Internet of Things (IoT)
Dojo by BullGuard, globally renowned IoT security platform for Communication Service Providers (CSPs), has announced the addition of DIP EDGE to the Dojo Intelligent IoT Security Platform (DIP). DIP EDGE is a software-based, IoT security gateway, a 5G and Multi-Access Edge Computing (MEC)-compatible Virtualised Network Function (VNF). DIP EDGE is a highly distributed, CSP-grade IoT security gateway with a comprehensive set of IoT-related threat detection and mitigation features. Dojo Intelligen...
DigiCert, Inc., global provider of TLS/SSL, IoT and PKI solutions; Utimaco, one of the world’s top three Hardware Security Module providers; and Microsoft Research, a provider of quantum-safe cryptography, announced a successful test implementation of the “Picnic” algorithm, with digital certificates used to encrypt, authenticate and provide integrity for connected devices commonly referred to as the Internet of Things (IoT). This proof of concept provides a path toward a full...
HID Global, a provider of trusted identity solutions, and Mist Systems, a pioneer in self-learning wireless networks powered by artificial intelligence (AI), announces that the two companies are working together to converge Bluetooth Low Energy (BLE)-based location services with Wireless LAN (WLAN) infrastructure for better deployment, management, and operations of IoT devices. With HID Location Services that is enabled by Bluvision, HID Global is an innovation in the IoT space as market pionee...
HID Global, a provider of trusted identity solutions, announces its new BEEKs Duress Badge Beacon that addresses the growing need to protect doctors, nurses and other caregivers from threatening situations that arise in the hospital environment. The Bluetooth Low Energy (BLE) duress functionality provides a fast and easy way for hospital personnel to send security staff real-time distress alerts from anywhere in or around the hospital campus if they are in duress and in case of other emergencie...
Constantly optimising deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting existing hardware Today, low-co...
Arcules, innovators in integrated video cloud as a service, announces that it has named Cody Flood as Senior Director of Sales for the United States and Canada. In this role, Flood will focus on amplifying the momentum of the regional sales team, and play a significant role in accelerating adoption of the Arcules cloud-based service. “The security industry is experiencing a period of disruption fuelled by rapid advancements in technology, and Arcules is at the forefront of offering modern...
AMG Systems is proud to announce that it has partnered with Juniper Networks, a provider of automated, scalable and secure networks, to offer its clients a single-source, enterprise-level, total networking solution. Customers will now be able to take advantage of both AMG’s specialised edge of network transmission systems for video security and other devices and Juniper’s core Layer 3 backbone networks, all provided by a single-source supplier. AMG Systems is the only UK-based IP and Ethernet switch product manufacturer and solution provider. Aiming to create simplicity through engineering, Juniper works to solve the world’s most difficult problems in network technology. Enhanced customer support Utilising a single supplier for an end-to-end networking solution can lower risk for usersThe new partnership means that AMG Systems will become an authorised reseller of Juniper Networks solutions through added value EMEA distributor, Nuvias. AMG Sales and Technical Support Manager, Ian Creary, says this will provide enormous benefit to customers. “They’ll receive even greater support with system design and product specification from AMG,” he says. “We have a reputation for providing the highest quality service and support, and that will only be enhanced now that our offering has expanded to include this full network provision capability.” AMG Business Development Director, Sara Fisher, says utilising a single supplier for an end-to-end networking solution can lower risk for users. “They have the peace of mind that only comes when both aspects of a network are designed and implemented together,” she says. Software-defined networking solutions The partnership between Juniper and AMG is significant and exciting because it offers users the very best of both worlds"“There’s no danger that the core network and the specialist edge network will be working at cross-purposes because they both come from the same reliable source. The partnership between Juniper and AMG is significant and exciting because it offers users the very best of both worlds, but with a single point of contact.” Rob Neal, Area Partner Director, UK and Ireland at Juniper Networks, says with video security and related smart devices as one of the IoT use cases, these systems can provide peace of mind and protection for people, assets and infrastructure. “Implementing and integrating these systems into an existing network can be complex, and means overcoming new infrastructure, security, and innovation challenges,” Neal says. “Juniper is ready to help with software-defined networking solutions that address and simplify the tasks that could otherwise derail big IoT projects.”
Pivot3, a provider of intelligent infrastructure solutions, has completed an advanced certification of its hyperconverged infrastructure with Genetec Security Center software. The combination of Pivot3 and the Genetec unified security platform delivers a robust integrated security and IoT solution designed to support the complex requirements of video-intensive, mission-critical environments. Additionally, Pivot3’s certified intelligent infrastructure provides three times the performance over its previous certification. Pivot3’s intelligent infrastructure is optimised to deliver the performance, resilience, scalability and ease-of-use required for enterprise-class security, video surveillance and IoT deployments to Genetec video management system customers. Eliminating system downtime The certification process ensures the companies’ combined solutions provide the advanced tools and high availability organisations require to streamline mission-critical video, security management and storage by hosting Genetec Security Center and additional applications on a single secure, resilient and scalable platform. Pivot3’s high-performance, ultra-dense, highly resilient technologies reduce risk and cost by eliminating system downtime “We are pleased to welcome Pivot3 into our partnership program,” said Georges Tannous, Director of Strategic Alliances, Genetec Inc. “Our joint customers and integration partners can benefit from this certification by trusting in the fact that our combined solutions deliver the performance and resilience required to meet their demanding implementations.” Pivot3’s high-performance, ultra-dense, highly resilient technologies reduce risk and cost by eliminating system downtime and data loss and simplifying management at scale. Additional applications With Pivot3, organisations can consolidate video surveillance and all additional applications onto a common infrastructure platform, reducing the need to purchase and manage extra hardware and delivering enterprise-class resilience and performance to the entire application suite. “The combination of Genetec and Pivot3 delivers robust infrastructure designed to meet the demanding needs of complex security and IoT environments,” said Brandon Reich, vice president of security and IoT, Pivot3. “Genetec is a leader in providing organisations with the insight and awareness necessary to ensure high levels of security, and we embrace the opportunity for continued collaboration to ensure our customers' applications and data are properly captured, protected and readily available when needed.”
Pivot3, a provider of intelligent infrastructure solutions, announces that it has named Rance Poehler as vice president of global sales and chief revenue officer. In this role, Poehler will be responsible for Pivot3’s global sales organisation and executing on the company’s growth strategy and talent acquisition. Poehler joins Pivot3 from Dell Technologies where he served as vice president of worldwide sales for its cloud client computing team, an $800 million line of business that represents a full suite of cloud and desktop virtualisation solutions. Mission-critical environments At Toshiba and IBM, Poehler held progressively senior roles selling into corporate data centers During his tenure as president of Panasonic System Communications Company, he led a $1.1 billion business-to-business North American division, delivering integrated Internet of Things solutions that helped Fortune 1000 companies and government agencies achieve competitive advantage and improve outcomes in mission-critical environments. At Toshiba and IBM, Poehler held progressively senior roles selling into corporate data centers. “Rance has extensive experience building and expanding medium- and large-scale B2B organisations while creating a culture that motivates team members to contribute to their potential,” said Ron Nash, CEO at Pivot3. Positive impact “He has consistently delivered margin and market share growth in complex organisations. We are thrilled to add this level of talent to our already strong group of sales leaders as we continue to create a formidable and highly experienced enterprise sales organisation at Pivot3. Rance knows our segments and our technology so he’ll have an immediate positive impact.” I am thrilled to work with Pivot3’s world-class sales organisation" With more than 25 years of experience addressing cloud computing, security, Internet of Things (IoT) and video surveillance solutions in unique vertical markets and with a broad ecosystem of partners, Poehler has managed sales and marketing, engineering and technology development and overall business operations. Truly intelligent platform As leader of global sales for Pivot3, he will build on the momentum of regional sales and channel teams, both in the U.S. and internationally, and will direct and execute growth strategies across Pivot3’s federal and global major accounts teams. “Organisations are looking for solutions that automate the exploding complexity and reduce the costs of delivering IT business services, from the core, the cloud and to the edge. Pivot3 has developed a truly intelligent platform that helps enterprises navigate those challenges with solutions that are secure, resilient and manageable at enterprise scale,” said Poehler. “I am thrilled to work with Pivot3’s world-class sales organisation to help further our innovation, market growth and customer success.”
ADT Inc., a provider of monitored security and interactive home and business automation solutions in the United States and Canada, announces its intent to lead a new consumer privacy initiative with a coalition of organisations committed to driving the adoption of privacy standards and best practices across the home security industry. The initiative will focus on ensuring the security and home automation industry take a leadership role in protecting consumer privacy. Launched on Data Privacy Day, these efforts build on ADT’s promise to protect what matters most. Implement high standards Every day millions of our customers trust us with what they love and cherish the most, including their privacy" According to data released in November by market-research firm Harris Poll and public relations firm Finn Partners, data privacy is the most pressing issue for those surveyed, and consumers are looking for companies to be proactive in protecting their data. With considerable growth and technology innovation in the security industry, the prioritisation of privacy is higher than ever before. “Every day millions of our customers trust us with what they love and cherish the most, including their privacy. That is why our privacy practices are purposefully designed to ensure we continue earning their well-placed trust,” said Jim DeVries, President and CEO, ADT. “This initiative is part of our ongoing commitment, as the market leader in home security, to implement high standards for our industry, and as we look at the future of technology and access, align our industry around standards and practices that better protect consumers.” Customer-centric In the coming months, the initiative will focus on three key objectives: Adopting a set of industry-wide best practices that are customer-centric and drive transparency. Working with dealers, partners and other industry organisations on the enhanced privacy and ethical standards for our industry. Programs focused on privacy, ethics, and transparency. Protecting data privacy Partners in this initiative currently include: Security Industry Association (SIA), the trade association for global security solution providers, with nearly 900 innovative member companies representing thousands of security leaders and experts who shape the future of the security industry. The Monitoring Association, an internationally-recognised, non-profit trade association representing professional monitoring companies. Electronic Security Association, the largest trade association in the U.S. representing the electronic security and life safety industry. The Internet Society’s Online Trust Alliance, an organisation that identifies and promotes security and privacy best practices that build consumer confidence in the Internet, in part through its IoT Trust Framework. TrustArc, who provides solutions to manage privacy compliance for the GDPR, CCPA and other global privacy regulations. The Security Industry Association is pleased to support this important broad-based effort led by ADT to ensure the privacy of consumers" “The Security Industry Association is pleased to support this important broad-based effort led by ADT to ensure the privacy of consumers,” SIA CEO Don Erickson said. “SIA has taken a leading role on privacy issues through its Data Privacy Advisory Board, and we look forward to working with our partners on this project to demonstrate that members of the industry are as committed to protecting data privacy as they are to securing people and property.” Managed commercial solutions ADT is soliciting participation from all other organisations who wish to help drive these objectives. For over 144 years, ADT has been committed to keeping families and homes safe. ADT evolved this mission by extending physical security to cybersecurity for residential customers with Identity Theft Protection, which provides monitoring and support to help customers minimise their risk of identity theft and loss exposure. ADT also offers cybersecurity solutions for enterprise and small businesses, providing monitored and managed commercial solutions that protect customers from multiple vectors of attack, including network, endpoints, servers, and email communications.
KDDI has introduced the KDDI GX (Global Exchange) Platform, providing overseas corporate customers with centralised support across a range of solutions including network, security, RPA (robotic process automation), IoT and others. The KDDI GX Platform will initially be offered across the ASEAN region covered by KDDI Singapore, including Vietnam, Indonesia, Malaysia, Thailand, Philippines, Myanmar, Cambodia, India, and the United Arab Emirates and Australia. Powerful operational support for IoT solutions The GX Platform will provide powerful operational support for a spectrum of solutions including IoT and RPAFor Japanese firms operating overseas, working in local IT environments is often an essential concern. Issues include relocation and human resource management, outsourcing operations management, minimising infrastructure cost, and optimising management, governance, and IT security, while advances in information technology require stable IT personnel in each country to maintain the IT environment. KDDI is responding to customer concerns by enabling a uniform response to these issues and making the KDDI GX Platform available. Through the integration of a full range of IT-related issues facing customers with operations overseas, the GX Platform will provide powerful operational support for a spectrum of solutions including IoT and RPA, in addition to establishing the necessary IT environments. Staff optimisation and cost minimisation Clients deploying the KDDI GX Platform will be able to concentrate IT-related resources on the expansion of core business operations, as the platform enables services common to each country, while fully outsourcing operations and management. With the GX Platform, staffing can be optimised as well as costs minimised. As the KDDI Group works to achieve its goal of ‘integrating telecommunications and life design’, it will continue to be a company that offers exciting new ideas and creates new customer experience value through powerful support for the global business implementation of the corporate customers. Expansion of core business operations Through staff optimisation and cost minimisation, clients are able to refocus their IT resources on the expansion of core business operationsKDDI enables access to common services across Asia, and the world. They can support corporate customers in each country with optimisation of human resource management, outsourcing of operations management, minimisation of infrastructure costs, and IT governance and security. Through staff optimisation and cost minimisation, clients are able to refocus their IT resources on the expansion of core business operations. Features:  The KDDI GX Platform can be used anywhere an Internet environment is in place. *Some services are unavailable in certain countries.  No initial investment required and services can be used for a monthly user fee. *Some services may incur one-time fees, depending on content.  Clients can select only the services they need according to their IT environments.  Services can be expanded or reduced according to the client IT environment. Key service offerings:  KDDI Managed Services Remote monitoring of all services and devices on the network Maintenance, support and problem solving for clients through flexible menu Complete IT operations and management, from PC to server  UiPath with KDDI Boosted productivity with UiPath robotic process automation (RPA) RPA engineers stationed throughout Southeast Asia region Full global robotic process control including data centre, cloud and network Start small with tailored service implementation plans for each customer  SORACOM with KDDI SORACOM powerful IoT platform, available in over 100 countries Flexible device support and applications compatibility respond to all needs Secure transmission of client data, device management and cloud integration  Zscaler with KDDI Zscaler, world's largest cloud-based web security platform Provides multi-layered security against diversifying online threats Multi-device and location-free, protects across users, devices and locations Protects from even the most advanced and complicated cyber-attacks  KDDI Cloud Inventory Centralised IT inventory and management platform Global endpoint management covering smartphones, virtual machines and more Capable of handling large-scale global systems, providing diverse security options Detects, prevents and removes targeted attacks, ransomware, unknown malware
nuPSYS—a pioneer in Internet of Things (IoT) solutions for physical security, infrastructure, and networks—is pleased to announce its 3D-Advanced Mapping integrated with the Milestone-Canon Video Management System as a plug-&-play 3D-plugin, which was shown live at Intersec 2019. nuSIM is a visual 3D-mapping solution that allows assets, cameras, sensors, alarms, partitions, and critical points to be accurately plotted onto a 3D mapping surface. This integration will enable operators to graphically view multilayer live video overlays within the Milestone-Canon VMS user interface. Key features include: 3D advanced mapping Integrated 3D view 3D representation of assets, cameras, sensors, & access control Generates a real-perspective view for operators – enhances efficiency manifold Interactive and dynamic operations Pragmatic 3D virtual presence Customisation dashboard per use case Dashboard provides simultaneous 3D view, streaming view and sensor view CONTEXT AWARE: immersed in the 3D physical environment SCALE: Single light pole (or single smart infrastructure) to a full smart city-scape SPEED: Real-time KPI IMPROVEMENTS: Enhanced efficiencies compared to maps and icons overlay nuPSYS' 3D-Advanced Mapping functionality provides system operators with a unique experience for viewing video and managing devices within the Milestone-Canon Video Management System. Operators can navigate to see cameras and sensors using a 3D model of the facility and grounds, providing a unique simple-to-deploy 3D-plugin for Milestone-Canon VMS.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile credentials are not secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organisation more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organisation deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All smartcards are equally secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organisation vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organisation if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic locks are more vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorised access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be prepared to unlock future benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
The oil and gas market is driven by a number of technology trends, political issues, waves of supply and demand, and regulations. At times, it seems like the market is in a constant state of ebb and flow, with business affected by traditional drivers, such as government mandates and operational efficiencies, and other non-traditional markers, like challenging weather conditions (consider the 2017 hurricane season as an example). Additionally, the global economy continues to grow, propelling increased energy demand. But like nearly every other market today, the oil and gas market is on the brink of a sea change. According to Deloitte’s 2018 outlook on oil and gas, “the digital revolution is here.” The sheer volume of information and data generated by digital devices, such as those associated with the Internet of Things, will allow producers to leverage rich data and combine it to deliver smart, efficient solutions. The rise of digital technologies is unleashing new ideas across the oil and gas industry and even though we are in the beginning stage of being able to harness the power of these types of technologies, innovative ideas are emerging — all designed to support the core business, reduce internal investments, deliver products faster, boost efficiencies, and enhance safety. Maximised operations and increased ROI This ongoing growth propels energy producers to embark on extensive exploration and production activities to meet increased demand This is welcome news because there are a number of challenges facing the oil and gas industry, from improving reserve replacement and ensuring workplace safety to reducing operating costs and limiting downtime. All of these objectives must be achieved while maximising operations and increasing overall return on investment. Never has it been more crucial for critical infrastructure organisations to demonstrate a focus on safety, security, and collaboration. Here's why: Growth and demand According to the U.S. Energy Information Administration, world energy consumption will grow by 56 percent between 2010 and 2040. This ongoing growth propels energy producers to embark on extensive exploration and production activities to meet increased demand. As energy-centric organisations look to emerging markets or remote regions to source production, safety becomes even more mission-critical to their success. Compliance Continuous demand is only one challenge; compliance with industry and government regulations is another significant hurdle that must be maintained or there is risk of production shutdowns. For example, the Department of Homeland Security’s Chemical Facility Anti-Terrorism Standards (CFATS) impose comprehensive federal regulations for high-risk chemical facilities, requiring organisations to conduct vulnerability assessments. This is just one of many regulatory procedures sites must follow to conform to environmental protections, safety precautions, and safe handling of hazardous materials. As energy-centric organisations look to emerging markets or remote regions to source production, safety becomes even more mission-critical to their success Threat protection, mitigation, and collaboration In addition to meeting the requirements of regulatory procedures, mitigating risk in this industry propels leaders to develop stringent strategies to ensure robust protection of people, property, and assets, effective and efficient response to incidents when they occur, and procedures and protocols to ensure business continuity in emergency situations. Energy providers require comprehensive safety planning and technology systems that can augment the capabilities of on-site and remote personnel. In recent years, video solutions have become the standard for monitoring facilities, assets, and employees, and now these organisations require enterprise-class solutions that can help gather intelligent data that allows for enhanced security and safety efforts but also focus on processes that enhance operational efficiencies. Cyber-attacks are becoming increasingly more complex and sophisticated in the oil and gas market IT security is also a concern. Cyber-attacks are becoming increasingly more complex and sophisticated in the oil and gas market. An IT breach can cause operational havoc, risk to the public, and damage to an organisation’s brand. Adopting a continuous improvement approach to a security strategy safeguards and helps protect valuable company information and reduces the likelihood of an incident. Also, collaboration between IT and physical security leaders and the correlation of both departments' data makes it much easier to identify a potential breach before havoc ensues. The digital age With the rise of the digital revolution and the demand for data to improve insight, oil and gas producers and businesses need to find new ways to capture data, correlate it as needed, and then leverage it to make the most informed decisions. Software platforms are being used in a wide variety of applications to provide a single pane-of-glass view that allows operators to gain critical insight into operations. By collecting intelligence from digital sensors, such as video surveillance cameras, open-source Web intelligence, building systems, crowdsourcing, weather sensors, mobile devices, and more, operators can detect potential risks and manage and respond to situations more efficiently. Furthermore, information can be shared easily with multiple agencies, employees, citizens, and first responders — especially valuable in the event of a safety incident where rapid response is paramount. By creating a single enterprise-wide view across disparate systems and technologies, organisations experience improved response times, lowered operational costs, and increased employee safety. Cyber, traditional security, digital devices, and situational awareness technologies combine to deliver an integrated, automated, and adaptive architecture to efficiently mitigate advanced threats in real time or forensically Traditional command centers Intelligent solutions, such as those derived from the idea of artificial intelligence, help organisations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command center technologies within the oil and gas industry, fusing critical data input from emergency calls and responder activity to enhance situational awareness. With traditional command centers relying mostly on call and radio updates, visibility can be limited, but new digital platforms enable operators to oversee a situation and engage with and direct the response force. Overall, these types of automated functions deliver a simplified and modernised operating environment. The future is the Intelligent SOC Oil and gas facilities can implement a proactive approach to safety and better mitigate threats and protect assets All of these digital solutions are designed to take center stage within the Intelligent Security Operations Center (ISOC). To combat advanced, multi-stage threats, oil and gas facilities are transforming the traditional SOC into the next-generation unified ISOC with an integrated platform for detection, investigation, communication, and response. Cyber, traditional security, digital devices, and situational awareness technologies combine to deliver an integrated, automated, and adaptive architecture to efficiently mitigate advanced threats in real time or forensically. Energy providers operate in challenging, fast-moving environments in which opportunities, requirements, and regulations can vary widely, change quickly, and evolve significantly over time. As the idea of the digital age continues to transform this market, new technologies will be more widely used to improve business operations from exploration and extraction to transportation and distribution. With the right technology, strategic partnerships, and enhanced situational awareness, oil and gas facilities can implement a proactive approach to safety and better mitigate threats and protect assets, while continuing to focus on achieving business goals that will sustain supply and demand for years to come.
The past decade has seen unprecedented growth in data creation and management. The products and services that consumers use every day – and the systems businesses, large and small, rely on – all revolve around data. The increasing frequency of high-profile data breaches and hacks should be alarming to anyone, and there’s a danger data security could worsen in the coming years. According to DataAge 2025, a report by IDC and Seagate, by 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half of it will actually be secured. Nuanced approach to data security Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its securityThe rapid proliferation of embedded systems, IoT, real-time data and AI-powered cognitive systems – as well as new legislation like the European Union’s GDPR – means that data security has to be a priority for businesses like never before. With data used, stored and analysed at both the hardware and software level, we need a new and more nuanced approach to data security. Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its security. What this means in practice is renewed focus on areas of hardware and software protection that have previously not been top of mind or received large amounts of investment from businesses, with security at the drive level being a prime example. The importance of data-at-rest encryption In a world where data is everywhere, businesses need always-on protection. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways A recent report from Thales Data Threat found that data-at-rest security tools can be a great way to help protect your data. However, it’s important to note that this must be used in conjunction with other security measures to ensure that those that fraudulently gain access to your key management system can’t access your data. Ensuring drives to be Common Criteria compliant One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliantDespite the clear benefits, this kind of encryption lags behind other areas, such as network and endpoint security, in terms of the investment it currently receives. The same Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security. One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliant. Common Criteria is an international standard for computer security certification, and drives that meet this standard have a foundational level of protection which users can build on. Providing an additional layer of security The retail industry has seen a spate of security breaches recently, with several major US brands suffering attacks over the busy Easter weekend this year. As frequent handlers of consumer card information, retailers are particularly vulnerable to attack. Data-at-rest encryption could enhance security in these instances, providing an additional layer of security between customer records and the attacker The advanced threats retailers face can often evade security defences without detection. Such a breach could grant attackers unrestricted access to sensitive information for possibly months – some breaches are known to have been detected only after consumer payment details appeared on the dark web. These types of undetected attacks are highly dangerous for retailers, which are relatively helpless to protect consumer information once their defences have been compromised. Data-at-rest encryption could significantly enhance security in these instances, providing an additional layer of security between customer records and the attacker which has the potential to make the stolen data valueless to cyber criminals. Industries in need of data-at-rest encryption Healthcare organisations, which hold highly sensitive customer and patient information, have a strong use case for data-at-rest encryption. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack. Recent research from the American Medical Association and Accenture revealed that 74% of physicians are concerned over future attacks that may compromise patient records. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack The financial sector would also benefit from further investment in data-at-rest encryption, given 78% of financial services firms globally are planning on increasing their spending on critical data, according to Thales’ Data Threat Report. It’s helpful to view security as a circle in which every piece of hardware and software handling the data plays its part SMEs and enterprises are not immune to security threats either – with growing numbers of people traveling for work or working remotely, the risk of sensitive business data becoming exposed via device theft is heightened. Usernames and passwords have little use if thieves can simply remove unencrypted hard drives and copy data across. Securing every hardware and software Technology vendors often focus on aspects of hardware and application security that are within their control. This is understandable, but it risks proliferating a siloed approach to data security. There is no single line for data security -- rather, it’s helpful to view it as a circle in which every piece of hardware and software handling the data plays its part. There’s a clear need for more industry dialogue and collaboration to ensure data security is effectively deployed and connected throughout the security circle and across the value chain.
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality, smart homes, smart cities, and machine intelligence. Video is an important element at CES. This year, the focus is on intelligent video. For example, Eyecloud.ai, Santa Clara, Calif., is displaying a home security camera with on-device face recognition that uses AI. Powered by a 12-core Intel Movidius VPU (video processing unit), the camera combines AI-on-the-edge with easy setup and wirefree operation for up to six months per battery charge. On-device artificial intelligence On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation SimCam, an Intel partner, demonstrates how the Intel Movidius VPU can turn a security camera into ‘the ultimate vision-based sensor’. On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation. A variety of other residential video systems are also on display at CES. For example, Swann Security is displaying 4K wired security systems featuring Google integration, a wireless smart security camera with True Detect heat-based PIR (photo infrared) motion detection, a video doorbell and chime with two-way talk, and indoor and outdoor wi-fi cameras with Alexa integrations. Intelligent automotive solutions Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES. It combines advanced image processing, high-resolution video encoding and CVflow computer vision (video analytics) processing in a single, extremely low-power design. The CVflow architecture provides Deep Neural Network (DNN) processing required for a new generation of affordable and intelligent home monitoring, professional surveillance and aftermarket automotive solutions. CV25 offers half the performance of Ambarella’s previously released CV22 chip, but the new chip’s lower cost will bring intelligent cameras to a price point desirable for home systems. All Ambarella’s chips have hardware-based cybersecurity. A suite of advanced cybersecurity features protects against hacking, including secure boot, TrustZone, and I/O virtualisation. Based on 10nm ultra-low power processing technology, the CV25 chip is optimised for wirefree cameras applications that require long battery life and small form factors. Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES Virtual security guards Elsewhere, the Deep Sentinel home security system applies video and AI to predict residential break-ins ‘before they happen’. The Pleasanton, Calif.-based tech startup uses ‘AI-infused security cameras’ to keep an eye on your home. Three wireless 1080p full HD cameras provide night vision and PIR motion sensing, connected by a smart hub. Using proprietary artificial intelligence, the cameras act as virtual guards, watching activity around a house and providing alerts to situations that may lead to burglaries, break-ins, package thefts and other dangers. My Safe Patrol is an AI-driven platform that analyses data aggregated from security personnel, citizen alert systems and IoT smart devices, and responds with geolocated alerts in real-time. My Safe Patrol effectively supports the security/safety ecosystem of a building, a campus, a city or a district through a dynamic dashboard that helps command and control operations manage and deploy security plans. AI-integrated devices Showcased solutions include Smart Living integration of video surveillance applications to enable real-time two-way audio and video streaming simultaneously MicroVision, Redmond, Wash., showcases an interactive display engine for AI-connected devices, providing an integrated solution for projected display and interactivity through multi-point touch and air gestures. MicroVision’s new consumer 3D LiDAR engine provides high-fidelity spatial awareness to smart home hubs, for input to smart devices such as lighting, security, entertainment, and thermostats. The Internet of Things (IoT) is another big topic at CES, and ThroughTek Co., Ltd., Taiwan, demonstrates IoT developments to transmit voice, video and data over both wide- and narrow-band channels in smart home applications. Showcased solutions include Smart Living integration of video surveillance applications combined with voice assistant to companion robots, wireless doorbells, and battery cameras to enable real-time two-way audio and video streaming simultaneously. Advanced Capacitive Touchscreen Decayeux Group, a European manufacturer of mailboxes and high security doors, is displaying MyColisBox, a secure and connected parcel box delivery system designed to provide online shoppers a secure pickup point accessible by a PIN code sent via SMS message to a smartphone. Walter is the new mobile app for MyColisBox. Kwikset, a division of Spectrum Brands, showcases its smart lock portfolio – including three new smart locks – in the CES Smart Home Marketplace. Kwikset is showing the SmartCode 888, Kwikset Convert, Obsidian, and new designs of the SmartCode 914 and SmartCode 916, as well as a new wi-fi lock. Baldwin, Kwikset’s ‘luxury lock’ sister company, is offering a preview of its new TouchScreen Collection, launching this summer, available in five styles and featuring Advanced Capacitive Touchscreen technology. The Internet of Things (IoT) is another big topic at CES, with many companies demonstrating IoT developments Cyber security standards Privacy is increasingly a concern in the consumer space, and Private Discuss, from PIMAN Security, is a premium, secure, white label communication solution. Their active AI-powered defense architecture provides encrypted audio and video calls, messaging and file sharing. It renders a confidential, secure messaging platform that adheres to the highest standards of cybersecurity. FLIR provides virtual reality demonstrations at their CES booth, allowing attendees to put on a virtual fire helmet and try out a FLIR camera in a real-world residential fire response scenario. Participants may also use a FLIR optical gas imaging camera virtually to stop fugitive emissions in a natural gas refinery. Booth visitors may also take “thermal selfies” to post on social media.
The initials GDPR have become synonymous with the need for companies within the European Union to provide consumers greater transparency and better control over their personal data. The General Data Protection Regulation (GDPR) has also increased awareness of privacy concerns around the world. It’s not the only factor highlighting a need for greater privacy – high-profile privacy breaches by companies such as Facebook are also driving the trend. But GDPR’s global impact cannot be denied. In fact, no company should assume that the need to address “GDPR-style” requirements is limited to the EU. As awareness has extended to the four corners of the globe, it has emboldened a new wave of laws and regulations that physical security companies ignore at their own peril. GDPR has increased awareness of privacy concerns around the world, and encouraged other areas to take notice GDPR also regulates how and if data about EU citizens can be transferred outside EU member states’ borders; the receiving country should have equal or better data protection laws in place. This factor also expands the potential impact of GDPR globally. California's Consumer Privacy Act 2020 California, which has the world’s fifth largest economy, passed a law this year that some have called “GDPR Lite.” The law gives the state’s 40 million residents the right to view private data held by companies, to correct it, to request that it be deleted and to keep it from being sold to third parties. California’s Consumer Privacy Act takes effect in 2020 and could be amended in the interim. The California law was passed quickly – and unanimously – by the state Assembly and Senate and was signed by Gov. Jerry Brown when it became clear that a ballot initiative was being organized to address the issue of privacy. In California, initiatives can be placed on the ballot by collecting signatures to require a direct vote by the electorate. Once passed, ballot initiatives are difficult to amend, requiring a two-thirds vote of state lawmakers. By passing the law, California’s legislature averted a proposed privacy initiative on the fall ballot. GDPR also regulates how and if data about EU citizens can be transferred outside EU member states’ borders There are differences in the California law and the European Union’s GDPR. For example, the California law only applies to companies that have annual gross revenues in excess of $25 million, that hold data on more than 50,000 people or that derive more than 50% of their annual revenues from the sale of personal information. Therefore, most small businesses are immune to the law’s requirements. However, the existence of the California law is a harbinger of more regulations to come, on the state or federal level. In another development related to the physical security industry, California has passed an Information Privacy: Connected Devices bill that requires electronics manufacturers to equip Internet of Things devices with “reasonable” security features – no more passwords such as “admin,” “password,” or “1234.” California’s Consumer Privacy Act is modeled under the General Data Protection Act Expanding the definition of personal information Other states are also getting involved. All 50 U.S. states have enacted breach notification laws requiring businesses to notify consumers if personal information is compromised. For example, Alabama’s new law, passed in June, applies to “unauthorised acquisition of sensitive personally identifying information in electronic form.” Many state laws are expanding the definitions of personal information and increasing cybersecurity requirements as they relate to that information. Globally, rapidly growing adoption of data protection laws is often modeled on regulations such as GDPR The problem with a “patchwork” of state requirements is the possibility that businesses may be caught unaware when state laws have different specific requirements addressing the same general mandate. At the federal level, there have been calls for a data breach notification bill that would provide a single set of rules for organisations to follow. In general, privacy is seen differently in the U.S. than in the E.U., due in part to history and a U.S. commitment to the First Amendment. The U.S. also tends to address privacy rights based on the category of information being considered; i.e., HIPAA requirements cover health information and the Gramm-Leach-Bliley Act regulates financial information. Globally, rapidly growing adoption of data protection laws is often modeled on regulations such as GDPR or on the Organization for Economic Co-operation and Development (OECD) Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. According to the United National Conference on Trade and Development, more than 100 countries around the world now have data protection legislation in place. Protecting and managing data All 50 U.S. states have enacted breach notification laws requiring businesses to notify consumers if personal information is compromisedWhen you consider the impact GDPR has had on the physical security market, the possible new hurdles can boggle the mind as additional privacy requirements take hold in the U.S and around the world. Challenges range from worries about management of access control and video surveillance data to concerns about biometrics. The success of new technologies using artificial intelligence (AI) depend on access to large data sets, so ensuring that data is protected and managed correctly is paramount. The genie is out of the bottle. GDPR may be driving the first wave of privacy concerns, but there is much more to come. Anyone who dismissed GDPR as a “European” factor is missing an opportunity to address issues proactively and to ensure optimum management of data privacy and transparency in the future.
Security and Safety Things GmbH (SAST) is a new company that has announced its vision for an Internet of Things (IoT) platform for the next generation of security cameras. The Bosch startup plans to build a global ecosystem for the development of innovative security camera applications. Based on the Android Open Source Project (AOSP), SAST provides libraries, an API framework, and codecs for developers to work with. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphone applications. We presented some questions to Nikolas Mangold-Takao, VP Product Management and Marketing, about the new venture, and here are his responses: Q: Why a new company now? What technology innovations have made this a good time to launch this company? The time is right to bring market needs and technological innovations together on one platform"Mangold-Takao: From a technical perspective we see two main drivers: increasing computing power at the edge and increasing internet connectivity, which will enable devices to directly communicate with each other and bring new technologies such as artificial intelligence also to the security and safety industry. At the same time, we see that this industry and its users are hungry for more innovative solutions – addressing new security needs while at the same leveraging the possibility to improve business operations for specific verticals, e.g. retail and transportation. The time is right to bring market needs and technological innovations together on one platform for this industry. Q: Why does SAST need to be a separate entity from Bosch? Mangold-Takao: SAST is setup as a wholly owned subsidiary of the Bosch Group. We wanted to make sure that SAST is able to underline its role as an industry standard platform across multiple players. SAST is open to get additional investors and is being setup as a startup in its own offices in Munich to foster the environment where speed and innovation can more easily take place. Having said that, several entities of the Bosch Group are very interesting partners for SAST. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphone applications Q: Please explain your "value proposition" to the industry. Mangold-Takao: We will bring new innovations and possibilities to the security and safety industry by providing an open, secure and standardised Operating System for video security cameras, to also address pressing issues such as cyber security and data privacy concerns. Devices that run then with the SAST operating system will work with an application marketplace provided and operated by SAST. Integrators and users can then use these apps from this marketplace to deploy additional functionality on these devices. With our platform we will be able to build up a community of app developers, including the ones not yet developing for this industry who have expertise in computer vision and artificial intelligence. Q: It seems what you are doing has parallels with the Apple and Android "app" stores. How is your approach the same (and how is it different) than those approaches? We are setting up SAST as a user-centric company and involve selected users very early on in the process"Mangold-Takao: The approach is similar in the way that we plan to generate revenue by operating the application marketplace and thus participate in the app revenue. The difference is that there is much more needed than apps and cameras to create a complete working solution addressing a user problem in this industry – we need to make sure that our own platform as well as the new applications being created will work as a part of an end-to-end solution. Q: "Critical mass" and wide industry participation seem to be requirements for your success. How will you achieve those goals? Will you involve integrators, consultants, or other parties in addition to manufacturers (to drive awareness)? How? Mangold-Takao: SAST is in close exchange with device manufacturers, integrators and consultants, as well as application developers and large end-users at the moment to ensure that we are building the right platform and ecosystem for this industry. We are setting up SAST as a user-centric company and involve selected users very early on in the process. We will run dedicated programs and hackathons to attract app developers, already active and new to our industry. We will also run selected pilots with end-users throughout 2019 to ensure we have all partners involved early on. SAST sees the industry is hungry for more innovative solutions – with the retail vertical market a target for these solutions Q: What timeline do you foresee in terms of implementing these initiatives? Mangold-Takao: While we start with first app development programs and plan our first pilots already for this year, we are planning our commercial launch for end of 2019. Q: How does your new company relate to the new Open Security & Safety Alliance (OSSA)? Mangold-Takao: The Open Security and Safety Alliance has been working very closely with SAST over the past year, defining some important concepts and elements required. One of the most important elements is an open and standardised Operating System, specific to this industry, which will then bring forward new innovative technologies and solutions. SAST is actively working on this Operating System, based on Android Open Source Project (ASOP), but is evolved and hardened with industry-specific features. Q: What's the biggest thing you want the security industry to understand about SAST? What is your "message" to the industry? Mangold-Takao: Our message is simple: let’s build better security and safety systems – together! But for real, innovating an industry is a joint effort, we can only bring new innovation to this industry with partners who share our vision and are excited about new technology. At the same time, we strongly believe that our platform allows every partner to bring forward what they do best but also invite new partners to our industry.
HID Global, globally renowned trusted identity solutions provider, and Phunware, Inc., a fully integrated enterprise cloud platform for mobile that provides products, solutions, data and services for brands worldwide, has announced their collaboration to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Wayfinding and HID Location Services Phunware and HID are addressing the need of healthcare institutions to deploy standardised technology “The combination of Phunware’s market-leading wayfinding and mobile engagement capabilities with innovative HID Location Services will ultimately revolutionise wayfinding within healthcare institutions,” said Phunware co-founder and CEO Alan S. Knitowski. “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk. With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” Phunware and HID are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. Unified Healthcare IoT solutions Healthcare organisations can easily lay out the foundation for IoT applications, such as wayfinding" “Wayfinding is one more application that we are integrating into HID’s unified healthcare IoT solution to make it easier for healthcare systems to manage a growing demand for automated and streamlined experiences,” said Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global. “With HID technologies, we have changed the location-aware landscape, delivering location as a service. Now, healthcare organisations can easily lay out the foundation for IoT applications, such as wayfinding.” Healthcare IoT-enabled platform HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Multiscreen-as-a-Service (MaaS) platform Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more.
Videowall technology supplied by Ultimate Visual Solutions (formerly eyevis UK) is at the heart of a new customer experience centre unveiled by independent system integrator Capula. UVS videowall technology The installation allows Capula to showcase a wide range of software technologies, including the latest IoT solutions, to clients from within the energy, manufacturing and utilities sectors at its headquarters in Stone, Staffordshire. Ultimate Visual Solutions (UVS) installed four eyevis EYE-LCD-5500-XSN-LD-FX 55-inch LCD displays to make up the videowall, along with a custom-made sound bar and a Netpix 4900 video wall controller. Netpix 4900 videowall controller We are delighted to have been chosen to complete such an important project for Capula" The installation also includes two 65-inch Samsung DM-65E touch interactive whiteboards; which give the Capula team the ability to show content from the Netpix videowall controller and allow them to annotate over it mid-discussion and feed content back to any display. UVS managing director Steve Murphy said: “We are delighted to have been chosen to complete such an important project for Capula, which will showcase the solutions we provide to visitors to their headquarters.” Capula Business Manager, Neil White commented: “We are very pleased with the service provided by Ultimate Visual Solutions. The expertise, guidance and follow on support was second to none. The technology installed in our prestigious customer experience centre has provided an excellent showcase for our business’ solutions.” Video wall and audio-visual solutions Burnley-based UVS, formerly eyevis UK, provides video wall displays and audio-visual solutions to a range of clients across the UK. Capula specialises in industrial control, instrumentation and automation and has decades of expertise, having worked in some of the most complex and demanding industrial environments. The Netpix 4900 is a network-based graphic controller for the management of video wall systems, single displays or projectors. The controller creates a big joined desktop for network-applications, video and graphic sources.
HID Global, a worldwide provider of trusted identity solutions, was selected by Skanska, one of the world’s project development and construction groups with operations in Europe and North America, to incorporate HID’s mobile solution for secure access to its new office complex in Warsaw. Powered by Seos, HID Mobile Access improves the user experience and increases security throughout the entire building – from the parking lot and elevators to areas with limited access to the public. Located at 173 Solidarności Avenue in Warsaw, the new Spark office complex is not only the new headquarters of Skanska, but a large part of the 70,000 square-meter office building has also been set aside for other tenants. Because the building is intended to be a mixed-tenant space, it was crucial to restrict access to secure areas from unauthorised visitors. Using smartphones for access The Spark building was designed to enable mobile access so that employees can now use their smartphones to open doors and enter secure areas. Skanska, with help from system integrator Sharry Europe, created a new system for building occupants that integrates numerous building applications, including HID Mobile Access. As a result, all building applications have been incorporated into an integrated mobile app, which marked an advancement in creating a more streamlined and convenient experience for the users. HID Mobile Access enhances the security for accessing our entire building" Both Spark building employees and their guests can now move throughout the building with nothing more than a smartphone, without the risk of them gaining access to restricted areas – unless the proper access rights are granted. When users arrive at the door, they simply tap their iOS and Android devices to an iCLASS SE reader using Near-Field Communications (NFC) or Bluetooth Low Energy (BLE) and HID’s ‘twist and go’ feature to gain access from a distance. Any changes to the user’s access rights are remotely managed by the administrator through a cloud-based portal. Integrating all building applications into one “HID Mobile Access enhances the security for accessing our entire building. In one application, we have integrated all building applications, such as parking, virtual reception and other Internet of Things functionality, bringing the whole user experience to a new level,” said Renata Nowakowska, Innovation Manager at Skanska. “One of the most pressing objectives for facility managers in smart buildings is to crack the code on how to enable as many building applications and services on mobile devices as possible in order to simplify how occupants move through a facility and interact with building services,” said Hilding Arrehed, Vice President of Cloud Services, Physical Access Control. “Skanska’s integration of HID Mobile Access into their mobile platform is a perfect example of how organisations are leveraging the power of mobile credentials and the cloud to realise the full potential of creating a connected and more intuitive experience for their users, while increasing security at the same time.”
Rasilient Systems, Inc., the pioneer in video surveillance systems purposely architected for IP video recording, has been chosen to provide video surveillance server and storage solutions for Zero 6 Mall, the impressive new-generation shopping destination that opened in April this year in Sharjah, United Arab Emirates. Zero 6 is a 16,000 square-metre complex that offers a diverse selection of dining, retail and entertainment attractions. Strategically located in Al Juraina, in close proximity to prominent city landmarks like University City and Sharjah International Airport, Zero 6 celebrates Sharjah’s evolving lifestyle community experience. Security integration software “Security is always the top concern in designing and developing a popular tourist and resident destination like Zero 6 Mall. Rasilient is honored to have been chosen to help secure this impressive and unique facility,” said Sean Chang, CEO of Rasilient Systems. Rasilient worked with UAE-based system integrator Exceed Communications, LLC, on the Zero 6 Mall project. Exceed Communications is a leading provider of IT infrastructure and security system needs including network design, installation and management and video surveillance and IPTV systems. Video surveillance at Zero 6 is managed by SeeTec Video Management Software (VMS). An OnSSI Company, SeeTec is one of the leading solution providers for video surveillance in Europe. Unmatched data integrity “Video surveillance storage is critical for security point of view and we are fortunate to have the services of Rasilient Systems, which is a trusted name for unmatched data integrity and storage reliability,” said Issa Ataya, Managing Director, Alef Group. We are confident that Rasilient Systems will provide the most innovative and state-of-the-art technology for Zero 6 Mall" “Zero 6 Mall is a one-stop destination in Sharjah that appeals more to a new generation as it’s a premier lifestyle-oriented place. We are confident that Rasilient Systems will provide the most innovative and state-of-the-art technology for Zero 6 Mall,” Ataya said. Video management software Rasilient provided video surveillance storage for Zero 6 that offers unmatched data integrity, storage reliability and scalability to address future growth. Rasilient’s purpose-built technologies lower CAPEX and OPEX by extending product life expectancy and enabling scheduled maintenance instead of reactive maintenance as systems age. The video surveillance system in place at the mall provides petabytes of storage using Rasilient’s fully redundant ApplianceStor AS85R Server and PS5000 Rackmount IP Storage. Rasilient’s ApplianceStor AS85R is a modular server system which packs four high performance server modules in a single 2U rack mount platform providing unmatched performance and density. Each module can be used to integrate VMS, failover, archive, administration and access control servers in a single high density 2U system. The AS85R significantly reduces cost over a separate VMS server, reduces cabling and the ordeal of integrating VMS, OS, commodity server and storage. Because the AS85R is ideally suited for use in conjunction with Rasilient’s PS5000 Rackmount IP storage, the Zero 6 project also utilises the PS5000. Rasilient’s PS5000 Rackmount IP storage provides a simple-to-use, high performance, and large capacity video surveillance solution Large surveillance installations Rasilient’s PS5000 Rackmount IP storage provides a simple-to-use, high performance, and large capacity video surveillance solution. The purpose-built storage array is optimised for high performance megapixel and large video surveillance installations – both key characteristics of the video solution used at the Zero 6 Mall. Rasilient's patented advanced video caching technology – VAN, FlowThrough, StreamAlign – enables no recording gaps and data locking and increases read/write performance. This allows the capability of using both high resolution megapixel cameras and heavy camera loads. With Rasilient’s video surveillance storage solutions, every single camera frame is processed and recorded – which is essential for the variety of mall security scenarios that might call for video retrieval. The Rasilient system is also engineered to monitor its own “health” and operations to ensure that the system doesn’t fail when it’s most needed. This Proactive technology monitors the health of every disc drive in the system to enable cloning right before an actual drive failure. Reliable video surveillance solutions Zero 6 Mall is just one of many projects Rasilient has completed in the UAE and surrounding areas over the last few years, said Chang. “With the successful implementation of quality and reliable video surveillance solutions for projects like Zero 6, Rasilient continues its growth in the very important Middle East market,” he added.
HID Global, a worldwide provider in trusted identity solutions, announced that 85-year-old fire protection provider RAEL Automatic Sprinkler Company and integrator Automated Decision have deployed HID Trusted Tag Services at one of Manhattan’s most iconic skyscrapers. The combined solutions help secure, digitise, automate and streamline inspection and maintenance of the building’s massive fire and safety sprinkler system. "HID Trusted Tag Services are a real competitive differentiator for us when we bid for projects now," said David Israel, President, RAEL Automatic Sprinkler Company. "We plan to deploy it in other noteworthy buildings and we’re exploring using it for other mission-critical equipment we inspect and repair as well." The RAEL solution incorporates HID Trusted Tag Services into Automated Decisions’ work order management system and mobile inspection app HID Trusted Tag Services HID Trusted Tag Services empower robust Internet of Things (IoT) applications by attaching unique and trusted identities to virtually any object that can be read by mobile devices. Smartphones and other devices can then be used for innovative use cases, without compromising the privacy of end users. The RAEL solution incorporates HID Trusted Tag Services into Automated Decisions’ work order management system and mobile inspection app. The deployment includes HID’s trusted and tamper-evident NFC tag using dual NFC and QR code technology; unique cryptographic authentication and a unique QR code placed on every component of the RAEL sprinklers. After authenticating to HID’s cloud authentication service, RAEL technicians move through the building, tapping each applied tag with their mobile devices to authenticate upon completion of their component inspection or repair. Proof of presence Each individual tap generates a unique encrypted code appended to a URL to provide proof of presence. This process confirms the technician was physically at the site and conducted the required sprinkler inspections and repairs. "Proof of presence was critical for us,” said Israel, “as property managers are now expected to deliver a much higher level of compliance reporting." The solution also logs the user, tap time and date into the Automated Decisions work order management platform. Mobile online access provides inspectors with service request maintenance records, sprinkler part specifications, diagrams and photographs. Combined HID and Automated Decisions solution has enabled faster, more efficient inspections and repairs Combined tag services and mobile devices "That RAEL and Automated Decisions are leveraging our offering for fire and safety at an immense, iconic skyscraper reinforces the breadth of IoT use cases that our identification and sensing portfolio addresses," said Mark Robinton, Director of Business Development & Strategic Innovation, Identification Technologies with HID Global. "Facility managers are also increasingly seeking to combine the use of HID Trusted Tag Services and mobile devices to automate other safety and security functions, including guard tour and key management, as buildings become more intelligent and connected." In addition to providing peace of mind to RAEL and their property management clients, RAEL also reported the combined HID and Automated Decisions solution has enabled faster, more efficient inspections and repairs, improved first-time fix rates and fewer repeat visits.
The Palacio de Congresos, celebrating its 20th anniversary, is a state-of-the-art conference and exhibition centre in the heart of Valencia, Spain. Also known as the Palace of Light, due to its glass-fronted façade and distinctive roof design, the Palacio regularly accommodates large-scale international conferences organized by multinationals, trade associations and government organisations. Most events gravitate around the main auditorium with room for up to 1,481 participants, as well as smaller auditoria with capacities for 467 and 270 people. If needed, an IP-based video and audio network can connect up to 2,250 participants across these separate conference rooms. Bosch - DICENTIS Conference System Given the international character of most of the conferences it hosts, simultaneous interpretation is essential at the Palacio. The building management sought a solution that would take this into account, along with the facility’s existing architecture and infrastructure. Two of its three auditoria are equipped with fixed interpreter booths. Although the smallest auditorium and the conference centre’s ten smaller meeting rooms do not include interpreter booths, simultaneous interpretation is also often required in these spaces. It was also important that the new conferencing system would not require any additional investment for wiring or cable connections. The OMNEO Interface allows transportation of the language channels via the IT network from the auditoria with fixed interpreter booths The DICENTIS Conference System from Bosch provided the perfect solution. Because the system is IP-based and Ethernet compatible, the existing IT infrastructure of the Palacio de Congresos could be used. The OMNEO Interface allows transportation of the language channels via the IT network from the auditoria with fixed interpreter booths to the meeting areas that don’t have these facilities. DICENTIS streams the language channels from the interpreter desks to the DICENTIS Conference devices in the main auditoria, and also to all the active conference devices in the Palacio’s smaller meeting areas. The floor languages of the active conference devices, regardless of their location, are streamed back to the interpreter desks. Mobile installation To serve the smaller meeting areas, the DICENTIS central equipment is installed in a small mobile rack for easy transportation and setup. Additionally, the DICENTIS Conference devices with channel selector can be transported from one room to another in specially made, high-quality, lightweight and sturdy cases for protection during transit. The mobile rack simply connects to the room’s IT network plug to connect to the equipment in the various meeting rooms. This smart, mobile DICENTIS solution meets the requirements of all the meetings held in the Palacio de Congresos. The capacity for simultaneous interpretation in all the meeting areas means 2,250 participants can be connected across all conference areas big and small.