ADI Global Distribution, a pioneer in wholesale distributor of security, AV (Audio Visual) solutions and low-voltage products, has announced that it has integrated with D-Tools’ business management software solutions, D-Tools Cloud and System Integrator. Customers can now access ADI’s full product offering directly from the D-Tools’ software interface. Business management software D-Tools software is designed to drive sales and improve operating efficiency, by streamlining th...
Allegion, a global provider of security products and solutions, has announced the first integration between Overtur, Allegion’s digital environment connecting all building phases in opening design, construction and ongoing management, and Software for Hardware, an industry-renowned software developed for door, frame and hardware distributors. Software integration The partnership announcement comes in advance of the DHI conNextions 2021 conference, where both companies will be demonstrati...
Access control and integrated security management vendor Maxxess has expanded its UK and Ireland operations with the appointment of Russell Baker as business development & account manager. Responsibilities Russell will be based out of the company’s European head office in Bracknell, UK, and will handle the substantial increase in demand for the firm’s signature solution, the eFusion™ access control, and security management platform. Building on the success of Maxxess sol...
GeoVision has announced the release of GV-Control Center (V4.0), integrated security management software, designed for central monitoring systems. GV-Control Center is designed for enterprise system users, to handle high-volume video data. From real-time monitoring, video playback, event detection pop-up, I/O central monitoring, 3D E-map and communications, GV-Control Center helps security guards to quickly identify threats, and take swift actions. GV-Control Center (V4.0) GeoVision unveils a...
On the occasion of the Milipol 2021 (Milipol Paris 2021) exhibition, the event dedicated to homeland security and safety (taking place from Oct. 19-22, 2021, in Paris, France), Deveryware will introduce its range of security solutions, to support investigators and enhance homeland security. As the European expert in investigation technologies and global security services, Deveryware will present its innovations, specially designed to facilitate police and the Gendarmerie’s investigations....
Algorithm development at Cognitec Systems GmbH (Cognitec) continues to engineer the optimal balance between speed and accuracy of the face matching processes. NIST’s Face Recognition Vendor Test The latest results of the U.S. NIST (National Institute of Standards and Technology) Face Recognition Vendor Test for identification tasks, show the Cognitec algorithm in the best position of all algorithms tested, when relating the template generation time to the false negative identification ra...
Moxa Inc., a globally renowned company in industrial communications and networking, with a focus on securing industrial networks, has introduced the new EDR-G9010 Series. These industry-certified, all-in-one firewall/NAT/VPN/switch/routers, act as a robust first line of defence for industrial networks, in diverse applications, such as smart manufacturing and critical infrastructure. EDR-G9010 Series industrial secure routers Moxa’s EDR-G9010 Series industrial secure routers offer 10-port GbE performance and defence-in-depth security capabilities, in order to fulfill the needs of bandwidth-hungry applications that require field-proven reliability and multi-layered security. With more and more cyber security incidents occurring in operational technology (OT) systems, enhancing industrial network security becomes a key priority for business owners and chief security officers. However, in OT environments, network requirements are not just concerned with security, but also focus on keeping operations functioning smoothly. Network security solution for OT environments With the launch of the new EDR-G9010 Series, Moxa brings a tailor-made network security solution for OT environments" “With the launch of the new EDR-G9010 Series, Moxa brings a tailor-made network security solution for OT environments,” said Kevin Huang, Product Manager at Moxa Networking, adding “We recommend our customers to use the EDR-G9010 Series industrial secure routers, to segment their networks as a first line of defence and prevent threats from propagating to the rest of the network.” He adds, “Furthermore, users can leverage its advanced OT Deep Packet Inspection (DPI) technology, firewall, NAT, and VPN features, to achieve multi-layered security. Last, but not least, the 10-port Gigabit performance, faster boot time and Layer 2/Layer 3 redundancy helps ensure the availability of industrial networks.” Compact and rugged industrial secure router Kevin Huang further stated, “The EDR-G9010 Series combines all these powerful functions into a single compact, rugged, industry-certified industrial secure router. Overall, the EDRG9010 series will be Moxa’s future-proof secure routing platform, with additional capabilities being added over time.” The EDR-G9010 Series industrial secure routers offer: Advanced Network Protection with Network Segmentation and Advanced DPI - Within one field site, the EDR-G9010 Series industrial secure routers can help build a security boundary, by segmenting OT and IT networks, and feature advanced DPI technology, to give users more granular control over network traffic, by filtering industrial protocols, based on the requirements of the application. Moxa will continuously extend the DPI protocol coverage. Starting with Modbus TCP/UDP and DNP3, Moxa will add specifically, power market-related protocols in 2022. When remote connections across multiple sites are needed, the EDR-G9010 Series’ embedded IPsec VPN ensures safe industrial network communication channels, when accessing the private network from the public Internet. Future-proof platform for OT Intrusion Prevention - The superb computing power of the EDR-G9010 platform enables it to run an Intrusion Prevention Module, which will safely block ransomware, malware, viruses and other cyber security threats in OT networks. This signature-based scanning technology will move traffic filtering and asset visibility in OT networks to an unprecedented level. This module is licenced on demand and will be available by mid of 2022. Better Performance with High Bandwidth and Faster Boot Times - With the number of connected devices constantly growing, the EDR-G9010 Series is capable of achieving high throughput, while providing robust security, perfect for bandwidth-hungry applications. Meanwhile, the faster boot time helps reduce system downtime, during regular maintenance or in the event of an emergency recovery situation. More Versatility - The EDR-G9010 Series caters to the needs of different networks, whether it is the need for a firewall, network address translation (NAT), remote VPN communications, switching, or routing. These secure routers are also certified for IEC 61850-3/IEEE 1613, NEMA TS2, ATEX Zone 2, and Class I Division 2. The accessible and versatile all-in-one design makes these devices ideal for securing industrial applications, such as in power substations, intelligent transportation systems, oil and gas, and smart manufacturing. IEC-62443 hardened - Secure routers play a pyramidal role in security architecture and need to be security hardened. Hence, EDRG9010 hardware and software has been developed with Moxa’s IEC-62443-4-1 certified process, and is ready to meet the IEC-62443-4-2 requirements, up to Security Level 2. EDR-G9010 Series 10-port Gigabit Industrial Secure Router highlights include: All-in-one firewall/NAT/VPN/switch/router, 8-port TX GbE and 2-port SFP GbE, Comprehensive redundancy mechanisms, including Turbo Ring and VRRP, Wide -40 to 75°C operating temperature (-T model), Advanced Deep Packet Inspection (DPI) for Modbus TCP/UDP and DNP3 traffic, and 104 and MMS (available in Q1, 2022), and Certified for IEC 61850-3, NEMA TS2, ATEX Zone 2, Class I Division 2, EN 50121-4, DNV, IEC-62443-4-2 SL 2 (available in Q4 2022). Compatible with MXview network management software EDR-G9010 Series is also compatible with Moxa’s MXview network management software To enhance network security visibility, the EDR-G9010 Series is also compatible with Moxa’s MXview network management software. With the MXview, software users can, for example, visualise the achieved security level of IEC-62443-ready Moxa devices, perform regular configurations backups, and have an at-a-glance overview of the network’s performance. With the launch of the EDR-G9010 Series industrial secure routers, Moxa has expanded its secure network infrastructure portfolio, in order to cover a broader range of industrial applications and introduced more granular control over industrial networks, so as to fulfill its ongoing commitment to protect the connectivity of industrial environments. Connectivity for the Industrial Internet of Things (IIoT) Moxa is a globally renowned provider of edge connectivity, industrial computing and network infrastructure solutions, for enabling connectivity for the Industrial Internet of Things (IIoT). The company delivers lasting business value, by empowering the industry, with reliable networks and sincere service, for industrial communications infrastructures.
Device Authority, a globally renowned company in identity and access management (IAM) solutions for the Internet of Things (IoT), has announced its latest major software release, which includes KeyScaler Edge software solution. The current global market is driving a more mature Edge computing model, with localised AI (Artificial Intelligence) and ML (Machine Learning) becoming more mainstream. However, no solution exists in the market, to address localised Edge gateway IoT security services. Automation for efficiency in Edge IoT deployments Organisations require automation for Edge deployments, in order to drive efficiency at IoT scale. This includes: Security lifecycle management Device bound identity Leaf device authentication and authorisation to edge gateways Zero touch on-boarding and registration Automated credential management Security compliance and regulatory adherence Safety, confidentiality, data theft/privacy, brand reputation and revenue protection is important for edge deployments Additionally, organisations still need to meet compliance and regulatory adherence, for private local network deployments. Safety, confidentiality, data theft/privacy, brand reputation and revenue protection are important for edge deployments. “We’re delighted to bring KeyScaler Edge to the market and help our customers, with their IoT edge deployments. Our BETA programme has been a success within healthcare, retail and transport sectors, and we’re regularly speaking with companies, who have experienced similar challenges and see KeyScaler Edge as the solution,” said Darron Antill, the Chief Executive Officer (CEO) of Device Authority. KeyScaler Edge KeyScaler Edge is the first device, identity-centric IAM (identity and access management) solution, to address the complex end-to-end challenges of IoT security lifecycle management, at the Edge. It is a lightweight version of KeyScaler, which is created specifically for Edge nodes, with the ability to register, authenticate and provision certificates, and tokens, to devices in the local network, independent of an available internet connection. “KeyScaler Edge gives technical, security and operations teams, the confidence that their IoT devices won’t lose robust security when no connection to the Cloud is available,” said James Penney, the Chief Technology Officer (CTO) of Device Authority. Central visibility of Edge James Penney adds, “We’ve developed the functionality to support any public and private CA, as well as provide central reporting and management of all certificates, and central visibility of Edge, and Leaf Node relationships. As Edge becomes more mainstream, customers are asking for online and offline capability, and for KeyScaler to solve the associated security challenges.”
Abloy Oy announced ABLOY CUMULUS, a platform for keyless access, combining quality hardware products with secure access and management applications. It brings all the solutions together into a single ecosystem with a risk-free, integrated cloud service. “CUMULUS is our next step in the ‘keyvolution’ — the development in which mechanical keys are transforming into digital ones. We have wrapped our more than one hundred years of security expertise into digital solutions for connected access management,” said Jussi Ahvalo, Vice President, International Sales, Abloy Oy. The world is becoming keyless, access rights are going digital, and customers want everything to be integrative. Many property owners and managers are planning to switch to access management that is seamlessly location-independent while securing all their keyless access points. The key to keyless access CUMULUS ensures secure access in commercial real estate, public spaces, housing, and sites essential for the functioning of society. It offers interfaces for third-party applications and software development. CUMULUS range of keyless, online access solutions can be administered with any software tool that best suits the needs The CUMULUS range of keyless, online access solutions from mobile keys and padlocks to upcoming electric locks and controllers can thus be administered with any software tool that best suits the customers’ needs. By selecting ABLOY OS INCEDO, the organisation can also manage other ABLOY solutions with the same tool, such as electromechanical PROTEC2 CLIQ™ and mechanical keys. “CUMULUS minimises management risks and provides a secure, tailored, always online and evolving access platform for our customer organisations. It is a cloud service for modern security management. With CUMULUS we provide continuously up-to-date, data-secure access management products and software,” said Jussi Ahvalo. CUMULUS padlock and software first to market CUMULUS is targeted at commercial and professional end-users (PEU). In the first phase, its primary vertical markets are parcel deliveries, finance (cash-in-transit), and construction. Geographically, CUMULUS will first be aimed at select markets in Europe and Southeast Asia. More markets will be added gradually. The first CUMULUS-branded products that will be available for customers later this year include a padlock, a mobile application, a cloud-based software engine (backend), and application programming interfaces (APIs). The APIs allow integrations to third-party applications such as booking, reporting, resource management, and access control systems. New products will continuously be added to the CUMULUS range.
Automating the issuance of all enterprise public or private trusted digital certificates through a single platform reduces the risk of certificate mismanagement and associated outages. HID Global, a pioneer in trusted identity solutions, has simplified certificate automation for any Microsoft Active Directory-managed network devices with its PKI-as-a-Service (PKIaaS) platform. Customers can seamlessly issue, renew, replace or revoke certificates automatically with Microsoft Autoenrollment now that any device on the network can easily be connected with HID’s cloud-based PKIaaS via the Microsoft Autoenrollment connector. Cloud-based PKIaaS platform HID Global, through its cloud-based, HID PKIaaS platform that delivers the industry’s broadest range of automation capabilities for managing privately issued and publicly trusted certificates. The platform eliminates manual, risk-prone processes for tracking, installing, and renewing certificates, and provides one secure and convenient cloud-based platform for all certificate needs. Out-of-the-box integration PKIaaS platform’s out-of-the-box integration and Account Certificate Manager enables customers to centrally manage certificates HID Global has simplified how to integrate Microsoft Active Directory-managed network devices with its cloud-based PKIaaS to automate their certificate lifecycles. The HID’s PKIaaS platform’s out-of-the-box integration and Account Certificate Manager enables customers to centrally manage all device certificates across the entire enterprise, either manually or through an active directory or a mobile device management platform, and whether they are issued automatically or manually. Identity and access management solutions Microsoft Active Directory has a 44 percent share of the market for identity and access management solutions. Providing out-of-the-box integration and automation support for it in HID PKIaaS eliminates the need for agent-based certificate distribution and automation. In addition to Microsoft Autoenrollment, HID PKIaaS supports various pre-built integrations with standards-based certificate management protocols including Simple Certificate Enrollment Protocol (SCEP), Enrollment over Secure Transport (EST), and Automated Certificate Management Environment (ACME). It also provides robust RESTful Application Programming Interfaces (APIs) to integrate with any other third-party tools for certificate orchestration and automation. Auto-Enrollment connector PKIaaS’s Auto Enrollment connector acts as a proxy and connects with Microsoft Active Directory HID PKIaaS’s Auto Enrollment connector acts as a proxy and connects with Microsoft Active Directory for any certificate request that makes an outbound connection to HID’s PKIaaS platform for certificate issuance or updates. There is no need to update any firewall configuration for an inbound connection since it only makes an outbound connection at port 443. There is also no agent or other configuration change required at the individual device level, enabling customers to leverage existing technology deployments and infrastructure. About digital certificate and PKIaaS offerings HID PKIaaS offers trust for the enterprise and its computers, network devices, IoT systems, and e-commerce transactions. Use cases range from securing websites and email communications to digitising paper-based processes using digital certificates and securing network endpoints or connected machines. The HID PKIaaS offering with native support for the Microsoft Autoenrollment protocol is available as a low-cost subscription service with a guaranteed uptime Service Level Agreement (SLA).
Cloud-based access control is growing in popularity as more organisations are looking to adopt a flexible, convenient, and scalable security solution. Over the last few years, the presence of the cloud has generated significant changes in the range of access control, and for good reasons! Cloud-based access control not only produces reliable, real-time control of the organisation but can also be fully integrated with third-party systems to help mitigate and limit risks within the organisation. Access control solutions The cloud ultimately eliminates old hardware and improves on new security protocols with minimal effort from the end-user. One of the major benefits of cloud-based access control is that it frequently leverages the power of data. Implementing a cloud-based system empowers employees to gather more data beforehand, and better prepares them to monitor their business effectively. “Cloud-based access control solutions are becoming increasingly popular. For organisations searching to upgrade their security infrastructure, remember, it’s important to select a flexible system that will integrate seamlessly with other third-party systems and support mobile access. Not only will this help to ‘future-proof’ the access control system, but it ultimately creates a safer and easier-to-use solution that can be relied on for years to come.” - Kim Loy, Chief Product Officer, ACRE.
Fugue, a cloud security SaaS company, announces support for Kubernetes security prior to deployment. Using policy as code automation built on the open source Regula policy engine, Fugue provides a unified platform for securing infrastructure as code (IaC) and cloud runtime environments using a single set of policies, saving cloud teams significant time and ensuring consistent policy enforcement across the development life cycle. With this release, organisations can now use Fugue to secure infrastructure as code for Kubernetes, Terraform and AWS CloudFormation. Fugue has also added rules that align with the CIS Kubernetes Benchmark. Cloud resource configurations A sponsor of the event, the company will be demonstrating Fugue virtually at KubeCon + CloudNativeCon North America, through Oct. 15. “Engineering teams are increasingly using a mix of container orchestration, virtual machines, and serverless across cloud providers, and using different policies for everything wastes a tremendous amount of time and invites vulnerabilities to slip through the cracks,” said Josh Stella, Co-Founder and CEO of Fugue. “Teams need a unified way to secure everything at every stage of the development life cycle, and with support for Kubernetes, they can secure all of the infrastructures as code and apply those policies to their running cloud environments.” Fugue provides centralised IaC security management for cloud resource configurations, container orchestration, and containers. Testing custom policies Teams can use Fugue to establish IaC security visibility across their organisation Teams can use Fugue to establish IaC security visibility across their organisation. Fugue’s open source Regula policy engine provides tooling for engineers to check their IaC configurations locally and for developing and testing custom policies, including those that can check for multi-resource vulnerabilities. Fugue and Regula use Open Policy Agent (OPA), the open standard for a policy as code. OPA is a Cloud Native Computing Foundation (CNCF) graduated project. The Fugue SaaS platform and Regula project include hundreds of pre-built policies mapped to the CIS Foundations Benchmarks for Amazon Web Services (AWS), Microsoft Azure, Google Cloud, and Kubernetes. Cloud security products Additionally, Fugue provides compliance mappings for SOC 2, NIST 800-53, GDPR, PCI, HIPAA, ISO 27001, CSA CCM, CIS Controls, CIS Docker, and the Fugue Best Practices Framework to catch misconfigurations that compliance may miss. The Fugue API and CLI are first-class citizens in the product, enabling engineers to build automated IaC checks into Git workflows and CI/CD pipelines to prevent misconfiguration vulnerabilities in deployments. Unlike with other cloud security products, teams can use those same policies to ensure cloud runtime environments stay secure post-deployment, including cloud resources deployed outside of IaC and CI/CD pipelines.
Today’s organisations face numerous diverse threats to their people, places and property, sometimes simultaneously. Security leaders now know all too well how a pandemic can cripple a company’s ability to produce goods and services, or force production facilities to shut down, disrupting business continuity. For example, a category three hurricane barreling towards the Gulf of Mexico could disable the supplier’s facilities, disrupt the supply chain and put unexpected pressure on an unprepared local power grid. Delivering timely critical information Tracking such risk is hard enough, but managing it is even more difficult. A swift response depends on delivering the right information to the right people, at the right time. And, it’s not as easy as it sounds. Indeed, 61 percent of large enterprises say critical information came too late for them, in order to mitigate the impact of a crisis, according to Aberdeen Research (Aberdeen Strategy & Research). These challenges are accelerating the hype around Artificial Intelligence (AI) These challenges are accelerating the hype around Artificial Intelligence (AI). The technology promises to help us discover new insights, predict the future and take over tasks that are now handled by humans. Maybe even cure cancer. Accelerating the hype around AI But is AI really living up to all this hype? Can it really help security professionals mitigate risk? After all, there’s a serious need for technology to provide fast answers to even faster-moving issues, given the proliferation of data and the speed at which chaos can impact operations. Risk managers face three major obstacles to ensuring business continuity and minimising disruptions. These include: Data fatigue - Simply put, there’s too much data for human analysts to process in a timely manner. By 2025, the infosphere is expected to produce millions of words per day. At that pace, you’d need an army of analysts to monitor, summarise and correlate the information to your impacted locations, before you can communicate instructions. It’s a herculean task, made even more difficult, when we consider that 30 percent of this global datasphere is expected to be consumed in real time, according to IDC. Relevance and impact - Monitoring the flood of information is simply the first hurdle. Understanding its impact is the second. When a heat dome is predicted to cover the entire U.S. Pacific Northwest, risk managers must understand the specifics. Will it be more or less hot near their facilities? Do they know what steps local utilities are taking to protect the power grid? Such questions can’t be answered by a single system. Communication - Once you know which facilities are impacted and what actions to take, you need to let your employees know. If the event is urgent, an active shooter or an earthquake, do you have a fast, effective way to reach these employees? It’s not as simple as broadcasting a company-wide alert. The real question is, do you have the ability to pinpoint the location of your employees and not just those working on various floor in the office, but also those who are working from home? How AI and ML cut through the noise Although Artificial Intelligence can help us automate simple tasks, such as alert us to breaking news, it requires several Machine Learning systems to deliver actionable risk intelligence. Machine Learning is a branch of AI that uses algorithms to find hidden insights in data, without being programmed where to look or what to conclude. More than 90 percent of risk intelligence problems use supervised learning, a Machine Learning approach defined by its use of labelled datasets. The benefit of supervised learning is that it layers several pre-vetted datasets, in order to deliver context-driven AI The benefit of supervised learning is that it layers several pre-vetted datasets, in order to deliver context-driven AI. Reading the sources, it can determine the category, time and location, and cluster this information into a single event. As a result, it can correlate verified events to the location of the people and assets, and notify in real time. It’s faster, more customised and more accurate than simple Artificial Intelligence, based on a single source of data. Real-world actionable risk intelligence How does this work in the real world? One telecommunications company uses AI and ML to protect a mobile workforce, dispersed across several regions. An AI-powered risk intelligence solution provides their decision makers with real-time visibility into the security of facilities, logistics and personnel movements. Machine Learning filters out the noise of irrelevant critical event data, allowing their security teams to focus only on information specific to a defined area of interest. As a result, they’re able to make informed, proactive decisions and rapidly alert employees who are on the move. Four must-have AI capabilities To gain real actionable risk intelligence, an AI solution should support four key capabilities: A focus on sourcing quality over quantity. There are tens of thousands of sources that provide information about emerging threats - news coverage, weather services, social media, FBI intelligence and so much more. Select feeds that are trusted, relevant and pertinent to your operations. Swift delivery of relevant intelligence. To reduce the mean-time-to-recovery (MTTR), risk managers need an accurate understanding of what’s happening. Consider the different contextual meanings of the phrases ‘a flood of people in the park’ and ‘the park is at risk due to a flood’. Machine Learning continuously increases the speed of data analysis and improves interpretation. Ability to cross-reference external events with internal data. As it scans different data sources, an AI engine can help you fine-tune your understanding of what’s happening and where. It will pick up contextual clues and map them to your facilities automatically, so you know immediately what your response should be. Ready-to-go communications. Long before a threat emerges, you can create and store distribution, and message templates, as well as test your critical communications system. Handling these tasks well in advance means you can launch an alert at a moment’s notice. The ability to minimise disruptions and ensure business continuity depends on speed, relevance and usability. AI and ML aren’t simply hype. Instead, they’re vital tools that make it possible for security professionals to cut through the noise faster and protect their people, places and property.
Today, we live in a technology-obsessed age. Whichever way you look, it’s hard to avoid the increasing number applications, products and solutions that continue to redefine the boundaries of what we previously thought possible. From autonomous vehicles and edge computing to 5G and the Internet of Things, all facets of our lives are continuing to evolve, thanks to an endless stream of differentiated innovations. In this article, we’ll be focusing on the latter of these - the Internet of Things (IoT). Deployment of IoT technologies Smart homes, smart utilities, smart retail, smart farming, smart supply chains and many of the other ‘smart’ versions of sectors that we’re already familiar with, are all called as such because of the implications of IoT. Indeed, it is a technology that has manifested itself in billions of devices, which today underpin the truly transformational levels of connectivity that we see across industries of all shapes and sizes. The statistics speak for themselves. According to Statista, over US$ 1 trillion is expected to be spent on IoT technology worldwide, in 2022. Be it added convenience, efficiency, productivity or intelligence, many benefits are poised to emerge from this spike in IoT-related activities. Yet to say this digital transition is going to be entirely positive would be naïve. Threats faced by smart cities It is said that by 2040, 65 per cent of the world’s population will be living in cities Let’s consider smart cities. It is said that by 2040, 65 per cent of the world’s population will be living in cities. To accommodate such an influx, without facing significant logistical issues, with limited space and infrastructure, policy makers have begun to recognise that these urban environments need to become not only larger, but smarter as well. As a result, the global smart cities market is on the rise. Statista states that, globally, technology spending on smart city initiatives is expected to double from US$ 81 billion in 2018 to US$ 189.5 billion in 2023. Threat of attackers with expanding IoT landscape The challenge here is that such a stark uptick will drastically expand the IoT landscape, presenting more opportunities than ever to threat actors. As connectivity and computing power is distributed more widely across large-scale outdoor networks, hackers will scale-up their own operations in tandem. According to a Nokia report from October 2020 (based on data aggregated from monitoring network traffic on more than 150 million devices globally), IoT devices now account for roughly 33 per cent of all infected devices, up from the 16 per cent estimated in 2019. What’s more concerning is how these figures are translating into real world events. 2021 alone has already witnessed an attack on a water plant in Oldsmart, Florida, which was designed to poison residents’ drinking water. Furthermore, Colonial Pipeline, one of the largest fuel pipelines in the US was also hacked, earlier this year, resulting in major shortages across the country’s East Coast. Security through IoT authentication From weak password protection, a lack of regular patch updates and insecure interfaces, to insufficient data protection, poor IoT devices management and an IoT skills gap, there are plenty of weaknesses existing within the IoT ecosystem, which continue to provide open goals for attackers. To defend against such lethal threats, security-by-design and open standards should be the guiding principles of IoT, working to prioritise security, interoperability and robust, internet-based protocols to mitigate risks. Device authentication and encryption A sound place to start is to make device authentication and encryption the central pillars of your IoT security architecture A sound place to start, in this regard, is to make device authentication and encryption the central pillars of your IoT security architecture. The goal is to be able to prove that each and every device joining a network is not malicious, with tell-tale signs being rogue code, for example. By ensuring each device is uniquely identifiable with digital certificates and therefore, properly authenticated when joining a network, you can ensure no tampered devices are able to infiltrate your overarching network. Using technologies, such as Hardware Secure Element Critically, passwords should be avoided altogether, these vulnerable to being stolen and cracked. And, while a similar vulnerability lies in the fact that all secure devices contain a private key, you can leverage technologies, such as Hardware Secure Element (a chip designed specifically to protect against unauthorised access, even if the attacker has physical access to the device), as an extra layer of defence. Digital certificates are not the only option available in protecting those IoT devices that, if tampered with, could become the cause of physical threats. Physical Unclonable Function (PUF) can also be used to prevent tampering. Physical Unclonable Function (PUF) Through Physical Unclonable Function (PUF), a form of IoT device fingerprint is developed from the unique make up of a piece of silicon, which can be used to create a unique cryptographic key. Unlike digital certificates, a secure infrastructure can be achieved through PUF, without the need for any additional hardware, as the key is not only stored securely, but it also becomes invisible to hackers, when the device is not running. The importance of encryption Use of AES encryption within radio chips, to scramble messages on the move, is the method adopted at Wi-SUN Alliance Now, let’s turn attentions to encryption. The use of AES encryption within radio chips, to scramble messages on the move, is the method that we have adopted here at Wi-SUN Alliance. It’s a means of maximising data security, but also reducing power consumption in the devices themselves. Beyond AES encryption, it’s also worth considering topography at the design stage. Indeed, mesh networks are advantageous for several reasons. They are more reliable, allowing data to be re-routed, should devices lose contact unexpectedly. Transmissions usually travel shorter distances, which improves power efficiency and performance, and frequency hopping functionality prevents attackers from jamming signals, which could deny the service altogether. Open standards and interoperability But where do open, interoperable standards fit in? As is defined by the European Committee for Interoperable Systems (ECIS), interoperability enables a computer programme to communicate and exchange information with other computer programmes, allowing all programmes to use that information. Open standards then allow any vendor of communications equipment or services to implement all standards necessary, to interoperate with other vendors. This is incredibly useful from a security perspective. It means that all specs are stress-tested and verified by many users, and that any vulnerabilities are quickly detected, and remediated, enhancing security and reliability. Need for open standards Equally, open standards can accelerate time-to-market, reduce costs and ensure products are usable, with a variety of manufacturers’ processors and radios, with a steam of publicly available protocol stacks, design information and reference implementations available that can help build and future-proof secure products. Indeed, large-scale corporate IoT networks alongside smart cities, smart utilities, and other key smart infrastructure will only continue to evolve, in the coming years. With the immense threats of attackers in mind, these systems must prioritise security-by-design, both now and in the future.
Most consumers are enjoying the convenience brought by electronic locks. With the existence of electronic locks, people no longer need to be restricted by keys. There are a variety of unlocking methods and more convenient remote control unlocking options. Suppose, you are going on vacation, and with the presence of an electronic lock, you can easily enter your house with your babysitter, without a spare key. Of course, not only smart homes, but also some infrastructure and commercial buildings are enjoying the convenience, brought by electronic locks. Passive electronic lock access control system This article will introduce a smart electronic lock used in the infrastructure industry, named passive electronic lock access control system. In traditional manufacturing, mechanical locks are commonly used in all walks of life, to protect the safety of property and facilities. However, the mechanical lock has caused many practical problems in the long-term application. For example, the keys are duplicated randomly, the unlocking authority cannot be controlled, the user's operation records cannot be known, and the remote control is not possible. Imagine that if you are in a remote telecom base station, it happens that you have the wrong key in your hand and cannot open the front door. In such a situation, this lock, maybe the worst scenario. In some industries, with a wide scope and large working area, more attention must be paid to access control systems Therefore, in some industries, with a wide scope and large working area, more attention must be paid to access control systems. In some outdoor scenarios, such as base stations and electric power cabinets, the requirements for access control systems are quite strict. Due to the particularity of its environment, ordinary power-based access control systems will no longer be applicable. Therefore, the emergence of passive access control systems has solved these problems. Electronic locks offer intelligent management function Based on years of in-depth field research, Vanma has developed the Vanma passive electronic lock access control system, based on the current situation of the industry. This system is different from other electronic lock systems, as it integrates the advantages of both mechanical locks and electronic locks. It not only has the simplicity of mechanical locks, but also has the intelligent management function of electronic locks. The term ‘passive’ of passive electronic locks means that no power is needed. Passive electronic locks have the same appearance as ordinary mechanical locks, so they can be installed anywhere, just like common mechanical locks. They also have a variety of practical functions of electronic locks. Authorised remote access control The Vanma management software allows security managers to assign access rights to specific areas, for different technical personnel. In order to facilitate real-time access control, the electronic key can be used in conjunction with the mobile phone app, in order to send information about its access rights to the technicians, in real time. Vanma management software can provide access to all operations performed by technicians Vanma management software can provide access to all operations performed by technicians, including complete audit reports. Access attempts outside the specified time range or outside the specified area can be obtained through the report, so as to analyse any abnormal situations. Access control in extreme weather conditions In the access control system, the lock (lock cylinder) maintains an extremely high standard and its protection level is IP67, to ensure the greatest degree of protection. Infrared induction technology is used in the electronic key, even if the surface of the lock is wet, the electronic key can also transfer the access authority to the lock cylinder. Ensure stable exchange of information between the key and the lock cylinder. In other words, a poor connection cannot prevent the transmission of information between the key and the lock. At present, this kind of passive electronic lock is widely used in many fields, such as telecom, electric power, water utilities, public utilities, medical emergency and so on in Europe.
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex. Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’. CV5S and CV52S AI-powered SoCs The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond. The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing. Faster and ubiquitous AI capabilities Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions" “Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm. John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.” Edge AI vision processors Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive. By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing. 4K multi-imager cameras “However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot. In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation. The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022. Reference boards for camera manufacturers The software on these new SoCs is an evolution of our unified Linux SDK" As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families. “The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot. Better crime detection Detecting criminals in a crowd, using face recognition and/or licence plate recognition, has been a daunting challenge for security, and one the new chips will help to address. “Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot. Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution. 4K AI processing on-camera The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analysed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras. This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and licence plates that are hundreds of meters away,” said Jerome Gigot. The advent of on-camera AI at 4K changes the paradigm Enhanced video analytics and wider coverage “Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot. He adds, “So, next-generation cameras will now be able to identify more criminals, faces and licence plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.” Deployment in retail applications Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement. The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out. This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics. Use in cashier-less stores Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item. In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking. Updating on-camera AI networks Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames. So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, colour, licence plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle. If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene. Efficient traffic management With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyse, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.). With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control centre. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server. Superior privacy Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video. On Ambarella’s CV5S and CV52S SoCs, the video can be analysed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy. In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualisation. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level. Privacy Masking Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas. “With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.” Physical security in parking lots With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred. With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the licence plates of all the cars going in and out, to automatically bill the owners. If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go. Advantages of using edge AI vision SoCs Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.” He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.” He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
The city of Baltimore has banned the use of facial recognition systems by residents, businesses and the city government (except for police). The criminalisation in a major U.S. city of an important emerging technology in the physical security industry is an extreme example of the continuing backlash against facial recognition throughout the United States. Facial recognition technology ban Several localities – from Portland, Oregon, to San Francisco, from Oakland, California, to Boston – have moved to limit use of the technology, and privacy groups have even proposed a national moratorium on use of facial recognition. The physical security industry, led by the Security Industry Association (SIA), vigorously opposed the ban in Baltimore, urging a measured approach and ‘more rational policymaking’ that preserve the technology’s value while managing any privacy or other concerns. Physical security industry opposes ban In such cases, it is local businesses and residents who stand to lose the most" “Unfortunately, an outright ban on facial recognition continues a distressing pattern in which the clear value of this technology is ignored,” said SIA’s Chief Executive Officer (CEO) Don Erickson, adding “In such cases, it is local businesses and residents who stand to lose the most.” At the national level, a letter to US President Biden from the U.S. Chamber of Commerce Coalition asserts the need for a national dialogue over the appropriate use of facial recognition technology and expresses concern about ‘a blanket moratorium on federal government use and procurement of the technology’. (The coalition includes Security Industry Association (SIA) and other industry groups.) The negativity comes at a peak moment for facial recognition and other biometric technologies, which saw an increase of interest for a variety of public and business applications, during the COVID-19 pandemic’s prioritisation to improve public health hygiene and to promote ‘contactless’ technologies. Prohibition on banks, retailers and online sellers The ordinance in Baltimore prohibits banks from using facial recognition to enhance consumer security in financial transactions. It prevents retailers from accelerating checkout lines with contactless payment and prohibits remote online identity document verification, which is needed by online sellers or gig economy workers, according to the Security Industry Association (SIA). At a human level, SIA points out that the prohibition of facial recognition undermines the use of customised accessibility tools for disabled persons, including those suffering with blindness, memory loss or prosopagnosia (face blindness). Ban out of line with current state of facial recognition Addressing the Baltimore prohibition, the Information Technology and Innovation Foundation reacted to the measure as ‘shockingly out of line with the current state of facial recognition technology and its growing adoption in many sectors of the economy’. Before Baltimore’s decision to target facial recognition, Portland, Oregon, had perhaps the strictest ban, prohibiting city government agencies and private businesses from using the technology on the city’s grounds. San Francisco was the first U.S. city to ban the technology, with Boston, Oakland; Cambridge, Massachusetts; and Berkeley, California, among others, following suit. Police and federal units can use biometrics Unlike other bans, the Baltimore moratorium does not apply to police uses Unlike other bans, the Baltimore moratorium does not apply to police uses, but targets private uses of the technology. It also includes a one-year ‘sunset’ clause that requires city council approval for an extension. The measure carves out an exemption for use of biometrics in access control systems. However, violations of the measure are punishable by 12 months in jail. The law also establishes a task force to evaluate the cost and effectiveness of surveillance tools. Transparency in public sector use of facial recognition Currently, the state of Maryland controls the Baltimore Police Department, so the city council does not have authority to ban police use of facial recognition, which has been a human rights concern driving the bans in other jurisdictions. A measure to return local control of police to the city could pass before the year lapses. SIA advocates transparency in public-sector applications of facial recognition in identity verification, security and law enforcement investigative applications. SIA’s CEO, Don Erickson stated, “As public sector uses are more likely to be part of processes with consequential outcomes, it is especially important for transparency and sound policies to accompany government applications.”
BIM (building information modeling) provides a process for creating and managing information during the building lifecycle and beyond. BIM is often equated with 3D modeling of construction projects, but the visual component is just part of the value of BIM. Additional data, such as specifications and other documentation, is also part of the process, underlying the visual aspects, helping to drive decision making and providing immediate access to detailed information about all facets of the building process. Incorporating BIM systems For the last six years, ASSA ABLOY Opening Solutions has worked with specification writers and architects in Europe, the Middle East, and Africa (EMEA) to make it easy to incorporate ASSA ABLOY Opening Solutions doors, hardware, and security solutions into BIM systems. Everyone on a project can work together in the interactive and information-rich BIM environment. BIM tools are also used by contractors, distributors, facility owners, and security consultants. BIM software BIM information relating to doors, hardware, and security solutions is available in the cloud BIM information relating to doors, hardware, and security solutions is available in the cloud with the company’s Openings Studio BIM software. This improves the process of door scheduling and visualisation and enables customers to focus on the design, installation, and management of openings. “If you have up-to-date information inside the BIM model, you can reduce mistakes and misunderstanding in the building industry,” says Marc Ameryckx, ASSA ABLOY Opening Solutions’ BIM Manager for the EMEIA region. “It helps to eliminate mistakes before they happen or as early as possible in the building process. The earlier, the less it costs. We provide data as soon as possible in the process.” (ASSA ABLOY Opening Solutions also has comparable systems available in other regions of the global company.) Centralised data in BIM 3D model Expanding the data available in BIM provides additional value compared to merely providing “BIM objects” that can be incorporated into a BIM 3D model. The combination of BIM modeling and the underlying specifications boosts the quality of the project and its key to success, says Marc Ameryckx. Even after the building is complete, the BIM model is still valuable, providing a repository of “as-built” information that can be used by building managers and security professionals tasked with operating and maintaining the building. For example, if a lock needs to be replaced, retrofitting is simpler because all the information about the lock and existing installation is available in a centralised data file. Revit and ArchiCAD A widely used BIM software is Revit from Autodesk, a program that brings architecture, engineering, and construction disciplines into a unified modeling environment to drive more efficient and cost-effective projects. Another BIM software program is ArchiCAD, developed by the Hungarian company Graphisoft. Openings Studio™ added a plugin for ArchiCAD this year, in addition to Revit. Tailor-made information security solutions We provide tailor-made information security solutions with various hardware on projects with more doors" “We can provide tailor-made information security solutions with various hardware on projects with more doors, adding more flexibility,” says Marc Ameryckx. “Customers do not need to be the experts on the products because we provide expertise as part of our specifications.” For example, how often do building mistakes occur because of a misunderstanding about the electrical needs of a lock and the wrong cabling is installed? The problem is especially expensive if it is discovered only after the walls are complete. Providing complete data about the electrical lock as part of a BIM system avoids the snafu. Another example is the specification of a deadbolt lock on a door that operates with an electric strike. The deadbolt undermines the intended operation of the electric strike and can interfere with escape routes in case of an emergency. The mistake becomes obvious in the BIM environment and can be rectified before consequences impact the real world. Data addition to Opening Suites site ASSA ABLOY Opening Solutions is continuously expanding the data it provides at the Opening Suites site, covering additional functionality and more components including the door, cabling, and electrical connections. Hardware sets are linked to specific doors in the BIM models, including all the details of various components, including article numbers, technical sheets, electrical requirements, all depending on customer expectations. Physical equipment includes QR codes that can be scanned by a smartphone to provide information on the door (A mobile app is in development). More details and more data Experienced BIM consultants work with the Openings Studio software on projects ranging from single doors to large buildings with many doors. Data will be more and more important, and there will be more data inside BIM models Adding more data and detail to the BIM process at the level of each door expands the usefulness of BIM, which has historically been focused on broader issues such as structural work and HVAC. “Openings Studio™ provides all the data to integrate doors and security in the BIM process,” says Marc Ameryckx. The higher level of detail may be a new aspect even for customers who already use BIM software. “Data will be more and more important, and there will be more data inside BIM models,” says Marc Ameryckx. In the future, the use of “digital twins” could expand the capabilities even further; for example, the software could simulate escape routes in case of fire. More data makes more things possible.
Heron Bros. is an award-winning construction and property development company with its headquarters in Draperstown, Magherafelt, Northern Ireland. It operates throughout the UK, Ireland and Europe and employs over 250 people. The company recently built a garage, which will be accessed by approximately 140 vehicles, the majority of which are cars and vans with a smaller number of HGV lorries. The new garage is accessed down a narrow single-track road that takes two-way traffic. To ensure the security of the site, Heron Bros. wanted vehicles to be able to access the garage through automatic gates without stopping to show a card to a reader. Access control software Inova Gates Ltd who design, manufacture and install high-quality automatic gates, were asked to install two sliding gates, each 7 metres wide to allow large vehicles to be able to turn in and out of the site. The requirement was that if a car or van approached, only the left-hand gate would open, but if a lorry approached, then both gates would open. An additional challenge for vehicle identification was that the access road runs at 90 degrees to the gates with no approach area in front of the gates. Each valid vehicle was issued with a Transit button-activated windscreen tag With the help of Nortech technical support, Inova specified a system using two Nedap Transit long-range readers together with a CRC200 control unit and Norpass3 access control software. Each valid vehicle was issued with a Transit button-activated windscreen tag. This avoids false detects, as the driver presses the button to activate the gate as the vehicle arrives at the gate. Long reading range One reader was installed on the inside of the gates for exit control and the other on the outside of the gate for entry control. The long reading range and wide read angle of the Transit reader enabled the installers to adjust the position and angle of each reader such that it detects tags in all types of vehicles. The access control system determines the type of vehicle by the access rights of the detected tag and operates the gates accordingly. The benefits of the reader are as follows: Robust industrial reader design. Read a range of up to 10 metres. Reader is able to detect vehicle tags at difficult approach angles. Reliable long-range tag detection avoids manual intervention and reduces running costs. Easy windshield mounting of windscreen tag using a suction pad. "Although the installation gave some challenges with the angle of the road to the reader, the technical teams of both Inova Gates and Nortech worked together to create a very satisfactory installation," said Cathal Rogers - General Manager, Inova Gates Ltd.
Alcatraz AI has announced that they are bringing the Alcatraz AI Rock facial authentication solution to BrainBox AI’s offices. BrainBox AI is at the forefront of building automation and a renowned company in the green building revolution. Identity and facemask verification solution As BrainBox AI’s office recently re-opened with limited capacity, the company is taking proactive steps, through Alcatraz AI’s robust identity and facemask verification solution, in order to keep employees safe. As one survey showed, two-thirds of employees have safety concerns, regarding the return of on-site operations. Considering these statistics, health and safety must be top priorities for businesses, as they re-open. BrainBox AI is keeping its employees’ safety at the top-of-mind, by installing Alcatraz AI’s Rock solution, before they return, to ensure greater safety and security. Alcatraz AI’s Rock facial authentication solution Alcatraz AI’s Rock facial authentication solution combines advanced AI and 3D sensing technologies Alcatraz AI’s Rock facial authentication solution combines advanced AI and 3D sensing technologies, to provide facilities with enterprise-grade identity verification, which is needed to create secure spaces. Rock’s state-of-the-art security features include touchless access, multi-factor authentication, video at the door and intelligent tailgating detection. Alcatraz AI’s access control solution, the Rock, effectively detects tailgating and sends ‘real-time alerts’, if an unauthorised person enters, and sends real-time notifications to ACS/VMS. BrainBox AI, leading the green building revolution “BrainBox AI is leading the green building revolution, and we are looking forward to bringing frictionless, multi-sensor technology and a touchless authentication feature to the office,” said Tina D’ Agostin, the Chief Executive Officer (CEO) of Alcatraz AI, adding “By utilising the Alcatraz AI Rock, we’ve helped BrainBox AI’s offices re-open smoothly and safely.” “BrainBox AI is excited to announce its partnership with Alcatraz AI. Our employees’ safety is always our top priority. We are confident The Rock’s touchless authentication and the frictionless security system will give each BrainBox AI employee peace of mind, when returning to the office,” said Jean-Simon Venne, the Co-Founder and Chief Technology Officer (CTO) of BrainBox AI.
ASSA ABLOY’s Code Handle door entry solution is a simple solution for keeping private rooms very private, in order to allow access only to those who require it and authorised personnel. Code Handle door entry solution The PIN code setting of the Code Handle access control solution allows users to keep control of who has access, particularly important when they want to keep items away from children. In primary schools, Code Handle protects each and every room that staff and security don’t want pupils to access. This ensures that only authorised teachers and support staff, who know the code to unlock the door, can access these rooms. All they need to do is enter the code on the Code Handle‘s keypad and the door opens. Works together with existing locking units Code Handle, by ASSA ABLOY, works in combination with the existing locking units Code Handle, by ASSA ABLOY, works in combination with the existing locking units, already installed in facilities. Users can keep the cylinder or lock, and just change the handle to a battery-powered Code Handle. With Code Handle, there is no need to cable the door, connect it to the mains or install an electronic access control system. The Code Handle door entry solution is perfect for staff offices, kitchens, store rooms, staff toilets, or any other school room that is to be kept private and secure. ASSA ABLOY’s Code Handle has various benefits, including: Auto-lock - Staff rooms are used many times, throughout the day, With Code Handle’s auto lock feature, there is no need to remember to lock the door, when exiting. Easy to install and retrofit - All it takes is two screws and two minutes of time, to install Code Handle on almost any interior door. Keyless and convenient - Secure rooms with no keys, no wires and no expensive access control system, with the Code Handle door entry solution.
Ipsotek, an Atos company and a pioneer in Artificial Intelligence-powered video analytics, has announced the fulfillment of its contract with Sydney Trains, the operator of rail services across the metropolitan Sydney area, to increase security capabilities at 13 railway stations. Following a competitive tendering process, Ipsotek was selected by Sydney Trains, to deliver an AI-based video analytics solution. This has seen the train operator, Sydney Trains, integrate a range of Ipsotek’s AI-powered video analytics solutions with its security cameras, to identify incidences of tunnel and track intrusion at its 13 stations, located across the metropolitan Sydney area. AI-based video analytics solution Ipsotek’s AI solutions are at the core of Atos Computer Vision Platform, a unique end-to-end computer vision platform that offers pre-trained & customisable AI models, powered by the BullSequana server range, enabled by NVIDIA GPUs and enriched by worldwide expert labs. Mark Edmonds, the Manager of Security Capability for Transport at Sydney Trains, commented “Sydney Trains chose Ipsotek, after an extensive comparison of a number of products. Ipsotek’s proven track record in the AI Video Analytics space, its partnership with Genetec and its work with Innovate UK’s Small Business Research Initiative (SBRI) for railway-focused AI applications, made it a well-deserved choice.” Enhancing security at Sydney Trains’ stations The project with Sydney Trains is the second transportation project in the region for Ipsotek Chris Bishop, Sales Director APAC & Marketing Director at Ipsotek, said “As a British SME, competing against some of the industry’s big-named companies, we are delighted to have been chosen by Sydney Trains, to deliver this project. It represents a welcome validation of our expertise within the transportation and more specifically, the rail sector and we are proud to have supported Sydney Trains with its commitment, to delivering enhanced security practices across its network.” The project with Sydney Trains is the second transportation project in the region for Ipsotek, which is working with accelerated computing solutions firm, NVIDIA on implementation. Ipsotek, member of NVIDIA Metropolis partner group Ipsotek is a member of the NVIDIA Metropolis partner programme, which brings together a computing platform and extensive ecosystem of specialists, to help create smarter spaces and solve some of the world’s most pressing problems, which involve operational efficiency and public safety. Sudarshan Ramachandran, the Country Manager, Enterprise, ANZ at NVIDIA, commented “As an NVIDIA Metropolis partner, Ipsotek delivers incredibly valuable capabilities, solving deeply challenging video-analytics problems using AI and the NVIDIA GPU accelerated computing stack.” AI video analytics for public transport Ipsotek’s project with Sydney Trains follows the company’s previous success in delivering an initial programme of work via the Innovate UK SBRI initiative, for the development of AI video analytics, to enhance the rail experience for passengers and staff in the UK.
Patient falls in nursing homes are a serious problem. In the United States, for example, around 1,800 elderly people, living in nursing facilities, die each year from injuries related to falls, according to the Nursing Home Abuse Center. Those patients who survive their injuries often have a reduced quality of life and suffer some form of permanent disability. Rise in nursing home patient falls Figures show that between 50% and 75% of nursing home residents suffer falls each year, twice the chances of falling when compared to seniors who live in a regular residential community. It has been a prevalent challenge to detect falls quickly and effectively, especially when these occur in residents’ bedrooms. In the United Kingdom, the Care Quality Commission has recognised that the use of CCTV may be one of the best ways to ensure safety and quality of care. However, using video surveillance also brings into question other security issues, such as privacy and data protection. Dahua’s WizMind technologies WizMind embraces human-based AI (Artificial Intelligence), for a whole host of applications across verticals This is where Dahua Technology’s WizMind technologies come into play. WizMind embraces human-based AI (Artificial Intelligence), for a whole host of applications across verticals, such as retail, energy, finance, transportation and of course, health and social care. Specific to the health and social care sector are deep-learning algorithms, to protect the privacy of the face and body in real-time, and stereo analysis, which combines dual-lens cameras with three-dimensional scene analysis, in order to detect sudden physical movement, such as falls. Stereo video analysis The growth of AI applications has enabled the greater availability of 3D scene analysis solutions, thereby enabling objects and people to be analysed in three dimensions. Dahua Technology’s stereo analysis uses two lenses, in order to capture separate images of the same scene. It then computes the ‘optical parallax’ of spatial points in the two images, providing 3D information of the scene. The stereo vision mimics the depth of view that comes from humans having two eyes, known as binocular vision. Combined with deep-learning algorithm Combined with a deep-learning algorithm, stereo analysis can recognise event patterns, such as falls and other movement-based behaviours, such as people approaching, the detection of an abnormal number of people in an area, and violent behaviour. In nursing and care homes, stereo analysis cameras can help staff monitor residents, in case of emergency and respond to residents’ problems, such as tripping and falls. The cameras can view all three dimensions of subjects and together with its deep-learning algorithm, can immediately alert staff to any unusual or sudden movement, such as would be evident in a fall. Cameras in communal areas and bedrooms With cameras situated both in communal areas and in bedrooms, the staff is able to respond quickly to incidents With cameras situated both in communal areas and in bedrooms, the staff is able to respond quickly to incidents, which may otherwise stay undiscovered for hours. An example of such a scenario is a nursing home in Singapore, which has a capacity of around 400 beds and is divided into 14 separate living environments, with each designed to be a home-like living area. Dahua cameras with intelligent fall detection technology Dahua cameras, such as IPC-HDW8341X-BV-3D with intelligent fall detection technology were installed, including the provision of 167 stereo analysis cameras inside each bedroom. These trigger an alarm, in the case of incidents, such as a fall, allowing immediate response by staff. Not only does this enhance the well-being and safety of residents, but it also can reduce the nursing home’s labour costs. In addition, Stereo Analysis can also be applied in other application scenarios. An underground unmanned bicycle parking garage in Amsterdam, for instance, has installed Dahua Technology’s behaviour analysis cameras, to detect abnormal events and prevent accidents, such as people tripping and falling, or suspicious individuals wandering around the area. Privacy Protection 2.0 technology While monitoring their situation inside the nursing home, Dahua also adopts Privacy Protection 2.0 technology that features masking of human face and body, to protect the residents’ privacy. It involves the restriction of what can be seen in video images and applies equally to live, and recorded images. Digital masking takes place on the front-end device (e.g. network camera). Dahua’s Privacy Protection 2.0 provides real-time occlusion of the body and face and enables users to access recorded videos, without having to overlay faces with mosaic masks. It also offers additional occlusion options, such as irregular polygons, mosaics and coloured blocks, and allows code exporting based on specified targets, ensuring the privacy of subjects. Privacy and security in evidence collection Stereo video analysis and privacy protection come into their own in nursing homes and healthcare facilities Benefits offered include non-pixelated human targets, allowing for privacy and security in evidence collection. The technology also allows for face and human attributes analysis, without breaching people’s privacy, making it ideal for nursing homes. Stereo video analysis and privacy protection come into their own in nursing homes and healthcare facilities. It allows the close monitoring of residents or patients to help ensure their well-being and safety, while at the same time protecting the privacy of often vulnerable individuals. Dahua TechMonth As part of the Dahua TechMonth, this blog highlights how Dahua’s stereo analysis technology, combined with privacy protection, can provide a valuable tool to help staff respond to incidents quickly and efficiently, including falls, without infringing on people’s data protection rights. In the next blog, Dahua Technology will be discussing the WizMind application of human metadata, enabling users to maximise situational awareness and analysis of events.
Visa chooses Callsign, as their preferred behavioural biometric digital and device intelligence identity provider. Under the agreement, Visa will introduce Callsign's behavioural biometric and device fingerprinting solutions to the Visa network of financial institutions, payment service providers (PSPs), and merchants across Europe. Callsign joins the Visa Fintech Partner Connect programme giving banks, merchants, and the wider card ecosystem access to Callsign's Intelligence-driven authentication solutions which positively identify consumers using inherent behavioural biometrics whilst detecting and preventing fraud. Allowing genuine access via MFA Callsign technology helps banks, merchants, and PSPs to answer two questions; is the user who they say they are? And are they permitted to access the service they are requesting? Callsign combines behavioural biometrics, device intelligence with MFA to help authenticate users' identities Using machine learning techniques Callsign combines behavioural biometrics, device intelligence, and geo-location with multi-factor authentication to help authenticate users' identities. This approach helps banks, merchants, and PSPs to secure and authenticate users' identities frictionlessly, stopping fraud early and only letting genuine customers access their service and transact safely and seamlessly. Need for secure and accurate user experience The agreement comes at a time of spiralling fraud, according to a recent report, every second fraudulent transaction in the finance industry was account take over. Card, not present fraud (CNP) accounted for 79% of all card fraud across the Single European Payments Area and, figures from UK finance suggest that in the money lost to Authorised Push Payment (APP) scams totalled nearly half a billion (479 million) in 2020. "The need to accurately identify users online for digital payments and online banking is critical due to the shift to online transactions in the past 18 months. Financial services organisations are looking for the technology that provides the most secure, accurate, and seamless user experience to incorporate into their solutions. We are pleased to be joining the Visa Fintech Partner Connect to work with Europe's leading fintech," concluded Amir Nooriala, Chief Commercial Officer, Callsign.
Round table discussion
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labour pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Since the advent of the physical security industry, access control has been synonymous with physical cards, whether 125 kHz ‘prox’ cards or the newer smart card alternatives. However, other credentials have also come on the scene, including biometrics and even smart phones. Some of these choices have distinct cost and security advantages over physical cards. We asked this week’s Expert Panel Roundtable: How soon will the access control card become extinct and why?
Cost is a reality to be managed. No matter how powerful or desirable a technology may be to a customer, the sale often comes down to the basic question: Can I afford it? And affordability extends not just to the purchase price, but to the cost of technology over its lifespan. In addition to advances in technology capabilities, the security industry has also achieved inroads to make its offerings more worth the cost. We asked this week’s Expert Panel Roundtable: What is the physical security industry doing to make more affordable and cost-effective technology solutions for end users?
Protecting dormitory residents and assetsDownload
Protecting Critical Infrastructure through facial recognitionDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download