Identity management
iDenfy, a Lithuania-based AI-powered identity verification, fraud prevention and compliance tool provider, has partnered with Transparent Care, an American-based innovative healthcare staffing platform designed to help hospitals hire nurses and other specialists. This collaboration aims to enhance the identity security of Transparent Care's staffing services to avoid any fraudulent identities, forged ID documents and other illegal activities. Transparent Care team Transparent Care opera...
Regula, a developer of forensic devices and identity verification solutions, prepared a dedicated package of expert articles focused on document verification, tailored to meet the needs of carriers, border verification authorities, the hospitality industry, and businesses during the 2024 Olympics. These resources aim to address the unique challenges posed by the influx of international visitors, ensuring seamless and secure experiences for all. Security and access management France...
iDenfy, a Lithuanian-based RegTech company best known for its identity verification tools, has announced a new partnership with SetFreaks, the world’s first pre-release service for DJs in the dance music industry. This collaboration will enhance regulated compliance and automate user identity verification on the SetFreaks platform while adding an extra layer of security to internal fraud prevention measures. SetFreaks, the world’s first pre-release service for DJs in the dance...
Regula, a global developer of forensic devices and identity verification solutions, has improved the onboarding process for Maza, a fintech company dedicated to providing new immigrants in the U.S. with rapid access to essential financial services. By integrating Regula Document Reader SDK and Face SDK, Maza has established a streamlined, secure identity verification process, enhancing customer experience and reducing onboarding costs by 50%. Maza assists newcomers to the USA with obtaini...
Mimecast, a pioneering global Human Risk Management platform, announced the acquisition of Code42, a pioneer in insider threat management and data loss prevention. Expanding on the success of their existing technology partnership, this acquisition marks a critical step in Mimecast’s strategy to revolutionise how organisations manage and mitigate human-centered security risks. The financial terms of the deal were not disclosed. Risk management capabilities “Mimecast&rsqu...
Matrix is excited to present its security products and solutions at Hotel Le Méridien, New Delhi, during the 5th edition of Rail and Metro Technology Conclave, 2024. Network cameras Matrix is the first Indian company to offer RDSO 6.0-compliant network cameras for Indian Railways. Matrix network cameras have been certified by the STQC, Delhi lab for adhering to the OWASP ASVS 4.0 L2 standards required by RDSO for cybersecurity compliance. Cybersecurity compliance Ma...
News
Mimecast, a global cybersecurity pioneer, has unveiled its Human Risk Management (HRM) platform, marking an important and eagerly anticipated milestone in advancing toward the next generation of cybersecurity. HRM platform In response to customer and market demand for a more effective means of mitigating risk brought on by employee mistakes and user errors, Mimecast has charted a new path forward by developing a connected HRM platform. The platform will provide unprecedented visibility into an organisation’s risk profile, scoring users by risk and allowing security teams to educate and protect the riskiest part of their employee base. A comprehensive solution to a complex problem Professionals cannot differentiate risk across employees, and frustrated end users who ignore warnings A small number of users tend to cause the majority of security issues. But, to date, organisations have invested in disconnected security point products, resulting in security professionals who cannot differentiate risk across employees, and frustrated end users who ignore continuous security warnings and bypass disparate controls, all of which ultimately increase both human and organisational risk. Preventative controls Mimecast's connected HRM platform, which is built on a central risk engine, is designed to prevent evolving and sophisticated threats targeting human error within organisations. The new platform will offer preventative controls and direct actions that will mitigate the risk associated with human behaviour such as an errant click of a link, the opening of a malicious attachment or inadvertently sharing a document. Challenges with human-centric risks Employees have access to a myriad of collaboration tools and unlimited access to organisational data In an increasingly connected world, employees have access to a myriad of collaboration tools and unlimited access to organisational data, making them prime targets for complex attacks such as business email compromise (BEC) and phishing, but also makes them more prone to errors as they are constantly multi-tasking and have multiple tools open at the same time. Traditional security measures often fall short of addressing these human-centric risks, leading to significant vulnerabilities. Risk mitigation "Our platform is centred around protecting organisations from employee mistakes and user error, aligning key defence and data controls to offer one of the most comprehensive approaches to human risk management," said Mimecast CEO, Marc van Zadelhoff. We provide a single solution that brings together multiple technologies – from Mimecast and dozens of partners – to help organisations protect collaboration and engage employees in risk mitigation." Human risk dashboard with unparalleled visibility The HRM platform is engineered to include a unique human risk dashboard, providing security teams with company-wide human risk scoring and visibility based on event data from both native Mimecast metrics as well as data from current and future integrations with third-party tools. Organisations can tailor security strategies specifically, including awareness initiatives that provide more training In addition to increased visibility at the organisation-wide, group, and individual levels, this dashboard is designed to also quantify attack factors measuring the frequency and severity of inbound threats, with plans to analyse inbound phishing attempts, blocked malware, malicious web content loaded by visited websites, and more. With full visibility into this data, organisations can tailor security strategies specifically, including awareness initiatives that provide more training to those who need it and less to those who don’t. Mimecast Engage® transforming security awareness A key pillar of the platform is the company’s new human risk awareness training offering, Mimecast Engage®, which is built to redefine how security leaders can manage human risk. Traditional security awareness programs take a standardised approach, rendering IT leaders unable to identify high-risk employees or effectively mitigate risky behaviour. Increasing productivity Mimecast Engage technology, the result of the integration of Elevate Security technology Mimecast Engage technology, the result of the integration of Elevate Security technology acquired in December 2023 with Mimecast’s awareness training product, combines to eliminate blind spots by offering extensive visibility into employees' risky behaviours powered by the human risk dashboard and adapting interventions to each individual's unique risk profile. This approach also helps increase productivity as the lower-risk employees are interrupted far less with training tasks, enabling them to focus on more critical business activities. Awareness and training "Mimecast Engage awareness and training empowers security teams to identify and reduce risky behaviour with smarter, more targeted training," said van Zadelhoff. "It leverages risk insights from the Mimecast ecosystem and beyond to deliver contextual interventions at the point of risk, helping to ensure a more secure work surface." Key benefits of the HRM platform Visibility: The comprehensive human risk dashboard spans the collaborative landscape, ensuring organisations can keep up with and stay ahead of evolving threats. Insight: Leveraging two decades of focused cybersecurity expertise, Mimecast’s HRM platform helps align cyber and human risk for more detailed and actionable insights. CISOs and security analysts can take these insights make proper decisions and deploy the right tactics to keep the organisation secure. Action: The unified, AI-powered platform is engineered to ensure that threats can be detected and eliminated promptly, allowing for precise and proactive decision-making. New business standards Mimecast is pioneering human risk management. The HRM platform and Mimecast Engage technology are the latest innovations in its mission to advance security and transform the way organisations manage and mitigate risk. By integrating security into the very fabric of human interaction, the organisation is setting a new standard for protecting businesses in an increasingly complex digital world.
Siemens Smart Infrastructure has expanded its Siemens Xcelerator partner ecosystem with the addition of the AI-driven field service and asset management suite from IFS, the world’s pioneering provider of industrial AI and enterprise software for companies that manage complex assets, operations, and service-focused activities. SaaS solution The powerful SaaS solution includes AI-enabled asset monitoring and a scheduling and optimisation engine that enables increased resource utilisation and service uptime of assets in electrical substations. By adding IFS's cutting-edge industrial AI suite to the Siemens Xcelerator partner ecosystem, an open ecosystem of certified partners, Siemens has expanded its offering to deliver unparalleled end-to-end value for customers in utilities, industries, and critical infrastructure. Addressing key challenges Through the integration of real-time asset performance data with automated workflows, parts management This latest portfolio addition addresses key challenges faced by customers including aging infrastructure, supply chain constraints, lack of transparency around critical spare parts and inventory management, and a shortage of experienced personnel. Through the integration of real-time asset performance data with automated workflows, parts management, and field service execution, the solution enables organisations to optimise maintenance strategies and reduce operational costs. Electrification X portfolio “Our customers are facing complex challenges including the need to increase productivity, optimise OPEX conditions, and minimise downtime while meeting sustainability goals. Technology that underpins the entire asset and service lifecycle is therefore key, as sustainability success depends upon how well you manage and maintain your enterprise assets,” says Stephan May, CEO of Electrification and Automation at Siemens Smart Infrastructure. “By adding the IFS suite to Siemens Xcelerator, our customers are set to benefit from an expanded offering that truly complements our newly launched Electrification X portfolio.” Electrification X Asset Management Siemens' Electrification X Asset Management applications leverage APIs to offer completely automated information flows - data stemming from IoT sensors and enriched by Siemens’ domain analytics - for use in IFS’ industry-pioneering AI-powered suite. This allows for triggering automated work orders, inspection checks, inventory, and spare parts management for electrical substation critical assets. Detecting asset anomalies Customers benefit from a single pane of glass to view unified data from multiple sources Customers benefit from a single pane of glass to view unified data from multiple sources, providing insight into asset health, alongside enterprise-wide automated work orders, inventories, and spare part management, all of which save them costly CAPEX and OPEX. The unique value proposition lies in IFS's ability to identify the detected asset anomalies from Siemens' systems, automatically log them, display them in lobbies, create required tickets, schedule work to the right crew at the right time, dispatch the operatives, and execute in the field. AI-enabled health assessments “We are delighted to form part of the Siemens Xcelerator partner ecosystem,” says James Lewis, Head of Service Management Business Unit at IFS. “With the end-to-end value of our joint solution, from issue detection through to resolution, our customers will benefit from one powerful SaaS application offering fully automated information flows for AI-enabled health assessments of critical assets, right through to ensuring service uptime through optimisation and scheduling of the field force, and utilisation of assets in electrical substations.”
WHAT: Allied Universal®, North America’s pioneering security and facility services company, is filling 200 event staff positions for the Denver Metro and Colorado Springs area. The positions are responsible for collecting tickets; welcoming and ushering guests; directing foot traffic; ensuring the cleanliness, operational efficiency and maintenance of designated areas; and providing superior customer service. Veterans are encouraged to apply Flexible schedules Competitive, weekly pay Up to $20/hour Part-time Paid training Potential career paths to management Promote from within the culture WHEN: 7/19/2024: 2 p.m.–7 p.m., 7/20/2024: 9 a.m.–3 p.m. WHERE: Hampton Inn Denver West Federal Centre, 137 Union Blvd, Lakewood, CO 80228 Requirements 18 years or older High school diploma (or equivalent) Background investigation Drug screen Driving Record Check Professional, articulate and able to use good independent judgement and discretion Must be able to work overtime Outstanding verbal and written communication skills Ability to successfully interact with all levels of an organisation and, with clients while functioning as a team player Hiring a diverse workforce “Allied Universal offers careers and long-term growth in the thriving and essential security industry,” said Steve Jones, global chairman and CEO of Allied Universal. “We have countless examples of individuals who began their career as a security professional and are in senior leadership positions today.” Allied Universal offers great benefits for full-time team members. There are various job sites and positions available including customer service officers, security mobile patrol officers, emergency department officers, security shift supervisors, security dispatch operators and more. For full-time positions, company benefits include medical and dental coverage, life insurance, 401(k), holidays and more. Allied Universal is an equal-opportunity employer committed to hiring a diverse workforce.
Many airports have been affected by the 100ml liquid limitation being reimposed for some 3D X-ray screening equipment, requiring passengers to remove any liquid, gel, or aerosol above 100ml from their bags and have it screened separately. X-ray screener training Airport security personnel play a crucial role in safeguarding passengers and preventing potential terrorist threats, and given that the world is entering peak summer travel season, with ever-increasing threats from around the world, it is more crucial than ever that security staff receive appropriately detailed and measurable X-ray screener training to be able to use equipment to its designed capabilities to detect prohibited items in densely packed passenger bags. With the continued and growing high travel demand airports are experiencing, equipping staff with the tools to confidently and effectively navigate the changes in screening technology and techniques is a way to ensure that security runs safely, smoothly, and efficiently with high degrees of confidence that prohibited items are readily detected. Maximum capacity and optimum efficiency It’s expected, according to ACI Europe, that European airport traffic will surpass pre-pandemic levels It’s expected, according to ACI Europe, that European airport traffic will surpass pre-pandemic levels in 2024 by 3.2%. In May 2024 alone, London Heathrow had over 7 million passengers pass through the airport. With greater passenger numbers anticipated during the busiest summer months, security checkpoints will need to be at maximum capacity and running at optimum efficiency to ensure passenger safety and avoid long queues. This requires all security personnel working within airport screening to have the skills and knowledge to carry out their roles with confidence and efficiency. 3D CT X-ray screening Redline Assured Security, one of the providers of aviation security training and consulting, is fully equipped to provide airport security staff with training, mentoring, and hands-on service to build confidence in using both 2D and 3D X-ray equipment. The move from 2D X-ray to 3D Computed Tomography (CT) X-ray screening technology provides X-ray screeners with more detailed images of bag content that can be easily manipulated, rotated, sliced, diced, and interrogated at a substance level. Easy item detection Screeners can examine the contents of luggage more effectively on screen, reducing the need for physical bag searches When screeners have received thorough training in using this new technology, they can examine the contents of luggage more effectively on screen, reducing the need for physical bag searches and resulting in highly effective prohibited item detection with a byproduct of vastly reduced security checkpoint queue times. This has been the experience of airports that were early installers and operators of 3D X-ray machines. X-ray training course A practical-based X-ray training course ensures that participants can operate an X-ray scanner effectively to detect prohibited items. Further enhancing this training, Redline can offer participants access to both 2D and 3D X-ray machines at the National Safety and Security Academy (NSSA) in Doncaster City, England. By simulating real-world experience, allowing participants to engage in the live screening of real images allowing for them to be trained in a controlled environment, after completing the course X-ray screeners are equipped to work in a live environment with a high degree of confidence in their screening abilities to operate the machine to its fullest potential to detect threats. Threat Image Recognition Training (TIRT) Redline’s EU and UK aviation regulatory-compliant 2D and 3D X-ray TIRT system is technically sophisticated Taking this training further to continually develop X-ray screener's knowledge and prohibited item detection skills, Redline deploys to clients a state-of-the-art, fully functional Threat Image Recognition Training (TIRT) which deployed via a cloud server to screeners' devices offer the highest quality, real-time training, anywhere it is required 24/7. Redline’s EU and UK aviation regulatory-compliant 2D and 3D X-ray TIRT system is both technically sophisticated and intuitive. It also provides trainee interaction and feedback with a performance review mode for managers, supervisors, and screeners, allowing airports to feel confident in their staff’s growth and achievements. Mentoring and on-the-job training (OJT) Through these training programs, qualified managers and instructors provide staff with Mentoring and On-the-Job Training (OJT) to ensure they have the knowledge and skills to efficiently undertake their job responsibilities. In the ever-evolving world, it is key that airports and their teams rise to the occasion to meet new needs and challenges, and Redline is a valuable resource that can make it possible to do just that.
Ajax Systems is proud to announce its victory at the PSI Premier Awards 2024. The company's KeyPad TouchScreen Jeweller device has been named the winner in the Access Control Product of the Year category. The PSI Premier Awards, organised annually by PSI Magazine, a top professional security media outlet in the UK, celebrate the pioneering technologies and businesses in the security sector. Winners are selected by security installers and systems integrators through votes on the PSI website. DESFire® technology and BLE support Device offers intuitive group management, a familiar Ajax app-like interface, and top-of-the-line security powers “We are excited to be named the winner of the PSI Premier Awards once again! The UK is one of our biggest markets, where Ajax company is making significant progress. The knowledge and expertise of UK security specialists have been invaluable to us, and we are immensely grateful to them for their support and today’s victory,” Valentine Hrytsenko, CMO at Ajax Systems. KeyPad TouchScreen Jeweller is a wireless keypad with a touch screen that seamlessly merges security and smart home device management. Its high-resolution display features all necessary controls, providing users with a visually stunning and high-quality image. The device offers intuitive group management, a familiar Ajax app-like interface, and top-of-the-line security capabilities, such as DESFire® technology and BLE support, which make it possible to control the keypad via smartphone using the Ajax app. PSI Magazine readers This is the fourth award that Ajax Systems has received from the British professional security community. Last year, the Ajax Academy project was recognised at the PSI Premier Awards as the “Manufacturer Training Programme of the Year.” In 2020, PSI Magazine readers selected MotionCam, Ajax’s indoor motion detector with photo verification, as the “Intruder Product of the Year.” Prior to that, in 2017, Ajax was named “Intruder Alarm of the Year” at IFSEC International, a pioneering integrated security event in London.
An ideal manufacturing workshop features continuous monitoring of all machines and processes, offering a comprehensive view of the production line. This visualisation transforms complex data into easy-to-understand visuals, enabling quicker decision-making and proactive issue resolution. With full visibility, businesses can gain deeper insights into their operations, streamline processes, and enhance overall productivity. Production efficiency Here are three ways production line visualisation can significantly enhance production efficiency: 1. Efficient remote AR inspection Using video and AR technology, inspections are faster by streamlining equipment and production evaluations and eliminating time-consuming manual paper forms. An AR map simultaneously provides a comprehensive view of the entire workshop and specific details through picture-in-picture mode. Clicking on a specific point within the live feed reveals detailed information, enabling a more intuitive view and immediate issue responses, thus preventing disruptions. Proactive and seamless approach Moreover, the entire process is managed online, from scheduling to regular video inspections, with tasks promptly assigned to maintenance personnel. This ensures a proactive and seamless approach to monitoring, alarm handling, maintenance, and quality assurance. 2. Clear video tracing for production ramp-up analysis Output scaling from 100 to 10,000 units requires careful analysis to identify optimisation opportunities Operators often struggle with equipment malfunctions in production lines, necessitating video playback for diagnostics. This process can be time-consuming due to unclear images or difficulties locating the video feed. Moreover, in fast-paced industries like electronics, setting up a new production line involves a capacity ramp-up. For instance, output scaling from 100 to 10,000 units requires careful analysis to identify optimisation opportunities and improve line capacity. This also necessitates quick and clear video tracing. Specialised production line cameras are invaluable in these scenarios. Production improvement features Unlike traditional models, their compact, industrial design and variable zoom make them perfect for different assembly lines, even in tight spaces. These cameras capture fast-moving processes at high frame rates and offer slow-motion playback for detailed analysis. When integrated with third-party systems like PLCs or barcode scanners, they quickly locate video feeds, aiding in rapid issue identification, equipment diagnostics, and production improvements. 3. Real-time video viewing with rapid response In production lines, having real-time visibility of various parts is crucial. Imagine working in one area and needing to see what’s happening in another instantly. Relaying messages between people can waste time and lead to mistakes. HDMI cameras connected directly to screens offer real-time high-definition, low-latency live feeds, allowing workers to assess conditions quickly and accurately. Use of AR With instant alerts directly on the AR screen, they can swiftly pinpoint and resolve issues on-site Enhanced by AR, these live feeds display vital data such as production metrics, safety updates, and equipment statuses. This integration empowers operators to oversee operations efficiently. For instance, when a production line halts unexpectedly, operators traditionally call personnel for investigation. With instant alerts directly on the AR screen, they can swiftly pinpoint and resolve issues onsite. Discover Hikvision’s production line visualisation solution Hikvision combines AR technology, specialised cameras, and centralised management software to strengthen the connection between production line operations and management. This approach enhances situational awareness and efficiency, creating a safer and more productive work environment. Specialised cameras Explosion-proof cameras ensure safety in flammable environments, and air-cooled withstand high temperatures To meet diverse production line needs, Hikvision offers various specialised cameras. High-frame-rate cameras capture rapid movements on fast-moving conveyor belts, while vibration-resistant cameras provide stable footage for overhead cranes. Macro cameras with auto-focus lenses deliver detailed close-ups, while separated covert cameras fit confined spaces. Explosion-proof cameras ensure safety in flammable environments, and air-cooled or water-cooled cameras withstand high temperatures. Visualisation solutions By implementing Hikvision’s visualisation solutions, enterprises can boost production efficiency and management, gaining a competitive edge in the market. Embracing advanced technologies fosters intelligent and efficient production management, paving the way for future growth.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
As we head into a new year, it’s fair to say that it isn’t easy out there for the security integrator community. That’s understandable given the big ruptures felt in the market for physical security in 2023. Typically, Commercial Real Estate (CRE) landlords are the biggest and most influential buyers of physical security hardware and software, but this is starting to wane as heightened borrowing costs and biting inflation cause real estate valuations to plunge. Building security upgrades A lot of CRE landlords are in a fight for survival which unfortunately doesn't leave much room for budget spend on building security upgrades. This state of affairs is a problem for security integrators with extensive connections in the CRE space. Where do they pivot their services to keep their business growing in 2024? From the conversations I’ve been having with integrators and customers alike over the past few months – the answer is that the growth potential lies in the enterprise space. The trajectory of enterprise IT and physical security Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working It might initially feel unnatural to see the enterprise segment as a potential driver of demand for physical security services and products. Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working habits? These things are true but also present an opportunity for the right physical security proposition. Standardisation of enterprise IT Take efficiency drives as an example. A key element of such efforts is an acceleration towards the standardisation of enterprise IT platforms, hardware, and solutions, using the cloud. What was once a focus on moving on-prem systems and workloads to the cloud has shifted to efforts to keep cloud OpEx costs down by centralising as much as possible. Practically, this means utilising APIs to plug disparate IT applications and services into central platforms that boast a “single pane of glass” view. APIs APIs drive consumption, open new business models, and foster cross-industry partnerships APIs aren’t anything new to enterprises. They drive consumption, open new business models, and foster cross-industry partnerships. However, the use of APIs in the physical security sphere has been surprisingly slow to take off. There are multiple elements to this but a key reason is that some security software products on the market aren’t cloud-based. Adding cloud-based solutions to network Others are cloud-based, however, and these are the solutions that security integrators need in their portfolio to serve the influential enterprise market segment and its approach to IT networks. Selling the value of these solutions requires integrators to take it a step further by speaking the language of the enterprise IT buyer and understanding their goals. The power of cloud-based access control in the enterprise Hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events The continued relevance of physical security for enterprises can’t be understated. After all, hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events – not less. Despite the discourse around office downsizing, the reality for most enterprises is that the office can’t be done away with completely and there’s always going to be growth experienced by successful companies that require an upgrade in physical square footage. Physical security Access control systems that are cloud-based will be preferred by the enterprise to fulfill the essential function of physical security. That’s because they align with the push towards centralisation in the cloud that enterprises are carrying out business-wide. Access control has the potential to result in lots of disparate dashboards and apps. Think video management, license plate recognition, building management software, elevator monitoring, hot desking solutions, guest booking software, room booking functions, and more. Uniting all of these functions in one platform suits enterprise security teams well. Access control solutions Linking employee databases to an IAM solution, or creating seamless experiences by tying access credentials But this only scratches the surface. Access control solutions that can be integrated with hugely popular corporate software applications like Okta, Azure Active Directory, and Google Workspace quickly catch the eyes of enterprise IT security teams by pulling in the same direction as the broader tech stack. Whether it’s applying AI analytics to anomaly detection, linking employee databases to an Identity Access Management (IAM) solution, or creating seamless experiences by tying access credentials to things like meeting room bookings, it’s through APIs that cloud-based access control can thrive in an enterprise setting. Security integrators It’s worth also noting that as enterprises grow, access control gets harder. Managing the access requirements of thousands of employees across a global real estate footprint requires the scale that cloud computing is best placed to bring. Security integrators who can join the dots to make that link are well positioned to pivot toward the enterprise. Broadening horizons Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates This pivot is understandably a daunting prospect but the potential for natural synergy shouldn’t be overlooked. Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates and security anomalies won’t be completely alien to cloud-first enterprises. That’s an opportunity for integrators to upsell more sophisticated security set-ups in a way that they may have found more difficult with CRE clients and prospects. Tailored propositions It would be remiss to avoid mentioning that ‘enterprise’ is a very loose term that encompasses businesses across multiple industry verticals. To better pivot, security integrators need to offer tailored propositions specific to set verticals that cover all bases as opposed to offer, for example, piecemeal alarm or video product solutions. Enterprise industry verticals Security integrators should be weary of all-encompassing narratives in 2024. Whether or not the global economic picture darkens, there are always going to be pockets of growth within certain enterprise industry verticals. Plus, anecdotally, the indicators point to enterprises being the driver of demand for cloud-based access control as we head into the new year. Integrators who can dial into that shift have a lot to gain and nothing to lose.
When a bomb detonated in the Port of Beirut, I had hundreds of employees under my care inside the blast zone. Within just two hours, I was able to determine who was impacted, understand their safety conditions, and share resources for on-the-ground support—all thanks to mobile technology. For Chief Security Officers, receiving calls like these launches a variety of protocols and necessary decision-making with the safety and security of people and assets as a top priority. And these calls are only becoming more common. Dependence on threat intelligence Mobile phones have dominated the post-COVID environment where people work from anywhere Threats ranging from natural disasters to geopolitical conflicts are becoming more frequent and complicate the responsibility organisations have in keeping their people safe. To meet these needs CSO’s are staying ahead of negative outcomes through creating a greater dependence on threat intelligence. In these times, effective, real-time risk management depends on hyper-local data from technology that is accessible, portable, and dynamic–such as cell phones. Mobile phones have revolutionised the way people live and work. They allow us all to walk around with a computer in our pocket, bringing the world to our fingertips and eliminating digital borders for over 90% of the world's population. Mobile phones have dominated the post-COVID environment where people work from anywhere and have geographically distributed teams but are also more vulnerable to threatening events. Mobile-friendly risk management platforms Mobile technology assigns workers with easy entry to data that can help keep them and their teams safe As we approach 2024, many organisations are adopting comprehensive risk management tools that empower personnel across the organisation with the intelligence and knowledge they need to stay safe wherever they are. Mobile-friendly risk management platforms, such as Crisis24 Horizon, provide always-on awareness, on-hand threat intelligence, and immediate communications and distress signalling through location monitoring. Users receive location risk assessments and push notifications directly to their devices about nearby issues and threats no matter if they are on or off the job. While only select risk managers have complete control of the platform and all sensitive employee data is protected through encryption, the app distributes critical intel to foster a culture of shared awareness and responsibility. Thus, mobile technology empowers employees with easy access to information that can help keep them and their teams safe. Creating a culture of mobile technology adoption In the last few years, the world has proven the importance of being well-informed of risks and mitigation plans to minimise harm. However, psychological barriers tend to trump physical barriers when it comes to accessing the vast array of tools our mobile devices offer. World has proven the matter of being well-informed of risks and relief plans to minimise harm Adopting this technology and establishing a culture that enforces risk management across an organisation is a daunting challenge that demands substantial commitment from leadership to be successful. Some companies have tackled this challenge by positioning security technology as part of the organisation’s employee benefits package, such as commuter benefits and health insurance, to encourage people to take advantage of these resources and learn how to use them. Cohesive risk management culture Technology is only as effective as the people whose actions it informs, which is why adoption and integration are so important. When a cohesive risk management culture meets a powerful technology platform, individuals are enabled to receive threat alerts and counter their impacts, letting others know when and how to take the necessary precautions to protect themselves and their team. For more information on mobile technology and other security trends, check out the Global Risk Forecast, an annual report by Crisis24 that provides a comprehensive analysis of key events around the world most likely to affect operations in the coming year.
These days, business is more collaborative, adaptable and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid and cloud systems. Good security is built on solid identity governance and administration (IGA) principles. From ransomware to supply chain intrusions, high-profile cybersecurity events frequently take advantage of weak identity and access management procedures. The Identity Defined Security Alliance found that 84% of organisations experienced an identity-related breach during its one-year study period. Robust IGA system Consequently, organisations need to find best-of-breed solutions for each section of the fabric Some of the most well-known cyber-attacks have not been made possible by a nation-state exploiting a remote zero-day vulnerability; rather, they have been made possible by something as basic as a hacked orphaned account. This resulted in lateral movement from an insecure platform to a high-value system, illegitimate privilege escalation or unsanctioned access to a computer system. To safeguard against such attacks, organisations must be aware of who has access to their systems and apps, and guarantee that access is revoked when it is no longer required. Here, a robust IGA system is helpful. It is not the whole picture, though; IGA is part of a larger identity fabric. A report by KuppingerCole noted that “Identity Fabrics are not necessarily based on a technology, tool or cloud service, but a paradigm for architecting IAM within enterprises.” The report pointed out that the paradigm is created using several tools and services. That’s because, contrary to marketing claims, no one vendor has a platform that provides all the needed elements. Consequently, organisations need to find best-of-breed solutions for each section of the fabric. Threats to the new corporate landscape Due to their exclusion from the corporate firewall and the security culture that comes with working on-site, remote employees and third parties are desirable targets for hackers. The transition to online office suites is another vulnerability that hackers are taking advantage of–for instance, through bogus authentication login dialogues. Additionally, hackers are using technologies like machine learning and artificial intelligence to circumvent current security tactics. A cyberattack powered by AI will imitate human behaviour and develop over time. Even publicly available information might be used by this "weaponised AI" to learn how to get past a target’s defences. CISO and the business users Attackers will finally find an entryway, but firms can protect the new perimeter–their identities It's no longer possible to secure the traditional perimeter. Attackers will eventually find an entryway, but businesses can protect the new perimeter–their identities. To defeat these threats, organisations must look again at identity and access management tools and how they are weighed against the impact on the organisation. Should you mandate multi-factor authentication (MFA) more often and earlier? Should only company-owned devices have access to networks, or should access be restricted to specific business hours or regions? Should access to sensitive information and critical systems be given just temporarily or should it be offered on a task-by-task basis? Both the CISO and the business users they assist should be asking these questions. Staying ahead of threats with identity Access control limits decrease dangers but can come with a cost. If you give your users too much access, your organisation becomes susceptible; if you give them too little, productivity suffers. But there are ways to strike a balance with security, compliance and productivity. More CISOs are turning to Zero Trust–which is based on the principle of maintaining strict access controls and not trusting anyone by default–to protect their systems from new attack types. However, Zero Trust is reliant upon having a thorough and baked-in strategy that underpins it. Other actions that companies can take include implementing automation for identity management, such as automating workflows for approval. This would significantly lessen the administrative burden and friction that security solutions like multifactor authentication (MFA) or time-restricted access to critical systems have on business users. This might include restricting access to particular devices, capping access hours during the day or enforcing MFA based on user behaviour. Identity fabric: Putting it all together Make sure your identity architecture is scalable, secure, and provides a seamless user experience These are just two elements of the identity fabric approach. Most organisations today have implemented pieces of an identity fabric, which is basically an organisation’s identity and access management (IAM) infrastructure and typically includes a mix of modular IAM solutions for multi-cloud and/or hybrid environments. Now, organisations need to define, enhance and develop this infrastructure. They must also institute guiding principles for how it should operate, meet current and future business requirements as well as identity-related cybersecurity challenges. In doing so, businesses can move past identity platforms and adopt an identity fabric perspective. The key is to make identity governance the starting point of your identity fabric strategy, ensuring seamless interoperability within your identity ecosystem. Make sure your identity architecture is scalable, secure, and provides a seamless user experience. Aligning security with business Due to the increase in knowledge workers using the cloud and working remotely, attackers are focusing on this group. These employees are easier to compromise, give access to valuable data and offer more attack targets. Knowledge workers also lack an administrator’s level of security expertise. Therefore, as part of their security fabric strategy, enterprises require a scalable IGA system. It is easier to comply with security and access regulations and takes less time for IT teams to do normal administrative activities when they invest in IGA, a crucial tenet of identity security. CISOs and boards, though, are currently looking at more than identity management. IGA is at the centre of the debate about security and governance. Taking an identity fabric-based approach, with a foundation built on modern, cloud-based IGA, will safeguard identities, increase productivity, and make staff adherence to organisational procedures easier.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Matter is a new open-source interoperability standard that will simplify the connectivity of smart home systems, including security. The growing popularity of the Matter 1.0 standard was evident at the large Consumer Electronics Show (CES) in January in Las Vegas, where the standard was heavily promoted by companies including Google, Amazon, and Samsung. A flood of Matter-connected products is on the horizon for ship dates in the second half of 2023. Evolve, and manage IoT standards Creating the standard is the Connectivity Standards Alliance (CSA), formerly the Zigbee Alliance, which changed its name in May 2021. With 300 companies as members, CSA seeks to create, evolve, and manage Internet of Things (IoT) technology standards through a well-established, collaborative process. CSA promotes the benefits of global, open standards, and the value of the IoT to customers and consumers, and seeks to break down the barriers to broad access and adoption of IoT technologies and solutions. Matter The new brand name Matter was launched in May 2021 to designate the standard formerly known as Project CHIP (Connected Home over IP), developed by CSA member companies including Apple, Google, Samsung, and Amazon. There are currently 800 devices and apps certified to the new smart home standard, including various smart home equipment (except video cameras, which will be included in a major release in the fall of 2023). Matter version 1.0 was initial launch in October 2022. Matter 1.0 release Twice a year moving forward, Matter plans a minor release each spring and a major release each fall As part of the Matter 1.0 release, authorised test labs are open for product certification, the test harnesses and tools are available, and the open-source reference design software development kit (SDK) is complete, thus enabling new products to be brought to market. Twice a year moving forward, Matter plans updated releases, a minor release each spring and a major release each fall. Smart home interoperability Currently, a variety of CSA working groups are addressing various aspects of interoperability in the smart home, including issues such as data privacy, security, energy management, and health and wellness, says Christopher LaPré, CSA’s Head of Technology. “Implementing elements requires that the standards alliance be able to multitask on several tracks,” says LaPré. Some development is centering around connectivity and the need for a “hub” to which multiple systems can communicate and incorporate an “identity” to regulate the availability of information to various systems. The standards will enable both do-it-yourself (DIY) systems and devices deployed by professional installers. Addressing privacy requirements The new development will be guided by what installers need to succeed in the home automation" Ecosystems depend on the availability of some type of “identity” to meet privacy requirements. Rules must be implemented across the ecosystem that deploys a “trust system” to ensure privacy. Solving the challenge involves getting all the major players to the table at the technical level to meet the bar from the business and technology perspective. “Integrators and retailers will play a role as Matter continues to evolve,” says LaPré. “New development will be guided by what installers need to succeed in the home automation market.” Matter-certified devices There is still work to be done to expand the 800 certified devices to function throughout the Matter ecosystem and to add new devices over time. One goal is to simplify an integrator’s solution using fewer hubs (and possibly a single hub) to provide a wide variety of services. The timeline of adding new Matter-certified devices may be delayed by the availability of equipment in the global supply chain, says LaPré. Flexibility Multi-admin provides for the simultaneous operation of devices in multiple smart home systems A multi-admin feature of Matter enables more flexibility for multiple ecosystems. A core feature of Matter, multi-admin provides for the simultaneous operation of devices in multiple smart home systems. Accordingly, family or household members could operate the device with the digital assistant or smartphone app of their choice. A bridging protocol helps to tie existing systems together. Amazon, Apple, Comcast, Google, SmartThings, and the Connectivity Standards Alliance came together in 2019 to develop and promote this new standard, joined by fellow Alliance board member companies IKEA, Legrand, NXP Semiconductors, Resideo, Schneider Electric, Signify, Silicon Labs, Somfy and Wulian. Smart device communication Currently, member organisations span all sizes, across a range of business categories. More than 1,700 Member individuals participate in bringing the Matter specification, reference implementations, testing tools, and certification programs to life. Matter's underlying network technologies are Wi-Fi and Thread. Wi-Fi enables Matter devices to interact over a high-bandwidth local network and allows smart home devices to communicate with the cloud. Thread provides a mesh network within the home. Both the Wi-Fi Alliance and Thread Group partnered with the Connectivity Standards Alliance to help realise the vision of Matter.
Case studies
Smiths Detection, a global pioneer in threat detection and security screening technologies, announces that it is partnering with Flughafen Zürich AG (Zurich Airport) to trial the use of the industry-pioneering HI-SCAN 6040 CTiX Model S carry-on baggage X-ray scanners and the iLane A20 ATRS, the smart automatic tray return system, at two security lanes in the airport. The 3D images produced by Smiths Detection’s HI-SCAN 6040 CTiX will allow some of Zurich’s 2.7 million monthly passengers to leave their liquids and electronics in their carry-on luggage as they pass through security, resulting in a more convenient and streamlined security screening experience. Installation of CT scanners The iLane ensures a consistent flow of trays and provides a seamless checkpoint journey for passengers In addition to providing more efficient and effective security screening, the HI-SCAN 6040 CTiX is the most energy-efficient scanner of its type available in the market, featuring low noise levels, zero vibration, and a 30% higher belt speed than other CT X-ray scanners – helping to promote a calmer checkpoint. The iLane ensures a consistent flow of trays and provides a seamless checkpoint journey for passengers. Alongside passengers, employees at security checkpoints will also benefit from the installation of CT scanners via the addition of 'remote screening' capabilities. This means that security staff no longer have to check the images of the baggage contents directly next to the devices, but can work from a separate room, facilitating a quieter and more concentrated work environment. Layout of the new security lanes Zurich Airport will test the CT equipment in various configurations over several months, in order to optimise the layout of the new security lanes, with the intention of equipping all 26 lanes with this cutting-edge technology in the future. Although passengers will be able to leave liquids in their bags, the maximum container size of 100 ml and total carry-on size of one-litre rules will remain in place until further notice. Matthew Clark, Vice President (VP) of Commercial, Smiths Detection, commented: "We are delighted that Zurich Airport has selected Smiths Detection to trial the use of this pioneering technology that will enhance security outcomes and improve efficiency, providing a smoother experience for passengers and staff alike."
A major European oil and gas company that acquires, explores, produces and supplies chemical and petroleum products had a cybersecurity challenge. Company leadership wanted a better way to quantify and respond to the industry’s increasing levels of cybersecurity risk. Pioneers were looking for a new way to better understand and improve their company’s OT cybersecurity. As part of this effort, pioneers wanted to compare the company’s current levels of protection against a series of hypothetical attacks to identify gaps. With operations in several locations and a supply chain network of over 1,000 gas stations, auditing and improving the company’s cybersecurity would be no small task. Set of analysis and recommendations The Honeywell csHAZOP solution is designed to deliver a comprehensive set of analysis To help overcome these challenges, the company called in Honeywell and, specifically, its csHAZOP services team to perform a detailed design evaluation based on OT cybersecurity risk. The Honeywell csHAZOP solution is designed to deliver a comprehensive set of analysis and recommendations–it goes beyond the standard cybersecurity vulnerability assessment or IEC 62443 compliance audit by adding deeper analysis that is designed to: Investigate a significant amount of what can go wrong, including approximately 500+ attack scenarios – evaluating these for multiple threat actors and different consequences, Address – via risk assessments – both the likely risk reduction through the regular IT type of countermeasures (AV, firewall, hardening, etc.) and the consequence severity reduction through the implementation of safeguards (e.g., hardwiring critical control signals), Estimate residual risk for each hazard, allowing identification and quantification, making mitigation actionable, Focus on process automation cybersecurity risk (csHAZOP stage 1) or production process cybersecurity risk (by adding csHAZOP stage 2 vs. cybersecurity production risk) to add a higher level of cybersecurity analysis from an OT perspective unique in the industry. Send in the csHAZOP experts Honeywell cyber experts also uncovered some high-risk design deficiencies The Honeywell OT cybersecurity experts worked with the Honeywell proprietary csHAZOP method to uncover several concrete recommendations for immediate remediation and technical design recommendations in the company’s ICS, to be considered in upcoming ICS migrations. Honeywell cyber experts also uncovered some high-risk design deficiencies. The Honeywell csHAZOP framework was used to identify levels of residual risk to determine which security hazard was more critical to address versus others. Honeywell provided targeted guidance on several aspects of the study, using experience from real-world cyber attacks in the industry. Honeywell’s csHAZOP service is one of the few cybersecurity assessments available on the market that is designed to apply counterfactual risk analysis. Honeywell’s csHAZOP report This evaluation now links OT cybersecurity to loss prevention and process safety Given a system’s protective measures, this method helps a company evaluate which cyber attacks (based on countermeasures, security protections and type of threat actor) may succeed. This evaluation directly links OT cybersecurity to loss prevention and process safety. Honeywell’s csHAZOP report for this oil and gas refinery was considered successful by the customer because of its well-defined procedure, the tools Honeywell has specifically designed for OT systems and the team’s experience and efforts in OT cybersecurity. Results of the csHAZOP assessment “The results of the csHAZOP assessment from Honeywell went beyond our expectations. We have received a detailed and analytical cybersecurity hazard and operability report concerning both identified risks and realistic recommendations for remediation." "Additionally, the report is a valuable tool for future upgrades of our systems as well as new projects and the development of an incident response plan. We intend to repeat this assessment periodically, as it is a valuable tool in our continuous efforts to improve security for our systems from the ever-evolving cybersecurity threats,” Major refinery in Europe.
Named one of Money magazine’s Best Colleges in America 2023, Fairfax-based Geoge Mason University (Mason) is the largest public research university in the Commonwealth of Virginia. Its 10,000 faculty and staff provide classes and support services across three regional campuses, an international branch campus in Songdo, South Korea, and five instructional sites. With more than 40,000 students hailing from all 50 states and 130 countries and a six-year graduation rate that is well above the national average, Mason continues a rapid upward enrollment trajectory that saw headcount and credit hours increase by nearly 2 percent in Spring 2022 and Fall 2023 applications rise by 11 percent. R1 research university In addition to a heavy emphasis on diversity – U.S. News and World Report named it the state’s best public university for diversity and innovation – Mason is a pioneer in technology and research with 40 percent of its students majoring in STEM fields. It is also the youngest nationally ranked R1 research university, a top 10 public university for cybersecurity programmes, and a top 20 public university for five different engineering and education online programmes. University's challenge Providing an exceptional experience had to balance with the need to maintain public access to appropriate services Mason’s rapid growth requires it to embrace system-wide innovation, particularly when it comes to providing a safe, secure university environment for students, faculty, and staff. Providing an exceptional experience had to balance with the need to maintain public access to appropriate services, as well as the convenience of contactless entry and the ability to act quickly when credentials were lost, or stolen or the user’s status with the university changed. Goal “We have a very open campus. Most of our doors are unlocked from 7 AM until 11 PM and we have a public library, so we need to make sure access control isn’t in the way. On the other side, we need to make sure that if something does happen, we can react quickly to unfolding scenarios,” said Daniel W. Anthes, Director of Technology Services, at George Mason University. “The goal is to make it safe, easy, and seamless for people to navigate campus.” Case study Mason had already implemented a card-based access control solution featuring HID® Seos credentialling technology, HID OMNIKEY® chips, HID Asure ID card printing software, HID FARGO® printers, and HID Signo™ card readers. Photo identification cards were encoded with appropriate credentials allowing the holder to access everything from parking to residence and dining halls to facilities and services, including data centres, libraries, and shops by simply tapping or swiping. “Eventually, we reached the point that the switch to mobile credentialling was a straightforward next phase. This would make it easier for staff and students to get where they needed to be without having to fumble with a set of keys,” said Anthes. HID's solution HID Mobile Access lets any compatible mobile device – smartphones, tablets, or wearables – be used as a credential Mason again turned to HID and Atrium, deploying the HID Mobile Access® solution with Seos as the underlying credential technology. Atrium provisions and manages the lifecycle of the HID Mobile Access credentials. HID Mobile Access lets any compatible mobile device – smartphones, tablets, or wearables – be used as a credential to securely access doors, gates, networks, and more. It significantly increases convenience and boosts operational efficiency without compromising security. HID Mobile Access Because Mason had Signo readers already in place, deployment of HID Mobile Access required just a simple upgrade. Importantly, while mobile access eliminates the need for physical access cards, the highly versatile Signo readers support the widest range of credential technologies via native Bluetooth, Near Field Communication (NFC), and Apple Wallet – meaning those who choose to can continue using their physical ID cards until they are ready to transition to mobile access. Seamless integration “Once you get them using the technology, at that point the realisation hits that this phone access is awesome. Or you can use your Apple watch and never even pull your phone from your pocket. There are a lot of things you have to navigate when considering credentials." "Fortunately, the HIDand Atrium Campus partnership offers the complete solution, bundled together and working seamlessly in the way I expected. The seamlessness of the mobile credential and how quickly they can get where they need to be with their phone or wearable is cool to see in action,” said Anthes. Final results Mason’s more than 50,000 students, faculty, and staff can leverage mobile credentials at any campus In addition to access to approximately 7,000 doors across its campus locations, Mason’s more than 50,000 students, faculty, and staff can leverage mobile credentials at any campus cash register, printer, copy machine, and retail and recreational facility. Mobile access will increase the convenience factor exponentially for students, for example enabling express check-in for residence halls at the start 2024-25 school year which will let students bypass queues that in the past were hundreds deep and go straight to their dorm rooms. Mason Mobile ID Mason Mobile ID has also driven a significant drop in the issuance of temporary and replacement cards, saving both the university and students time, money, and frustration. Students can also easily switch credentials to a new wearable or mobile device, eliminating the need to have this done in person – a significant convenience when Apple released its iPhone 15 shortly after Mason transitioned to mobile access. Safety standpoint “We are only two months in, so there are a lot of benefits we have yet to see with Mason Mobile ID, but I’m excited about what we’ve already started noticing in terms of students engaging faster with their peers and community." "The police department also absolutely loves the wearables from a public safety standpoint, because they can get through the doors a whole lot faster than they could with the traditional cards or when they had to fumble with keys,” said Anthes. Operational efficiency Going forward, Mason is exploring expanding mobile access to shuttle buses, which would also allow them to track utilisation data, and for more special events access. “New technology like mobile access is how Mason improves operations, so if there is an opportunity, I will certainly push to have HID involved. There are a lot of things you have to navigate when considering credentials. Fortunately, the HID and Atrium Campus partnership offers the complete solution, bundled together and working seamlessly in the way I expected,” said Anthes.
Morse Watchmans, the industry pioneer in key control and asset management systems, has a full lineup of key control solutions with unmatched expertise and robust technology that is bolstering security at K-12 schools nationwide, improving security operations, reducing costs, and facilitating better response times after an incident. Highlights include innovations like the Morse Watchmans’ Emergency Key Grab (EKG) Kit, which provides first responders with secure, fast access to keys in the event of a facility lockdown. Key control solution “Harnessing our specialised key management expertise, we’ve developed a comprehensive key control solution for K-12 schools that is boosting peace of mind for administrators, teachers, students and parents alike,” said Tim Purpura, VP of Global Sales and Marketing, Morse Watchmans. "Key management systems are a smart investment for K-12 schools, cutting security costs by preventing lost keys and controlling access for authorised staff. By deploying a centralised key control system, schools enhance security by ensuring keys are housed securely and are easily accessible to first responders.” Key management from Morse Watchmans Morse Watchmans brings an effective solution to safeguard students and staff, optimise operations Addressing K-12 challenges, such as limited budgets and maximising efficiency with less technology, advanced key management from Morse Watchmans brings an effective solution to safeguard students and staff, optimise operations, and allow first responders rapid access during an emergency. Using this solution, keys are stored securely in an electronic key cabinet, granting access only to authorised users with credentials. This allows schools to mitigate the risks of unauthorised entry or lost keys. Leveraging integrated software expands its capabilities, allowing administrators to configure access, generate reports, and receive notifications. Software can connect with other systems such as video surveillance and access control for broader situational awareness. Morse Watchmans’ EKG kit The centralised key control systems allow quick access for first responders in the event of a lockdown. Working hand in hand with Morse Watchmans’ Emergency Key Grab (EKG) kit, first responders will have quick access to keys during an incident, allowing faster response times when seconds count. The EKG Kit includes the following technology: One-module or greater KeyWatcher Touch System, an electronic key control system that stores facility keys in a key cabinet, only to be accessed by those with the proper permissions. Morse Watchmans’ color-coded SmartKeys and KeyRings that track access to master facility keys. Coloured red, these accessories are designed to be easily identifiable by responding personnel. K-12 playbook hard copies and one-on-one educational training from Morse Watchmans. The staggering statistic that more than 370,000 U.S. students have experienced gun violence in the past two decades, alongside mounting concerns for teacher safety, underscores the urgent need for pre-emptive measures to protect lives. Establishing robust key control systems is crucial to creating secure educational environments for both students and educators.
In a groundbreaking initiative to bolster security measures, Indian Railways has successfully implemented Herta's state-of-the-art facial recognition solutions across its extensive network of train stations in the Eastern region. This transformative project marks a significant step towards ensuring the safety and well-being of passengers and staff throughout the railway system. The project becomes the largest one in the world in the transport sector. Herta has also been awarded two more regions that will be implemented after the Eastern one. Facial recognition technology The deployment of Herta's cutting-edge facial recognition technology is part of IndianRailways' commitment to embracing advanced solutions for enhancing security. By leveraging Herta's expertise, the railway network aims to create a safer environment for passengers, mitigate potential security threats, and streamline operational efficiency. Key features Key features of Herta's facial recognition solutions implemented at 230 train stations using thousands of video surveillance cameras include: Real-time Identification: Herta's technology provides real-time facial identification capabilities, allowing for swift and accurate recognition of individuals within the train station premises. Enhanced Security: The implementation of facial recognition enhances security by automatically identifying and alerting authorities about the presence of individuals with potential security concerns, contributing to the overall safety of passengers and staff. Efficient Monitoring: Herta's system enables efficient monitoring of the train stations, offering a proactive approach to security management. The technology assists in the quick response to incidents and ensures a rapid resolution of security issues. User-Friendly Interface: The intuitive user interface of Herta's solutions facilitates easy integration with existing security systems, providing a seamless experience for railway personnel responsible for monitoring and managing security. Stringent security requirements Mr. Rahat Jain, IDIS INDIA - MD, expressed his enthusiasm about the successful implementation, stating, "We are delighted to announce the successful integration of Herta's facial recognition solutions at Indian Railways." Startologic, the official partner overseeing the deployment of Herta's facial recognition solutions at Indian Railways, is proud to be part of this transformative project. The successful implementation showcases the capability of Herta's technology to meet the stringent security requirements of one of the world's largest railway networks.
Comcast Smart Solutions, a division of Comcast Corporation that specialises in smart technology solutions for businesses and communities, announced that it will provide the Town of Braselton, Georgia, with smart video camera technology with AI capabilities to improve public safety and emergency response. The deployment of smart video camera technology at the Town Green and Braselton Park will provide the town with real-time visibility into its community spaces, and insights into traffic patterns during events, and will increase peace of mind for residents. New technology nonprofit The town saw it as a natural progression to continue upgrading the area with technology “These advanced cameras will play a vital role in bolstering safety efforts within our town and surrounding municipalities,” said Jennifer Scott, Braselton Town Manager and Clerk. “With real-time monitoring and intelligent analytics, this technology presents an efficient and cost-effective approach to creating safer public spaces and fostering a stronger sense of security for our community members." The Town of Braselton has a history of embracing smart technology, evidenced by its support of a new technology nonprofit that provides startup incubator space in partnership with local community members and a technology-focused university. Given this background, the town saw it as a natural progression to continue upgrading the area with technology. AI video analytics solution These cameras are planned to minimise false alarms and provide quick and valid forensic hunts Now, at the Town Green, multiple smart video cameras will oversee the parking lot and areas behind the concession stands. Additionally, smart video cameras at Braselton Park will monitor the playground and parking lot near the park’s tennis courts. Equipped with multi-sensor and multi-directional capabilities and AI video analytics, these cameras are designed to minimise false alarms and provide quick and accurate forensic searches. The video information captured, along with the AI video analytics solution will integrate seamlessly into a cloud-based application, providing the town with actionable data insights, including alerts for suspicious activity and recommendations based on traffic patterns. Smart video camera solution In collaboration with Comcast Smart Solutions, Braselton will receive comprehensive project management and continuous support. This includes a dedicated Comcast Smart Solutions project manager overseeing installations, conducting analyses, providing product training, and maintaining an ongoing support team to assist Braselton. “Delivering a seamless and reliable solution was essential to assist the Town of Braselton in enhancing safety and revitalising communal areas,” said Mike McArdle, Senior Regional Vice President, Comcast. “We’re excited to not only provide a comprehensive smart video camera solution but also offer continuous support, ensuring that Braselton residents can enjoy their parks with confidence and peace of mind.”
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillance systems to RFID tags used to avoid shoplifting, today’s retail and loss prevention strategies are more effective than ever. Beyond security, the newer technologies can also provide benefits related to merchandising, inventory control, customer service, and the list goes on. The combination of abundant data and artificial intelligence (AI) is a powerful one-two punch that is on the verge of reshaping the retail industry. We asked this week's Expert Panel Roundtable: How are new technologies transforming the retail and loss prevention markets?
There is a bright outlook for trade shows in 2024. In particular, ISC West has recently become the must-see event in the security marketplace. ISC West will take place April 9-12 at the Venetian Expo in Las Vegas. In addition to providing access to a wide range of technological innovations, the show also serves as a platform to introduce new products and services. As the industry counts down to the big exhibition, we asked this week’s Expert Panel Roundtable: What will be the big news at ISC West 2024?
Video surveillance has been a dominant factor in the casino market since the 1950s when video replaced the use of elevated walkways that allowed casino security personnel to monitor the gaming floor from above. As technology continues to evolve, we can expect to see more innovative uses of video in the casino market. Beyond video, other technologies are also transforming the casino experience. We asked this week’s Expert Panel Roundtable: How are new technologies impacting the casino surveillance and security market?
White papers
![Best practices for asset management](https://www.sourcesecurity.com/img/white-papers/612/920x533_1699974817.png)
Best practices for asset management
Download![The top 4 reasons to upgrade physical security with the Cloud](https://www.sourcesecurity.com/img/white-papers/612/920x533_1696264536.jpg)
The top 4 reasons to upgrade physical security with the Cloud
Download![Public-private partnerships on campus: What you need to know](https://www.sourcesecurity.com/img/white-papers/612/img-920x533.jpg)
Public-private partnerships on campus: What you need to know
Download![A more secure alternative to 125 kHz proximity cards](https://www.sourcesecurity.com/img/white-papers/612/main-image-lp.jpg)
A more secure alternative to 125 kHz proximity cards
Download![Creating a secure and positive healthcare experience](https://www.sourcesecurity.com/img/white-papers/612/asset-image-920x533_1658397645.jpg)
Creating a secure and positive healthcare experience
Download![5 reasons to integrate mobile technology into your security solution](https://www.sourcesecurity.com/img/white-papers/612/gall-4.jpg)
5 reasons to integrate mobile technology into your security solution
Download![Is your access control system as secure as you think?](https://www.sourcesecurity.com/img/white-papers/612/HID-asset-7-access-620.jpg)
Is your access control system as secure as you think?
Download![House Of Smart Cards - How assumptions can open dangerous security gaps](https://www.sourcesecurity.com/img/white-papers/612/smart-card-technology-hid62.jpg)
House Of Smart Cards - How assumptions can open dangerous security gaps
Download![Mobile Access - What you need to know](https://www.sourcesecurity.com/img/white-papers/612/920-undarkened-mobile-security.jpg)
Mobile Access - What you need to know
Download![The evolution of cards and credentials in physical access](https://www.sourcesecurity.com/img/white-papers/612/hid-access-phone-620x360.jpg)
The evolution of cards and credentials in physical access
Download![Security risks of ‘universal’ card readers](https://www.sourcesecurity.com/img/white-papers/612/csm-hid-global-2500-BLUE2-620x360.jpg)
Security risks of ‘universal’ card readers
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Identity management: Manufacturers & Suppliers
![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Facial recognition](https://www.sourcesecurity.com/img/emagazines/612/facial-recognition-magazine-security-technology-trends-international.jpg)
Facial recognition
Download