Industrial security systems
Radiflow, a provider of industrial cybersecurity solutions for industrial automation networks, and Trusted Cyber Security Solutions (TCSS), a provider of cybersecurity services and solution, jointly announce that TCSS has joined Radiflow’s OT MSSP Partner program in order to expand its service offerings and pursue market opportunities to provide managed OT cybersecurity services to its industrial customers across central and southern Europe. TCSS is a growing cybersecurity systems integra...
Shepherd Lock, a new keyless smart lock for the home, launched on Kickstarter. Shepherd Lock uses the same technology found in the automotive industry and is the first smart lock that detects lock-picking attempts to protect homes against burglaries. Shepherd Lock is equipped with a keyless entry system, making it convenient to enter the home. The lock’s automotive grade touch™ technology allows users to unlock their door with just a touch. Shepherd Lock also transforms existing loc...
Honeywell announces the launch of new category of software, Enterprise Performance Management for Operations Technology, that will improve the way a variety of companies collect, analyse and act on data from their operations. The software solution, called Honeywell Forge, will leverage the company's more than 100 years of expertise in asset and process control technology and will transform the way work gets done by owners and operators of buildings, airlines, industrial facilities and other crit...
Radiflow, global provider of industrial cybersecurity solutions for industrial automation networks, has announced that the company has launched a partner program for MSSPs to offer OT cybersecurity services. OT MSSP partner program Radiflow’s new OT MSSP partner program provides the framework for MSSPs to offer new cybersecurity services dedicated to ICS/SCADA networks to their industrial enterprise and critical infrastructure customers. Radiflow is aiming this offering at MSSPs that alr...
Facial recognition has seen huge breakthroughs since the U.S. National Institute of Standards and Technology (NIST) first began testing in 2010. Accuracy has seen massive gains, especially from 2013-2018. In the 2018 test, the most accurate algorithm was 20 times more accurate than the 2013 equivalent. Essentially, 95 percent of the matches that failed in 2013 now yield correct results. Compare that to 2010-2013, when the most accurate algorithm reduced its error rate by 30 percent. This reduc...
Antaira Technologies is a global developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the FCU-6001-SFP+. Antaira Technologies’ FCU-6001-SFP+ media converter is equipped with one 10G/5G/2.5G/1G Base-T auto-negotiation port and one 10G Base-X SFP+ slot. It supports 10Gigabit Ethernet media conversion from cop...
Moxa Inc., a pioneer in industrial communications and networking, releases a major upgrade for its MXview industrial network management software. Enhanced compatibility now lets customers seamlessly integrate MXview into both IT and OT systems. In addition, it is possible to centrally manage large-scale networks featuring up to 10 sites using real-time, operational data to configure, monitor and diagnose a maximum of 20,000 devices. Key to the success of the new upgrade is a faster, more user-friendly interface that provides full visibility and holistic transparency into network status. Network management tool MXview will generate comprehensive reports, including inventory, traffic and availability, that empower customers to transform complex system metrics into IIoT performance indicators. MXview is a scalable network management tool developed to deal with the expanding industrial network requirements" “MXview is a scalable network management tool developed to deal with the expanding industrial network requirements of the IIoT,” said Theo Lai, Product Manager at Moxa. “We developed the latest version of MXview with two goals in mind: to make network management easier and to ensure that the software is simple-to-use for the best user experience.” Manage industrial networks In order to further simplify network management, MXview allows users to get the data they need from a main control dashboard where IT professionals can quickly analyse and respond to network changes so the issues can be resolved before escalating and impacting the business. Integration is simple: a web widget generates a URL enabling the integration of MXview into SCADA systems and other web-based applications where the control dashboard can be viewed from both local and remote sites at anytime. In addition to integrating MXview into OT applications, the software now supports RESTful API, which provides IT engineers with more options to manage industrial networks using their own dashboard to minimise maintenance effort. The net result of these upgrades is more effective use of network assets, which can lead to lower costs and reduced risk.
ThreatQuotient™, a security operations platform innovator, announces that the ThreatQ™ integration with MITRE ATT&CK™ now includes support for PRE-ATT&CK and Mobile. Together with Enterprise ATT&CK, the three-pronged framework creates an end-to-end attack chain that examines and assesses an adversaries’ actions. Since first integrating with MITRE ATT&CK in early 2018, ThreatQuotient has helped customers integrate the framework in their workflows to achieve a holistic view of their organisation’s specific attack vectors and what needs to be done to effectively defend against adversaries. Attacks are happening with increasing velocity, and the average cost of a data breach has risen to $3.86 million, according to the 2018 Cost of a Data Breach Study by Ponemon. Accelerate detection The security industry is placing greater emphasis on technologies As more organisations begin to accept the likelihood that they will be breached, the security industry is placing greater emphasis on technologies, tools and processes to accelerate detection and response. However, this is not always done with collaboration in mind. When combined, the ThreatQ platform and MITRE ATT&CK framework enables expansive and shared understanding across teams and technologies, allowing faster response when an event occurs. “Every organisation can derive value from the MITRE ATT&CK framework to measure, improve and extend the capabilities of their security operations. To yield the greatest success, security teams should use the framework to have a complete understanding of what they are trying to protect against,” says Ryan Trost, CTO & Co-founder at ThreatQuotient. Cybersecurity community “Whether mapping the attack tactics or techniques against your defences to more accurately assess your risk posture; connecting active adversaries to their own respective TTPs to ensure internal battle cards are accurate and distributed; or simply gauging your organisation’s higher probability threat risk areas and providing your red team better ‘real world’ objectives ThreatQ’s integration of the ATT&CK framework provides teams an out-of-the-box capability.” “As an organisation’s capacity to use ATT&CK data evolves, the ability to dig deeper into the framework will allow a company to gain even greater value...but at their own pace. This is great for the industry and will hopefully play a cornerstone role as organisations defend themselves against attacks.” “The MITRE ATT&CK knowledge base provides a common language for the cybersecurity community to use when describing adversary behaviours,” said Katie Nickels, MITRE ATT&CK Threat Intelligence Lead. “We continue to be inspired by the ways the entire community is using ATT&CK to improve their defences.” Respond to incidents Threat hunting teams can take a proactive approach ThreatQuotient has long believed that the ability to accelerate security operations starts with having a thorough and proactive understanding of the actors, campaigns and TTPs targeting an organisation. There are three main ways an organisation can use the integration of ThreatQ and MITRE ATT&CK to their advantage: Reference and Data Enrichment - Aggregate data from the framework into ThreatQ and search for adversary profiles to answer questions like: Who is this adversary? What techniques and tactics are they using? What mitigations can I apply? Security analysts can use the data from the framework as a detailed source of reference to manually enrich their analysis of events and alerts, inform their investigations and determine the best actions to take depending on relevance and sightings within their environment. Indicator or Event-Driven Response - Use ThreatQ to correlate data from the ATT&CK framework with incidents and associated indicators from inside the organisation’s environment. Security analysts can then automatically prioritise based on relevance to their organisation and determine high-risk indicators of compromise (IOCs) to investigate. With the ability to use ATT&CK data in a more simple and automated manner, security teams can investigate and respond to incidents and execute appropriate courses of action for more effective detection and more efficient threat hunting. Proactive Tactic or Technique-Driven Threat Hunting - Pivot from searching for indicators to taking advantage of the full breadth of ATT&CK data. Threat hunting teams can take a proactive approach, beginning with the organisation’s risk profile, mapping those risks to specific adversaries and their tactics, drilling down to techniques those adversaries are using and then investigating if related data have been identified in the environment. For example, they may be concerned with APT28 and can quickly answer questions including: What techniques do they apply? Have I seen potential IOCs or possible related system events in my organisation? Are my endpoint technologies detecting those techniques? ThreatQuotient’s Neal Humphrey, Threat Intelligence Engineer Director, North America, will host a webinar on May 22, 2019 at 2:00pmET to discuss best practices for applying the MITRE ATT&CK framework effectively and making it actionable.
Genetec Inc. (‘Genetec’), a technology provider of unified security, public safety, operations, and business intelligence solutions announces a number of strategic hires in Europe to support the company’s sustained growth in both Europe and the Middle East. Francesco Serra, has taken on the role of Vice President of Sales for Europe, based in the Genetec European headquarters in Paris. Having held senior roles with Siemens, Avaya and Polycom, Francesco brings over 25 years of management experience in the technology industry. His extensive background in sales and sales management will be an asset to the Genetec leadership team as the company continues to accelerate its growth in this region. New market opportunities Georges Tannous has taken on the new position of Director of Marketing for Europe, Middle East, Turkey and Africa In his new role, Francesco will be responsible for driving the Genetec European sales and channel operations to deliver on the company's ambitious growth plans. “We are excited to welcome Francesco to the Genetec team. His industry experience and sales acumen will help us to continue to propel our business forward in Europe by building on our existing successes and opening up new market opportunities under his leadership,” added Michel Chalouhi, Vice-President of Global Sales at Genetec. With over 15 years of experience in global partner management, and an MBA from Western University's Ivey school of business, Georges Tannous has taken on the new position of Director of Marketing for Europe, Middle East, Turkey and Africa. End-user awareness Also based in Paris, Georges will lead the company’s EMEA marketing teams and guide the continued growth of the Genetec brand in the region while continuing to oversee the company’s global portfolio of strategic technology alliance partners. A key player in the global Genetec Marketing Leadership program, Georges will work closely with the sales organisation to build powerful demand generation, channel engagement, and end-user awareness programs. “Francesco and Georges are experienced leaders with impressive track records of driving high-performance sales and marketing teams. They bring considerable experience to our European sales and marketing organisation, as we continue to accelerate our growth and expand into new regions such as East Central Europe,” said Guy Chenard, Chief Commercial Officer at Genetec. Business intelligence solutions Security industry veteran Jakub Kozak, has joined Genetec to become the company’s new Regional Sales Manager Continuing the sales and marketing expansion in Europe, security industry veteran Jakub Kozak, has joined Genetec to become the company’s new Regional Sales Manager for East Central Europe. Having held senior sales position in the region with Axis communications, and L3 Technologies, Jakub will be responsible for expanding the company’s footprint in Eastern Europe. With ever-increasing increasing market demands for powerful, enterprise-class IP video surveillance, access control, license plate recognition, and business intelligence solutions, Genetec has enjoyed a compound annual revenue growth rate (CAGR) of 30 percent for the last 10 years. With flagship European customers that include Paris, Rome and Schiphol airports, The Danish Police, Twickenham Stadium, and The University of Hull, the company is continuing its rapid expansion in the region and is looking to further add to its global team of 1,300 talented employees.
Prysmian Group, pioneer in the energy and telecom cable systems industry, presents its latest innovations for high-value electrical assets monitoring systems at the Grid Asset Management conference that is taking place in London on May 14 to 16. More specifically Prysmian’s presence at the conference will be centred around PRY-CAM, the Group’s breakthrough technology for condition assessment and asset management of electrical systems and equipment from 3 kV to 600 kV. Artificial intelligence interface Collected data are stored via the cloud to be accessed remotely by ways of an AI interface Through a full range of electronics-based products PRY-CAM monitoring technology allows fast, accurate and reliable on-line measurements of Partial Discharge (PD) and key parameters of any electrical equipment for system diagnosis and defect localisation purposes, to helps electric assets owners to increase uptime, asset longevity and safety, while reducing maintenance costs and risks. The PRY-CAM technology does not require to switch off the monitored system, thus offering remarkable benefits in terms of associated costs. Collected data are stored via the cloud to be accessed remotely, shared and analysed by ways of an artificial intelligence interface that generates automated alarm signals if a critical situation is identified. Comprehensive condition assessment Prysmian will be in the spotlight at this year’s conference as Platinum Sponsor, having its representative, Roberto Candela, speaking about extended and comprehensive condition assessment and management of electrical systems to improve reliability and optimise performance and lifecycles, within the Day 1 programme session dedicated to Power Grids Asset Management & Advanced Diagnostics. Prysmian is the only player in the cable industry capable of providing turn-key supply" “Prysmian is the only player in the cable industry capable of providing turn-key supply of such and advanced monitoring solution fully integrated with any cable system“ says Roberto Candela, CEO of Prysmian Electronics, the Group’s fully owned subsidiary, entirely dedicated to Condition Assessment and Asset Monitoring systems and services. Cable system integrator “We are marking a turning point in the technology for power grids diagnostics, monitoring and maintenance systems and services and we are moving from the role of pure cable manufacturer to cable system integrator” he adds. Prysmian Electronics reported a significant growth in 2018 and was awarded important contracts for power grids monitoring systems by the main Utilities world-wide, including Italy, UK, Middle East, China, USA and Singapore.
Skybox Security, global provider of cyber risk management solutions, has announced its integration with Indegy, globally renowned industrial cybersecurity solutions firm, to help organisations better understand the security posture of hybrid IT and operational technology (OT) networks. Hybrid IT and OT networks OT networks have been a mystery to IT security teams" “OT networks have been a mystery to IT security teams,” said Skybox Security VP of Products Amrit Williams. “But more and more, CISOs are being tasked with getting a handle on security in OT environments. That starts with literally being able to see and understand the connections between the corporate and production networks, visualising how the two impact one another’s risk of attack. Our integration with Indegy further strengthens the visibility and insight we give customers with hybrid IT-OT networks, so they can accurately prioritise and respond to those risks.” With Skybox’s understanding of the hybrid network topology and security controls, it can simulate access between and within networks, and determine the reachability of vulnerable assets. Skybox also provides more context to Indegy’s vulnerability data, highlighting exposed and exploitable vulnerabilities, prioritising their remediation and generating tickets to kick off the workflow. Skybox-Indegy integration The integration between Skybox and Indegy provides customers with seamless visibility of their IT and OT networks. The combination of Indegy’s passive and active data collection from the OT network is relayed to Skybox where OT assets, services and vulnerabilities are modeled alongside those from the IT environment. “Having a bird’s eye view of a hybrid IT-OT network is hugely valuable,” said Indegy CTO Mille Gandelsman. “Where Skybox provides a high-level view and insight into the corporate network, Indegy allows users to maintain deep visibility into industrial control system networks and device-level changes and provides rich, reliable information. Rolling these capabilities into a single solution will help align IT security teams with OT engineers to ensure cyber risks are understood and remedied without undue disruption.”
The inaugural Tech Security Summit met at the Sheraton Grand Nashville last week. Combining DICE Corporation’s annual DICE User Group Conference with a series of educational sessions and panel discussions, the April 29-May 2 event provided a platform for leaders in security and alarm monitoring to meet and examine new technology and revenue growth opportunities in an evolving industry. DICE Corporation President and CEO Cliff Dice kicked off day one with an energising keynote presentation, explaining his inspiration behind launching a new conference platform. “I had the idea for a tech security summit because a lot of people in the security industry were coming to us asking if we could contribute to more panels and be part of the discussion.” Security technology companies For almost 30 years, you have turned to us to provide the best solutions you trust to run your businesses" “We are the predominant infrastructure provider in the industry, so it made sense that we would explore new ways to bring those leaders together with our engineers and expand our annual summit to include everyone in the industry,” Dice said. The recent news of other security technology companies being sold and restructured was also discussed in the keynote, with Dice assuring attendees of the company’s commitment to remaining a family business focused on quality and customer satisfaction. “We are not selling,” Dice said before discussing some of the company’s highlights from the last year. “For almost 30 years, you have turned to us to provide the best solutions you trust to run your businesses. This is a family business and we have a long-term vision to keep operating the company from one generation to another,” he said. Alarm automation software Much of the week’s sessions focused on value and usability. The company’s new CloudEye cloud video recording product stood out as a prime example of the company’s ability to streamline an in-demand technology without compromising functionality and performance. Jerry Corrion, DICE Corporation’s chief software architect, addressed the growing need for off-premises surveillance storage and gave attendees and in-depth look at the technology’s simple setup, the CloudEye Connect mobile tool, and how dashboards and integrations with alarm automation software provide additional advantages. DICE Corporation’s recently announced integrations with Microsoft’s Dynamics 365 financial management system DICE Corporation’s recently announced integrations with Microsoft’s Dynamics 365 financial management system was also a frequently discussed topic. As the first to bring integrated accounting to the security industry, the implementation of Dynamics 365 with the company’s Matrix web applications provides new opportunities for users, including fully automated reporting of RMR and attrition and reporting of industry metrics such as EBITA (earnings before interest taxes and amortisation). Educational opportunities Industry-specific dashboards and business intelligence tools were also showcased by the engineers behind the integrations. In addition to product information and educational opportunities, networking was a large component of the Tech Security Summit experience. Platinum sponsor ACKData sponsored outings at well-known Music City institutions like Famous Saloon, which offered a taste of Nashville to attendees. From sampling the city’s legendary barbecue to participating in line dancing, industry professionals were able to socialise with DICE staff and get to know the people behind the technology they use every day. “Downtown Nashville was the perfect backdrop for our evening networking events,” said Amy Augustin, director of marketing and communications for DICE Corporation. “Being able to get together outside of the summit setting gives us more opportunities to connect and grow as tech producers and users.” Panel discussion The final day of the Tech Security Summit focused on training opportunities and panel discussions The final day of the Tech Security Summit focused on training opportunities and panel discussions. Joshua Greko outlined new additions in UL, including the changes that will affect monitoring centers going forward. An introduction to level one operator training was offered by the Monitoring Association as part of their Five-Diamond designation program to certify monitoring centers. The event concluded with a panel discussion featuring David Sylvester and Stephen Rubin of Davis Mergers & Acquisitions Group and Barry Epstein of Vertex Capital discussing topics related to acquisitions and the effects of changing markets in the security industry. For Cliff Dice, the 2019 Tech Security Summit proved to be a worthwhile experience in providing another source of information about new technology available to the security industry. “I’m really pleased with the new Tech Security Summit format. By providing a user-focused platform for our customers, tech experts, and security professionals, we were able to do something that was truly different and beneficial for the industry.”
When dealing with a substantial, complex security system installation – often covering multiple sites and many hundreds of people – you clearly need a security vendor with the resources and experience to deliver. Smaller security companies may not have adequate means to support the longevity of these projects. This generally isn’t an issue for larger companies, but beware - not all such companies are well placed to deal with large projects; that’s because not all of them have a formal process in place. Large security projects require clear KPIs and targets (including monthly commitments), ongoing review, regular clear communication and a dedicated team for consistency and continuity from start to finish. Major security system Tying yourself to one manufacturer is rarely a good idea when it comes to large and complex security installs If you don’t choose wisely, what you may end up with is company delivering a string of different people from different departments working on your installation at any given time, without a joined up approach. The person responsible for system design, for example, may never see your project when it’s actually being installed, which can lead to a potentially problematic and ultimately unsatisfactory outcome. Whilst every major security system design project will bring about its own set of challenges, the approach taken by the security vendor should remain consistent. Here’s what it should look like at the different stages of the project and what you should expect from your supplier. Tying yourself to one manufacturer is rarely a good idea when it comes to large and complex security installs. Product knowledge Going down this route limits your options and you could end up with a security system that meets the vendor’s product portfolio rather than your needs. That doesn’t mean to say that a security company that is not affiliated to specific manufacturers won’t have close relationships with a range of them. A close relationship can be beneficial in terms of in-depth product knowledge and preferential pricing. What’s most important is that the security company independently test and asses product rather than relying on manufacturers’ claims. They should continually appraise the marketplace to see what’s new and assess the value and relevance of product. They should also have the finger on the pulse of the security sector to identify where the market is going. Team work is essential with large projects not only to get the job done, but also to manage any risk Comprehensive strategy At STANLEY Security we very much focus on identifying technology solutions that minimise financial outlay for a client, such as video analytics. At present we are testing facial recognition systems which have grown in popularity and delivery. A written, comprehensive strategy needs to be in place for the project, including forecasting that considers the longer timescales involved in large, complex projects and includes a ‘what if’ approach to ensure appropriate resource is available. So, for example, if a project looks like it is going to overrun due to unforeseen circumstances, you want to be sure you retain the same team on the project full time and that they are not transferred onto the next contract or dividing their time between the two. Manage any risk Team work is essential with large projects not only to get the job done, but also to manage any risk. Your vendor must have an experienced Major Project Team with a clear structure, so everyone knows their role and you know who you are dealing with at any given time. Although it’s the last stage of the project, Commission & Handover has the potential to be the most difficult and is where costs can escalate If subcontractors are being used by the security company, which is quite usual for very large installations and for particular specialisms (e.g. control room modelling), then a process needs to be in place to manage them and you need to be made aware of this. Although it’s the last stage of the project, Commission & Handover has the potential to be the most difficult and is where costs can escalate. High security requirements This is where the dedicated Major Project Team is vital as they will know the project inside out and have worked on it from start to finish, helping to avoid any end of project issues. Large, complex security systems, especially those with high security requirements, are not easy to deliver. They require skilful, experienced hands, substantial resources in both financial and staffing terms, and a clear, consistent procedure that everyone is fully aware of. Don’t assume that just because you are dealing with a large security vendor they will have all of these in place; think like a security professional and ask to see the evidence!
Thousands of security professionals gathered Nov. 14-15 at the Javits Center in New York City to explore new products, solutions and technologies, network with security luminaries and obtain high-quality industry education. ISC East, sponsored by the Security Industry Association (SIA), is the Northeast’s largest security industry event; more than 7,000 security professionals attended or exhibited at this year’s conference. Following day 1 of ISC East, SIA gathered industry luminaries and experts for SIA Honors Night, an annual event featuring a cocktail reception, a gala dinner benefiting Mission 500, engaging entertainment and an awards ceremony recognising industry leaders. Sold-out event SIA Honors Night 2018 was a sold-out event held at the Current at Chelsea Piers. The awards presented at SIA Honors Night 2018 were: SIA Progress Award (presented by SIA’s Women in Security Forum) – Eddie Reynolds, president and CEO, iluminar Inc. Women in Biometrics Awards (co-founded by SIA and SecureIDNews and co-presented with sponsors FindBiometrics, IDEMIA and SIA’s Women in Security Forum) – Kelly Gallagher, senior account manager at NEC Corporation of America; Lisa MacDonald, director of the Identity Management Division in the Office of Biometric identity Management at the U.S. Department of Homeland Security; Colleen Manaher, executive director of U.S. Customs and Border Protection; Lora Sims, senior biometric examiner at Ideal Innovations, Inc.; and Anne Wang, director of biometric technology research and development at Gemalto Cogent SIA Insightful Practitioner Award – Guy M. Grace, Jr., chair of the Partner Alliance for Safer Schools Steering Committee and director of security and emergency planning for Littleton Public Schools in the Denver suburb of Littleton, Colorado Jay Hauhn Excellence in Partnerships Award – Larry Folsom, co-founder and president, I-View Now George R. Lippert Memorial Award – Pat Comunale, retired security industry veteran, former member of the SIA Board of Directors and former CEO and president for Tri-Ed Distribution, an Anixter company Standout keynotes SIA Honors Night also highlighted Mission 500, a charity that advocates for children and families living in extreme poverty in the United States Honors Night guests enjoyed keynote remarks from Bonnie St. John, a Paralympic ski medalist, Fortune 500 business consultant, Rhodes scholar, former White House official and best-selling author. St. John discussed her journey to become the first African-American ever to win medals in Winter Olympic competition despite having her right leg amputated at age five and shared her top lessons from mentors and her advice for cultivating resilience. SIA Honors Night also highlighted Mission 500, a charity that advocates for children and families living in extreme poverty in the United States; each year, SIA Honors Night raises funds for Mission 500. SIA presented 26 engaging education sessions through the SIA Education @ ISC East program, including two standout keynotes and four hands-on workshops. Hundreds of conference attendees participated in these sessions, with impressive speakers like Valerie Thomas, ethical hacker and executive consultant at Securicon; Pierre Bourgeix, president at ESI Convergent; Scott Swann, president and CEO of IDEMIA National Security Solutions; and Jumbi Edulbehram, regional president – Americas, Oncam. SIA sponsored Infosecurity North America’s Keynote Stage, the central hub of the event Confronting emerging threats Highlighted education sessions at this year’s conference included: Friend or Foe? Technology Disruption and the Physical Security Industry, a keynote address by Philip Halpin, senior vice president and head of global security at Brown Brothers Harriman, one of the country’s oldest and largest privately held financial firms 21st Century Best Practices: Reporting From the Front Lines on How Law Enforcement and the Security Industry Are Confronting Emerging Threats, a keynote address by James A. Gagliano, a retired FBI supervisory special agent, CNN law enforcement analyst and adjunct assistant professor at St. John’s University Cybersecurity professionals ISC East 2018 was co-located with two additional conferences – Infosecurity North America and Unmanned Security Expo Additional cutting-edge topics covered in the education sessions included the move to smart cities, convergence in the security industry and the use of artificial intelligence in video analytics. ISC East 2018 was co-located with two additional conferences – Infosecurity North America and Unmanned Security Expo. SIA sponsored Infosecurity North America’s Keynote Stage, the central hub of the event, which featured a presentation from world-famous hacker Kevin Mitnick, insights from Dave Hogue of the National Security Agency’s Cybersecurity Threat Operations Center, a discussion on the cyber skills shortage gap and ways to attract, develop and retain talented cybersecurity professionals and more. Handle sensitive data Additional events at ISC East 2018 included: A breakfast presented by ISC Security Events and SIA’s Women in Security Forum featuring a panel discussion celebrating women in security and supporting the participation and advancement of women in the industry Paid hands-on workshops providing cutting-edge information and valuable insights on the most current business trends, technologies and new developments in security Free exhibitor product training sessions sharing live, in-depth demonstrations A meeting with SIA’s Data Privacy Advisory Board, which provides information and best practices to help SIA members handle sensitive data in a safe and secure manner to protect the personally identifiable information of their employees, partners and customers from potential breaches
A deep native integration of Bosch cameras with software from ISS proactively catalyses the best in security and surveillance, while providing advanced intelligent video tools. ISS SecurOS provides intelligent enterprise video management solutions with emphasis on providing scalability and flexibility to meet the customer’s needs. Deeply integrating built-in video analytics from Bosch cameras improves operator efficiency and situational awareness to manage complex environments. ISS SecurOS maximises camera performance for license plate recognition, face recognition, and container/train carriages recognition. The cameras meet the performance needs for advanced analytics, ensuring the success of projects and saving time, resources, and cost. The partnership has delivered multi-thousand-camera safe city deployments, industrial analytics solutions, and systems for large-scale transport providers. The usage of roads and parking lots can be managed more effectively by knowing the whereabouts of each vehicle License plate capture The usage of roads and parking lots can be managed more effectively by knowing the whereabouts of each and every vehicle. Operations managers are accountable for efficient logistical flows and effective use of roads and parking lots. Knowing the ins and outs of the transport infrastructure and what’s going on at all times provides the knowledge required to ensure operations are running safely, efficiently and in compliance with the rules and laws. An important part of this comes from monitoring which vehicles are entering an area and ensuring they are allowed to be there. Capturing license plates of every vehicle moving in an area provides knowledge of traffic flows and usage patterns. Such a solution should also allow a customer to easily configure and manage monitoring preferences and permit easy data exchanges with other operational management systems and services to manage an infrastructure and logistics as a whole. Reliable license plate data Robust mechanical design of cameras ensures reliable 24/7 operation for many years even in harsh environments As transportation infrastructures are often operating around the clock, reliable vehicle identification data is required 24/7. This means that the cameras capturing this data should work in all lighting and weather conditions, for both slow- and fast-moving vehicles. Cameras must be built to produce usable images 24/7 in all weather conditions. For quality license plate recognition in both day and night, the cameras make use of supplementary infrared light. A special License Plate Recognition (LPR) mode, developed in collaboration with LPR software, delivers readable license plates even with glaring headlights and with fast moving vehicles. Robust mechanical design of cameras ensures reliable 24/7 operation for many years even in harsh environments. License Plate Capture solution The SecurOSTM AUTO system of ISS, when used with Bosch cameras, provides easy to deploy solutions for all of these requirements. It recognises license plates from many countries, manages and matches white, hot and blacklists and notifies the operator either in the GUI or through a messaging interface to other management systems. Additionally, the system can be used and managed as a standalone or embedded in other management systems on the premises.
As digital transformation accelerates and touches more aspects of business operations, ASIS International is working to provide educational opportunities that security practitioners need to stay on top of those rapid developments. It’s a mission that will drive the ASIS Europe 2019 meeting, ‘From Risk to Resilience,’ this month (March 27-29) in Rotterdam. “What makes the event special is how it covers the full spectrum of security risks that organisations face, and in particular, looks at the human factors and management challenges involved,” says Eduard Emde, CPP, ASIS Europe 2019 Conference Chair, Head of the Health, Safety and Security Section, ESA (European Space Agency), the Netherlands. Examining technology-driven risk When we look at technology-driven risk, only a part of that can be addressed by new technology" “When we look at technology-driven risk, only a part of that can be addressed by new technology. Much of the work is helping people adapt and find new ways of working and managing – that is where I think this event excels.” The opening keynote on ‘Amsterdam: From Smart City to Smart Society’ will be delivered by Theo Veltman, Innovation Rainmaker at the Municipality of Amsterdam. The keynote will set the tone for the three-day event by showing practically how cities are evolving and why – from the perspective of society, business and government. “This a great way to challenge us to understand what is driving change outside the ‘security bubble’ so that we can be better prepared for what is coming,” says Emde. The growing exhibition at ASIS Europe in Rotterdam will feature 45 exhibitors, including Johnson Controls, Nedap, Securitas and Stratfor Mobile device security In addition, the show will cover some of the most relevant and challenging topics in emerging technology such as artificial intelligence (AI), drones, mobile device security and industrial control systems. Given the seniority of the audience, a lot of time will be devoted to management and leadership topics such as soft skills and building teams with diversity and inclusion in mind. In addition, Nick Lovrien, CPP, Chief Global Security Officer at Facebook, will speak about securing an innovation culture. Scenario-based training sessions will provide a hands-on experience to work through challenges such as a chem-bio attack, a fake news crisis, travel risk planning, practical ways to effectively engage business executives and red teaming on cyber-physical risk. The growing exhibition at ASIS Europe in Rotterdam will feature 45 exhibitors, including Johnson Controls, Nedap, Securitas and Stratfor. Advanced learning experience We have a large number of global CSOs, regional leaders, and specialists from key companies across a whole range of sectors" Online registration will be open until March 26. There is a Free Show Pass that provides access to the exhibition and to the education in the Innovation Track and Career Centre, plus two networking drinks and refreshments throughout the day in the exhibition hall. For a more advanced learning experience, the Professional Pass and Leadership Pass offer more sessions, training and networking functions. There are plenty of options aimed at all budgets, learning needs and schedules, says Emde. Last year there were 775 registrants in total. “This year is looking good. We already surpassed last year’s total number of conference delegates, and registrations are coming in steadily,” says Emde. “For me, the numbers only tell a small part of the story,” he adds. “We have a large number of global CSOs, regional leaders, and specialists from key companies across a whole range of sectors. That quality, diversity and expertise onsite is what really makes the networking experience so valuable.”
In the physical security industry, the advent of artificial intelligence (AI) and deep learning is most commonly associated with potential improvements in video analytics performance. However, AI is also applicable to a variety of content analytics beyond video. This is part three of our 'AI in Physical Security' series. It will be interesting to watch how companies that take the next step beyond proving viability for security purposes to deliver true business applications to the market. Right now, we’re seeing organisations working hard to develop content analytics that perform in an effective, efficient and accurate manner. Enterprise software companies This shift will create a huge disruption in our industry and cause further consolidation Many of these organisations are true AI and/or computer vision companies, and they are spending a lot of money developing very advanced algorithms. However, there’s still work to be done identifying the real benefit of these analytics for customers as part of comprehensive business intelligence solutions. Until that happens, and customers understand how those benefits apply to them directly, adoption will continue to be lower than all the marketing hype would suggest. Data capture form to appear here! Because data analytics are becoming such a significant component of today’s ‘big data’ solutions, watch for a number of large, enterprise software companies to start focusing on the security industry. This shift will create a huge disruption in our industry and cause further consolidation. Analysing mobile endpoints There is also a potential for machine learning to enable cybersecurity companies to predict the nature of future attacks based on past behaviour, similar to how Netflix displays what you want to watch based on what you’ve previously viewed. According to Jack Gold, president and principal analyst at J. Gold Associates, this innovation can assist cyber companies to transition away from a ‘signature-based’ system to detect malware. Instead, he sees more companies adopting a machine learning approach that aims to analyse past incidents in a broader manner and aggregate information from a multitude of sources. A main function of AI is to analyse past incidents in a broader manner and aggregate information from a multitude of sources Specifically, some machine learning applications for cybersecurity are effective at doing the following: detecting malicious activity, helping security officers determine what tasks they need to complete in an investigation process, analysing mobile endpoints, decreasing the number of false positive threats, automating repetitive tasks like interrupting ransomware, and potentially closing some zero-day vulnerabilities. Android mobile endpoints A number of tech giants have invested in these capabilities recently, including Google, which is employing machine learning to help protect Android mobile endpoints. Amazon also bought a startup called harvest.AI to help it aggregate and better understand data located on the S3 cloud storage service. Machine learning can help cybersecurity efforts, but it can’t replace many important functions Ultimately, machine learning can help cybersecurity efforts, but it can’t replace many important functions. There will always be sophisticated attacks that no machine learning algorithm will be able to find. Pairing human intellect with machine technology is the best approach. In another application, AI-driven robots can be deployed for security in places where it may not be feasible to have a human patrol, such as the outskirts of a vital electric substation located hundreds of miles from the nearest town. Evolution of artificial intelligence A robot can easily traverse the harsh terrain and notify authorities when something is amiss. Another use is during disaster recovery efforts. Robots don’t get tired, and they don’t have to use the bathroom, eat or take a break. With the abilities afforded by AI, robots can also navigate any designated area autonomously to keep an eye out for suspicious behaviour or alert first responders to those who may need aid. In situations where health and safety concerns preclude the ability of having a human to watch the site, such as at toxic waste dumps, robots can be deployed. Although drones still largely require a human operator to chart their flight paths and control their movements, the evolution of artificial intelligence is also revolutionising the capabilities of machines to work autonomously. If you missed part two, see it here. Or, to start from part one, click here.
Avigilon Corporation (“Avigilon”), a Motorola Solutions company, announced it was selected to help protect the security of Independent Express Cargo Ltd. (“Independent Express Cargo”) in Dublin, Ireland. Independent Express Cargo is one of Ireland’s largest pallet delivery operators, serving as a national transport network hub and full third-party logistics supplier with 25 depots across the country and over 1,000 active clients. Avigilon Control Center VMS To improve security throughout its Dublin site, which consists of 180,000 square feet of warehouses on a nine-acre site, Independent Express Cargo worked with integrator Usee.ie to install a complete Avigilon security solution. The new system features Avigilon Control Center (ACC) video management software, which provides security operators with a more efficient way to manage video from a central location. ACC software also includes advanced artificial intelligence (AI) and video analytics capabilities ACC software also includes advanced artificial intelligence (AI) and video analytics capabilities, including Avigilon Appearance Search and Unusual Motion Detection technologies. Additionally, a combination of Avigilon cameras — including the H4 Pro, the H4 Multi-sensor and the H4A Bullet with self-learning video analytics — were deployed to achieve optimal coverage while allowing security operators to leverage the benefits of real-time analytics. Incorporating advanced AI technologies By implementing a complete Avigilon security solution that leverages advanced AI technologies, Independent Express Cargo has seen an increase in operational efficiencies and improved security of its sites, assets and resources. “With complete security solutions from Avigilon, we have been able to increase the speed at which we can detect events across our sites,” said Owen Cooke, director of Independent Express Cargo. “In the fast-paced environment of transportation logistics, this has dramatically increased efficiencies so that we can continue to focus on our number-one priority: our customers.” Intelligent video security system “Avigilon AI and analytics allow our customers to improve operations while maintaining system flexibility and ease of use,” said Bernard Pender, chief executive officer of Usee.ie. “Choosing Avigilon helps us meet our client’s goal of deploying a highly intelligent and user-friendly video security system.”
The Malaysia government water treatment plant envisions providing the best water treatment with demand of high security protection in the industry sector. Furthermore, the highly reliable platform with flexibility to expand storage by year and budget becomes important criterions to select the ideal surveillance partner. Surveon NVR7800 ensures high video image quality with high throughput capability, in addition to flexible JBOD storage expansion capability. Surveon NVR7800 Series Surveon NVR7800 Series was designed as a recording server with an archiving function Price and performance are always the key elements to help Surveon to win projects. Surveon NVR7800 Series was designed as a recording server with an archiving function that offers multiple advantages compared to traditional system structures composed of recording server plus a separate storage device, making it the top choice for the water treatment plant. The big scale industrial plant installs 50 to 100 cameras at each site in demand of high image quality. The plant needs a reliable system that supports recording with hundred channels and is able to transmit high resolution images smoothly. The NVR7800 Series delivers a high level of recording throughput of nearly 2000 Mbps, supporting recording with more channels, allowing system to receive better video image quality by higher bitrates, and ensuring smooth transmission even with high frame rate. Compatible with 3rd party VMS Support up to 316 drives with high density 4U 60-bay expansion enclosure (maximum capacity of up to 3.6 PB with 10TB HDD). It supports to expand storage through JBOD by year, timeline and budget with best flexibility. This provides the government owned plant to expand facilities by year, timeline and budget. The water treatment plant prefers a solution which is fully compatible with Axxonsoft VMS. The NVR7800 Series is 100% compatible with major 3rd party VMS, including Milestone, Genetec and Axxonsoft VMS with certification. Supports multiple network cameras Based on Milestone test findings, NVR7800 Series supports up to 150 cameras Based on Milestone test findings, NVR7800 Series supports up to 150 cameras, more than twice Milestone’s benchmark level in a non-stop recording scenario. The system is even capable of supporting more than four times the number of cameras estimated by benchmark under the testing scenario where motion detection is enabled, giving medium to large projects the best price-performance solution. "The hybrid server-storage design of NVR7800 Series gives us the best C/P value candidate. The enterprise level RAID engine enables highest level data protection with RAID 1+Spare, 5+Spare, 6+Spare technology to support robust data protection even with HDD error. Further, the flexibility to connect JBOD provides the high flexibility to extend recording time base on project demand. We are very satisfied with the result and look forward to working with Surveon next time." said the administration manager of the water treatment plant.
Mobile-device and application-security technology company Trustonic announces that Hyundai Motor America will demonstrate its new Digital Key app, secured by Trustonic Application Protection, at the New York International Auto Show 2019. The Digital Key will launch with the all-new 2020 Hyundai Sonata in the fall. Hyundai’s Digital Key is a downloadable smartphone app that can replace a traditional car key by leveraging Near Field Communication (NFC) to detect an authorised smartphone. An NFC antenna is located in the driver’s door handle for locking and unlocking while a second antenna for starting the engine is located in the wireless charging pad in the centre console. Seamless vehicle sharing The Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication Once authorised, the Digital Key allows a smartphone to control select vehicle systems remotely using Bluetooth Low Energy (BLE) communication. A user can lock and unlock the vehicle, activate panic alert and start the engine within a range of about 30 feet of the car. The new Digital Key can be utilised by up to four authorised users, facilitating seamless vehicle sharing. Users’ preferred settings are also stored in the car, meaning that when a user is recognised, the vehicle automatically adjusts settings for side mirrors, radio presets, sound settings, and seat positioning. Hyundai is using Trustonic Application Protection (TAP) to secure the Digital Key. TAP ensures that Digital Key transfer requests are securely displayed to and approved by a real, authenticated user on a trusted device. Cybersecurity approach TAP utilises a multilayered industry-recognised security approach for communication to and from the customer’s phone. “Hyundai has been a leader in connected car technology for a long time now, with new features like Apple CarPlay, Android Auto, Smartwatch and Smart-speaker integration into our vehicles,” said Manish Mehrotra, director of digital business planning and connected operations, Hyundai Motor America. “Digital Key adds convenience for 2020 Sonata owners and allows us to be ready for future shifts in the mobility space, such as car sharing. We chose Trustonic because of their multilayered, industry recognised cybersecurity approach.” Vehicle-function permissions Hyundai’s Digital Key will enable easy car sharing and improved user experiences" Car owners have a deeper level of access than other authenticated users, enabling them to set vehicle-function permissions and the duration of access for each shared user. This enables uses beyond car sharing, such as enabling couriers to access the trunk within a pre-agreed window of time to deliver a package. Future uses that the app could enable include car rentals, triggering an alarm when a vehicle travels outside a designated area and remote control of features, such as autonomous parking. Ben Cade, CEO, Trustonic, adds, “Consumers expect to be able to manage their lives on their smartphones, and this includes their vehicles. Hyundai’s Digital Key will enable easy car sharing and improved user experiences for drivers—and as international leaders in app security, it’s up to us to ensure this can happen in a scalable and secure way.”
A manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialisation in some of the towns in Maharashtra while preserving their rich heritage. Wide area monitoring The company is spread across a wide area, employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing high resolution images and covering a greater area for monitoring was the primary requirement. The company is divided into various branches that are located at various places in Satara, Maharashtra. This gave rise to the need for a centralised solution at a centralised location from where all other sites can be monitored at a time. Matrix IP bullet and dome cameras To cover the large monitoring area, Matrix provided IP bullet and dome cameras that have greater field of view when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images that aid in night time surveillance and provide enhanced security. For storing the streamed videos, Matrix offered network video recorders. These NVRs have features such as adaptive recording which aids in storing more data in a defined space. Moreover, it has intelligent video analytics such as intrusion detection and motion detection which were also applied. Instant notifications and alerts ensured real-time security of the premises.
With a heritage stretching back over 500 years, Gebrüder Weiss is one of Europe’s oldest transport and logistics companies. Based in Vorarlberg, Austria and with more than 7,000 employees in 150 locations around the world, it is also one of the largest. Sony video security in logistics centers Customers of all sizes trust Gebrüder Weiss to ship their consignments quickly, safely and undamaged to their destination Customers of all sizes trust Gebrüder Weiss to ship their consignments quickly, safely and undamaged to their destination. To guarantee this and make the entire logistics chain traceable, the service provider relies on comprehensive video surveillance in its logistics centers, which is regularly updated to reflect the latest state of the art. Gebrüder Weiss has now expanded its existing monitoring solution at the company’s largest distribution centre in Maria Lanzendorf near Vienna that previously featured almost 500 Sony cameras and Milestone's video management software (VMS). This has been supplemented with the addition of 33 Sony SNC-VM772R 4K video security cameras. Sony 4K cameras The upgrade ensures greater security, comprehensive package tracking and the ability to track any damage. The new Sony 4K cameras are used mainly to monitor reloading from larger trailers into smaller trucks. Their field of view covers the actual transfer area as well as the interior of the trailers and conveyor belts. The SNC-VM772R features a large CMOS sensor with 4K resolution that combines excellent image quality and large depth of field, even in difficult lighting conditions. The camera’s robust design with integrated image stabilization ensures smooth, clear video images despite vibration, dust and exhaust fumes from passing trucks. Video monitoring The new 4K cameras can track several objects simultaneously with either VGA or Full HD resolution The cameras’ installation ensures that the entire transshipment area is monitored at all times, with no blind spots caused by vehicles or pallets. In addition, the new 4K cameras can track several objects simultaneously with either VGA or Full HD resolution. The SNC-VM772R's 20-megapixel image sensor also enables capture of high-resolution Evidence Shots – still images with greater than 4K resolution that allow even the smallest details to be viewed clearly. For Gebrüder Weiss, the Sony solution is thus an outstanding alternative to multiple PTZ (pan/tilt/zoom) cameras or multi-sensor systems. Installation and integration into the existing environment were carried out by local Sony partner ÖWD Österreichischer Wachdienst Security & Services. With 2,800 employees, ÖWD is one of the largest security companies in Austria and maintains 24/7 technical teams in all Austrian states. "Since it opened in 2006 we have been using Sony cameras at our terminal in Maria Lanzendorf, which is our largest in the world" says Werner Drnec, Operations Manager at Gebrüder Weiss, Maria Lanzendorf. "Both the image quality and reliability – with failure rates close to zero – have always exceeded our expectations, and even in the current project they proved themselves in a direct comparison. Our confidence in the Sony brand plus easy, seamless integration into our existing environment added to this."
As a wholly-owned subsidiary of Tebian Electric Apparatus Stock Co., Ltd. (TBEA), Shenyang Transformer Group Co., Ltd. (Shenyang TBEA) is one of the largest transformer manufacturers in China, and a major exporter in the industry with manufacturing and R&D capabilities. Shenyang TBEA is the first transformer company publicly listed in China and has an annual productivity that has reached 30 million kilovolt-ampere (KVA). It is the only company that provides 840,000 KVA/500KV main transformers and converter transformers for the left bank of the Three Gorges Project. Shenyang TBEA has a world-class industrial park occupying 720,000 square meters for production of UHV AC and DC electricity transformers. Featuring dispersed entry points over a large area, the company needed a new access control system to safeguard the plant’s integrated factory, R&D building, administrative offices, elevators, mixed working areas and key equipment rooms. Access control system with TCP/IP connection Shenyang TBEA required specific technical features for the new physical access system including TCP/IP connection and high-speed processors In particular, stringent access control for the general manager’s office, financial department, conference rooms, elevators, and core mechanical room was mandatory and the new system needed to also perform time and attendance and data generation for night patrol. In addition to security and stability, the access control system needed to enable seamless integration with the plant’s existing security equipment from third-party vendors, and be interoperable with the cards already deployed in the field to save cost. To address these challenges, Shenyang TBEA required specific technical features for the new physical access system including TCP/IP connection and high-speed processors, as well as data generation and communication capabilities. In addition, each access point needed to execute all commands offline in case of network failure. Centralised web-based access control solution After a thorough analysis of Shenyang TBEA’s requirements, HID Global provided a comprehensive solution that included 17 VertX V1000 network controllers, 107 VertX V100 door/reader interfaces, 173 iCLASS R10 contactless smart card readers and ten iCLASS R30 contactless smart card readers. The new system leverages Shenyang TBEA’s existing TCP/IP network for a centralised, web-based access control solution that provides central monitoring, report generation, the ability to establish staff access level settings and visitor management. The security officer on duty can then verify the employee’s identity to prevent unauthorised entry, enhancing the efficiency and internal security iCLASS R10 and iCLASS R30 readers are installed at each access point and connected to VertX V1000 network controllers through the VertX 100 reader interface to transfer entry records to the host. Each entry point can still execute all commands when communication is lost with the central station. By integrating with the system software, the administrator can restrict staff access based on job function. For example, only authorised staff members are allowed to use the elevator to access specific floors. Enhancing security by preventing unauthorised entry HID Global’s solutions also meet Shenyang TBEA’s access control system requirements and perform the following functionality: Staff management: The solution is integrated with system software and main entrance and factory monitors. When a cardholder presents his/her card to the reader, the cardholder information and photo is displayed on the monitors. The security officer on duty can then verify the employee’s identity to prevent unauthorised entry, enhancing the efficiency and internal security. Enhanced Security: HID Global’s iCLASS readers and credentials deliver increased security with the readers’ data encryption and mutual authentication capabilities. Additionally, HID Global’s VertX networked access solutions enable access level settings and area control to prevent unauthorised entry to specific areas. All employees must present their cards when entering or leaving the main gate of the site, and the entry records are transmitted to the central server to further improve security management. Integration with surveillance and fire control systems When any abnormal alarm signals are received, the new access control system can activate a pop-up camera to perform video monitoring and screen capture Interoperability: VertX access control solutions are interoperable with a wide range of hardware and management software, enabling additional deployments such as time and attendance, remote area control, visitor management and more. The readers support the factory’s existing MIFARE credentials, offsetting the cost of swapping out all of the cards at once. Integration with other sub-systems: The solution can seamlessly integrate with multiple sub-systems such as surveillance and fire control systems. When any abnormal alarm signals are received, the new access control system can activate a pop-up camera to perform video monitoring and screen capture. For fire control, the system can determine the incident type and location and unlock emergency doors for evacuation in the case of a fire. Lifetime warranty on products and solutions “After our extensive assessment, we selected HID Global and its physical access control solutions for its leading technology and comprehensive product functionality. We had an experience where some HID Global controllers were accidentally submerged under water and the products still functioned properly without any defects, validating HID Global’s robust product design and quality,” said Mr. Yu Liuyi, project manager with Shenyang TBEA. “As a global leader in secure identity solutions, HID Global offers a lifetime warranty to their customers. HID Global and its channel partners has promptly responded to our requests and provided quality support to achieve satisfying results, eliminating our concern regarding post-sales service and support,” Liuyi added.