Internet of Things (IoT)
Enterprise PKI Manager in DigiCert ONE from DigiCert, Inc., a globally renowned provider of TLS/SSL, IoT and PKI solutions, supports security for today’s increasingly remote workforces via certificate automation to authenticate employees and their devices at scale, and encrypt data. Working from home is here to stay, with Gartner reporting that 74% of CFOs are looking to shift some employees to permanent remote work. Digital certificates are a proven, widely adopted solution for strong au...
Zigbee is a familiar name in the smart home arena, and the Zigbee Alliance is expanding its technology approach to address the challenges of the Internet of Things. As the Internet of Things (IoT) has evolved, the need has become obvious for stronger unity among brands and ecosystems to enable products within smart environments to work together more easily. Working to serve that need is the Zigbee Alliance, which seeks to promote collaboration in the Internet of Things by creating, evolving, an...
SonicWall announces the expansion of its Capture Cloud Platform with the addition of the high-performance NSa 2700 firewall and three new cost-effective TZ firewall options. The company also debuted SonicWall Cloud Edge Secure Access that delivers easy-to-deploy, easy-to-use zero-trust security for organisations operating in a modern work-from-anywhere model. Making necessary investments “As emerging technologies mature, it’s imperative that companies make the necessary investment...
ISC West, in collaboration with premier sponsor, the Security Industry Association (SIA), has announced breaking news and guidance regarding ISC West 2021 event. The international security event was originally slated to be held March 23-26, 2021, but after extensive internal and external consultation and monitoring of the ongoing COVID-19 virus pandemic situation, they have made the decision to reschedule ISC West 2021. Rescheduled ISC West 2021 event The ISC West 2021 security event now will...
Messe Frankfurt’s ASMAG Security & IoT published its 2020 Security 50 list, naming BCD International as one of the 50 “most influential security companies in the world.” Of the 50 companies listed, six were from North America. BCD International ranked No. 3 among North American companies, and No. 28 overall. BCD International was among seven newcomers to make this year’s list, posting a 36 percent growth in revenue from 2018 to 2019. Jeff Burgess, CEO of BCD Internat...
Safetrust, the globally renowned company in virtual credential solutions, has released touchless mobile access and WiFi options for the millions of HID iCLASS SE and multiCLASS SE readers deployed globally with their new SABRE MODULE. The 30-second plug-in makes the SABRE MODULE the fastest way to enable touchless mobile access at the door, turnstile or elevator, while using existing readers. SABRE MODULE touchless mobile access The SABRE MODULE enables hands-free authentication from a config...
Check Point Software Technologies Ltd., a renowned provider of cyber security solutions globally, has released its cyber security predictions for 2021; detailing the key security challenges that organisations will face over the next year. Check Point states that the effects of the changes introduced during the COVID-19 pandemic will continue to be a key focus for organisations’ IT and security teams. 81% of enterprises have adopted mass remote working for their employees, with 74% planning to enable it permanently. The company is also warning of emerging ransomware and botnet threats, and the challenges of securing new 5G networks and the explosion in connected devices it will power. Secure remote connectivity “The COVID-19 pandemic derailed business-as-usual for virtually every organisation, forcing them to set aside their existing business and strategic plans, and quickly pivot to delivering secure remote connectivity at massive scale for their workforces." "Security teams also had to deal with escalating threats to their new cloud deployments, as hackers sought to take advantage of the pandemic’s disruption: 71% of security professionals reported an increase in cyber-threats since lockdowns started,” said Dr. Dorit Dor, Vice President of Products at Check Point Software Technologies. Cyber security predictions Covid-19 will be impacting the lives, businesses and societies, and those impacts will change as the year progresses “One of the few predictable things about cyber security is that threat actors will always seek to take advantage of major events or changes - such as COVID-19, or the introduction of 5G - for their own gain. To stay ahead of threats, organisations must be proactive and leave no part of their attack surface unprotected or unmonitored, or they risk becoming the next victim of sophisticated, targeted attacks.” Check Point’s cyber security predictions for 2021 are broken down into three categories: COVID-19 related developments; malware, privacy and cyber-conflicts; and emerging 5G and IoT platforms. Pandemic-related developments Securing the ‘next normal’: In 2021, Covid-19 will still be impacting the lives, businesses and societies, and those impacts will change as the year progresses. So everyone needs to be ready for a series of ‘next normals’ as the company respond to those changes. Following the rush to remote working, organisations need to better secure their new distributed networks and cloud deployments to keep their applications and data protected. This means enforcing and automating threat prevention at all points of the network - from employees’ mobiles and endpoints, to IoT devices, to clouds - to stop advanced attacks from spreading rapidly across organisations, and exploiting weaknesses to breach sensitive data. Automating prevention will be critical, as 78% of organisations say they have a cyber skills shortage. No cure for COVID related exploits: As COVID-19 will continue to dominate headlines, news of vaccine developments or new national restrictions will continue to be used in phishing campaigns, as they have been through 2020. The pharma companies developing vaccines will also continue to be targeted by malicious attacks from criminals or nation-states looking to exploit the situation. School’s out targeting remote learning: Schools and universities have pivoted to large-scale use of e-learning platforms, so perhaps it’s no surprise that the sector experienced a 30% increase in weekly cyber attacks during the month of August, in the run up to the start of new semesters. Attacks will continue to disrupt remote learning activities over the coming year. Malware, privacy and cyber-war Double extortion increases the ransomware stakes: Q3 of this year saw a sharp rise in double-extortion ransomware attacks: hackers first extract large amounts of sensitive data, prior to encrypting a victim’s databases. Then attackers threaten to publish that data unless ransom demands are paid, putting extra pressure on organisations to meet hackers’ demands. The botnet army will continue to grow: Hackers have developed many malware families into botnets, to build armies of infected computers with which to launch attacks. Emotet, the most commonly-used malware in 2020, started as a banking trojan but has evolved to become one of the most persistent and versatile botnets, capable of launching a range of damaging exploits, from ransomware to data theft. Nation shall attack nation: Cyber attacks by nation states will continue to grow, for espionage or to influence events in other countries. Microsoft reported that threat actors from just three countries launched 89% of nation-state hacking incidents over the past year. Over recent years, the focus has been on securing national critical infrastructure, and while this remains essential, it’s also important to recognise the impact of attacks against other state sectors. These include national healthcare organisations and Government departments, such as March 2020’s Vicious Panda campaign targeting Mongolia. Weaponising deepfakes: Techniques for fake video or audio are now advanced enough to be weaponised and used to create targeted content to manipulate opinions, stock prices or worse. Earlier this year, a political group in Belgium released a deepfake video of the Belgian prime minister giving a speech linking COVID-19 to environmental damage and calling for action on climate change. Many viewers believed the speech was real. At a simpler level, audio could be faked for voice phishing - so that a CEO’s voice could be forged to bypass voice authentication. Privacy? What privacy?: For many people, their mobile devices are already giving away much more personal information than they realise, thanks to apps demanding broad access to peoples’ contacts, messages and more. This has been magnified with buggy COVID-19 contact-tracing apps, which have privacy problems, leaking data about individuals. And that’s just legitimate apps: mobile malware targeting users’ banking credentials and committing click-fraud on adverts is a major growing threat. New 5G and IoT platforms 5G benefits and challenges: The totally connected, high-speed world promised by 5G also gives criminals and hackers opportunities to launch attacks and cause disruption by targeting that connectivity. E-health devices will collect data about users’ wellbeing, connected car services will monitor users’ movements, and smart city applications will collect information about how users live their lives. This massive volume of data from always-on, 5G devices will need to be protected against breaches, theft and tampering to ensure privacy and security against attacks, especially as a lot of this data will bypass corporate networks and their security controls. Internet of Threats: As 5G networks roll out, the numbers of connected IoT devices will massively expand - drastically increasing networks’ vulnerability to large scale, multi-vector cyber-attacks. IoT devices and their connections to networks and clouds, are still a weak link in security: it’s hard to get complete visibility of devices, and they have complex security requirements. One needs a more holistic approach to IoT security, with a combination of traditional and new controls to protect these ever-growing networks across all industry and business sectors.
Freedom is now available as a cost-effective, always-up-to-date Access Control as a Service (ACaaS) for subscription-based security management and video surveillance through the cloud. About ACaas software Identiv, Inc., a front-runner in digital identification and security, announced the release of Freedom Cloud, the cloud-based Access Control as a Service (ACaaS) offering for the Freedom Access Control solution. Freedom features the industry’s lowest equipment footprint and its cloud, subscription-based service gives organisations the option to pay as they go and only for what they need, equaling less investment and greater cash flow. Features Freedom Cloud empowers users to control, manage, and maintain their physical access control system (PACS) via Freedom’s intuitive browser-based web administration and helps hospitals, government entities, schools, and commercial customers manage all aspects of PACS from anywhere, anytime. Benefits Freedom Cloud transforms Identiv’s feature-rich, cyber-secure Freedom Access Control into a cost-effective, hassle-free ACaaS. ACaaS combines the benefits of Software as a Service (SaaS) with on-premises access control devices, access control hardware remains onsite and software and servers are removed and stored at data centres, making it possible for users to control access remotely and backup and store data securely. Troubleshoot remotely “Your cloud solution should not be weighed down by a heavy, clunky platform; that is why we created the Freedom Encryption Bridge, to literally lighten the hardware load you have to deploy and maintain onsite. By moving the server and infrastructure off-premises, Freedom Cloud boasts the industry’s lowest equipment footprint,” said Steven Humphreys, Identiv CEO. “Cloud-based access control addresses one of the security industry’s biggest pain points: troubleshooting. Social distancing and widely distributed work forces have made the need to troubleshoot remotely and securely critical.” Freedom Cloud and IoT’s collective advantage Combined with Internet of Things (IoT)-driven Freedom Encryption Bridges, Freedom Cloud is flexible Freedom Cloud software is patched, upgraded, and maintained seamlessly with no interruption to daily operations. Combined with Identiv’s lightweight, Internet of Things (IoT)-driven Freedom Encryption Bridges, Freedom Cloud is flexible and scales to meet the needs of even the most complex business, personnel and facility requirements. The easy-to-use, intuitive browser-based access system ensures a seamless transition from an on-premises solution to a cloud-based one — making the software always accessible and always up-to-date. Functions Identiv’s fully interactive video surveillance integration platform for Freedom provides an all-in-one pane of administration for both access control events and live video feed. The Freedom system also offers the ability to create a mobile onboarding email template that can be defined by the administrator, allowing for the sharing of the iOS or Google Play store link, as well as login information for the mobile app, ensuring a smooth mobile enrollment process. Cloud solution pre- and post-pandemic “The benefits of ACaaS are clear — lower upfront costs, direct remote support and assistance, and customisation,” added Mr. Humphreys. “Freedom Cloud keeps our customers at the forefront of technology. Pay-as-you-go preserves their cash and adds to the benefits of our cloud platform without hassles or risks. Cloud solutions are perfect for the uncertainty of the pandemic and post-pandemic era. Making that transition is top-of-mind for security dealers and integrators as they plan to bring an increasingly cloud-first approach to their customers in 2021.” Freedom Mobile software Along with Freedom Cloud, Identiv’s new Freedom Mobile is also available now, allowing frictionless physical access to a door using the native GPS and Bluetooth technology directly from a mobile device, replacing the need for a physical credential.
The Open Security & Safety Alliance (OSSA) is pleased to announce AndroVideo released its first security camera that follows OSSA’s Technology Stack. OSSA drives an open platform principle and philosophy to open up the security and safety marketplace to fuel innovation beyond the limits of a single organisation. Supporting the security industry’s emerging open ecosystem, the new Smart Edge Camera from AndroVideo is available now and bears the ‘Driven by OSSA’ seal. Video security devices This mark indicates the product follows the OSSA Technology Stack for video security devices that prescribes the use of a common operating systems (OS), with the first two OSSA Specifications being: OSSA Application Interface Specification OSSA Compliant Camera Definition Specification The seal also ensures seamless connectivity within the newly established digital marketplace operated by Security & Safety Things – also an OSSA member organisation. This single marketplace is a central hub that provides tools and information to enable third-party app development. System integrators can then use the infrastructure to purchase, install and manage the apps on ‘Driven by OSSA’ camera devices. This consolidated approach is a core component of the Alliance’s vision to steer open standards. Open platform principles AndroVideo is a developer and manufacturer of smart edge cameras that offer technological advancements AndroVideo is a developer and manufacturer of smart edge cameras that offer impressive technological advancements. The AndroVideo Smart Edge Camera runs the operating system provided by Security & Safety Things and seamlessly connects to their recently announced digital marketplace. “As an early member of the Open Security & Safety Alliance, we are proud to participate in this ecosystem that facilitates cooperation among camera manufacturers, developers, integrators and end users,” said Jonny Wu, Vice President at AndroVideo/Ability Group and OSSA Contributor Member. “We’re eager to collaborate with all OSSA members to push the envelope on open platform principles that benefit both users and participants.” Application-ready platform AndroVideo takes security up a notch with its competitive edge computing capabilities. The MD2, EBL2 and VD2 in dome, bullet and vandal dome form factors incorporate various robust technical features. Engineered with expertise in image quality tuning, the new product line provides market players with a highly optimised, application-ready platform for rapid AIoT development. “We congratulate AndroVideo for being one of the first OSSA members to come to market with cameras based on our Technology Stack and the Alliance’s founding vision/philosophy,” said Johan Jubbega, President, Open Security & Safety Alliance. “By establishing connections and partnerships through the Alliance, AndroVideo secures a strong foothold in this collaborative ecosystem as it evolves and the IoT continues to mature across the security and safety landscape.”
Dahua Technology, a renowned video-centric smart IoT solution and service provider, will hold its online Dahua Technology Partner Day 2020 on 1st of December. The event will be a perfect occasion to get a taste of the Dahua ECO system in the EMEA region. 26 technology partners will bring solutions in the field of security and IoT. Smarter Together is the central theme of the Dahua Technology Partner Day 2020. A total of 26 distinguished Dahua partners will gather to share their knowledge and expertise on the development of security and IoT applications for a variety of vertical markets. This online event will serve as a technological and commercial hub for end-users and system integrators from different markets, ranging from Logistics, Traffic and Infrastructures to Healthcare, Retail and Residential. Attendees can Register free of charge and tune in to all the partner keynotes. Explore business opportunities In the partner hub, participants can chat with technology partners, explore business opportunities or technical challenges and get the latest product information. The event will kick off with an opening speech by Mr. Jason Zhao, Dahua VP & General Manager of Overseas Business to introduce how Dahua Technology and its technology partners become smarter together. 26 Partners will showcase their solutions in a main auditorium and six different break out rooms, including Axxonsoft, Qognify, Ivideon, TechnoAware, Vaelsys, A.I. Tech, Optex, Eagle Eye Networks who joined in the 2019 offline partner day and gained much exposure and business opportunities last year. Global security industry We are moving the Partner day to an online event in order to sustain the opportunity of getting together" Integrated solutions developed by both Dahua Technology and its partners will be displayed during the event, which will surely raise spectators’ interest as they meet different needs of system integrators and end users with greater versatility.“The 2019 Partner Day held on September 26th at Estadio Wanda Metropolitano, Madrid was a success with many of our partners’ participation. However, 2020 is challenging because of COVID-19." "We are moving the Partner day to an online event in order to sustain the opportunity of getting together. During the event, leading representative companies in global security industry and IoT industry will have the chance to present their insights into the latest Security Application and also reflect on current challenges in the industry”, says Mr. Jiaqi Gao, Overseas Marketing Director at Dahua Technology. Smart integrated security solutions “The attendees will have the chance to meet security players in the market and create new and diverse business opportunities.” Committed to its mission of “Enabling a Safer Society and Smarter Living,” Dahua Technology will continue to adhere the core value of “customer-centred” and provide the market with smart integrated security solutions, systems, and services to create value for city operations, corporate management, and consumers.
Conscia Sweden, a provider of security and IT infrastructure solutions, has qualified as the first Cisco IoT Advantage Partner in the world. This is the result of a lot of completed Cisco IoT training and a wealth of practical experience regarding IoT and industrial networks. Conscia has also developed the Conscia DevicePortal software, which is used by both private and public sectors in several countries to quickly connect and manage IoT devices in a secure manner. Building secure solutions “Conscia has a large customer base in, among other things, the manufacturing industry, and the fact that we are now the world’s first Cisco IoT Advantage Partner is a clear signal that our customers have a first-class partner at their service here and now,” says Claus Thorsgaard, CEO of Conscia Group. It also means that we can take a proactive role and propose new solutions for customers in other industries" “The ability to build secure solutions that allow our customers to unlock the power of the data they possess in the production networks gives us exciting opportunities for efficiency and new business models. It also means that we can take a proactive role and propose new solutions for customers in other industries, and thereby let them take part in experiences and opportunities they may not have thought of,” says Lars Kyhlstedt, Managing Director, Conscia Sweden. Connecting different devices “It is only when it is possible to connect really many devices quickly and safely - whether it is lathes in a factory or speakers in a school - that you can realise the significant potential of networked intelligence. Cisco's modern, secure, efficient, and flexible networks enable this and therefore we are very pleased that Conscia with its extensive expertise in the latest technologies is now our first IoT Advantage Partner,” says Niklas Andersson, Vice President, Cisco EMEAR North. The term IoT - Internet of Things - encompasses many different solutions for connecting different devices and things. The need for data collection from deployed units such as real estate systems, industrial units, control systems or equipment in healthcare has traditionally often been handled completely separated from classic IT. Handling IoT security Proprietary protocols and requirements for how, for example, locks, industrial robots or X-ray machines need to communicate often result in one unique solution per need. Another major challenge is that high competence is required to handle IoT security without a simplifying tool The requirement to constantly add more and new devices, protocols and data collection points can lead to an almost exponentially increased burden in the handling of each new function that is to be connected - especially if security is to be taken into account. With Conscia DevicePortal, it is possible to manage security in a fast and efficient way when onboarding and handling IoT devices. Another major challenge is that high competence is required to handle IoT security without a simplifying tool, such as Conscia DevicePortal. Reliable communication solutions With Conscia DevicePortal, other IT personnel, who do not have special skills, can handle the work, says Ola Magnusson, Head of Group IT Infrastructure at Suzuki Garphyttan, a manufacturer of valve spring wire for car engines and transmission solutions. Cisco is a pioneer in communications and networking, offering a strong suite of IoT products and solutions. Whether it's specific and rugged products that can handle the outdoor environment or platforms like Cisco Cybervision to provide an overview and security, they take advantage of their deep knowledge of how to build scalable and reliable communication solutions.
Euralarm, the European association of the fire safety and security industry, has commented on the upcoming delegated act (DA) for internet-connected and wearable radio equipment, as part of the Radio Equipment Directive. The comments and proposals are given in view of the activation of the delegated act pursuant to article 3(3) of the RED (d, e and f) and cover the scope of the delegated act, the definition of ‘internet-connected devices’ and the implementation period. Relevant technical aspects addressing cyber security While Euralarm supports the need for increased cyber security, the fire and security industry will preferably support a horizontal cyber security regulation. Nevertheless, if embedded in the RED, Euralarm wants to ensure that the technical aspects addressing cyber security are relevant for wireless fire safety and security equipment, and can work for manufacturers and service providers. The idea is to include the cyber security requirements through a delegated act on internet-connected and wearable radio equipment. Such an act is a legally binding act that enables the Commission to supplement or amend non‑essential parts of EU legislative acts, for example, to define detailed measures. Scope of DA limited to ‘internet-connected devices’ Euralarm believes that the scope of the DA should be limited to the ‘consumer internet-connected devices’ Since the essential requirements of the delegated act have been triggered by cases involving toys and other consumer devices, Euralarm believes that the scope of the DA (delegated act) should be limited to the ‘consumer internet-connected devices’. Article 3(3) (d) of the RED states, “Radio equipment does not harm the network or its functioning, nor does it misuse network resources, so as to cause an unacceptable degradation of service." The term ‘network’ is not defined in the RED. Applying Art 3(3) (d) to internet-connected devices would create a deviating understanding of network, instead of radio communication network, it is enlarged to the ‘internet’. Ensuring users' privacy and data security According to Euralarm, it is therefore, sufficient to enforce Art 3(3) (e) and (f) to ensure that personal data and privacy of the user and subscriber are protected, and that the equipment is protected from fraud. This will also reduce the risk of inconsistent and overlapping requirements. As far as the definition of ‘internet-connected devices’ is concerned, Euralarm believes that a clear definition is crucial for the correct application of this delegated act and that, therefore, the concept of ‘directly or indirectly’ shall be avoided. Defining ‘consumer internet-connected device’ Since ‘internet’ is not used nor is it defined in RED, Euralarm also proposes to re-formulate this definition to cover radio equipment connected by using any internet protocol. This specifically covers those devices that could potentially present cyber security risks. The definition of a consumer internet-connected device that Euralarm proposes is “Any radio equipment, falling within the scope of Directive 2014/53/EU, which is capable to be connected to internet by using any internet protocol and intended to be put into service by a consumer or any other end-user.” Proposed transition period of five years As far as the date of application is concerned, Euralarm proposes a transition period of five years, before the requirements of the delegated act become mandatory. This allows enough time for a harmonised standard to become available and cited, and for manufacturers to finalise their product design and demonstrate the compliance.
In part one of this feature, we introduced the shotbolt – a solenoid actuator – as the workhorse at the heart of most straightforward electric locking systems. Shotbolts remain at the core of most sophisticated electric locking solutions as well. But they are supplemented by materials and technologies that provide characteristics suited to specialist security applications. Here we look at some more demanding electric locking applications and contemporary solutions. Preventing forced entry Where the end of the shotbolt is accessible, the electric holding force can be overcome by physical force. That’s why anti-jacking technology is now a frequent feature of contemporary electric solenoid lock actuators. Anti-jacking, dead-locking or ‘bloc’ technology (the latter patented by MSL) is inherent to the way the locking assembly is designed to suit the requirements of the end application. The patented bloc anti-jacking system is highly effective and incorporated into many MSL shotbolts deployed in electric locking applications. The bloc technology uses a ring of steel balls in a shaped internal housing to physically jam the actuated bolt in place. A range of marine locks is widely used on Superyachts for rapid lockdown security from the helm Real life applications for MSL anti-jacking and bloc-equipped shotbolts include installation in the back of supermarket trucks to secure the roller shutter. Once locked from the cab, or remotely using radio technology, these shutters cannot be forced open by anyone with ‘undesirable intentions’ armed with a jemmy. A range of marine locks is widely used on Superyachts for rapid lockdown security from the helm. While anti-jacking features are an option on these shotbolts, consideration was given to the construction materials to provide durability in saltwater environments. Marine locks use corrosion-proof stainless steel, which is also highly polished to be aesthetically pleasing to suit the prestigious nature of the vessel while hiding the innovative technology that prevents the lock being forced open by intruders who may board the craft. Rotary and proportional solenoids sound unlikely but are now common A less obvious example of integrated technology to prevent forced override is a floor lock. This lock assembly is mounted beneath the floor with round-top stainless-steel bolts that project upwards when actuated. They are designed to lock all-glass doors and are arguably the only discreet and attractive way to lock glass doors securely. In a prestigious installation at a historic entranceway in Edinburgh University, the floor locks are remotely controlled from an emergency button behind the reception desk. They act on twin sets of glass doors to quickly allow the doors to close and then lock them closed with another set of subfloor locks. No amount of stamping on or hitting the 15mm protruding bolt pin will cause it to yield, thus preventing intruders from entering. Or leaving! Explosion proofing In many environments, electric locking technology must be ATEX certified to mitigate any risk of explosion. For example, remote electric locking is used widely on oil and gas rigs for stringent access control, general security and for emergency shutter release in the event of fire. It’s also used across many industrial sectors where explosion risks exist, including flour milling, In many environments, electric locking technology must be ATEX certified to mitigate any risk of explosionpowder producers, paint manufacture, etc. This adds a new dimension to the actuator design, demanding not only intrinsically safe electrical circuits and solenoid coils, but the careful selection of metals and materials to eliminate the chance of sparks arising from moving parts. Resilience under pressure The technology boundaries of solenoids are always being pushed. Rotary and proportional solenoids sound unlikely but are now common. More recently, while not directly related to security in the traditional sense, proportional solenoid valves for accurately controlling the flow of hydrogen and gases now exist. Magnet Schultz has an extensive and somewhat innovative new range of hydrogen valves proving popular in the energy and automotive sectors (Fig. 2-6). There’s a different kind of security risk at play here when dealing with hydrogen under pressures of up to 1050 bar. Bio security Less an issue for the complexity of locking technology but more an imperative for the effectiveness of an electric lock is the frequent use of shotbolts in the bio research sector. Remote electric locking is commonplace in many bioreactor applications. Cultures being grown inside bioreactors can be undesirable agents, making 100% dependable locking of bioreactor lids essential to prevent untimely access or the unwanted escape of organisms. Again, that has proven to be topical in the current climate of recurring coronavirus outbreaks around the world. More than meets the eye In part one, I started by headlining that there’s more to electric lock actuation in all manner of security applications than meets the eye and pointed out that while electric locking is among the most ubiquitous examples of everyday security, the complexity often involved and the advanced technologies deployed typically go unnoticed.Integrating the simplest linear actuator into a complex system is rarely simple For end users, that’s a very good thing. But for electro-mechanical engineers designing a system, it can present a challenge. Our goal at Magnet Schultz is to provide a clearer insight into today’s electric locking industry sector and the wide range of locking solutions available – from the straightforward to the specialised and sophisticated. Integrating the simplest linear actuator into a complex system is rarely simple. There’s no substitute for expertise and experience, and that’s what MSL offers as an outsource service to designers. One benefit afforded to those of us in the actuator industry with a very narrow but intense focus is not just understanding the advantages and limitations of solenoid technology, but the visibility of, and participation in, emerging developments in the science of electric locking. Knowing what’s achievable is invaluable in every project development phase.
Nowadays, everything seems easier in the matter of surveillance. Sophisticated technology safeguards our valuables for us without asking for anything in return. But what if it’s not true? What if it comes with a price? Video surveillance systems are a popular way to keep the property under constant control. It’s not rare that the technological sophistication of these systems puts us in awe. They make us feel, and be, safe. Yet, there are doubts when it comes to ensuring privacy. And these worries are understandable. Privacy abusers wait around every corner. Some of the fish for data coming from our monitoring systems. Should we then give up and go back to the in-person property guarding? Not really. Countless advantages make an intelligent video surveillance system worth trying. How to find the best solution within the video surveillance systems? Which system is the most secure in protecting us from the threats of privacy abuse: in-house processing unit, or the cloud? Desire for safety Every human wants to feel safe. At the bottom of Maslow's "Needs Hierarchy," there are two most essential points. We desire to fulfill our physiological necessities - the need for food, water, warmth, and rest. In the second place, also fundamental is a need for security.Security doesn’t only mean keeping burglars away from the property Today's fast-paced world changes its outer expression, yet the significance of security is constant. We crave to feel safe and we are ready to do a lot to achieve it. The core truth to begin with when it comes to security is its definition. Security doesn’t only mean keeping burglars away from the property. If it did, we would be content with any camera surveillance system, regardless of its privacy threats. The issue is more complex. Humans value their privacy. Not only keeping our valuables safe but also being away from the sight of others matters to us. We put efforts to protect our privacy, whether it comes to houses, businesses, or sensitive data. Data privacy Why is it so important? Ongoing cases of privacy invasions prove that data finds "new owners" very fast. These data takeovers can result in a major inconvenience and robbery on a large scale. Main privacy threats are information collection, processing, dissemination, and invasion. We want to protect data obtained by video surveillance systems. Privacy and security are sometimes compared to water and oilThese are, for example, video registrations, times of entrance to the property, number and identities of visitors, etc. Privacy and security are sometimes compared to water and oil. They say you can have security but you’ll lose privacy. They say you can have privacy, but you’ll lose security. These common convictions inspired a new generation of companies to create privacy-first security solutions. They are, in other words, security systems focused on not sacrificing privacy. Cloud-based systems Most of the time, popular video surveillance systems but at the same time insecure when it comes to privacy are running on the cloud. There has been a long discussion about its safety and it continues to raise privacy concerns. These systems too often fail in ensuring privacy, and they are vulnerable to hacking. Ring, Nest, and other home security companies experienced compromising mishaps on a large scale. It's not a secret that some cloud-based companies partner up with police departments. Also, if your data is too available, tech companies can sell it to advertisers.Data uploaded onto the cloud is exposed for anyone to meddle with Data uploaded onto the cloud is exposed for anyone to meddle with. According to the book The Age of Surveillance Capitalism_ The Fight for a Human Future at the New Frontier of Power by Shoshana Zuboff “Nest takes little responsibility for the security of that information and none for how other companies will put it to use. In fact, University of London legal scholars Guido Noto La Diega and Ian Walden, who analysed these documents, reckon that were one to enter into the Nest ecosystem of connected devices and apps, each with their own equally burdensome terms, the purchase of a single home thermostat entails the need to review nearly a thousand contracts.” Security and privacy vanish once a smart home system enables remote access. In-house processing units It all leads to the conclusion that keeping data in the in-house processing unit is safer and more private. It keeps us away from the eyes of governments, corporates, advertisers, and hackers. And since the market is proactive, solutions in that department came fast. Thanks to the advances to the internet of things (IoT), edge computing, and machine learning, it will be possible in the near future to find different surveillance private-secure systems on the market. A privacy-centered "architecture" processes and stores camera footage inside the propertyThey will combine the most advanced technology with sophisticated privacy protection. In the in-house option, a privacy-centered "architecture" processes and stores camera footage inside the property. For example, one Seattle-based startup is working on a solution that uses specialised IP cameras that work in groups with an edge computing device. An AI (artificial intelligence) algorithm analyses all the footage taken by the cameras. Once it detects anomalies, it notifies the final user. Those systems don't upload any of the customers' data to the cloud, they keep privacy and all the information at the customer's home. The in-house processing unit can learn to differentiate what its user marks as important. The system captures and saves only those pieces of information. Smart surveillance systems To give an example: users who wish to know when their dog is outside can set the cameras to detect it. If they wish to turn a blind eye to burglars, they are free to do it. Smart surveillance systems work with facial matching and pose detection technology. They can detect individuals that haven’t logged on to the system. This tool respects an ethical protocol. It isn’t sensitive to a specific gender, race, or age. Its purpose is to detect behavior identified as suspicious without targeting individual identities. By identifying people who aren’t a part of your daily routine, the system cuts any kind of security risk. The in-house processing unit video surveillance systems "do the watching" for you. The newest in-house processing unit video surveillance systems will sharpen the feature of crucial importance - privacy protectionThat revolutionises the way we think about security. The system that integrates all the security visual sensors into the “brain” of the system is the smartest and safest idea on the market. This “brain” later decides whether to notify the user about the potential danger or let it go. It deletes every irrelevant piece of data on the spot. This kind of cognitive machinery saves both your time and bandwidth. Thanks to them, you get rid of unnecessary alerts. The newest in-house processing unit video surveillance systems will sharpen the feature of crucial importance - privacy protection. The newest technology offers a plenitude of sophisticated surveillance methods. Our task is to choose the right one. The one that not only protects our properties and valuables but also our privacy.
Electric locking is among the most ubiquitous examples of everyday security. Yet the complexity of electric locks and the advanced technologies deployed to provide simple, dependable and, for the most part, impenetrable locking often goes unnoticed. And that’s a good thing: when we take things for granted, it usually proves they’re fit for purpose. As experts in the field of solenoid actuated designs, we’re okay knowing that remote electric locking solutions are taken for granted and that the design sophistication behind a functional and reliable locking assembly is often overlooked. As readers of this journal will know, security takes many forms. Perhaps the most recognisable application of a security policy is the ability to lock something. A door to prevent access. A gate to control the flow of people or vehicles. Or shutters to guard against theft. Or to unlock a turnstile to allow ingress and egress, as found in leisure centres and museums. Or to switch between either flow direction when required – think football match stand access, for instance. In part one of this feature, we look at straightforward electric locking solutions that use solenoid actuators. Straightforward security measures However, while locking can be one of the simplest security initiatives, it’s also capable of being among the most complex where sophisticated measures are called for. In part two, we will cover specialised electric locking technologies and some more unusual security solutions and application examples. Among straightforward security measures is remote locking Among straightforward security measures is remote locking – a function found almost everywhere you look. Unless you’re the proud owner of a classic car, when did you last physically put your vehicle key in the door lock? Remote locking ups the ante for designers who need to incorporate security in an assembly, an application, a product or a system. Solenoid workhorses Solenoid actuators and electromagnet technologies are the bedrock of electric locks. Remote operation – activating a lock from a distance – is commonplace. Wireless RF transmitters in the key fobs of modern vehicles activate the central locking system. Cards with embedded RFID chips, fingerprint readers and facial recognition systems provide selective access to buildings, typically by either actuating a solenoid lock or releasing a powerful door magnet. You can see examples on the Jubilee and the new Elizabeth (Crossrail) lines on the London Underground. They use electric solenoid-based locks to secure platform access screen doors, only allowing them to open once the tube train has arrived. Solenoid-based electric locking is at the heart of safety-based security in applications such as lift doors and disabled access lifts, on building hoists, and as interlocking systems for screens and safety covers on machine tools, to name a few. Solenoid-based electric locking is at the heart of safety-based security These are straightforward applications that address a range of issues that come under the general heading of security. Others demand special features built into the electric locking mechanism to meet specific end user requirements. This added complexity can present a design challenge to the inexperienced. Electro-mechanical design engineers invariably have a useful broad knowledge for developing products but not necessarily a core expertise in solenoid technology. One example we like to use is a railway carriage. To design and build that takes a huge breadth of knowledge and expertise due to the many systems and assemblies a carriage comprises. But passenger trains now feature remote electric door locking which must function perfectly – and without which the rolling stock is unfit for purpose. That electric locking subassembly design is a critical feature and a specialist development project. Solenoid actuators and electromagnet technologies are the bedrock of electric locks Shotbolts A generic term used for electric solenoid locks is shotbolts. In these linear actuating units, the solenoid typically moves the bolt directly or through a bell crank to turn the actuation through 90 degrees, or to extend the linear movement of the bolt. They can be built as Fail-safe or Fail-secure models, meaning energise-to-lock, or energise-to-release respectively, which determines the state they adopt in the absence of power. You would want some applications to default to unlock in the event of power loss, and others to default to the locked state. Both types usually deploy a spring to return the bolt in the quiescent unenergised state. Bi-stable is another functionality available. In this design, no power is consumed in either position. A loss of power will leave the device in its last state. Scaling down Some shotbolts are large. Those designed to secure the access ramp on the Solent hovercraft built by Griffon Hoverwork are powerful units – and in that application a weatherproof design is deployed to withstand the saltwater spray and frequent washdowns. But a shotbolt and the solenoid contained within it can be physically quite small and require minimal power, yet still provide highly secure locking in a mortice lock arrangement. This is where the locking assembly starts to become complex Over the years, bespoke designs have been developed for diplomatic bags and Cash In Transit (CIT) cases. Both use small, low power actuators. In the latter application by specialist Cash In Transit equipment manufacturers HDH, intelligent electric lock technology provides unique features – and there’s a range of surprises in store for anyone accessing cash boxes illicitly. Technologies in cash transit solutions include GPS tracking, alarms, remote monitoring and automatic ‘cash degradation’ systems if a case is forced open. Ensuring that degradation systems don’t activate when a case is opened legitimately is equally important. This is where the locking assembly starts to become complex, requiring special design expertise. The CIT solenoid lock uses a 90°actuator to latch, lock and arm automatically if required but can be set to not lock or arm as the actuator travel doesn’t engage with the mechanical latch mechanism by default. Integrated technology solutions inside the case include daylight sensors, surface protection wires inside and out, and reed switches between the lid and the base. All contribute to safety precautions that prevent accidental activation and protect the valuable cargo and the operator. But for first line security, straightforward shotbolt electric locking is still at the heart of CIT cases. Internet of Things Miniature shotbolts are also used in some medical ventilators – a topical subject at the time of writing during the global coronavirus pandemic. They are also increasingly appearing in consumer-level Internet of Things (IoT) applications, being a key component in home automation applications. Our goal at Magnet Schultz is to provide a clearer insight into today’s electric locking industry sector and the wide range of locking solutions available. We dealt with some straightforward technologies and applications here. In part two, we will look at special technologies built into more sophisticated solenoid locks to prevent forced entry, at materials that guard against explosion risks in hazardous environments and even at the use of proportional solenoid technology to manage pressurised gases. Read part two of this feature here.
Close collaboration with customers has been a hallmark of the physical security industry for decades. And yet, less ability to collaborate face-to-face to discuss customer needs has been a consequence of the COVID-19 pandemic. “True innovation, which comes from close collaboration with customers, is more difficult to achieve remotely,” said Howard Johnson, President and COO, AMAG Technology, adding “Not being able to visit in person has not been helpful. Kurt John, Chief Cyber Security Officer at Siemens USA, adds “We need to plan intentionally with a strategic approach for collaboration and innovation.” Securing New Ground virtual conference Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry at a ‘View from the Top’ session, during the Securing New Ground virtual conference, sponsored by the Security Industry Association. Their comments covered business practices during the pandemic and the outlook for technology innovation in response. “We had to pivot quickly on business models and create a cross-portfolio team task force to discuss how we can leverage technologies to help customers [during the pandemic],” said John, adding “We are having outcome-based conversations with customers about their businesses and operations, and how we can combine short-term benefits with long-term growth and flexibility.” But some of those conversations are happening from a distance. Results-oriented approach in remote work environment After the pandemic took hold, Siemens shifted rapidly to remote work and embraced other infrastructure changes. “We had to refocus and lead with empathy, flexibility and trust,” said John, adding “We gave our staff flexibility to set their hours and used a results-oriented approach.” There is also a social element missing in the work-from-home model. “Virtual coffee machines do not replace being there in person,” said Pierre Racz, President and CEO, Genetec, adding “Small talk about the weather is important psychological elements.” Positives in using multi-factor identity management He predicts that, in the future, office hours may be reduced, but not floor space, with space needed for in-person collaboration and long-term social distancing. Employees will come to the office to do collaborative work, but can work from home to accomplish individual tasks that may be ‘deferred’ to after-hours, when the kids have been fed. When the pandemic hit, Genetec had resumed 95% of their operations within 36 hours, thanks to their use of multi-factor identity management. They did not suffer from malware and phishing issues. “Multi-factor is really important so that well-engineered phishing campaigns are not successful,” said Pierre Racz. Shift to ‘Zero Trust’ model All three panelists noted a coming skills gap relating both cyber security and systems integration Remote working technologies are shifting to a ‘zero trust’ model, in which access to systems is granted adaptively based on contextual awareness of authorised user patterns based on identity, time, and device posture. For example, an office computer might have more leeway than a home computer and a computer at Starbucks would be even less trusted. The approach increases logical access security while providing users their choice of devices and apps. Skills gap in cyber security and systems integration A growing skills gap has continued throughout the pandemic. “Where we have vacancies, we have struggled to find candidates,” said Howard Johnson. All three panelists noted a coming skills gap relating both cyber security and systems integration. New technologies will clearly require new skills that may currently be rare in the workforce. Cyber security will become even more important with growth in new technologies such as AI, machine learning, 5G and edge computing. A workforce development plan is needed to address the technologies and to enable companies to pivot to new business needs, said John. Adoption of temperature sensing solutions From a technology viewpoint, Johnson has seen attention shift to the reception area and portal, away from touch technologies and embracing temperature sensing as a new element. There have also been new requests for video and audio at the portal point, to create methods of access and egress that do not require security personnel to be present. “Some customers are early adopters, and others are waiting for the market to mature before investing,” Howard Johnson said. “Security companies have been faced with the need to respond rapidly to their customers’ needs during the pandemic, but without seeming like ‘ambulance chasers’,” said Pierre Racz. In the case of Genetec, the company offered new system capabilities, such as a 'contamination report', to existing customers for free. Move to a hybrid and flexible work environment In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach" An immediate impact of the pandemic has been a reduction in required office space, as more employees have worked from home, raising questions about future demand for office space. “The pendulum tends to swing to the extremes,” said Kurt John, adding “In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach.” “Users will be much more careful about letting people into their space, which requires more policies and procedures,” said Lorna Chandler, CEO, Security by Design, who participated in a panel at Securing New Ground about how the pandemic is changing commercial architecture and access control. “Users should also be careful in the rush to secure premises from COVID-19 that they don’t violate HIPAA laws or create other potential liabilities,” adds Chandler. Continuum of mechanical and electromechanical devices Mark Duato, Executive Vice President, Aftermarket, ASSA ABLOY Opening Solutions, said a “Continuum of mechanical and electromechanical devices is needed to protect premises and ensure convenient operation of an access control operation.” “First and foremost, the immediate reaction to the impact of COVID-19 is to rush to educate and invest in technologies to increase the ability to analyse people,” said Duato, who also participated in the access control panel. Shift to touchless, frictionless access control “The move to touchless, frictionless access control “is really a collaboration of people, process and technology,” said Valerie Currin, President and Managing Director, Boon Edam Inc., adding “And all three elements need to come together. Touchless and frictionless have been in our market for decades, and they’re only going to become heightened and grow. We’re seeing our business pivot to serve markets we have not served in the past." More and more data is a feature of new systems, but is only helpful when it is analysed. “We all live in a world of data, or IoT and sensor technology,” said ASSA ABLOY’s Mark Duato, adding “But we don’t want to be crushed by data. Data is only helpful when you can reduce it to functional benefits that will help us innovate. We have to take the time to squeeze the value out of data.”
As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com has adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected. “We moved quickly to establish work-from-home protocols to protect our employees and minimise impact on our partners,” says Anne Ferguson, VP of Marketing at Alarm.com. The Customer Operations and Reseller Education (CORE) team has operated without interruption to provide support to partners. Sales teams are utilising webinars and training resources to inform and educate partners about the latest products, tools, and solutions. Alarm.com’s partner tools are essential for remote installations and support of partner accounts. Helping customers remain connected Adapting to challenges of the coronavirus pandemic, Alarm.com is further investing in solutions that help customers remain connected and engaged. The company has created a resource hub called “Succeeding Remotely” that provides tools, tips and news links that partners can use to adapt their business operations. From adjusting sales and installation techniques to maintaining cellular upgrades, Alarm.com is helping partners stay connected to customers remotely, keep their teams trained, and address rapidly evolving customer concerns without rolling trucks.The company has created a resource hub called “Succeeding Remotely “Additionally, after seeing all that our partners are doing to support their local communities in need, we were compelled to highlight those efforts with ongoing videos called Good Connections, which we’re sharing with our partner community to spark more ideas and ways to help,” says Ferguson. “Though our partners have experienced varying degrees of disruption to their business, we’re inspired by their adaptability, ingenuity and resilience,” says Ferguson. “Along with establishing proper safeguards for operating in homes and businesses, our partners are leveraging our support resources more heavily, while our entire staff has worked tirelessly to deliver new, timely resources.” Do-It-Together solutions Alarm.com partners are successfully employing Do-It-Together (DIT) solutions, focusing on 3G-to-LTE upgrades, and pivoting to new verticals like commercial and wellness. Many are also streamlining their business operations and taking advantage of virtual training opportunities to enhance their technicians’ skills and knowledge, says Ferguson. Do-It-Together installs involve depending on customers to perform part or all of the installation process. Partners can send customers fully configured kits with mounting instructions, or technicians may guide customers on a remote video call. Alarm.com’s tools, training and products help partners modify remote installation options depending on each customer’s needs. End users can validate the Alarm.com Smart Gateway with their central station that sensors they have mounted were done correctly using the Alarm.com mobile app Alarm.com Smart Gateway For example, the Alarm.com Smart Gateway can be pre-configured with indoor and outdoor cameras for easy customer installation and to reduce the likelihood of future service calls. Also, end users can validate with their central station that sensors they have mounted were done correctly using the Alarm.com mobile app. “DIT is helping our partners continue onboarding customers and avoid backlogs,” says Ferguson. “We’ve been pleasantly surprised by the resiliency and level of future investment that our residential and commercial partners have shown in the face of adversity,” adds Ferguson. For example, a significant number of business customers have used the slow period to install systems that are typically too disruptive to put in during normal business hours. Similarly, service providers are adopting new technologies or business models, such as cloud-based access control. “They’re often saying to us, ‘I’m going to take this opportunity to make changes to improve our business,’ and have been working closely with us on training and business consulting to support their efforts,“ she says. Shift to the cloud Ferguson sees a growing preference for cloud-managed surveillance and access systems over ones that have historically been run on-premise. The technology itself is attractive, but especially driving change is the enhancement to the daily lives of service providers and customers, which have been strained during this time. “The foundational benefit of our cloud-based solution is the hassle-free, seamless customer experience it delivers,” says Ferguson. “We make this possible by taking ownership of the servers, software maintenance, firmware updates, health monitoring, and more. With cloud technology, these aspects become invisible to the customer and take a lot off their plate, which is more important than ever.” End users can take advantage of Smart Tip video tutorials to help with DIT installations, or they can use the Alarm.com Wellcam to connect with loved ones anywhere.End users can take advantage of Smart Tip video tutorials to help with DIT installations Partners can attend training workshops focused on remote installation tactics, while driving consumer interest in new offerings through Alarm.com’s Customer Connections platform. The goal is to make it simple for partners to stay connected to their customers to maximise lifetime account value. “We are well-positioned to endure the pandemic because of the strength of our partners in their markets along with our investments in technology, hardware and our team,” says Ferguson. “As restrictions slowly lift, there is cautious optimism that the residential, commercial, property management, plumbing/HVAC, builder and other verticals will recover quickly. We believe that as more partners adopt the DIT model and add commercial and wellness RMR, they will find increasing opportunities to deploy security, automation, video, video analytics, access and more throughout their customer base.”
The next step in the journey of digital transformation, the fifth generation of wireless communications technologies (5G) will have an enormous impact on mankind, and on every industry including security. In short, 5G will disrupt the way we live and work. To discuss the changes, we presented our questions to Benoît Jouffrey, VP 5G Expertise at Thales, which is at the forefront of the transformation with an emphasis on trust and security. Following are his responses. Q: In layman's terms, what is the difference between 4G and 5G ecosystems as they relate to opportunity, flexibility and choice in networking tools? Jouffrey: Compared with largely one-size-fits-all 4G services, the 5G ecosystem will provide organisations with much greater choice and flexibility in the way they communicate over mobile networks. The network slicing capabilities of 5G means that business can have their own independent networks, with each one customised to their unique requirements and backed up by service-level agreements (SLA). Another aspect of 5G will be the ability to drive latency between UE (User Equipment) and network down to below a few milliseconds, which will massively boost the performance and scalability of enterprise applications. Q: How can these capabilities drive a company's digital operations? 5G will allow enterprises to be connected more efficiently Jouffrey: 5G will allow enterprises to be connected more efficiently: they can rely on a higher density of connected devices exchanging more information in a better timeframe. Due to these slicing capabilities, 5G networks allow for much greater personalisation than 4G networks. This means that businesses could benefit from this personalised network, tailored to their portfolio of Internet of Things (IoT) use cases, and not be necessarily expected to rely on a one-size-fits-all network. By combining the unique capabilities of 5G with the insights derived from analytics, machine learning, and artificial intelligence, enterprises will be in much better stead to run their operations efficiently and securely. Q: How might 5G impact the use of cloud systems? Jouffrey: 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have a small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate. Q: How can one provide trustworthy 5G lifecycle management for IoT devices? Jouffrey: Trustworthy IoT lifecycle management is an end-to-end approach from the secure provisioning of keys within the devices, to the proper identification of the users, from the authentication on the network or the network slice, to the secure handling of the data either at stored or in motion. Resources need to be invested long before this to qualify the business model, in prototyping, as well as prototype testing. Most organisations don’t have the resources to counter all the security challenges of their 5G IoT deployments. Businesses will often end up choosing between navigating a risk-laden 5G environment, with inadequate or incomplete trust mechanisms, or outsourcing these requirements. When looking at outsourcing, companies must choose a provider with expertise in digital security, ensuring 5G IoT deployments have data protection and connectivity credentials built in, together with end-to-end data protection solutions such as encryption – protecting data in the device, network, and cloud at rest and in transit. Q: How can wireless modules address new 5G IoT use cases? Wireless modules can be expected to play a bigger role than in previous generations of cellular Jouffrey: As IoT considerations are integrated into the 5G ecosystem, wireless modules can be expected to play a bigger role than in previous generations of cellular. 5G modules support different characteristics to earlier generations – the 5G use cases are much more complex, varied, from high-end use cases requiring high data usage and throughput, such as for industrial routers, to low-throughput, energy consumption optimised devices, as required for some IoT sensors. At the end, compared to the largely one-size-fits-all approach that preceded it, 5G will increase the demand for vertical-tailored wireless modules. Importantly, these wireless modules need to support new data protection and security features that go well beyond conventional compliance to 3rd Generation Partnership Project (3GPP) standards. Due to the extent of personalisation within 5G networks, wireless modules must also offer providers and customers greater security as well as agility all along the device lifespan. Q: What are the new data protection challenges posed by 5G, and how can they be addressed? Jouffrey: The 5G era presents exciting opportunities, as well as security challenges. The greatest risks to enterprise data on 5G networks – including eavesdropping, man-in the middle attacks, denial of services, loss or compromisation of data – were already known in 4G. The 5G standards have looked at providing answers to these threats and come with some noticeable improvements, such as the encryption of the international mobile subscriber identity (IMSI), otherwise known as the Subscription Permanent Identifier in 5G. But what’s different with 5G is the threat surface area, due notably to the variety of devices that will be used over these 5G networks and the underlying technologies used for the deployment of the networks, such as cloud native virtualisation. On top of this, it’s the first generation of cellular to launch in an era of global cyber-crime, funded by organised crime and states alike. So, whilst enterprises should look to the ecosystem of telecom operators and cloud providers, vendors, and system operators to help understand the opportunities presented by 5G – this same ecosystem needs to guide them in countering any new risks that the 5G architecture may pose. The key to securing 5G enabled devices is to build security into devices from the outset using encryption. The key to securing 5G enabled devices is to build security into devices from the outset Q: What new roles can the 5G embedded universal integrated circuit card (eSIM) endorse in network authentication? Jouffrey: 5G is the first generation of cellular to launch in a buoyant eSIM market. The eSIM will be key in supporting network slicing authentication and security, enabling enterprises to leverage their credentials to pre-select network slices. However, to support secure authentication for mobile networks that may require the usage of different authentication algorithms over time, these 5G eSIMs must support this flexibility of usage of multiple authentication and authorisation credentials. With this capability built into these eSIMs from the start, mobile operators can remotely swap the authentication algorithm either for a dedicated primary authentication, or in a definitive way, thanks to key rotation management, thus maintaining a trusted environment.
Allot Communications Ltd., a global provider of innovative network intelligence and security-as-a-service (SECaaS) solutions for communication service providers (CSPs) and enterprises, has announced that a Tier-1 telecom operator in APAC has selected Allot HomeSecure to provide consumers with zero touch clientless cyber security and parental control services, to protect the CPEs/routers and devices in their homes. HomeSecure solution The HomeSecure solution will be deployed in CPEs provided to consumers by the operator, and in the operator’s cloud-native environment. The services are expected to be made available to millions of the operator’s fixed broadband customers. The operator has ordered an enterprise-wide perpetual licence from Allot. According to the Microsoft Security endpoint threat report 2019, the malware encounter rate in APAC was 1.6 times higher than the global average. In light of these conditions, Allot HomeSecure gives telecom providers in APAC a unique opportunity to deliver zero-touch, fully automated services that protect their customers while generating supplemental revenues. Security for home IoT and smart home devices Allot HomeSecure provides security for home IoT devices and smart appliances Allot HomeSecure provides security for home IoT, smart appliances, and the devices connected to the home network. It integrates into the existing home router with the addition of a thin software client that provides home network visibility, cyber security and parental controls without the need for any configuration by the consumer. Allot HomeSecure uses AI to identify and profile connected home devices and to detect and act upon anomalous device behaviour. HomeSecure has the option to be managed from an easy-to-use app for every household that gives consumers control over their network security and parental controls. “Our customer in APAC sees anti-malware protection for all home-connected devices and parental controls as basic requirements for any offering they provide to their millions of fixed broadband customers. HomeSecure gives them a single zero-touch clientless solution that satisfies both of these demands,” said Ran Fridman, EVP Global Sales at Allot.
Axis Communications, the provider in network video, has helped develop an innovative and clean energy solution which illustrates the potential of sustainable surveillance technologies in remote locations. In response to a request to produce a system to document part of a major programme of improvements to Scotland’s A9 carriageway, Axis and its partner Camera Control UK, developed a solution which is capable of capturing high-quality 4K time-lapse imagery using entirely renewable sources. One of the main challenges was that the solution needed to be able to capture high-quality surveillance video in an area with no communication networks or local power, while coping with weather extremes and construction logistics. With diesel generators disregarded due to the pollutants they would produce, and the challenges associated with trying to lay power cables over a considerable distance along a route that twists and turns, a clean and sustainable solution was required. Video surveillance helps in better traffic flow The highways project will see a 10-mile stretch of the A9 from Perth to Inverness widened to increase the efficiency of the route and allow for smoother traffic flow. After winning a tender to document the project, local company, MB Productions Ltd, commissioned Camera Control UK to produce a solution. Camera Control UK in turn contacted Axis Communications, the provider in network video technology, to work in collaboration. The resulting video would be used for audit purposes, to provide evidence of best practice, and to serve as example material for future projects. All captured video is relayed back to a central control location using a dedicated wireless network Martin Naylor, Director of Camera Control UK, elaborates: “We realised it had to be an off-grid solution to avoid using local power; a solution that could incorporate wireless communications and utilise renewable energy sources to be environmentally friendly and sustainable over the longer term.” Bullet cameras To bring the solution to life, AXIS P1448-LE 4K short bullet cameras were chosen for their robustness and durability. The final system uses eight solar power packs, charged by a mixture of wind turbine and solar PV panels. Eight towers with mounted cameras are employed at various key touchpoints along the A9. Communications masts, installed to enable cloud connectivity, ensured that the Axis cameras, connected via the IoT, were able to deliver imagery of incredible quality. The whole solution illustrates the possibilities for innovation when utilising the natural elements, having a virtually zero carbon footprint. All captured video is relayed back to a central control location using a dedicated wireless network. The whole system can be remotely monitored to continually check its status of operation. Remote management also enables the cameras to be fine-tuned for precision imagery of the work in progress, without the need to manually touch the cameras, or even to be on-site in person. 4K Imagery Martin Naylor commented on the relationship with Axis that has made this solution possible: “Axis really values innovation and is therefore an ideal partner, not only because the team takes the time to understand the challenges when trying to push the boundaries of what’s possible in surveillance, but also because their drive towards sustainable and ethical practices is an inspiration to other technology companies.” Matt Brown, Director, MBP, said of the solution: “We are now able to capture fantastic 4K imagery of the ongoing work on the A9. Camera Control UK has produced an entirely green solution, an incredible feat of engineering. The Axis cameras are in a completely different league, in terms of quality, to others we’ve seen. This project has been a great success.”
BBVA Compass Stadium is a soccer-specific stadium located in Houston, Texas, USA and home to the Houston Dynamo, Major League Soccer club (part of MLS in USA). It also is home to the Houston Dash of the National Women’s Soccer League and to Texas Southern University Tiger football. It is also going through a major retrofit with its security systems to include a best of breed, open architecture solution. The stadium first opened in 2012, but six years later, Cultris Security Systems of Houston is back upgrading and expanding the current security installation. After spending five years with another security provider, the Dynamo and Dash, who maintains the facility, opted for a completely new solution. Axis cameras integrated with Salient Systems VMS Along with their current Panasonic cameras, stadium officials opted for Axis Communications cameras Along with their current Panasonic cameras, stadium officials opted for Axis Communications cameras. Both camera manufacturers play well with Salient Systems VMS. The result was an image resolution much more enhanced than they had been experiencing. “With all of this equipment brought together, we found it to be easy to use, user-friendly, and supported a very complimentary search function,” said Paul Fisher, Director of Key Accounts at Salient Systems, adding “For those people hired as facility guards, and with a sometime frequent turnover in staff, new people were able to use the Salient software right away and were able to do their job guarding the facility more quickly.” Paul further stated, “An installation like this is a great reference for us, and it is a very exciting security installation. Although there are fewer than 100 cameras, the placement and location of the cameras will allow security to monitor the sometimes over-zealous fans, and with BBVA Compass Stadium officials installing our synopsis video tool, stadium officials will be able to key-map the entire facility, gain analytical data and improve the customer experience.” CompleteView VMS platform Salient also partners with Dell, taking its CompleteView VMS platform into the booming Internet of Things market. The CompleteView VMS’ ability to quickly render and manage video surveillance over a WAN or LAN makes it a compelling offering for solution providers looking to gain a foothold in IoT. The manner through which the video is processed is very efficient, and can render the video and perform forensics on the video rapidly. As more businesses look to video surveillance as an IoT application, the CompleteView VMS platform can be integrated with other software packages will enable partners to work with customers to solve specific problems through big data and analytics capabilities. DSX software installed for secure access control BBVA Compass Stadium officials also switched out the outdated access control software and installed DSX software to complete the upgrade. “We have long known that DSX is a workhorse software solution,” said Jason Smith, President of Cultris Security Systems Inc., adding “It is easy to use and a lower cost to use. These upgrades are exciting for us to be part of because the installation will come in several phases, with the integration supported for years to come.” Open architecture security solutions Cultris technicians almost had a blank canvas to begin their security installation Jason adds, “We also found working with BBVA Compass Stadium staff very easy because they were receptive to open architecture security solutions. Phase Two will begin in 2019, and we’re excited to design the next layer of security at the stadium.” Cultris technicians almost had a blank canvas to begin their security installation. The facility itself is an open architecture facility, so facility managers were very receptive when plans were drawn up for security equipment. Much of the focus was on the stadium concourses, where the bulk of the soccer fans’ traffic is found during a match. 360-degree cameras installed The new master plan now included 360-degree cameras along the concourse, which offered coverage in every direction. The same 360-degree cameras were also placed near the locker rooms, loading docks and service areas. PTZ and fixed lens cameras were upgraded and placed in each corner of the facility where there is a gate for entrance and exit. As imagined, soccer fans are very passionate about their sport and teams, so cameras on the concourse were placed in a planned manner for the guarding staff to be able to know and react quickly if or when a fight broke out among spectators. The 360-degree cameras also enable the security staff to mobilise and reach the incident spot, where they would be required, as quickly as possible. 4K PTZ cameras Stadium security staff is able to view cameras placed in an adjacent parking area Houston’s BBVA Compass Stadium has a capacity of 22,039 seats, including 34 private suites, 1,100 club seats, an indoor premium club area, a dedicated supporters/fans stand and a food court. The stadium is designed to accommodate Major League Soccer (MLS) and FIFA standard international soccer, as well as other sports including football, lacrosse, and rugby and live concerts. Stadium security staff is able to view cameras placed in an adjacent parking area, as well as city security cameras (live view only) in order to ensure the safety and security of people coming to the venue and leaving after the match. These cameras have a 4K PTZ quick drive function, which helps establish a clear view of events, if additional security help is needed. As an integrator, Cultris Security has clearly installed a solution that will work properly for BBVA Compass Stadium, and their tenants, who are always looking to strike a goal.
The year 2020 is bound to be a special year with the outbreak of coronavirus disease 2019 (COVID-19) globally. The highly contagious disease has taken away many lives and counting, especially in China, South Korea, Japan, and some countries in Europe and Middle East. Dahua Technology, globally renowned video-centric smart IoT solutions and services provider, has been an early participant in the epidemic prevention and control in Asia, joining the global efforts in combating the virus to minimise the impact on mankind. Dahua Thermal Solution Since sending its first batch of thermal cameras to the hardest-hit area Wuhan on January 24th, 2020 Dahua Thermal Solution has been deployed in thousands of sites in China, including transportation hubs, commercial complexes, banks, and other places, and some are on the way to multiple countries in Asia. Hong Kong, a financial capital in Asia, also suffers from the COVID-19 epidemic situation. Dahua Thermal Solution has been applied in some local business complexes, banks, company parks, and other places. To enable safe and smooth work resumption recently, quite a few major corporations have been using Dahua Thermal Solution in their headquarters and subsidiaries to improve their workplace safety. Dahua Thermal Solution measures the body temperature of their employees, handling thousands of staff flow every day. Thermal cameras deployed at virus-hit zones Using Dahua Thermal Solution will significantly improve speed and accuracy in body temperature measurement Compare to the traditional way of body temperature measurement – a forehead thermometer, using Dahua Thermal Solution will significantly improve speed and accuracy, and at the same time, help reduce cross-infection via non-contact measurement. To measure the temperature of 5,000 people, it will take about 4.2 hours using a forehead thermometer, as it takes at least 3 seconds to measure a person. However, it takes only 30 minutes if using the Dahua Thermal Solution, which measures 3 person per second. It also features a high accuracy of ±0.3℃ . Epidemic prevention and control “Dahua Thermal Solution helped us detect a couple of suspected cases in just a few hours of operation, which we greatly appreciate,” a Hong Kong user commented. Dahua Thermal Solution has been on the front line since the very beginning, helping with the epidemic prevention and control in airports, railway stations, hospitals, schools, and other sites all over Asia. Featuring high accuracy, high efficiency, strong adaptability and easy deployment, Dahua Thermal Solution can also be applied to all kinds of entrances and exits, kitchens and kindergartens.
Oman Airports manages and operates all civil airports in the Sultanate of Oman. As a result of the growing aviation sector in the Middle East, Salalah, Duqm and Muscat International airports were all recently redeveloped with new state-of-the-art terminal facilities and technologies. Access control solution To protect Oman Airport’s growing number of passengers and new hi-tech terminal buildings, Oman Airports required an advanced access control solution that not only incorporated the latest advances in technology but also had proven resilience within the aviation industry. With 30 years’ experience of securing airports around the world, the CEM Systems’ AC2000 Airport security management system was the ideal match. As the largest airport in Oman, Muscat International’s upgrade was a landmark $1.8 billion expansion project. Phase one involved the construction of a new state-of-the-art 580,000 sqm Terminal 1 building, which was officially inaugurated for operations in March 2018. CEM intelligent card readers additionally feature a large internal database for offline card validation" Airport edition access control system “Oman Airports required a proven, fully integrated security solution to secure Muscat Airport’s new hi-tech Terminal 1 building, as well as a number of its external peripheral buildings. At the same time we were also awarded the contract to secure the new Salalah and Duqm Airports in Oman. “This allowed all three airports to use the CEM Systems’ AC2000 Airport Edition access control system and share a commonality of security infrastructure for operational excellence. We congratulate Oman Airports in their achievement and are delighted to be part of such an important leading infrastructure project for the development of Oman.” said Philip Verner Regional Sales Director, Security Products, Johnson Controls. Intelligent IP card readers CEM Systems’ range of intelligent IP card readers with integrated controllers (S610e, S700 readers) were installed throughout Oman Airports to provide the highest possible level of on-board smart card technology. CEM intelligent card readers additionally feature a large internal database for offline card validation and can store up to 200,000 cardholder records and 50,000 transactions offline. This ensures zero system downtime, prevents any loss of transaction data and delivers the highest possible level of system reliability within airports. Over 3,000 CEM IP card readers were installed throughout Muscat Airport’s new Terminal 1 to protect airside and landside locations, including 45 arrival and departure gates, 29 jet-bridges and 82 immigration counters. Emerald touchscreen terminals CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport A large number of outlying annex buildings (spread out over 30,000 m2) were also secured with CEM intelligent card readers. These included a new 97m high Air Traffic Control (ATC) tower, aircraft hangars, cargo and crew facility buildings and the new pivotal headquarters building for the Public Authority for Civil Aviation (PACA). CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport for heightened security. Emerald is a combined access control card reader and controller featuring fully integrated Voice over IP (VoIP) intercom, onboard Power over Ethernet technology and a range of smart airport applications and operational modes, all in one single, powerful terminal. Integrated biometric and access control solution For areas of heightened security, over 1,300 CEM fingerprint card readers (S610f & emerald fingerprint terminals) have also been installed throughout all three Oman airports. As an all-in-one advanced IP card reader, controller and integrated biometric solution combined, CEM fingerprint readers uniquely provides three layers of security (card, PIN and biometric verification) via one hardware device and one integrated software enrolment process. This eradicates the need for a separate biometric enrolment solution, provides a quick and accurate biometric read time and ultimately creates less biometric verification errors at the door/gate. Intelligent IP readers critically provide Oman Airports with aviation specific door modes Gate room management CEM Systems’ intelligent IP readers also go beyond security by helping airport operations. Intelligent readers are used to enable air-bridge monitoring, provide check-in-desk enabling, control baggage belts and assist with airport passenger flow and gate room management. Intelligent IP readers critically provide Oman Airports with aviation specific door modes such as ‘Passenger mode’ which enables the efficient management of gate rooms for departing and arriving passengers. Passenger mode controls the open times of single or interlocking doors, ensuring Gate Room doors are opened or closed depending on the configuration set for a specific flight. The user-friendly LCD screen on CEM card readers effectively acts as a smart information point for ID staff and flight agents and allows staff to easily manage the Gate Arrivals process on the ground. S3040 portable hand-held readers Oman Airports now utilise portable card readers to enable random ID checks on personnelCEM Systems’ S3040 portable hand-held readers uniquely protected Muscat International Airport during its initial construction phase in December 2014. Portable readers enabled ID card validation at temporary airport site entrances and gates, which at the time of construction had no power or comms. Oman Airports now utilise portable card readers to enable random ID checks on personnel throughout all three airports. Designed specifically for airports, CEM Systems’ AC2000 Airport security management system provides powerful aviation-specific access control throughout airside and landside areas. Using a range of powerful AC2000 Airport software applications, Oman Airports benefit from sophisticated ID badging, airport visitor management and high levels of airport systems integration. Open architecture integration tools CEM Systems’ open architecture integration tools successfully enabled the AC2000 access control system to be seamlessly linked with other airport security systems including video, perimeter detection and Oman Airport’s central ‘Airport Operating System’ for the resolution of maintenance faults. This ensures that system maintenance faults and alarms are dealt with promptly, efficiently and with full accountability. Oman Airports use the CEM Systems’ AC2000 VIPPS application to manage airport pass applications and biometrics To provide the highest possible level of smart card security to over 30,000 authorised card holders, all three Oman Airports utilise highly secure CEM DESFire smart card technology with multiple layers of encryption. Oman Airports use the CEM Systems’ AC2000 VIPPS (Visual Imaging Pass Production) application to successfully manage airport pass applications and biometrics. AC2000 Visitors application The AC2000 Visitors application also provides a powerful tool for Oman Airports to monitor and control ID card access for visitors and temporary airport staff. Information such as ‘name of airport sponsor’ can be recorded and once visits have been completed, cards can then be recycled, creating efficiency savings within the airport ID centre. Moving forward, CEM Systems will continue to work together in partnership with Oman Airports and their chosen system integrators as all three airports move into their next development phases. It is understood that airport security needs and legislation requirements change over time and thus CEM Systems will remain flexible to help meet their evolving project needs.
BI-City Tokyo is located in Nur-Sultan (Astana), the capital city of Kazakhstan. It is a high-end residential complex of BI Group – a renowned construction holding company in the Kazakhstan real estate market. At present, three apartment buildings with public areas and more than 400 apartment units have been completed. Aiming to create modern high-end intelligent buildings and residential areas, the BI Group wanted to upgrade the existing analog video intercom system of BI-City Tokyo. Replacing analog intercom system The original analog intercom system in this community is outdated and cannot meet the diverse security requirements of high-end residential areas. First, the original analog intercom does not support retaining images and leaving messages. Second, this system only supports access cards to open doors, which is inconvenient for residents in case they forgot their card. Third, the original system cannot add IP cameras to monitor public areas such as children's playground, fitness areas, etc. Fourth, the cold winter temperature in Nur-Sultan requires high-performance equipment capable of operating in extreme environments. Faced with the abovementioned challenges, BI Group was also looking for a trustworthy brand that can provide not only modern smart system but also technical support and reliable after-sales service. Meeting all the above requirements, Dahua smart residential solution was chosen to be the security solution provider of BI-City Tokyo. Dahua Smart Residential Security Solution The complete solution deployed more than 300 pieces of Dahua equipment, including IP cameras The complete solution deployed more than 300 pieces of Dahua equipment, including Indoor Monitor, Apartment Outdoor Station, IP Camera, Access ANPR Camera, Video Recorder, etc. The solution supports two-way audio intercom, real-time video and messaging feature. In addition, a variety of door opening methods were also implemented: door opening via remote calling, door opening using access card, and remote door opening via APP. Additionally, all the equipment can be visualised and integrated in the Dahua DSS platform for centralised management, operation and maintenance. Moreover, the temperature in Nur-Sultan can reach up to negative 40 degrees in winter season. This requires high-performance outdoor devices featuring dust and water resistance, and explosion-roof capability. In response to this pressing challenge, Dahua apartment outdoor station VTO1210C-X-S1 and access ANPR camera ITC237-PW1B-IRZ that support wide working temperature were installed at the entrance of the apartment building for a more effective visitor and vehicle management. ANPR and IP cameras installed When a visitor arrives at the entrance of the apartment building and dials a resident’s room number through the Dahua apartment outdoor station, the camera installed at the entrance will synchronise the video with the visitor’s image captured in the resident’s indoor monitor. Once the visitor’s identity is confirmed, the resident just needs to press the button on the indoor monitor to open the door remotely. With Dahua app, users can even answer calls and open doors remotely when they are out for work or traveling. As for vehicles, Dahua access ANPR camera ITC237-PW1B-IRZ is designed for extreme temperature environments (temperature range of -40°C to +60°C). With built-in intelligent video analytics, the camera has the ability to detect and recognise moving vehicle's plate number within low speed. Vehicle tracking and identification For both approaching and departing vehicles, the access ANPR camera takes a snapshot of the number plate and vehicle overview picture, as well as records corresponding surveillance videos. By setting a whitelist, the camera can automatically control the barrier or gate to open if a plate number recorded in the whitelist has been recognised. The public areas including children's playground, fitness areas, as well as the lobby are covered by 2MP IR Mini Dome Network Camera IPC-HDBW4231E-ASE, 2MP and 3MP IR Mini-Bullet Network Camera. The Starlight Ultra-low Light Technology of IPC-HDBW4231E-ASE offers industry-leading light sensitivity, capturing colour details under low light condition up to 0.002lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. Integrated management platform Dahua smart residential solution provides an integrated management platform for the personnel of BI-City Tokyo Dahua smart residential solution provides an integrated management platform for the management personnel of BI-City Tokyo. It assists in the remote and visual management of the property and improves the services and facilities they offer. Security guard at the entrance is not needed anymore to manage entering and exiting vehicles, which saves labor costs, reduces the waiting time of vehicles and improves traffic efficiency. In addition, the all-round monitoring of the public areas within BI-City Tokyo greatly improves the safety level of the entire community. The video intercom system of the building provides a variety of convenient door opening methods, enhancing the resident’s living experience. IP video intercom solution “We adopted analog solution in the first phase. From the second phase, we replaced all of analog system with Dahua’s IP video intercom solution. We hope that Dahua will help us complete the solution planning of the three, four, five, and six phases,” said Arman Lesbekov, General Manager of BI Group. Dahua Technology is an internationally renowned video surveillance and security solutions provider with more than 6000 professionals in their R&D team, dedicated to providing cutting-edge products in technologies like AI, IoT, Cloud services, video, cyber security, and software reliability with high quality and performance. Video surveillance systems expert Since 2014, Dahua has ranked second in the global video surveillance equipment market according to an IHS report, and in 2017 Dahua ranked third in the A&S International "Security 50". The company believes in investing and building strong R&D capabilities for new technology and innovation.
Round table discussion
Video storage has been a challenge since the days of VCRs and videotape. Storing images is a central need for any video systems, especially one that is focused on the forensic and investigative aspects of video. Today, digital video is stored on hard drives and even in the cloud. Increasingly, video is considered “data” that drives a variety of video analytics and even artificial intelligence (AI) applications. We asked this week’s Expert Panel Roundtable: What are the new trends and opportunities in video storage?
Artificial intelligence (AI) and machine learning have made a big splash in the physical security market, transforming video analytics to a new level of accuracy. In fact, the terms have become common buzzwords throughout the industry. However, the potential for AI and machine learning to impact the physical security industry goes far beyond their ability to improve video analytics. We asked this week’s Expert Panel Roundtable: Beyond better video analytics, how can artificial intelligence (AI) and/or machine learning benefit the physical security market?
The emergence of smart cities provides real-world evidence of the vast capabilities of the Internet of Things (IoT). Urban areas today can deploy a variety of IoT sensors to collect data that is then analysed to provide insights to drive better decision-making and ultimately to make modern cities more livable. Safety and security are an important aspect of smart cities, and the capabilities that drive smarter cities also enable technologies that make them safer. We asked this week’s Expert Panel Roundtable: what are the physical security challenges of smart cities?
Software libraries, security applications and open platforms: '5 Minutes With' Video Interview with Fabio Marti from Security & Safety Things