In many regards, 2018 was a turbulent year for the physical security marketplace, driven by evolving technologies and changing customer needs, among other factors. Year-end is a great time to reflect, so we asked our Expert Panel Roundtable: What caused the most disruption in the physical security marketplace in 2018?
We’re here again. The end of another calendar year, and a time when many organisations are assessing their performance over the past 12 months and finalising strategic plans for 2019. Taking time to reflect on where our industry is at – and what’s likely to happen in the future – is important for all organisations as they set out their long-term goals and tactics. Here are some of the key trends to watch in the months to come and some predictions on their potential to i...
The security marketplace is talking about a lot of different subjects. Our website’s Expert Panel Roundtable discussions in 2018 reflected some of the “hot topics” in the industry. The very most-clicked-on Expert Panel Roundtable discussion in 2018 was about privacy issues and GDPR’s impact on physical security systems. Other hot topics that made the Top-10 list of roundtable discussions included obstacles to adoption of mobile credentials, what’s new “...
Cyberattacks targeting IoT devices and consequently video systems as well are growing more frequent at an unprecedented rate. The things users should consider in their security strategy are highlighted in an information package from the Regensburg-based video equipment manufacturer with information and specific recommended measures. They show that the essential aspects extend beyond the classic instruments of cybersecurity. Security specialists at many banks in several different countries were...
Cyberattacks targeting IoT devices and consequently video systems as well are growing more frequent at an unprecedented rate. The things users should consider in their security strategy are highlighted in an information package from the Regensburg-based video equipment manufacturer with information and specific recommended measures. They show that the essential aspects extend beyond the classic instruments of cybersecurity. Security specialists at many banks in several different countries were...
The initials GDPR have become synonymous with the need for companies within the European Union to provide consumers greater transparency and better control over their personal data. The General Data Protection Regulation (GDPR) has also increased awareness of privacy concerns around the world. It’s not the only factor highlighting a need for greater privacy – high-profile privacy breaches by companies such as Facebook are also driving the trend. But GDPR’s global impact canno...
Police Crime Prevention Initiatives (PCPI) has become the accreditation body for Business Crime Reduction Partnerships (BCRPs), which seek to reduce crime and anti-social behaviour in towns and cities around the country. Working closely with Police and Local Authorities, BCRPs bring businesses together to make their communities safer and to combat the adverse impact on profitability caused by crime and the fear of crime. BCRPs share intelligence to deter and prevent crimes like shoplifting and theft through violence and disorder to create safer shopping and business environments for both the day and night-time economies. PCPI, which is often referred to by its most successful crime prevention initiative, Secured by Design, will be accrediting BCRPs on a set of standards owned by the National Business Crime Centre (NBCC). Recognising good practice and professionalism The standards include good management practices and procedures such as membership agreements, data securityThe standards have been created over the last 18 months by a group of industry professionals led by Martin Blackwell, former Chief Executive Officer, of the Association of Town and City Management, and including representatives from the NBCC, leading staff from the BCRP sector and business. The aim of the BCRP accreditation process is to recognise good practice and professionalism to ensure they are functioning in an ethical manner and within the law, specifically checks to ensure compliance with the General Data Protection Regulation. The standards include good management practices and procedures such as membership agreements, data security and compliance with current legislation. It includes having robust information for members and partner organisations that is up to date as well as making it easily accessible 24/7. For some BCRPs, the standards will include the use of CCTV and radio links with members. Data sharing to reduce criminal activity It is expected that accreditation will enhance the level of partnership working nationally and encourage continued, significant, national business investment in BCRPs. In addition, the intention is that it will provide reassurance to Police Forces that data shared with BCRP partner organisations will be utilised in a responsible manner to reduce criminal activity. Jon Cole, PCPI Chief Operating Officer, said: “We want BCRPs and their businesses, including their management and employees, to feel confident and empowered to take action to work with Police Forces and Local Authorities to make their local communities safer and stronger.” The standards provide a solid starting point and we intend to review them regularly to ensure that they remain fit for purpose" Georgina Barnard, NBCC Operational Lead, said: “The standards provide a solid starting point and we intend to review them regularly to ensure that they remain fit for purpose.” “We want to promote better and more consistent working between Police Forces and their local BCRPs. By demonstrating that accredited partnerships meet the national standard, we will give Police Forces the confidence to ‘dare to share’ information and act on the information they receive from BCRPs to promote collaborative working.” Making local communities safer BCRPs are subscription-based, business-led, non-profit making action groups, often associated with Business Improvement Districts (BIDs), working with Police Forces and Local Authorities to gather intelligence and share information to tackle crime and disorder affecting businesses from multi-chain retailers and small independent shops through to pubs and restaurants and nightclubs. There are believed to be approximately 400 BCRPs operating in the UK. They seek to make their local communities safer places to live, work and visit. BCRPs are encouraged to contact one of the two Assessing Organisations working with the NBCC that have been authorised to carry out assessments leading to accreditation. They are the National Association of Business Crime Partnerships and Revive & Thrive.
Video analytics capabilities and privacy protection enhancements are among several highlights that Honeywell has added to its equIP® Series Cameras line, and MAXPRO® network video recorders (NVR) and video management system (VMS). The expanded capabilities are designed to help protect complex building environments, while improving user friendliness for operators and reducing overall cost of operation. The updated camera technology and new analytic features include Tripwire, Intrusion, and Abandoned Object and Missing Object Notification on all models. Low-light models will also include automatic behavioural detection, analysis, tracking and classification of people and vehicles as they move through a scene with Xtralis LoiterTrace, Smart Impressions and People Counter. The new cameras, NVRs and VMS help customers meet General Data Protection Regulation (GDPR) requirements from product perspective. Updated video management system Both MAXPRO NVR and MAXPRO VMS have been updated to support the latest equIP camerasBoth MAXPRO NVR and MAXPRO VMS have been updated to support the latest equIP cameras and new features for broader applications. Updates include: New POE switch (HPOE3X) and AUX ports to reduce maintenance, installation storage costs, and resources for providing lower total cost of ownership Storage overheads and required bandwidth is also reduced (by up to 40%) by theadoption and use of H.265 video compression For MAXPRO VMS R500 specifically, body pixellation and blurring in live view from the new equIP models for enhanced privacy protection The new editions enhance Honeywell’s growing line of IP video technologies to deliver scalable high-quality video solutions for any business need. In addition, the equIP Series and MAXPRO solutions integrate with a variety of Honeywell products, including Pro-Watch® access systems, to provide a comprehensive connected building platform.
Eagle Eye Networks announced the addition of a data centre in Germany expanding its global network of video surveillance data centres. The new data centre is located in Frankfurt and will support customers across the European Union as well as German customers’ GDPR requirements to store video within Germany. With this new addition, Eagle Eye Networks now operates EU data centres in the UK, Germany, and the Netherlands. Eagle Eye also operates data centres in California, Texas, Canada, Japan, India, Singapore, and the United Arab Emirates. Providing maximum data security The Eagle Eye Cloud video surveillance system (VMS) is the leading global cloud-based video solution addressing the needs of businesses, alarm companies, security integrators, and individuals. Eagle Eye’s state of the art infrastructure has been specifically designed for high volume video traffic, processing, storage and is managed directly by Eagle Eye personnel to provide maximum security, performance, and availability. Adding a local data centre in Frankfurt is evidence of our commitment to the German market as well as our commitment to adhere to localised privacy and regulatory requirements" Eagle Eye Networks is committed to expanding rapidly in the German market. Eagle Eye’s commitment is evidenced by the addition of a data centre in Frankfurt, along with the German translation of all product interfaces. “Eagle Eye takes privacy and data security very seriously,” stated Rishi Lodhia, Eagle Eye Networks’ Managing Director for EMEA. “Adding a local data centre in Frankfurt is evidence of our commitment to the German market as well as our commitment to adhere to localised privacy and regulatory requirements.” Key features of the Eagle Eye Cloud VMS: Complete Privacy Encryption. Eagle Eye Networks’ encrypted video recording – both at rest and in transit – keeps customers compliant with privacy regulations. The Eagle Eye Security Camera VMS is compatible with a wide array of IP and analogue cameras, allowing companies to retrofit old systems with cloud video surveillance system when their existing DVR or VMS needs replacement. Secure remote access. With smartphone usage overtaking laptop usage in Germany, Austria, and Switzerland, secure remote access is critical. The Eagle Eye Security Camera VMS has cyber-secure access from all iOS and Android mobile apps and from all major web browsers, including Internet Explorer, Chrome, Safari, and Firefox. Exhibiting at Security Essen 2018 Eagle Eye Networks operates its European headquarters in Amsterdam, NL, and has offices in Austin, Texas US, and Tokyo, JP. Eagle Eye Networks will be exhibiting at Essen Security 2018 at stand 7C24.
The latest advances in secure surveillance technology, engineered entirely in Korea, are being demonstrated by IDIS at Security Essen (25-28 September), on booth E10, Halle 5. The IDIS Total Solution is increasingly being preferred by major users globally because it offers the advantages of secure, exclusively Korean design and manufacturing, as well as outstanding performance in all applications. Important innovations on show at Security Essen include: IDIS’ flagship DirectIP solution; a full array of IP cameras (including full-HD and 4K), network video recorders, network accessories and monitors; new privacy masking features to support user compliance with data protection regulations (such as GDPR); IDIS Center, which typically delivers 50% cost savings on centralised monitoring systems in comparison with server-based solutions; and game-changing AI. Advanced deep network IDLA is easy to set up and use, with no calibration required, simply by setting the region of interest and sensitivity Proving to be the biggest draw for visitors is the latest iteration of IDIS Deep Learning Analytics (IDLA) technology that has opened a new door to the future of video analytics with ground-breaking 96% accuracy combined with a 200ips speed allowing for the analysis of 32 channels simultaneously. These exciting advances in video analytics makes IDLA more accurate, faster, and more scalable than competitive offerings. It provides agile appearance searching, object detection and classification (for example people, cars, and bicycles) intrusion detection, and loitering detection—all adapted to fit a 16:9 ratio. The IDLA engine offers this unrivalled accuracy thanks to its advanced deep network architecture. Yet, IDLA is easy to set up and use, with no calibration required, simply by setting the region of interest and sensitivity. Powerful AI solution Further, since IDLA does not require additional processing power users can progress legacy hardware and cameras to transform their existing surveillance system into a powerful AI solution. Version 2.0 will be commercially available early next year, and users will be able to access both standard and advanced functionality, such as appearance search, through a single and affordable licence. Object detection and classification, intruder detection and loitering analytics are already available for users of IDIS Solution Suite video management software. Making its major exhibition debut in Germany, IDIS DirectIP is a true plug-and-play, end-to-end IP surveillance platform which offers industry-leading ease of use and performance. Consisting of IP cameras, NVRs, network equipment and totally cost-effect IDIS Center software IDIS DirectIP is a complete package that is easy to install, secure, flexible and scalable. Dynamic privacy masking IDIS Dynamic Privacy Masking securely masks areas of interest without transcoding, allowing users to protect the privacy of selected individuals It is compatible with legacy systems and supports third-party and ONVIF protocols, for maximum installation flexibility. DirectIP provides users with best-in-class performance, that when combined with the seven year IDIS Ultimate Warranty, is affordable and cost effective to run. Visitors to booth E10, Hall 5 are also learning how IDIS Dynamic Privacy Masking is supporting users in complying with privacy legislation such as GDPR. IDIS Dynamic Privacy Masking securely masks areas of interest without transcoding, allowing users to protect the privacy of selected individuals, for example by-standers, in video which is being used as evidence. Significant cost advantages Together these advances offer end-users, installers, consultants and distributors new levels of system-building flexibility and security with significant cost advantages. Commenting, Joon Jun, President of the IDIS Global Business Division, said his team was excited to be sharing these latest advances with customers at Security Essen. “IDIS technology is now recognised as a trusted, premium brand and it is being adopted by major users around the world. This success is thanks to our commitment to highly secure manufacturing - which is exclusively Korean - and innovative design which keeps us at the very forefront of the video surveillance sector.”
Suprema, a provider of biometrics and security, announces that the company will showcase GDPR-ready enterprise access control solutions at Security Essen 2018 including its latest range of biometric readers, multi-band RF card readers, mobile credentials and access control software platform. At the show, Suprema will introduces BioLite N2, the world's best performing outdoor fingerprint terminal. BioLite N2 is designed for both the enterprise access control systems and time attendance applications with well blends Suprema's technologies and innovative features. With a powerful 1.2GHz CPU and massive 4GB memory, BioLite N2 achieves incredible matching speed up to 20,000 matches per second and accommodates up to 10,000 users and provides instant matching results with minimal lag time. Mobile credential technology For reliable operation under extreme conditions such as outdoor installation and harsh climate, BioLite N2 features a rugged IP67 structure with a operating temperature range between -20 to 50 C. The device also features illuminated keypad and high-contrast GUI for better visibility under various lighting conditions. BioStar 2 Mobile Card enables users to issue electronic ID cards in users' smartphones, which capable of completely replacing existing plastic cards To answer emerging demand of mobile credential technology in EU market, Suprema will reveal its latest development of mobile credential technology. The latest BioStar 2 Mobile Card enables users to issue electronic ID cards in users' smartphones, which capable of completely replacing existing plastic cards. To make the mobile credential versatile over both Android smartphones as well as iPhones, BioStar 2 Mobile Card supports NFC and BLE communication. Revenue opportunity "At Suprema, we are pleased to announce the expansion of the enterprise-level security solution with the addition of high-performance biometric readers and mobile credential technology at Security Essen 2018. At Suprema, our commitment is focused to meet stringent requirement from enterprise-level security systems, provide best available credential technology and response to growing IoT trends. As a result, we'd like to create an added revenue opportunity for Suprema's global distribution partners and installers in promoting their Suprema portfolio offering," said Hanchul Kim, Sales Director at Suprema. At the show, Suprema will also showcase GDPR-ready access control solution. As an EU provider of biometric access control solution, Suprema has anticipated the regulation by providing key technical features to comply with GDPR and the company will provide full demonstration of its latest GDPR-ready access control solution. Suprema has established direct operations in 3 EU countries - France, Germany and UK - to improve local sales and technical support. According to the IHS Markit 2016 report, the company ranked first in EMEA market share for biometric access control.
Kingston Digital, Inc., the Flash memory affiliate of Kingston Technology Company, Inc., a global provider of memory products and technology solutions, announced it will showcase an array of products at Global Security Exchange (GSX) (booth 2685 Central Hall), the most established trade event for security professionals. The company will display its full line of industry-leading encrypted USB Flash drive solutions, including the IronKey brand purchased in 2016, as well as upcoming high-density business and enterprise SSDs and Server Premier memory. “When it comes to memory and data storage solutions, it is imperative that security professionals trust the products they use and the companies that make them. For over 30 years, we have been an unquestioned leader in this field,” said Richard Kanadjian, encrypted USB business manager, Kingston. “For storage-bound applications, Kingston stands ready as the industry shifts away from traditional 15k SAS toward NVMe, where the performance gains in terms of IOPS and lower latency is tremendous. GSX is the perfect venue for us to show the security industry our ability to provide it with the most complete line of superior data performance solutions for their varied security, data, audio/video or other applications.” GDPR compliant USB drives Kingston encrypted USB drives are designed to protect data that require high security and serve as an additional element in compliance with the EU’s GDPR GSX 2018 takes place at the Las Vegas Convention Center from September 23-27. Kingston is located in booth #2685 in the Central Hall. Kingston encrypted USB drives are designed to protect data that require high security, maintain a productive and efficient mobile workforce, and serve as an additional element in compliance with the EU’s GDPR (General Data Protection Regulation). These drives help users meet specific agency directives, such as encryption, TAA and FIPS compliance, and are ideal for government or corporate use. The line includes both IronKey drives available in 4GB to 128GB capacities; and, Kingston DataTraveler models available from 4GB to 64GB. Securing data with SSDs In business applications, Kingston SSDs increase performance, help secure data, and extend the life of older systems. In enterprise applications, Kingston SSDs offer increased reliability and power fail features to keep mission-critical environments up and running 24/7. The upcoming DC500R is a high-performance 6 Gbps SATA SSD designed for read-centric data-centre workloads. It is designed with strict QoS requirements to ensure predictable random IO performance as well as predictable latencies over a wide range of read/write workloads. Special power-loss safeguards help reduce the likelihood of data loss and ensure that the drive will successfully re-initialise on the next power-up of the system. DC1000M U.2 NVMe SSD The DC1000M 2.5″ U.2 NVMe SSD's advanced architecture enables delivery of up to 600k IOPS of random read performance and a potent 3GB/s of throughput The DC1000M 2.5″ U.2 NVMe SSD features high-storage capacity and best-in-class enterprise performance. Its high-performance Gen 3.0 x4 PCIe NVMe interface enables high throughput and low latency on a standardised low-cost platform. The drive’s advanced architecture enables delivery of up to 600k IOPS of random read performance and a potent 3GB/s of throughput. Its strict QoS requirements ensure predictable random IO performance as well as predictable latencies over a wide range of workloads. The ‘mixed-use’ workload drive makes it ideal for running a wide range of applications. Kingston server memory is a worldwide industry standard. Server Premier modules are manufactured using a locked bill of materials (BOM). They are designed for big data centres, people who implement high-quality branded provisioned servers to those who use or build white-box systems and require a consistent brand and revision of DRAM. The line offers a variety of embedded memory products that provide maximum performance and flexibility
There are two types of people in the world as it relates to privacy. Those that care about their privacy and sadly, those that don't. This divide continues to be further separated with the constant flood of cyber security breaches that we hear about. We, as consumers, can no longer get a cheap hamburger without hearing that once again, the information we want to be kept secret, has been breached. The old phrase of "you can lead a horse to water but you cannot make him drink" rings true as we approach helping consumers take charge of their digital and personal privacy. Governmental regulations for privacy Law makers have started taking up the charge to help protect the privacy of consumers Law makers have started taking up the charge to help protect the privacy of consumers. This has been executed with the newly European General Data Protection Regulation (GDPR) which went into effect on May 25th, 2018. The core premise is the consumer owns their data. Despite any company which uses, stores, or profits from a consumer's data, the consumer still owns it. This is a major shift away from how businesses are forced to protect the consumer's data. Even though many of us have likely heard about GDPR, it is not the only privacy law that's taking the world's stage. In fact, in California there is a new law called the California Consumer Privacy Act of 2018 which is focused around the same principles GDPR. This new California law goes into effect in 2020 and goes one step further by considering privacy as an alienable right for all consumers. Encouragement for consumers to take charge of their digital and personal privacy is becoming ever more important Taking ownership of privacy Despite the new regulations due to a corporation's lack of controls around consumer privacy data, the truth is that even though these regulations provide consumers with a mechanism to take ownership with how their personal data is used, doesn't mean they will. It's at this point we, as the security industry, need to step back to consider how we can improve the problem. Just because laws have paved a way, we still need to help consumers travel down the road to better privacy. For the privacy of consumers to truly be considered an inalienable right, we need to stand up for our rightsThere are two further mechanisms that we still need, governmental social programs and continued passionate discussions from the security industry. Governmental social programs will help provide free or low-cost classes for consumers to learn about how they can protect their privacy. However, governmental programs can only go so far and this by itself will not be enough. History has shown that social progress is often accomplished by a passionate minority that stands up against the oppression of human rights. For the privacy of consumers to truly be considered an inalienable right, we need to stand up for our rights. Not only do we need to exercise the capabilities new GDPR laws has created for us, but we should tell the important people in our lives. We need to stand up for our privacy because if we don't, we'll end up losing even more of our privacy.
When a child goes missing in a large, crowded mall, we have a panicking mom asking for help from the staff, at least a dozen cameras in the area, and assuming the child has gone missing for only 15 minutes, about 3 hours’ worth of video to look through to find the child. Typical security staff response would be to monitor the video wall while reviewing the footage and making a verbal announcement throughout the mall so the staff can keep an eye out for her. There is no telling how long it will take, while every second feels like hours under pressure. As more time passes, the possible areas where the child can be will widen, it becomes more time-consuming to search manually, and the likelihood of finding the child decreases. What if we can avoid all of that and directly search for that particular girl in less than 1 second? Artificial neural networks are improving every day and now enable us to search for a person across all selected camera streamsWith Artificial Intelligence, we can. Artificial neural networks are improving every day and now enable us to search for a person across all selected camera streams in a fraction of a second, using only one photo of that person. The photo does not even have to be a full frontal, passport-type mugshot; it can be a selfie image of the person at a party, as long as the face is there, the AI can find her and match her face with the hundreds or thousands of faces in the locations of interest. The search result is obtained in nearly real time as she passes by a certain camera. Distinguishing humans from animals and statues The AI system continuously analyses video streams from the surveillance cameras in its network, distinguishes human faces from non-human objects such as statues and animals, and much like a human brain, stores information about those faces in its memory, a mental image of the facial features so to speak. When we, the system user, upload an image of the person of interest to the AI system, the AI detects the face(s) in that image along with their particular features, search its memory for similar faces, and shows us where and when the person has appeared. We are in control of selecting the time period (up to days) and place (cameras) to search, and we can adjust the similarity level, i.e., how much a face matches the uploaded photo, to expand or fine-tune the search result according to our need. Furthermore, because the camera names and time stamps are available, the system can be linked with maps to track and predict the path of the person of interest. AI Face Search is not Face Recognition for two reasons: it protects people’s privacy, and it is lightweight Protecting people’s privacy with AI Face Search All features of face recognition can be enabled by the system user, such as to notify staff members when a person of interest is approaching the store AI Face Search is not Face Recognition for two reasons: it protects people’s privacy, and it is lightweight. First, with AI Face Search, no names, ID, personal information, or lists of any type are required to be saved in the system. The uploaded image can be erased from the system after use, there is no face database, and all faces in the camera live view can be blurred out post-processing to guarantee GDPR compliance. Second, the lack of a required face database, a live view with frames drawn around the detected faces and constant face matching in the background also significantly reduces the amount of computing resource to process the video stream, hence the lightweight. Face Search versus Face Recognition AI Face Search Face Recognition Quick search for a particular person in video footage Identify everyone in video footage Match detected face(s) in video stream to target face(s) in an uploaded image Match detected face(s) in video stream to a database Do not store faces and names in a database Must have a database with ID info Automatically protect privacy for GDPR compliance in public places May require additional paperwork to comply with privacy regulations Lightweight solution Complex solution for large-scale deployment Main use: locate persons of interest in a large area Main use: identify a person who passes through a checkpoint Of course, all features of face recognition can be enabled by the system user if necessary, such as to notify staff members when a person of interest is approaching the store, but the flexibility to not have such features and to use the search tool as a simple Google-like device particularly for people and images is the advantage of AI Face Search.Because Face Search is not based on face recognition, no faces and name identifications are stored Advantages of AI Face Search Artificial Intelligence has advanced so far in the past few years that its facial understanding capability is equivalent to that of a human. The AI will recognise the person of interest whether he has glasses, wears a hat, is drinking water, or is at an angle away from the camera. In summary, the advantages of Face Search: High efficiency: a target person can be located within a few seconds, which enables fast response time. High performance: high accuracy in a large database and stable performance, much like Google search for text-based queries. Easy setup and usage: AI appliance with the built-in face search engine can be customised to integrate to any existing NVR/VMS/camera system or as a standalone unit depending on the customer’s needs. The simple-to-use interface requires minimal training and no special programming skills. High-cost saving: the time saving and ease of use translate to orders of magnitude less manual effort than traditionally required, which means money saving. Scalability: AI can scale much faster and at a wider scope than human effort. AI performance simply relies on computing resource, and each Face Search appliance typically comes with the optimal hardware for any system size depending on the customer need, which can go up to thousands of cameras. Privacy: AI Face Search is not face recognition. For face recognition, there are privacy laws that limits the usage. Because Face Search is not based on face recognition, no faces and name identifications are stored, so Face Search can be used in many public environments to identify faces against past and real-time video recordings. AI Face Search match detected face(s) in video stream to target face(s) in an uploaded image Common use cases of AI Face Search In addition to the scenario of missing child in a shopping mall, other common use cases for the AI Face Search technology include: Retail management: Search, detect and locate VIP guests in hotels, shopping centres, resorts, etc. to promptly attend to their needs, track their behaviour pattern, and predict locations that they tend to visit. Crime suspect: Quickly search for and prove/disprove the presence of suspects (thief, robber, terrorist, etc.) in an incident at certain locations and time. School campus protection: With the recent increase in number of mass shootings in school campuses, there is a need to identify, locate and stop a weapon carrier on campus as soon as possible before he can start shooting. Face Search will enable the authorities to locate the suspect and trace his movements within seconds using multiple camera feeds from different areas on campus. Only one clear image of the suspect’s face is sufficient. In the race of technology development in response to business needs and security concerns, AI Face Search is a simple, lightweight solution for airports, shopping centres, schools, resorts, etc. to increase our efficiency, minimise manual effort in searching for people when incidents occur on site, and actively prevent potential incidents from occurring. By Paul Sun, CEO of IronYun, and Mai Truong, Marketing Manager of IronYun
As most of us are well aware by now, from 25th May 2018, every EU country will be subject to the new General Data Protection Regulations (GDPR), changing the way personal data is handled by strengthening compliance requirements and introducing strict penalties for failing to adequately protect personal data. All UK businesses must be conscious of the new rules and make the necessary changes, since non-compliance can result in data breaches and massive fines of up to 20 million Euros, or 4% of turnover - whichever is highest. The British Security Industry Association (BSIA) holds that there are a staggering six million active CCTV cameras currently being used in the UK. Most businesses of all types and size will be using some type of CCTV, whether it be for security purposes, health and safety or monitoring. People’s rights and freedoms cannot be overridden, as employees at work still have a right to privacyRight to privacy What businesses need to be aware of though, is that the images and footage of people captured by their surveillance system is classified as personal data under GDPR, which means that those who operate this type of surveillance must ensure that they are complying with the new regulations. Under GDPR, those who operate CCTV cameras must be able to demonstrate that there is a strong, transparent, ‘fair’ reason for doing so. People’s rights and freedoms cannot be overridden, even at work – employees still have a right to privacy. If you haven’t done so already, you should immediately conduct a full data privacy impact assessment, as recommended by the Information Commissioner’s Office (ICO) code of practice. This will help you determine if there is a legitimate reason for processing data through CCTV footage, while ensuring that you are not excessively impacting the privacy rights of the people captured. Justifying privacy impact assessments If you are unsure of how to carry out a privacy impact assessment, there are experts out there who can help you An example of legitimate justification would be a construction site owner introducing wireless CCTV cameras to monitor and secure their site from would-be criminals. In this case, to meet legitimate purpose, the footage must be of sufficient quality and the images captured must be readily available for police examination if such a request is made. An illegitimate reason, on the other hand, would be the installation of CCTV purely to track the behaviour of employees, which could be viewed as an invasion of privacy. However, if you can say it is there for health and safety purposes, with evidence to back this up, you might then have a justifiable explanation. If you are unsure of how to carry out a privacy impact assessment, there are experts out there who can help you. Maintaining transparency Under GDPR, ‘transparency’ is important when processing data, which means data subjects, i.e. those whose images are captured by CCTV, are entitled to know that they are being filmed, which means you must inform them of the CCTV presence. To best ensure you are upholding this rule, it is a good idea to display prominent, unambiguous signs within the CCTV area to communicate that you are capturing footage and give people a number to contact for more information. Not only does this inform people that they could be under surveillance, but by placing prominent signage you are also helping to deter trespassers, who are less likely to enter a premises if they know might be filmed. Those whose images are captured by CCTV are entitled to know that they are being filmed Data retention One of the main aspects of GDPR is that personal data cannot be stored forever; it must only be kept for as long as its purpose requires (usually 30 days is recommended). As such, every camera your business operates will have to be assessed in order to ascertain how long footage is to be retained and why. Each case will be subjective and there are no hard and fast rules as to the ideal retention period. It is up to you to determine an acceptable period, taking into account people’s rights when deciding what is best. The upside is most modern CCTV cameras will allow the operator to set specific data retention limits. Individuals can request access for free under the new GDPR, making the likelihood of requests higherResponding to data requests As it falls under personal data, people can request access to CCTV footage which relates to them and the CCTV operator is required to disclose it. However, you must ensure that the person requesting to see the footage is the person who is present in it. By providing access to the footage, you must be wary not to disclose any personal data of other people, which may mean blurring out sections of the footage (e.g. containing number plates or images of other people) is necessary to avoid data breaches. Moreover, once a request for data access has been made, this must be provided without delay and within one month at the latest. This can be extended by two months where the request is complex or numerous. As such, you should ensure that there are appropriate policies in place within your working environment to ensure that employees know how to respond to individual data requests. Under the old rules, there used to be an admin fee for such requests, but this has been scrapped and now individuals can request access for free under GDPR, making the likelihood of requests higher. GDPR awareness among security service providers It’s always important to use a highly reputable security service provider who should be well aware of the GDPR rules Under GDPR, security suppliers are ‘data processors’, which means that the clients of them should have contracts in place outlining what the security supplier can do with the data. As such, you must ensure that sub-contractors working for your business, such as security suppliers, installers or engineers, are following the rules too. You will be opening up your business to potential data breaches if you are allowing such third parties to access, remove or distribute personal data captured by the CCTV. This is why it’s always important to use a highly reputable security service provider who should be well aware of the GDPR rules. If you don’t know, just ask! Ensuring fair usage The introduction of GDPR is certainly going to pose some interesting challenges for all businesses and how it unfolds is yet to be seen. The tighter regulations show that it is no longer acceptable to not be aware of or not understand the rules surrounding personal data and that such breaches will be taken seriously. However, they should certainly not discourage CCTV use, but instead operators should seek to guarantee fair usage is upheld and take steps to ensure that people know how and why they are being recorded.
Security Essen 2018, held in Messe Essen, Germany, promised attendees a newly modernised trade show with a simplified layout and more interactive experience. Compared to previous years, halls were reorganised by technology area, with aisles laid out to make more direct pathways for attendees. The fair welcomed 950 exhibitors and more than 36,000 trade visitors from the global security market. Several manufacturers mentioned that footfall had been lighter than expected, but that the show had delivered on its promise to welcome more international visitors, in particular from the Middle East region. Exhibitors also grumbled about higher costs for booth space. Key security industry exhibitors Exhibitors expressed concern that the absence of key players reduced overall foot traffic Exhibitors praised the bigger aisles, which made it easier for visitors to navigate the show. However, some were unsure whether this was due to a better layout or simply because the show was missing key exhibitors. Notably absent were access control provider Dormakaba, security solutions company Honeywell, and surveillance providers Geutebruck and Dallmeier. Exhibitors expressed concern that the absence of key players reduced overall foot traffic. Security Essen hosted a particularly strong access control presence. Halls 2 and 3 were home to companies from across the access control and mechatronics spectrum. Sponsorship by EVVA covered the west entrance. The locking systems manufacturer, which celebrates its 100th anniversary next year, boasted significant floorspace. Exhibitors were pleased with the large access and locking presence, commenting that London-based IFSEC International tends to be dominated by video surveillance providers. EVVA, which celebrates its 100th anniversary next year, boasted significant floorspace Deep learning and artificial intelligence The push toward artificial intelligence (AI) in physical security continues, although the tone at Security Essen seemed to be shifting beyond hype and more toward how the technology can actually add value. For example, Hikvision’s cameras boasted more intelligence and processing power, and the company emphasised faster-paced product cycles. Customers ultimately do not buy AI – they buy benefits and solutions VIVOTEK embraced artificial intelligence as the biggest trend in the industry. The company demonstrated its latest deep learning technology for crowd detection applications. For Dahua, artificial intelligence allows users to easily search metadata in a video, including age and behaviour. Dahua demonstrated its solution for the transportation market, which is able to learn if a bus or train driver is falling asleep at the controls. However, some manufacturers chose not to focus on artificial intelligence. Representatives from Brivo and Eagle Eye Networks highlighted that customers ultimately do not buy AI – they buy benefits and solutions. Historically, video analytics were oversold and underdelivered, and the same could happen to AI if the term is overused in marketing security solutions. VIVOTEK embraced artificial intelligence as the biggest trend in the industry The German market & GDPR While the fair welcomed an increase in international visitors, many stands offered a distinctly German flavour. Exhibitors catered to German customers’ preference for data protection and high levels of privacy. Visitors were welcomed to the show by banners from Genetec, emblazoned with the slogan “Privacy matters… So, remember to forget me.” The video security provider’s stand demonstrated this concept more tangibly, via its Privacy Protector Module. The surveillance software, which is certified with the European Privacy Seal (EuroPriSe), monitors events while automatically pixelating people and vehicles in real time. If an incident occurs, an authorised operator can securely access the unaltered video. Visitors were welcomed to the show by banners from Genetec Other companies also acknowledged issues of privacy and cybersecurity. Hikvision noted that Europe is more regulated, which limits the implementation of the company’s products compared to those used in China. Dahua emphasised that its data for the German market is stored in Frankfurt to meet demands for data protection. IDIS made a point of saying there are no backdoors to their products. The deep learning products are easy to use and 96% accurate, says the company. FLIR has developed a cybersecurity hardening document, and strives to be transparent about cyber issues, including a web landing page where customers can raise any concerns. Vanderbilt is also pushing the cloud as a way forward with its ACT365 cloud-based access and video solution. Users are not intimidated by the cloud anymore since we all use it in our personal lives, says the company. Also on the access control side, EVVA were clear on the security of their AirKey mobile access system, which uses technology based on internet banking, double encryption and high-quality hardware. As well as demonstrating its SAROS thermal camera, FLIR strived for cybersecurity concerns to be addressed by customers Taking a broader view Nedap views security as being about allowing people to focus on their daily lives and work, safe in the knowledge that security is being taken care of. At the show, Nedap launched its new slogan ‘Security for Life’, stating that “true security is when you don’t have to think about it”. Nedap’s global client program represents a long-term commitment to projects. They are having more discussions with clients about risk management through standardisation and centralised policy.Solutions – as opposed to products – were also a focus at Security Essen, as at IFSEC before it Clients remain with Nedap because they keep investing in the platform, constantly updating the code and simplifying it to improve scalability for organisations, says the company. Nedap had one of the few double-decker booths at Security Essen. Solutions – as opposed to products – were also a focus at Security Essen, as at IFSEC before it. HID Global touted their extensive use of partnerships to provide solutions. SeeTec highlighted their move away from products to a more solution-based approach. FLIR, perhaps best known as a thermal camera company, were pushing their solutions approach to markets including intelligent traffic, smart city, video management and PSIMs. Nedap had one of the few double-decker booths at Security Essen Vertical markets in focus As vertical markets go, retail was big, and several players were offering some type of retail solution. Retail – along with banking, finance and transportation – was among Hikvision’s vertical markets of choice. Dahua's new panoramic cameras stitch together the image inside the camera instead of on the server SeeTec’s retail solution combines EAS with business intelligence and heat mapping. Dahua’s retail offerings include people counting and emotion detection, which can correlate with weather data, for example. Genetec also showcased a range of retail solutions. Technology improvements announced at Security Essen include FLIR's more robust FB6 series thermal line, Promise Technology's SMARTBOOST technology improved playback performance, and Videotec's cameras with better night performance. The extended 50m range of Optex's intrusion detection laser sensor reduces the need for cameras. Dahua's new panoramic cameras stitch together the image inside the camera instead of on the server. The Hanwha Techwin booth featured Korean flags and a “Korean at heart” motto to set the company apart Signs of the U.S. congressional ban There were signs at Security Essen of an impact of the recent U.S. ban on use of Hikvision and Dahua equipment in government installations, although both big Chinese manufacturers maintained a high profile at the German show. For example, the Hanwha Techwin booth featured Korean flags and a “Korean at heart” motto to set the company apart. Chinese camera manufacturer Uniview were keen to stress that they are not owned by Chinese government (neither is Dahua). Uniview’s all-IP camera line offers high resolution, low-light, multisensor and fisheye options, and AI software provides facial recognition, object detection, and fire and smoke detection at the edge. The company aims to increase its global presence with more international branch offerings and international factories.
Data was always bound to be a hot topic at this year's IFSEC International event. Artificial Intelligence (AI) has been a buzzword since last year's show. This year, manufacturers are ready to demonstrate solutions capable of processing and analysing large volumes of information to bolster security and provide business intelligence. Organisers deliberately positioned IFSEC as a converged security event, highlighting the inherent link between the security of physical assets and the security of data. In the wake of the recent passing of the European General Data Protection Regulation (GDPR), visitors to the London-based show sought reassurance that physical security systems could help them comply to stricter rules regarding the collection and protection of personal information. Analysing Big Data Seagate Technology, known for providing the surveillance industry with hard disk drives and storage solutions, showcased its Skyhawk AI hard disk drive, its first drive created specifically to enable artificial intelligence (AI) applications for video surveillance. Seagate's drive is designed for data-intensive workloads associated with recording large volumes of footage The drive is designed for data-intensive workloads associated with recording and analysing large volumes of video surveillance footage. According to Seagate's Sales Manager Andy Palmer, AI-enabled analytics at the edge can avoid the latency associated with cloud-based systems. This makes the solution suitable for smart city applications requiring 24/7 intelligence from multiple cameras. The company also highlighted its strategic partnership with video surveillance provider Dahua Technology, with the latter seeking to leverage Seagate's technology to boost its own AI solutions. The Digital Barriers solution allows organisations to optimise how video data is transmitted depending on their particular needs Video transmission and privacy One manufacturer addressing the challenges of data transmission was Digital Barriers. The company demonstrated the integration of its EdgeVis Live platform with Milestone's XProtect video management system (VMS). The platform is designed for safe city applications, in which law enforcement and security professionals may need to stream incidents and events in real time over a limited bandwidth. The Digital Barriers solution allows organisations to optimise how video data is transmitted depending on their particular needs. For example, while some applications may favour a high clarity of video, others necessitate low data usage or a quick turnover of frames. The full, high quality video can then be downloaded later, meaning no intelligence is lost.While some applications may favour a high clarity of video, others necessitate low data usage or a quick turnover of frames The company also demonstrated its deep-learning facial recognition software, which can be used to identify suspects or vulnerable persons. To maximise accuracy, the deep learning system is trained on a wide range of images with varying angles and lighting. The solution is designed around data protection and privacy, explained Product Manager Fernande van Schelle, as all information is encrypted, and the system only identifies faces of known individuals on a pre-defined watch-list. Daniel Chau, Overseas Marketing Director at Dahua; Adam Brown, security Solutions Manager at Synopsys; Udo Scalla, Global Head Centre of Excellence - IOT Privacy, TÜV Rheinland Group GDPR for physical security professionals Dahua Technology addressed data protection concerns with an expert panel dedicated to the cybersecurity questions posed by the new European General Data Protection Regulation (GDPR). Speakers included Daniel Chau, Overseas Marketing Director at Dahua; and Adam Brown, security Solutions Manager at Synopsys. Chau explained that Dahua encourages customers to address cybersecurity by undertaking independent audits and penetration tests. Brown elaborated that for any organisation, cybersecurity must be a boardroom issue. Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity, and instead integrate the concept into the company's overall strategy so that best practices can cascade through the organisation.Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity The panel also included insights from Udo Scalla, who specialises in data protection for IoT and smart home devices at TÜV Rhineland Group. Scalla proposed that manufacturers must avoid focusing on how best to capture data, and instead ask why the data is being collected, and whether it should even be collected in the first place. Integrators must ask why the customer intends to install the system, and what they want to do with the data – only then can they begin to assess the GDPR requirements. While the possibilities for collecting data are now endless, explained Scalla, not everything that is technologically possible ought to be made into a business reality. MOBOTIX highlighted its Cactus Concept cybersecurity campaign with a large blue cactus Protecting video surveillance systems Video surveillance manufacturer VIVOTEK also tackled cybersecurity, with a presentation on 'Security within Security.' The company showcased its partnership with cybersecurity software provider Trend Micro, which enables VIVOTEK to provide cybersecurity-enhanced cameras. The cameras include embedded anti-intrusion software to prevent and mitigate cyber-attacks by detecting hacking attempts and blocking the source IP address. Should a camera be compromised, explained Shengfu Cheng, VIVOTEK's Director of Marketing and Product Planning, it can be quarantined to stop the spread of the attack, thus controlling the damage and reducing the cost of the infection. The Cactus Concept campaign aims to educate partners and customers on how to build a cyber-secure video surveillance system Cybersecurity was also a key theme at the MOBOTIX stand. The stand played host to a large blue cactus, a very literal representation of the German manufacturer's Cactus Concept. The campaign, launched earlier this year, aims to educate partners and customers on how to build a cyber-secure video surveillance system. According to the concept, every element of the system, from image capture through to video management, must be encrypted. These are the digital "thorns" which prevent the entire system –the cactus – being compromised. Exhibitors at IFSEC 2018 made a conscious effort to address customers' challenges around the collection, transmission and protection of security system data. As solutions become more powerful, with increasing numbers of connected sensors, this is a theme which is unlikely to go away anytime soon.
With IFSEC International fast approaching, 27,000 security professionals are preparing to come together at London’s ExCel to share the latest technology and best practices in the physical security industry. Last year’s show reflected the latest trends shaking the security market, including Big Data and cybersecurity. This year, we can expect speakers and exhibitors to develop these themes in line with recent developments. The industry will need to respond to end users’ questions about collecting and protecting increasing amounts of data from smart security systems. Exhibitors will be expected deal more thoroughly with data security and cyber concerns in light of the reform of EU data protection regulation While data security and cyber vulnerabilities have been big news across the pond at trade-shows such as ISC West, the London-based event will be expected to deal more thoroughly with these concerns in light of the 2018 reform of EU data protection rules, known as the General Data Protection Regulation (GDPR.) Cyber security for physical security systems Over the last two years, the physical security industry has begun to sit up and take notice of the interdependence of physical and cyber security systems. High profile incidents such as the WannaCry ransomware attack on the UK’s National Health Service have highlighted the threat that the Internet of Things (IoT) poses to business security systems, while the Mirai botnet attack underlined the vulnerabilities of networked security systems specifically. Visitors will receive advice on how to secure increasing volumes of information through the synergy of physical and cybersecurity technologies At previous IFSEC shows, cybersecurity and IoT have played a marginal role, confined to specific zones on the show floor. This year’s exhibition promises to be the arena for an ‘integrated security event,’ with the convergence of physical and cyber security playing out across the show floor. A new ‘Show Me How’ area will provide end users with best practice advice for deploying smart, integrated security systems. The Keynote Arena will host a range of ‘case study’ seminars, offering insights into real world deployments of connected security solutions. Speakers include Silvino Schlickmann, Director of Cyber Crime at INTERPOL, and Dr Pippa Malmgren, Founder of DRPM Group and former Special Assistant to the President of the United States. The Converged Security Centre, brought to the show by Vidsys and partners, will demonstrate how the latest networked technologies can provide security professionals with actionable business intelligence. Visitors will receive advice on how to secure increasing volumes of information through the synergy of physical and cybersecurity technologies.IFSEC 2018 is explicitly addressing safe city concerns with City Forum and London First summits, where strategists can discuss everyday threats European security market trends Attendees will also expect the show to address the regional developments affecting the physical security market. With the ongoing threat of extremism, safe city solutions continue to be big news at European shows. IFSEC 2018 will explicitly address this theme with City Forum and London First summits, which will bring together government and law enforcement strategists to discuss everyday threats, from cyber security to terror. Exhibitors will also need to address the impact of the General Data Protection Regulation (GDPR) on their physical security offerings. At last year’s event, manufacturers were ready to discuss the impact of data protection changes on a theoretical level. Now that the regulation has come into effect, video surveillance and access control companies will need to clearly show how their products and solutions comply to new standards, including privacy by design and the right to be forgotten. While this year’s IFSEC International event reflects many familiar themes we have heard about at recent shows, the three days at London’s ExCel are sure to offer new solutions and wisdom to security professionals who are hoping to weather the challenges of an increasingly connected technology landscape.