the policymakers to engage with us in the industry so that together we can strike the fine line for the better good of all of us. Maintaining high ethical standards We have a firm understanding and expectation that ethical standards are a huge driver in the security business. Citizens are not in favour of technology companies abusing data about them and monetising from things that they have not opted in to do. Soon, I think we will see many more companies and governments leaning toward suppliers that do have a responsible mindset and high ethical standards for partnerships. Ethical practices Our journey toward Responsible Technology is an ongoing process, and we must remain steadfast in our commitment to ethical practices and the protection of human rights. We recognise that the rapidly changing technological landscape continually presents new challenges and opportunities. For this reason, we continuously look into how we can improve, for example, our end user licence agreements to avoid potential human rights abuses. An industry responsibility Security companies must prioritise careful planning and preparation, including developing policies and procedures For Responsible Technology to truly become a reality, compliance with international human rights laws and data privacy regulations is critical. Security companies must prioritise careful planning and preparation, including developing policies and procedures that govern the ethical use of video surveillance systems. The secure and ethical community In today's technology environment where deep integrations, machine learning, and artificial intelligence are becoming the norm, Responsible Technology is more relevant than ever. The security industry has a unique opportunity to set an example for other sectors by promoting a secure and ethical development community that prioritises Responsible Technology, trustworthy data collection, and the protection of human rights. We must all rise to this challenge and embrace our role as ethical leaders for the greater good of both people and societies.
Along with the growing adoption of cloud, SaaS applications have accounted for more than triple of the account-takeover attacks between 2019 and 2021, alone. Any given breach can potentially bankrupt many small businesses, with average costs reaching USD 4.35 million in 2022, according to a 2022 IBM report. Every business, no matter its size, must minimise these risks by deploying a range of cybersecurity tools and procedures. One of the most important elements is multifactor authentication (MFA). Some cyber insurance companies mandate MFA as a prerequisite for coverage and others will lower their premiums for companies that have deployed it. These insurers know how much more secure the enterprise is when multiple different verification methods are used for logging into accounts and applications. Importance of Cyber Insurance Cyber insurance has become a must-have for organisations that deploy and rely on digital systems. Small businesses are especially vulnerable to cyber threats since few have invested in the necessary security tools to defend against network breaches, scams and other types of cybercrime. Cyber insurance has become a must-have for organisations that deploy and rely on digital systems The good news is that cyber insurance policies are widely available and offer a broad range of coverage options. Some will pay the costs of direct expenses associated with a network attack as well as legal costs, including litigation defense payments, if the business could not meet contractual obligations because of the breach. Cyber insurance premiums Policies may also cover the cost of losing and then restoring access to technology after a breach. Policies may even cover the costs of transfer payment fraud caused by social engineering, as well as profit losses from reputational damage, although this can be restricted to a finite period of time. Depending on the coverage that is selected, cyber insurance premiums can be expensive, and a policy does not replace the solid foundation of an underlying cybersecurity framework. A foundation that includes MFA will help to stop cybercrime before it is committed while also making it easier to acquire and reduce the costs of cyber insurance. In fact, MFA is now one of the most common conditions for obtaining cyber insurance because of its proven ability to help prevent account takeover attacks and stop identity-related data breaches. Multifactor authentication overview The MFA ‘factors’ for confirming identity during login typically include something the user knows The MFA ‘factors’ for confirming identity during login typically include something the user knows (like a pin), something the user has (like a secure device), and something the user ‘is’ (like presenting a fingerprint or face scan to a reader or camera). Using these factors when accessing sensitive applications, systems, and data helps prevent attackers from compromising accounts. This is true even if the attacker has somehow tricked legitimate users into providing usernames and passwords through phishing schemes, in which seemingly legitimate emails are used to harvest this information. Preventing unauthorised access These types of attacks can be launched at scale and put millions of organisations at risk around the world. Some insurance providers simply will not cover them. They know that MFA can help organisations avoid these ‘user error’ attacks through authentication policies that prevent unauthorised access to any of the organisation's networks, applications and devices, wherever they are located. The U.S. government has also required that all federal agencies use MFA Insurers aren't the only ones recommending and even mandating MFA. The U.S. government has also required that all federal agencies use MFA, per the Executive Order On Improving the Nation's Cybersecurity signed by U.S. President Joe Biden in May 2021. A similar recommendation has been made in Europe as part of ENISA guidelines. The barriers to MFA adoption by SMBs One might wonder why over 40% of small and medium size business(SMBs) in the United States don’t have a cybersecurity plan in place and why less than 15% of the ones that do have a plan, consider it to be inadequate. According to the Cyber Readiness Institute, when we dive deeper into the details, there are three key barriers to MFA adoption: Lack of Awareness — 55% of SMBs are reported to remain unprotected because they’re simply unaware of MFA and its benefits to their organisation. Limited Understanding — Beyond a lack of awareness, 30% of business owners said they don’t utilise MFA because they simply don’t know how it works. In addition to the fundamental functionality, there are a variety of MFA options to consider, including a range of form factors that can be utilised to best meet an organisation’s needs. Perceived Inconvenience — 20% of SMBs believe MFA is too inconvenient, when in reality, we’re all more familiar with the concept than we think. How smaller businesses can best implement MFA SMBs should see MFA as a fundamental piece of a larger cybersecurity puzzle SMBs should see MFA as a fundamental piece of a larger cybersecurity puzzle by allowing them to quickly and easily increase security and convenience. MFA isn’t only about security, its also about convenience. Implementing MFA allows organisations to eliminate reliance on passwords, which can significantly improve user experience. So what should decision-makers know about MFA in order to implement it for their SMB? Ease of Use — The right MFA solution should offer a variety of authentication methods, but should also be easy to adopt and use across the organisation. Multiple Methods and Form Factors — Determine the best combination of authentication methods and form factors. Some providers offer only a small selection, which can tie you down to very basic and inflexible options that do not fully meet your users unique needs. Easy Deployment and Management — Time is money, especially for SMBs. Some solutions can take months to deploy, require extensive training and new installation codes, as well as potential overhauls to existing applications. Look for a solution that can be up and running in days. A Complete Solution — Any MFA solution should provide comprehensive security across all of your assets, including your PCs, mobile devices, applications and networks Compliance — Compliance impacts businesses of all sizes. As such, be sure to find a provider that meets evolving industry standards, including data protection such as GDPR and CCPA. Adaptability — As your business grows, your security needs will also evolve, with some users or parts of your business requiring more security than others. Make sure your provider allows you to scale and adjust accordingly to offer the right security for the right users. Blocking cybercriminal attempts Leading and growing a smaller business is a big challenge. Fortunately, adopting MFA provides a safety net to help block cybercriminal attempts, protect your business’ reputation and most importantly, help protect your bottom line. MFA should be the foundation for any robust security strategy and many cyber insurance companies now require it to reduce premiums and even qualify for coverage. For best results, organisations should choose a solution that is easy to deploy, offers a broad range of authentication options and form factors, and gives users a smooth and convenient authentication experience.
Security beat
Matter is a new open-source interoperability standard that will simplify the connectivity of smart home systems, including security. The growing popularity of the Matter 1.0 standard was evident at the large Consumer Electronics Show (CES) in January in Las Vegas, where the standard was heavily promoted by companies including Google, Amazon, and Samsung. A flood of Matter-connected products is on the horizon for ship dates in the second half of 2023. Evolve, and manage IoT standards Creating the standard is the Connectivity Standards Alliance (CSA), formerly the Zigbee Alliance, which changed its name in May 2021. With 300 companies as members, CSA seeks to create, evolve, and manage Internet of Things (IoT) technology standards through a well-established, collaborative process. CSA promotes the benefits of global, open standards, and the value of the IoT to customers and consumers, and seeks to break down the barriers to broad access and adoption of IoT technologies and solutions. Matter The new brand name Matter was launched in May 2021 to designate the standard formerly known as Project CHIP (Connected Home over IP), developed by CSA member companies including Apple, Google, Samsung, and Amazon. There are currently 800 devices and apps certified to the new smart home standard, including various smart home equipment (except video cameras, which will be included in a major release in the fall of 2023). Matter version 1.0 was initial launch in October 2022. Matter 1.0 release Twice a year moving forward, Matter plans a minor release each spring and a major release each fall As part of the Matter 1.0 release, authorised test labs are open for product certification, the test harnesses and tools are available, and the open-source reference design software development kit (SDK) is complete, thus enabling new products to be brought to market. Twice a year moving forward, Matter plans updated releases, a minor release each spring and a major release each fall. Smart home interoperability Currently, a variety of CSA working groups are addressing various aspects of interoperability in the smart home, including issues such as data privacy, security, energy management, and health and wellness, says Christopher LaPré, CSA’s Head of Technology. “Implementing elements requires that the standards alliance be able to multitask on several tracks,” says LaPré. Some development is centering around connectivity and the need for a “hub” to which multiple systems can communicate and incorporate an “identity” to regulate the availability of information to various systems. The standards will enable both do-it-yourself (DIY) systems and devices deployed by professional installers. Addressing privacy requirements The new development will be guided by what installers need to succeed in the home automation" Ecosystems depend on the availability of some type of “identity” to meet privacy requirements. Rules must be implemented across the ecosystem that deploys a “trust system” to ensure privacy. Solving the challenge involves getting all the major players to the table at the technical level to meet the bar from the business and technology perspective. “Integrators and retailers will play a role as Matter continues to evolve,” says LaPré. “New development will be guided by what installers need to succeed in the home automation market.” Matter-certified devices There is still work to be done to expand the 800 certified devices to function throughout the Matter ecosystem and to add new devices over time. One goal is to simplify an integrator’s solution using fewer hubs (and possibly a single hub) to provide a wide variety of services. The timeline of adding new Matter-certified devices may be delayed by the availability of equipment in the global supply chain, says LaPré. Flexibility Multi-admin provides for the simultaneous operation of devices in multiple smart home systems A multi-admin feature of Matter enables more flexibility for multiple ecosystems. A core feature of Matter, multi-admin provides for the simultaneous operation of devices in multiple smart home systems. Accordingly, family or household members could operate the device with the digital assistant or smartphone app of their choice. A bridging protocol helps to tie existing systems together. Amazon, Apple, Comcast, Google, SmartThings, and the Connectivity Standards Alliance came together in 2019 to develop and promote this new standard, joined by fellow Alliance board member companies IKEA, Legrand, NXP Semiconductors, Resideo, Schneider Electric, Signify, Silicon Labs, Somfy and Wulian. Smart device communication Currently, member organisations span all sizes, across a range of business categories. More than 1,700 Member individuals participate in bringing the Matter specification, reference implementations, testing tools, and certification programs to life. Matter's underlying network technologies are Wi-Fi and Thread. Wi-Fi enables Matter devices to interact over a high-bandwidth local network and allows smart home devices to communicate with the cloud. Thread provides a mesh network within the home. Both the Wi-Fi Alliance and Thread Group partnered with the Connectivity Standards Alliance to help realise the vision of Matter.
For an enterprise, addressing cyber security requires that stakeholders have immediate access to critical information compiled from multiple sources and presented where and how they need it. Various data sources monitor the cyber security status of a company’s computer systems to provide real-time visibility. Aggregating that data into visual dashboards and presenting it to operators enables any cyber security problems to be flagged quickly and resolved. Software system enhances cyber security Userful Corporation provides a software system that enhances cyber security operations for an enterprise Userful Corporation provides a software system that enhances cyber security operations for an enterprise, enabling stakeholders to envision various cyber security factors, such as application security, network security, cloud security and IoT (Internet of Things) security. The software system empowers operators to respond more efficiently. Working in conjunction with a company’s existing IT infrastructure, Userful software combines datasets from diverse systems into a visual format and delivers the information to a desktop computer, a video wall, or even to a home office. Real-time visibility “It provides a new dynamic to how cyber security issues are resolved,” said Shane Vega, Userful Corporation’s Vice President (VP) of Product Marketing, adding “The individuals who have flagged a cyber security issue may not be the ones to respond. Having real-time visibility provides more value to the overall response.” A typical cyber security operations centre resembles a physical security command or emergency management hub – large video walls, individual desktop workstations, and operators that need to share information and respond quickly to any incident. Userful’s software helps in managing operations centres Userful’s software manages how data is presented in an operations centre environment, without relying on proprietary hardware, operating outside an end-user customer’s IT infrastructure. Managing operations centres is a core offering for Userful Corporation, including command centres of all types, from traditional network operation centres to emergency network systems to security systems. The ability to use one software system throughout an enterprise is appealing to companies that have historically grappled with proprietary and siloed systems. Solutions that are easy to deploy, manage and scale Cyber security professionals need solutions that are easy to deploy, manage and scale" “We are a platform that can be utilised across the enterprise,” said Shane Vega, adding “Cyber security professionals need solutions that are easy to deploy, manage and scale, so they can manage all the threats every day.” Compiling and displaying information to an operations centre has historically involved silos of proprietary audio/video (AV) hardware. Ironically, the hardware approach presents cyber security risks that undermine the very mission of protecting a company’s data and networks. The proprietary systems operate outside the company’s network infrastructure, and IT professionals do not have visibility into the systems. Security Orchestration, Automation and Response (SOAR) Instead of hardware, displaying information on Security Orchestration, Automation and Response (SOAR) can be accomplished using software running on off-the-shelf components, managed by the IT department and featuring all the cyber security protections required, throughout the enterprise’s network infrastructure. SOAR includes threat and vulnerability management, security incident response and security operations automation, enabling companies to collect threat-related data from several sources and automate the responses. Cyber security threats Possible threats might include an influx of packet generation, malware, someone seeking access to the network, or a malicious email. Various tools manage each threat, and each must be visualised. Because the threats are related, a comprehensive dashboard enables operators to create parallels and respond more efficiently. The software-as-a-service system ensures that all software is updated and can operate on the latest hardware In the Userful AV-over-IP scenario, an IT department takes full ownership of the computers and subsystems installed on the network. The software-as-a-service system ensures that all software is updated and can operate on the latest hardware. Companies always have an ecosystem of interconnectivity. Single platform/solution The single platform/solution also extends beyond operations centres to include meeting rooms and digital signage. All images are captured using existing protocols, such as Real Time Streaming Protocol (RTSP), HTTP Live Streaming (HLS), Web Real-Time Communication (WebRTC), and so forth. In contrast, the AV industry is hardware-centric and has been known to circumvent software approaches in order to justify selling more hardware. AV systems typically operate in terms of pixels rather than bytes of information and use proprietary software. Companies always have an ecosystem of interconnectivity Different departments in a company have historically installed their own specific AV systems, based on proprietary hardware, so that each department is siloed from the rest of the organisation. Dangers of random hardware on a network Random hardware on a network, beyond the reach of the IT department, can provide access points to the network for hackers and other cyber security threats. Each proprietary hardware system exists outside the existing security protocols of the enterprise and each represents a cyber security vulnerability. Some companies end up with five or six different operations centres that involve three or four manufacturers, all siloed. Software versus hardware Our biggest challenge is to get people to understand what is possible with software versus hardware" “Our biggest challenge is to get people to understand what is possible with software versus hardware,” said Shane Vega, adding “The industry is inundated with hardware, and the risk is the unknown. Customers may not be familiar with a software solution that can accomplish what they have historically depended on hardware for.” Userful Corporation works through channel partners (integrators), who assemble complete systems using Userful software and other components, such as video screens, large-format commercial displays, groups of tiled displays, projectors – any type of display with an input. Corporate policy specifies security at every level Userful’s corporate policy specifies security at every level, including user authentication, encryption, endpoint security, air-gapped servers, information security policies, General Data Protection Regulation (GDPR), and a solution built on industry-leading IT standards. To spread the word about Userful Corporation’s capabilities related to cyber security, the company will be participating in Infosecurity Europe 2022, taking place from June 21 to June 23, 2022 at ExCeL, London, United Kingdom (UK).
Mergers and acquisitions are among the most disruptive forces in the security marketplace. However, they are also both a reality and a growing trend. Whenever there is value to be leveraged, companies tend to enter into business transactions to maximise that value. For the security industry, the result is a continually shifting collection of manufacturer companies seeking new ways to provide value to customers. M&A activity continued unabated in 2021, despite residual industry challenges such as dysfunctional supply chains and lingering consequences of a global pandemic. Here are some of the larger and/or most impactful M&A transactions of 2021. Stanley Black & Decker sells to Securitas Stanley Black & Decker announces an agreement to sell most of its Security assets to Securitas AB for $3.2 billion in cash. The transaction includes Stanley Black & Decker's Commercial Electronic and Healthcare Security business lines. The businesses carry 2021 forecasted revenues of approximately $1.7 billion. “The business is well-positioned for ongoing growth within Securitas, a global pioneer in the security industry,” says James M. Loree, Stanley Black & Decker's CEO. Openpath’s solution makes businesses more secure with multi-factor authentication Motorola acquires Openpath and Envysion Motorola Solutions adds to its security industry portfolio with the acquisition of Openpath Security Inc., a cloud-based mobile access control provider. Openpath’s solution makes businesses more secure with multi-factor authentication, enables a contactless entry experience, and can be easily scaled and managed due to its cloud-based architecture. Motorola also announces the acquisition of Envysion, a provider of video security and business analytics solutions for quick-service restaurant and retail industries. Delta Electronics buys March Networks Delta Group, a provider of power and thermal management solutions, , purchased 100% of the shares in Infinova (Canada) Ltd., owner of Canadian-based video surveillance and business intelligence company March Networks, from Infinova International Ltd. through its subsidiary Delta International Holding Limited B.V. Following the close of the transaction, it was expected that March Networks will continue to operate from its Canadian headquarters, and the March Networks executive management team will continue to lead the organization. Delta Electronics is also the parent company of VIVOTEK. APi Group acquires Chubb Fire and Security Business APi Group Corp. agreed to acquire the Chubb Fire & Security Business from Carrier Global Corporation for an enterprise value of US$ 3.1 billion. Headquartered in the United Kingdom, Chubb has approximately 13,000 employees globally and a sales and service network that spans 17 countries, serving more than 1.5 million customer sites in Europe, Asia Pacific, and Canada. APi Group is a business services provider of safety, specialty, and industrial services in more than 200 locations worldwide. Teledyne Technologies Inc. will acquire FLIR in a cash and stock transaction valued at approximately $8.0 billion Teledyne acquires FLIR Teledyne Technologies Inc. and FLIR Systems, Inc. jointly announced that they have entered into a definitive agreement under which Teledyne will acquire FLIR in a cash and stock transaction valued at approximately $8.0 billion. Jim Cannon, President and Chief Executive Officer of FLIR, said, “We could not be more excited to join forces with Teledyne through this value-creating transaction.” Resideo adds Norfolk Wire and Electronics Resideo Technologies, Inc. acquired privately held Norfolk Wire & Electronics, based in Richmond, Virginia. Norfolk was founded in 1985 and is a regional distributor of security, telecom, network, and audio-video (AV) related products, supplies, and tools. With 11 full-service retail locations and a 43,000 sq. ft. distribution centre, Norfolk serves customers across the mid-Atlantic region and will be part of Resideo's ADI Global Distribution business, a wholesale distributor of security, AV, and low-voltage products. Triton acquires ACRE, which acquires Feenics and Matrix Triton Partners acquired ACRE, an end-to-end security solutions provider based in Dallas/USA and Dublin/Ireland. Triton is investing alongside the current management team of ACRE. Weeks later, ACRE acquired cloud-based workplace solutions company Time Data Security (TDS). Later in the year, ACRE announced acquisition of Feenics and Matrix Systems. Feenics brings cloud-based access control solutions brings cloud-based access control solutions to ACRE’s rapidly growing network of global customers while also expanding its portfolio to support the growing demand for cloud-based security solutions. Matrix enables ACRE to expand the addressable market for the company’s technology portfolio. Brivo, Inc. and Crown PropTech Acquisitions have entered into an agreement making Brivo a publicly listed company Brivo becomes publicly traded through the merger Brivo, Inc., a cloud-based access control and smart building technologies company, and Crown PropTech Acquisitions, a publicly traded special purpose acquisition company (SPAC), have entered into a definitive merger agreement that will result in Brivo becoming a publicly listed company. The transaction values the company at a pro forma enterprise value of $808 million. Upon closing, the combined company will operate as Brivo, and its Class A common stock is expected to be listed under the ticker symbol “BRVS.” Nice buys Nortek Security Nice, a global manufacturer of smart home, security, home, and building automation solutions, , acquired Nortek Security & Control from Melrose Industries. Nortek Security & Control is a developer of technology for security, home automation, control, power, AV and entertainment, access control, health, and Artificial Intelligence (AI) systems, for residential and commercial markets. Eagle Eye acquires Uncanny Vision Eagle Eye Networks, a cloud video surveillance solutions company, has acquired Uncanny Vision Solutions, an artificial intelligence (AI) analytics and Solutions Company. The acquisition accelerates the company’s leadership in providing AI and analytics, to make customers’ businesses more efficient and the world a safer place. The acquisition also includes research and development (R&D) capabilities and a new regional office located in Bangalore, India.
Case studies
With an impressive 259 charging points and locally generated solar power to charge vehicles, Merklingen train station is the world’s largest e-car charging park. Situated between the cities of Stuttgart and Ulm, Merklingen was inaugurated in December 2022. The new train station serves approximately 1000 to 1300 passengers daily. It has benefitted local hospitality, retail, and tourism since it opened with the state Ministry of Transport calculating that it will eventually generate an annual economic benefit of 4.8 million euros for the region. GDPR perspective As a transport hub for the local municipality of Merklingen, it is important that visitors feel safe and operations run smoothly. Because of this, the management team of the Zweckverband Schwäbische Alb contacted Reif GmbH looking for a new, intuitive video system that was futureproofed and could support the management of the station’s innovative e-car charging park. The customer also wanted an easy-to-use VMS to help with daily operations Existing systems on the market did not meet the customer’s requirements, specifically National Defence Authorisation Act (NDAA) compliance which was important from a GDPR perspective. The customer also wanted an easy-to-use video management system (VMS) to help with daily operations and with event investigations. A new intuitive video system Hanwha Vision was chosen thanks to its intuitive WAVE VMS, NDAA compliance, open platform, and camera features. As a Diamond Partner, Reif GmbH was also able to offer a five-year warranty on the Hanwha Vision cameras. In total, 37 cameras are installed around the station’s car park along with WAVE VMS enabling continuous monitoring of the building and surrounding locations. The cameras include the QNO-8080R, a 5MP Network IR Bullet Camera, a TID-600R Intercom and the XNO-9082R, a 4K IR Bullet Camera with the Wisenet7 chipset and powerful video analytics including directional detection, audio detection, shock detection, and face/upper body detection. The benefits of an open system The open platform also supports future expansion of the station video surveillance if needed Hanwha Vision’s open platform offered the flexibility and futureproofing needed by the operator team, notably in supporting an integration with a custom in-house AI parking control system that was developed in partnership with a regional software company. This system automates parking management removing the need for personnel to issue access, exit, and parking fees for the station car park. The open platform also supports future expansion of the station video surveillance if needed, or additional features and uses. Crucial evidence and insights The cameras work with the in-house parking management system to prevent unauthorised vehicles from entering the premises. They have also captured footage that was later used to investigate damage to property, helping operators to resolve such cases clearly and effectively with the video evidence. The XNO-9082R shows excellent performance in different lighting conditions thanks to Wisenet7 The XNO-9082R shows excellent performance in different lighting conditions thanks to Wisenet7, delivering clear images back to operators to help with situational awareness day and night. IK10 water and vandal protection was another selling point for the station team, as the cameras are all situated outdoors. Meeting GDPR requirements Hanwha Vision cameras are NDAA compliant, meeting the GDPR requirements for the station. No productive data is passed on to external third parties and the system can be operated completely on-premise to meet data protection regulations. Data can only be viewed by explicitly authorised individuals. Due to the WAVE VMS, maintenance staff can access the on-premise server in an emergency or malfunction with remote access through WAVE Mobile. “The performance and quality of Hanwha Vision cameras along with the open WAVE VMS that could work with the in-house AI parking management system made it the logical choice for the Merklingen station project,” explained Andreas Baumann, Managing Director at Reif GmbH.
The new GoldenEye Hotel and Resort on the Bulgarian and Turkish border, Europe’s largest casino development, opened in 2024 by BC Industries is providing enhanced security with more efficient guest services thanks to a 600-camera video surveillance solution from IDIS. The advanced camera system combines 24/7 visibility over gaming tables and public areas, fault-free image capture and recording of UHD video footage, a more efficient real-time monitoring platform for multiple users, and options for rapid targeting of AI analytics. End-to-end visibility As well as meeting the higher security requirements typical of casino operations, the system from South Korea’s largest in-country video tech manufacturer supports the GoldenEye resort in providing a more impressive welcome for hotel guests with full visibility over corridors, communal areas, and back-of-house operations ensuring the ultimate guest experience. The end-to-end solution has been installed by Volga Elektronik to cover the casino, hotel, and car parks. High-definition image capture IDIS 12MP Super Fisheyes, 8MP IR, and 5MP IR dome cameras allow broad scene surveillance A combination of IDIS 12MP Super Fisheyes, 8MP IR, and 5MP IR dome cameras allows broad scene surveillance of all internal areas, without blind spots, plus targeted coverage of priority locations such as cashier cages and slot machines. High-definition image capture allows gaming tables to be monitored in fine detail with operators able to identify card suits, and chip denominations and quickly detect any suspicious player activity, regardless of low light or cigarette smoke. Instant and smooth dewarping Instant and smooth dewarping of the fisheye images supports efficient real-time viewing and playback, allowing incidents to be resolved rapidly and preventing game stoppages. This ensures positive experiences, and confidence, for both customers and staff. External areas, including parking bays and entrances, are covered using IDIS 5MP IR bullet cameras and 2MP IR PTZs. IDIS Solution Suite VMS, NVRs IDIS Solution Suite VMS allows 24/7 monitoring by six operators and two supervisors, using a control room video The system also comprises seven 64-ch NVR recorders; and IDIS Solution Suite enterprise-class VMS and Critical Failover to protect continuous access to video and provide full redundancy in the event of a range of fault conditions. IDIS Solution Suite VMS allows 24/7 monitoring by six operators and two supervisors, using a control room video wall, with live viewing and simultaneous playback. The solution is NDAA compliant, with inherent cybersecurity protection; and it meets GDPR requirements, with IDIS’s dynamic video privacy masking allowing footage to be easily exported without privacy infringement. Advanced surveillance capabilities “IDIS video technology is perfectly designed for casino security,” said Mert Çalışkan, BC Industries’ Casino Operations Director. “Our new system gives us all the advanced surveillance capabilities we need to protect our guests and our facilities. And we’ll be able to easily adapt and extend it in the future and take advantage of exciting new capabilities.” ERP software The resort would be taking advantage of this future-proofing capability that comes with all IDIS technology In the next project phase analytics data integration with the casino’s ERP software is being introduced, along with transaction data overlaid on recorded video for efficient incident investigation. Koray Ozyildirim, IDIS Türkiye Country Manager confirmed that the resort would be taking advantage of this future-proofing capability that comes with all IDIS technology. IDIS AI video solutions and integration “Across the casino sector there is huge potential for adopting IDIS AI video solutions and integration capabilities,” he said. “IDIS’s industry-pioneering analytics are flexible and powerful and can be targeted at specific locations to enable highly accurate people counting, heat maps, and occupancy monitoring. Along with seamless systems integration, this will increasingly deliver a host of competitive advantages including enhanced security, better customer service, and, ultimately, greater profitability.”
Security office in commercial and residential building requires state-of-the-art solutions that can keep up with the demands of modern surveillance and threat detection. With space-efficient design, high-performance processing, coupled with advanced data protection, NVR NViS 5704, a powerful video analytics solution, enable seamless surveillance operations and enhanced security measure in edge AI applications. These capabilities empower security office to efficiently monitor and analyse video streams, identifying potential threats and recognising objects or individuals of interest in real-time. Optimal Space Utilisation The NVR NViS 5704 boasts a compact 1U form factor with rack depth only 56cm, making it an ideal choice for security office with limited space. Its space-efficient design ensures seamless integration into existing infrastructure without compromising on performance. At the heart of the NVR NViS 5704 lies the 13th Gen Intel® Core™ Processor with Performance Hybrid Architecture, delivering up to 16 cores, including a balance of performance cores for intensive tasks and efficient cores for power optimisation. NViS 5704 also features a PCIe x16 expansion with the flexibility to integrate accelerator cards or powerful graphics cards. This groundbreaking processing power and accelerator card support enable edge AI applications in video analytics, such as face/motion detection, object recognition, ensuring enhanced surveillance capabilities and efficient decision-making. Fortified data protection and backup Data security is of utmost importance in commercial and residential building security operations Data security is of utmost importance in commercial and residential building security operations. The NViS 5704 comes equipped with TPM2.0 and Bitlocker drive encryption, providing robust data protection to safeguard sensitive information from unauthorised access and potential threats, especially when hard disk is lost or stolen. In addition, Intel RAID technology is utilised for secure data backup. With RAID D 0, 1, 5, 10 support, critical data can be mirrored or distributed across multiple drives, ensuring data redundancy and protection against data loss. The NVR NViS 5704 offers an unparalleled blend of power, flexibility, and security, delivering a comprehensive solution for these mission-critical environments, With its accelerator card support, advanced Intel® Core™ processors, and enhanced data protection features, the NViS 5704 empowers security professionals to stay one step ahead in their efforts to safeguard communities and assets. Safeguarding communities and assets Main Features of NVR NViS 5704 are as follows: System 1U Rackmount 12/13th Gen Intel® Core-i platform DDR4 up to 64GB HDD 4-Bays 3.5” (support RAID 0,1,5,10) 1 x NVME SSD, 1 x M.2 2242 SATA SSD Display DP1.4, 1 x HDMI 2.0b, 1 x HDMI 1.4 2 x 2.5GbE Intel® Ethernet Audio in/out/Mic PCIe x16
The ever-increasing number of shoplifting incidents is forcing retailers to turn to facial biometrics as a security measure. This has yielded impressive results: store owners confirm that such security systems identify thieves by their faces and cite a reduction in theft-related losses between 50 and 90%. Modern facial recognition systems employ advanced algorithms that both ensure data privacy and adhere to international GDPR. Retail theft and robberies Retail store managers have noted a recent rise in thefts and robberies. As reported by Charged, a British retail news outlet, this disturbing trend emerged in 2018-2019 and has since evolved into a pressing issue. Interestingly, the rise in shoplifting incidents coincides with a broader surge in crime rates, as independent research portal Numbeo assigns a "high" rating to this metric in many Latin American cities. Retail security survey 82% of respondents mentioned intensification in the ferocity of attacks and the involvement of weapons The increase in retail attacks, as well as a growing level of aggression from organised groups, is prompting widespread concern. The 2021 "Retail Security Survey: The State of National Retail Security and Organised Retail Crime" report by the National Retail Federation provides some alarming statistics. According to the report, 64% of respondents observed a surge in losses from organised criminal groups since 2016, while 53% reported an escalation/increase in theft. What is more, 82% of respondents mentioned intensification in the ferocity of attacks and the involvement of weapons. The average loss per theft The National Retail Federation approximates the average loss per theft incident in a store at $462, with organised robberies amounting to nearly $7,500. Furthermore, data from the British Retail Consortium, as reported by the Daily Mail, reveals an alarming increase in-store theft incidents, soaring from 3 million cases in 2016-2017 to 8 million in 2022. Delayed response Theft cases below a certain monetary value are often deemed low-priority and go uninvestigated The often delayed response of the police to shoplifting incidents leaves retail businesses vulnerable to theft. Store employees, wary of potentially armed perpetrators, avoid personally confronting suspects, while law enforcement personnel respond to incidents only after the criminals have already made their escape. Additionally, theft cases below a certain monetary value are often deemed low-priority and go uninvestigated. Latin America relies on biometric technologies Fortune Business Insights predicts the global facial recognition technology market to reach an impressive $13 billion by 2027, with a compound annual growth rate (CAGR) of 14.8%. The 3D recognition sector exhibits even swifter growth, with Market Research Future reporting a CAGR of 21.6%. Biometric technology development The Latin American biometrics market will hit a volume of $8 million by 2027-2028, with a CAGR of 17-22% However, it is Latin America that is considered the most favourable region for biometric technology development, with its biometrics market surpassing the global growth rate by far. Multiple research firms, including Inkwood Research, anticipate that the Latin American biometrics market will hit a volume of $8 million by 2027-2028, with a CAGR of 17-22%. Government investments Analysts identify Brazil, Mexico, and Argentina as key influencers in the regional development of biometric technologies. This trend is attributable to both governmental investments in initiatives like safe cities or digital identification, and private sector endeavours to mitigate the escalating crime rates. How facial recognition protects against theft A facial biometrics system installed in a major retail store chain prevents thousands of crimes Retailers are finding effective protection against growing losses through a combination of organisational protocols, staff training, and the adoption of ready-to-use security solutions, such as anti-theft systems, in-store surveillance, and biometric technologies. Facial recognition systems have proven to be highly effective in preventing theft and robberies. For example, according to the Daily Mail, a facial biometrics system installed in a major retail store chain prevents thousands of crimes each month. AI-based system Additionally, Charged disclosed that a local convenience store saw a staggering 90% reduction in losses following the installation of an AI-based system. Facial biometric systems assist security services in monitoring the store and promptly identifying any infractions. How it works Cameras installed in the store capture video footage, which the system then uses to extract facial images and create biometric profiles stored in a database. The system continuously cross-references real-time video data against the biometric profiles already cataloged in the database. In case a customer was previously involved in theft, vandalism, or similar incidents features on the "stop-list," the system notifies the security service, prompting closer monitoring of the said individual. Detect suspicious activities and alert By integrating facial biometrics with video analytics, the system can quickly detect suspicious activities and alert security personnel. The incorporation of facial biometrics helps to: Significantly reduce losses from theft, robbery, and vandalism, Improve the efficiency of security services, Lessen the strain of manually sifting through footage from multiple cameras, Minimise the potential for human error in in-store security, Enhance interaction with customers by incorporating biometrics into marketing systems. Police departments also benefit from increased crime-solving rates, while retail industry professional associations can curb recurrent thefts by sharing "stop lists" and biometric data on criminal gangs and individual offenders. The security system project was a collaboration between Francaza, a Brazilian integrator, and RecFaces Brazilian Shopping Centre case study Jockey Plaza, a shopping centre in Curitiba, Brazil, implemented a comprehensive security system featuring video analytics and facial biometrics. This modern facility, spanning 200,000 square metres, accommodates 400 stores and 28 food establishments. The security system project was a collaboration between Francaza, a Brazilian integrator, and RecFaces, a facial biometrics solution developer. Id-Guard facial identification software To enhance the security of the shopping centre, automate security operations, and expedite crime investigations, they chose to employ RecFaces' Id-Guard facial identification software. Id-Guard seamlessly integrates with video surveillance and video analytics systems, offering biometric identification, real-time and retrospective face search within video streams, and stop listing capabilities. Saves time Implementation of Id-Guard saves security specialists time as they no longer have to spend hours" "The moment a person on the stop list enters the camera's field of view, the operator is immediately notified," says Cristiano J S Maffessoni, Francaza’s CIO. "Based on our experience, implementation of Id-Guard saves security specialists time as they no longer have to spend hours sifting through video footage when investigating incidents." 50% cut in shoplifting instances According to Cristiano J S Maffessoni, the payback period for the Jockey Plaza shopping centre project is less than 3 years thanks to a 50% cut in shoplifting instances, swift resolution of crimes, and increased efficiency of security services. The return on investment for biometric systems typically spans 1 to 3 years, depending on the crime rate in the vicinity of the shopping centre. To calculate effectiveness, it is necessary to evaluate the average loss per incident, the average number of similar incidents annually, and the incident reduction rate, generally fluctuating between 30% and 70%, based on the security service's efficacy. Ready-to-use biometric solutions Our solutions allow customers to identify offenders, instantly respond to incidents, and foster loyalty" Maria Kazhuro, RecFaces' BDM in Latin America, shares, "RecFaces has developed two lines of ready-to-use biometric solutions specifically designed for the security and retail sectors." "We've seen an immense demand for our ready-made solutions in Latin America, thanks to their quick and easy deployment on any equipment. Our solutions allow customers to identify offenders, instantly respond to incidents, conduct marketing research, and foster customer loyalty." Data storage method RecFaces' Id-Guard, a biometric ready-to-use solution, stores only biometric template feature vectors that cannot be reconstructed into facial images in its database. This data storage method adheres to international GDPR data protection regulations and is supplemented by AES-256 standard encryption mechanisms for critical data.
A town in Arunachal Pradesh becomes a ‘Smart City’ with AI-powered Videonetics Solution. A smart, resilient, and unified solution enables public safety, asset security and traffic management for the city. The customer One of the prominent towns in Arunachal Pradesh, India, made it into the Government of India’s Smart Cities Mission development scheme with a vision of building a well-managed clean, green, and environment-friendly city. This city is envisioned to possess a character of its own, defined by scenic beauty, intellectual capital, and eco-friendly tourism through sustained economic growth for all its citizens. The target is to create a replicable role model that can act like a lighthouse to other aspiring towns of Arunachal Pradesh. Challenges Over the past few years, the town has witnessed a high influx of students, visitors and tourists The town is fast becoming a bustling tourist attraction in Arunachal Pradesh. Before this, the town had a limited deployment of CCTV cameras, and the system was not well suited to even conduct any investigations if an unwanted incident were to happen. Over the past few years, the town has witnessed a high influx of students, visitors and tourists. Understandably, infrastructure has also shown rapid growth, and hence local authorities understood the need to address concerns of vigilance, traffic, municipality, assets protection and safety of the citizens. Solution The official body formed to execute the vision of a safe city wanted to implement a comprehensive surveillance solution to monitor law and order situations, road safety, identify miscreants, protect public and private properties, and improve urban amenities. A project team comprising officials of the governing body, Videonetics, and system integration partners, carried out extensive research to identify important spots around the town and prepared a comprehensive surveillance strategy. Videonetics designed a versatile and unified solution that includes Intelligent Video Management System (IVMS 3.0), AI-powered Video Analytics, Automatic Licence Plate Recognition (ALPR) System and Face Recognition System (FRS). 24x7 Geo-situational awareness and accelerating response time: Operators in the command and control centre monitor over 180+ locations across the town with Videonetics Intelligent VMS using multi-layer GIS maps for a clear view of cameras spread across the geography. This covers areas like government establishments, public areas, airports, railway stations, schools, parks, markets and roads. Suspect tracking and face recognition: The city deployed network cameras to process video streams with the Face Recognition application (MeraFace™) at city entry-exit points and other public areas. The forensic investigation features of the application also help in a quick search for evidence and identifying suspects during investigations. AI-powered video analytics for the safety and security of people and assets: Artificial Intelligence powered video analytics has been deployed strategically across various facilities throughout the city while keeping in mind the requirements specific to each site. Line crossing detection is deployed along perimeters of correctional facilities to detect intrusion. Face recognition application is also used at entry-exit gates to recognise faces in live video streams. ‘Unattended Object Detection’ use case has also been applied to identify objects that can pose a security threat. Fire and smoke detection has been deployed at the airport and road intersections across the city to detect fire and smoke caused by accidents. Parks and gardens are being monitored to detect people collapsing. Face recognition is also being used to identify people. Crowd formation and estimation has been put to use in public areas like hospitals and VIP hotspots to manage crowd efficiently. To keep the city clean, the municipality body is using AI-powered Video Analytics to detect the overflow of garbage bins installed at all garbage collection centres. Also, to keep a constant track of the timely collection of garbage and identify people violating guidelines and penalise them, the face recognition system has been deployed as well. To protect various government buildings and schools, ‘Vandalism and Graffiti Detection’ use cases have been deployed, along with the face recognition system to identify frequent perpetrators and alert the authority for timely action. In the quest for maintaining the environment and air quality, authorities are using AI-powered Video Analytics to ‘Detect Polluting Vehicles’ in real-time. Accessing vehicle details with ease: Videonetics’ Vehicle Licence Plate Recognition (ANPR or ALPR) application is deployed across 34 locations such as inter-city roads, intersections, entry-exit points of the city and highways. This is done to capture and record the licence plate of any vehicle class and store them in the database for any future investigations. ANPR also supports city officials in identifying suspicious or wanted vehicles or non-standardised number plates in real-time and alert police officials on time. It has been quite helpful in solving cases of ‘stolen’ vehicles in the city. Impact The town has become a shining beacon emblematic of the concept of a truly safe and smart city, as the unified video management platform of Videonetics has successfully provided tools to multiple agencies to solve real challenges beyond the basic need of monitoring for security purposes. Here is a quick summary of the derived benefits of the end-to-end solution: Active monitoring round-the-clock, in-built Video Analytics, ANPR, and facial recognition system has helped law enforcement authorities to manage traffic efficiently, enhance safety for citizens, and protect local businesses and city infrastructure. Working with city administration, control room operators can switch between video feeds using dynamic maps that empower them to obtain critical event information and manage emergencies by alerting stakeholders for quick action. And when necessary, the Videonetics solution makes it possible to share forensic videos across departments, facilitating more collaborative and successful response efforts. On the traffic front, operators gain vital statistical insights into traffic flow across the city that helps in pre-emptive planning to reduce congestion. The authorities also get alerts when there is a hot listed vehicle spotted. Face Recognition System (MeraFace™) has proven to be a watchful eye in identifying people of interest, suspects, criminals and trespassers, and alert teams for faster response and intervention to curtail threats The open and modular architecture of the solution not only allows the city to continue adding more applications to make its traffic management more robust but also integrates the city surveillance system in a single unified interface to address overall security concerns with a holistic approach.
MVM is a nationally-owned energy group with a mission to provide affordable and clean energy. Its portfolio covers the total domestic energy system in Hungary, where it is the dominant electricity wholesale trader; and it also operates in Austria, the Czech Republic, Croatia, Slovakia, Romania, and other parts of Europe. It is actively increasing its presence in regional markets, as well as expanding into areas of sustainable energy including solar power, hydropower, and natural nuclear. Electricity generation by the MVM Group is already about 83% carbon neutral. Challenge MVM had 14 photovoltaic power plants that needed to be protected in high-residential areas while protecting the privacy of neighbouring residents. Because of their locations, these sites were at high risk of vandalism, trespass, and theft of equipment. Also due to the adjacent residential settings, traditional security technology such as fence detection and outdoor visual CCTV could not be used. Solution: Thermal and PTZ cameras Protecting the privacy of neighbouring residents The thermal cameras included the TNO-4030T, TNO-4040T, and TNO-4050T The MVM security team turned to Hanwha Vision for its thermal cameras, as a way to protect its high-value photovoltaic assets, while adhering to GDPR and protecting personal privacy. Over 100 thermal cameras were installed along with PTZ cameras with a handover function. The thermal cameras included the TNO-4030T, TNO-4040T, and TNO-4050T. Good features and reasonable pricing “Hanwha Vision has a very balanced product line with good features and reasonable pricing,” explained Tamás Tánczos, Security Engineering at MVM, adding “It was a natural choice when we realised that on these sites we couldn’t use fence protection, infrared, or microwaves to detect intruders. With the thermal cameras, we could rest assured that no personal data would be gathered.” Results Motion detection The thermal cameras help MVM protect its photovoltaic sites without compromising neighbouring residents’ privacy. They come equipped with Motion detection, Handover, Tampering, Loitering, Directional detection, and Audio detection features built-in to boost operators’ situational awareness. The TNO-4040T and TNO-4050T can additionally detect changes in temperature, such as a potential fire, and shock detection, which could indicate displacement or hard blows to the device. Intelligent video analytics While the camera is constantly scanning for potential intrusion and motion detection, operators can continue to work on other activities with alerts issued for any events that need their response. This makes the system more intelligent and efficient compared to traditional fence detection or basic CCTV cameras. Visibility Because the cameras work through thermal imaging, they are not affected by low light levels or visibility, so inclement weather doesn’t impact their effectiveness. Operators consistently receive good images and resolutions no matter the environmental conditions. Further expansion planned The project initially involved 14 sites but as the effectiveness and benefits of the Wisenet cameras are proven, this is expanding to other sites in MVM’s portfolio. The team is also considering adding thermal cameras with built-in AI due to launch soon.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Facial recognition is a mature technology that continues to change and evolve. New innovations such as artificial intelligence (AI) are expanding facial recognition capabilities, even as privacy concerns, though often misguided, undermine wider acceptance in the market. We asked this week’s Expert Panel Roundtable: What are the new developments in facial recognition?
During the coronavirus lockdown, employees worked from home in record numbers. But the growing trend came with a new set of security challenges. We asked this week’s Expert Panel Roundtable: What is the impact of the transition to remote working/home offices on the security market?
![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Facial recognition](https://www.sourcesecurity.com/img/emagazines/612/facial-recognition-magazine-security-technology-trends-international.jpg)
Facial recognition
Download