Internet of Things (IoT)
Many exhibitors at GSX 2019 saw the show as a success, despite slower booth traffic on the second and third days. According to show sponsor ASIS International, there were more than 20,000 registrants from 125 countries around the world, including those who attended the conference as well as the exhibition. Exhibitors definitely put their best feet forward, enthusiastically promoting their technology breakthroughs, but how convincing were they? The comments from at least one attendee – a l...
Armor At Hand™, manufacturer of the lightweight ballistic Smart Shield™, will be showcasing its IoT connected shields at the 2019 Global Security Exchange (GSX) beginning on Sept. 8 in Chicago at McCormick Place Convention Center, Booth 181. In addition to demonstrating the shield’s ability to withstand the impact of multiple 7.62mm high-powered rifle bullets, Armor At Hand will also be announcing its partnerships with ESRI and The School Superintendents Association (AASA) alo...
HID Global®, a provider of trusted identity solutions, announces that it has acquired HydrantID, a provider of management and automation services to secure enterprise organisations’ data, IT systems, networks, and Internet of Things (IoT). Specialising in public key infrastructure (PKI) as a service, HydrantID has issued over three million PKI credentials and secured over 125,000 domains – a perfect complement to HID’s IdenTrust business, which is a pioneering digital cert...
Axis Communications, a market expert in network video technology, will be demonstrating in collaboration with trusted and selected partners the very latest innovations in physical security technology. Axis’ Partner Showcase event on 16 October 2019 at London’s Tottenham Hotspur F.C. will host 27 partners under one roof who will be providing product demonstrations, seminars and Q&A discussions on key topics ranging from cyber security, AI/machine learning, behavioural analytics, d...
CSCUK - Cyber Security Connect UK – renowned forum for Chief Information Security Officers (CISO), has called for the cyber security community to respond to the UK Government policy paper published on 11 September 2019 about post-Brexit cyber security. Cyber security certification The British Government has asked for the cyber security industry in the UK to provide views and opinions about the proposed approach to cyber security certification following the UK’s departure from the E...
ABP Technology, a value-add specialty distributor for IP technology solutions, has obtained the exclusive rights to distribute AlarmReady™ in the United States. AlarmReady is the first universal alarm system video verification solution designed to frictionlessly attach to any IP video surveillance system. “AlarmReady is an exciting opportunity for system integrators to deliver a video verification solution – for any alarm system users may have – that enables higher situa...
Security and Safety Things GmbH (SAST) will demonstrate their open IoT platform for video surveillance cameras at the Global Security Exchange (GSX) in Chicago, September 10 to 12, 2019 at McCormick Place. The world's first open and standardised operating system with a global IoT marketplace will feature applications from more than 15 partner software developers running on security cameras from more than five camera manufacturers in an innovative, airport-themed booth at GSX. "GSX is the ideal event for us to offer a sneak preview of our rapidly growing ecosystem, which includes camera manufacturers demonstrating prototype cameras with the SAST operating system,” said Hartmut Schaper, CEO of Security and Safety Things. “We’re particularly excited to present innovative AI applications as part of the SAST marketplace, ranging from real-time edge analytics to deep learning, using technology such as Microsoft Azure Cognitive Services.” Video analytics improve store operations 15 partners to help increase security, optimise operations and improve customer experiences at airports" The airport-themed booth will illustrate video analytics use cases in three core areas of an airport: The terminal, the boarding gate and the duty-free shops. The terminal section will feature a cross-domain use case together with Microsoft Azure Cognitive Services and Here Technologies, presenting how security and customer experience can be improved with deep learning. The boarding gate section focuses on security and safety use cases, such as showcasing applications to detect abandoned luggage. In the duty-free store, partner developers will illustrate how video analytics help improve store operations and how neural network learning solutions improve the shopping experience of customers. Camera analytics with mapping services “Together with our partner Here Technologies, we will for the first time present cross-domain use cases, showcasing how travel journeys can be improved by integrating camera analytics data with mapping services,” said Nikolas Mangold-Takao, VP Product Management, Security and Safety Things. "These benefits are part of our mission and that of our more than 15 developer partners to help increase security, optimise operations and improve the customer experiences at airports and many other industry verticals as well.” All applications will run on prototype cameras with SAST OS from members of the Open Security and Safety Alliance (OSSA).
macmon secure GmbH, globally renowned technology solutions provider for network security, announced developing its Network Access Control (NAC) solution completely in Germany. The Berlin-based in-house development team has now been able to even extend the best-of-breed solution with further significant features in order to solve major future challenges of Corporate IT-Security. Network access control solution With macmon NAC, enterprise networks will be even more effectively protected against unauthorised access. Security teams will be significantly relieved of administrative workload. The amount in security tools will be reduced, and the IoT-devices securely operated. With version 5.15.0, macmon secure GmbH has reached yet another milestone With version 5.15.0, macmon secure GmbH has reached yet another milestone. In addition to numerous new and improved functions, the overall performance of the engine could be significantly increased, again. Therefore the processing speed of large amounts of data - as they occur in the Domain Name System (DNS), the network device detection and foot-printing - multiplied. Scalability for growing networks In the optimised dashboard, administrators now can see more details about unauthorised devices in the network status in more detail. macmon NAC also evaluates the network status. This relieves the IT department from work and makes decisions easier. With new and enhanced filter wizards, macmon NAC now also offers the option of searching in IPv4 and IPv6 ranges. The filters can be even more granular. In addition, RADIUS authentication information has been enhanced in reporting and included in a NAC RADIUS report.In addition to various improvements and optimisations, which result from the close collaboration with the macmon customers, it is now possible to also implement NAC via SNMP with macmon satellites, enabling decentralised NAC. The synchronisation of the servers has been significantly accelerated, the interaction has been expanded considerably with more stability. The transparency of the processes and the performance of the scalability nodes has been increased. In addition, detailed status messages provide more transparency about the synchronisation as well as the system status of the satellites. macmon RADIUS server The relatively new Past Viewer feature has been further optimised to more effectively evaluate the historical data of the network. On one hand, the collected information was supplemented by further details and the search for historical data was made more flexible for the administrator. For logins to a network device, the macmon RADIUS server can now be used for authentication. To do this, macmon NAC has a separate set of rules that makes access options controllable. The switch port layouts stored in a particular network device can be configured, and also displayed graphically. The overview of complex networks increases enormously. macmon REST API With a wider range of functionalities, the macmon REST API now covers almost all areas of macmon NAC With a much wider range of functionalities, the macmon REST API now covers almost all areas of macmon NAC. Thus, the possibility to set manual links was added and the intelligent access to endpoints was extended. So not only the information about company devices, guest devices, and BYOD devices, but from now on about any other unknown/discovered devices are available. Last but not least, the API also enables guest management and Wake-On-LAN.Access VLANs configured on the switch ports can now be automatically adopted as terminal standard VLANs. Other VLAN concepts can be implemented flexibly, extending to parallel operation with other VLAN management solutions. By activities and on demand you will be informed by e-mail about the event ID and get with one click directly to the process. Extended capabilities To support the widest possible network device diversity, several new methods are included, such as extended capabilities for SonicWall Firewalls, Cisco WLAN Controller 5500 and switches from HP (1910s), Ruckus, Extreme (Rail), Alcatel (Industrial), Enterasys and Moxa.The management of guests and the creation of vouchers via the macmon guest portal has been expanded and is now much more flexible. Administrators can differentiate between time of usage and usage duration and are in the position to extend voucher lifetime quickly. FireEye integration extends connectivity In addition to texting, a SMS can be sent to guests on extension or expiration of their utilisation period. The portal pages can now also be displayed in Spanish and Italian. The site offers an optimised display of details and messages for administrators and guests.The new integration of FireEye enables the receiving and processing of status information of individual endpoints in the network. This way, endpoints that are classified by FireEye as dangerous or infected, are automatically isolated in macmon NAC, accordingly. Integration with other security solutions In macmon NAC, other security products can also be integrated, for example, endpoint security solutions In macmon NAC, other security products can also be integrated, for example, endpoint security solutions, emergency management and firewall / IPS. The company uses its long-standing technology partnerships with well-known manufacturers of security products such as Barracuda, Certex Tenfold, Contechnet, EgoSecure and NCP to promote the knowledge exchange. The open macmon REST API also enables direct connection to any asset management system, identity source or infrastructure component. Customers benefit from these far-reaching opportunities and can optimally combine multi-vendor IT systems. Network security Christian Bücker, Managing Director macmon secure GmbH, said "Over the past few months, our development team has developed significant capabilities that will allow us to further extend our leading position in the dynamic network security market. He adds, “Our customers appreciate macmon NAC because we offer a solution that can handle the existing enterprise infrastructure in a highly dynamic, but also an intelligent way. Network security becomes even easier and more efficient through our permanent in-house development capabilities."
SecuX Technology Inc., a blockchain security company, is going to unveil a cutting edge Libra crypto POS solution and demonstrate SecuX Pay crypto wallet app for physical retail stores’ payment ecosystem at Hall 26, Stand 329 during IFA NEXT 2019. SecuX Pay will enable retailers, brand owners, VARs and system integrators to build a tailor-made crypto payment ecosystem to boost sales. “We are excited to showcase SecuX Pay crypto payment ecosystem at IFA Next week. It’s supposed that the blockchain security accelerates the cryptocurrency payment ecosystem. SecuX Libra Crypto POS solution allows tourists, business travellers, and cross-border purchasers to easily pay for the commodities or merchandise without high international transaction fees, to increase the sales with no barriers,” said Howard Liao, Managing Director, SecuX Europe GmbH. Keeps digital assets secured “We enthusiastically invite bitcoin and cryptocurrency exchanges, electronic payment companies, retailers, VARs, and system integrators to collaborate and explore for a new epoch of a crypto payment ecosystem. For example, IoT applications and ecosystems such as smart retail, smart food court, smart shopping mall, smart supermarket, smart hospitality, smart parking, smart car infotainment, and gaming café. SecuX keeps your digital assets secured and transmission easy in the blockchain.” SecuX will demonstrate Libra crypto POS solution: SecuX Pay crypto payment ecosystem SecuX Crypto Hardware Wallet SecuX Crypto POS Box SecuX Merchant Payment Wallet App SecuX Merchant Payment Hub SecuX Crypto POS Module
SALTO Systems has appointed Ralph Clifton to the commercial sales team position of the Central US Region as Senior Account Manager. SALTO Central region manager Based in Detroit, Ralph will oversee the growth and development of commercial sales key accounts for the Central US Region. The Central US region includes the States of North Dakota, South Dakota, Minnesota, Iowa, Nebraska, Kansas, Missouri, Oklahoma, Arkansas, Texas, Louisiana, Wisconsin, Illinois, Indiana, and Michigan. Ralph will report to SALTO Business Development Director David Latreille. “Ralph is a tremendous addition to the SALTO team,” said David Latreille. “His extensive experience with leading technology providers and his proven success in developing and managing accounts will be key as he leads this important area. We welcome Ralph and look forward to great success and continued growth.” Enterprise security expert Prior to joining SALTO, Ralph served as key account manager for several leading technology companies including AVI-SPL, Hewlett-Packard, and Dell. His expertise includes a high level of knowledge in enterprise software, services, virtualisation, cloud, security, networking, IoT, Big Data, and storage. He has been recognised with multiple awards, including Top Performer and the Vendor Merit Award. “SALTO is a dynamic organisation that owns a fantastic segment of the security and access space,” said Ralph. “I bring years of technical sales experience to the SALTO team through my tenure with leading technology companies. SALTO is a natural evolution of the work I’ve done and I expect that we will do great things together.”
SALTO Systems SVN-Flex is a feature that enables SALTO stand-alone electronic locks and cylinders to update user credentials directly at the door. This SALTO access control technology makes keyless, wire-free smart buildings a reality. SVN-Flex maximises the potential, efficiency, and reliability of the SALTO Virtual Network (SVN), increasing the security, control, and convenience for users while reducing the cost of installation. “SVN-Flex is a game changer that creates a new standard in access control,” said Marc Handels, Chief Technical Officer of SALTO Systems. “The door is the ultimate touch point in an access control system and making its wireless smart lock hardware an updating point for user credentials maximises functionality and brings an unprecedented level of convenience and security for both end users and system administrators.” Increases the number of updating points SVN-Flex functionality can be enabled on any product in the SALTO XS4 BLUEnet-enabled electronic lock rangeBased on SALTO’s BLUEnet wireless communications technology, SVN core technology, and in combination with the trusted access control management platform and high-quality XS4 electronic locking solutions, SVN-Flex extends and increases the number of updating points directly to any door. SVN-Flex functionality can be enabled on any product in the SALTO XS4 BLUEnet-enabled electronic lock range. SVN-Flex is managed via SALTO’s ProAccess SPACE web-based access control management software. Adding SVN-Flex to an access control solution results in an exponential increase in security, control, effectiveness, and convenience for users and system managers, as the communication between devices flows in real-time on wireless online access points and much faster on offline points. Ability to cross-link wireless locks SVN-Flex dramatically reduces the cost of installing additional updating points in an access control system yet provides the capability of adding updating points where required. It might have been challenging in the past to provide several updating points on one building floor when required for security, for example. With SVN-Flex, however, the options for affordable updating points are endless: emergency exits, hall doors, gates equipped with mechanical cylinders, perimeter doors, and much more. Benefit of SVN-Flex includes the ability to easily cross-link stand-alone, wireless locks and online access points Another benefit of SVN-Flex includes the ability to easily cross-link stand-alone, wireless locks and online access points and integrate into existing IT networks without consuming valuable resources. This produces a reliable, on-premise infrastructure for access control that is designed to adapt and grow with any demand; from just one door and user up to hundreds of doors with thousands of users. Data-on-card backbone core technology In the event of a network failure, SVN-Flex continues to operate seamlessly via SALTO’s SVN data-on-card backbone core technology, ensuring that no one will be locked out or any unwanted access will be permitted. Because SVN-Flex is based on SALTO’s SVN core technology, it’s compatible on sites that already use SVN. Just by installing SALTO BLUEnet wireless locks or cylinders in high traffic access points, current SALTO customers will benefit from a boost in their existing SVN system because it will increase the number of updating points. Our products are designed to be affordable and functional for customers of any size" The rest of the offline installation will still work autonomously, but vital information like blacklist dissemination, user access plan updates, battery status reports, or access audit trail reports will be updated more frequently. Smart access control solutions “SVN-Flex is yet another example of SALTO’s commitment to delivering the most technologically-advanced access control solutions on the market – smart, contactless, and mobile,” said Handels. “And although our products always include the latest in innovation, they are designed to be affordable and functional for customers of any size: from a two-room office to a university with thousands of doors.” SVN-Flex boasts numerous features and benefits which is why SALTO developed a special microsite that provides detailed product information and explains how the supporting technology works together to deliver a comprehensive access control solution.
Snap Network Surveillance, PTY LTD (‘Snap Surveillance’), the developer of the world’s first and only AI-based intelligent tracking software for large-scale security camera networks, will be participating as an ecosystem development partner in the SAST booth #10037 at the upcoming GSX expo in Chicago, September 10-12, 2019. SAST (Security and Safety Things) is a Bosch-owned IoT startup, leading an open Internet of Things (IoT) ecosystem initiative. This includes creation of an open OS platform for Smart Cameras and an App store for software on the platform, with a focus on delivering enhanced security and safety. AI-based security apps The need to track people and objects from camera to camera is becoming critical" Through their revolutionary open IoT platform for security cameras, SAST enables seamless management of networked cameras — by unleashing a new generation of AI-based security apps. Snap is excited to be one of the initial development partners. “Snap Surveillance’s support of the SAST ecosystem provides an ideal platform for video pursuit of people and objects moving about environments such as airports or large retail establishments,” stated Henry Detmold, CTO, Snap Surveillance. “In today’s larger camera-count environments, the need to track people and objects from camera to camera is becoming critical and with SAST support for learning on their cameras, our mutual customers will be able to get the benefits without needing a big investment is server capacity.” Intelligent tracking solution Snap Surveillance’s AI-enabled intelligent tracking solution will be on display at the SAST GSX booth - showcasing our solution that is 10x faster than human-alone subject tracking while also removing operator fallibility. This solution is essential for improving the speed of operating a security camera network This solution is essential for improving the speed, performance, and accuracy of operating a security camera network. An overarching benefit of deploying Snap Surveillance’s Force Multiplier (FMx) software in a SAST ecosystem is that image analysis running on the camera can be more efficient and accurate than on a server, which results in faster and more accurate learning of the camera relationships. Camera-count environments Further benefits are anticipated as the SAST ecosystem grows, with other development partners able to utilise the camera networking information from Snap’s machine learning algorithms. Snap Surveillance will also be exhibiting in its own booth in the GSX Disruption District, #3417. As a Gold Partner with Milestone Systems, Snap Surveillance will be demonstrating its patented AI-based system for learning camera relationships, and showcase how easy it is to track suspects or objects around large camera-count environments, removing the stress of knowing which camera feed will be needed next.
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimisation easier. In most cases, digital transformation will fundamentally change how an organisation operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more.As the data from each of these sensors is collected and analysed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organisations are using for enhancement and improvements is comprehensively protected from unauthorised access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organisations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organisations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT increases threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organisation recognise and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organisations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organisations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognising and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
Airport environments have become more sophisticated and complex over the course of the last 20 years. What was once a simple structure to facilitate travel from point A to point B has now been transformed into a hustling and bustling setting that offers passengers the comforts and conveniences of a small city. As a result, the complexity of risks that airport operators face has grown exponentially. Security personnel must now mitigate risks like terrorism, theft, personal safety and insider threats all while streamlining operations to help preserve a positive passenger experience. Beyond the visual of long and winding security checkpoint lines, most travelers are unaware of the vast amounts of work that take place behind the scenes to ensure their safety. Increasing passenger numbers On top of the typical, day-to-day concerns security operators face, airports are only becoming busier. According to the United States Department of Transportation’s Bureau of Transportation Statistics, 2018 was a record-breaking year for air passenger travel. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017. As these numbers continue to increase, the demand on airport security personnel to keep people and property safe also increases. This is why the latest advancements in security technology are critical as part of a comprehensive and cohesive airport security strategy. Let’s take a look at some of these advancements and how they are helping airport security operators mitigate risk. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017 Video-based command and control Airports are operational 24 hours a day, 7 days a week, which means it is paramount (and typically mandated) to have video as the heart of modern-day security operation centres (SOC). In today’s data-focused environment, security personnel rely on a multitude of solutions and systems, which often include video surveillance, access control, alarm notifications, and more, to ensure comprehensive protection of passengers. What’s needed is a single, unified platform with integrated event management and response The rising influx of information from these systems can often be overwhelming, and in most cases, manual processes are used to manage across these domains in an attempt to achieve a coordinated response. These manual processes are not scalable. What’s needed and is now being introduced to the market is a single, unified platform with integrated event management and response to allow security operators to maximise situational control and determine the appropriate intelligence-powered response. Real-time situation management The combination of real-time video, with information from a variety of additional sensors, devices and applications is changing the game for airport security personnel. Now, in the event of an incident, security officials can use this data to gain enhanced situational awareness of what’s happening and deliver actionable insights to efficiently and effectively respond to the incident. Through numerous information sources and security systems, airports can benefit from a modernised and enriched investigative experience for a broad and deep understanding of routine or emergency situations. Advanced analytics Analytics are a powerful resource that gives security teams the ability to discover significant patterns and obtain insightful knowledge from video surveillance data. Advanced algorithms can be the key in providing early warnings to assist in detecting threats, helping to establish a proactive security strategy. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations. Additionally, analytics can automate predefined standard operating procedures to help minimise human error and optimise resource utilisation. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations Mobile reporting The Internet of Things (IoT) and ubiquitous connectivity have brought remote capabilities to airports, where instantaneous information sharing is paramount. Mobile reporting solutions allow passengers and employees to act as additional “eyes and ears”, bringing critical safety alerts to the attention of security officials. Information shared by passengers and employees can be extremely beneficial to help shed light on a security incident and enable faster and more efficient response. Some solutions even offer the ability to share video and audio with the command centre through a passenger’s smartphone. Facial recognition technology Facial recognition can provide situational intelligence through detecting, tracking, and alerting on persons-of-interest A powerful and versatile security solution, facial recognition can provide situational intelligence to security operations centres through detecting, tracking, and alerting on persons-of-interest appearing in video streams across multiple sites and thousands of cameras simultaneously. These systems are capable of forensic-search recognition capabilities and can be compared against national, local or custom databases to make investigations faster and more efficient. Interest and adoption of the technology is growing, with new use cases being introduced daily. The solution is sure to become a valuable tool in the years to come. In short, airports are very much like small connected cities, featuring a landscape with a variety of assets, a wide range of stakeholders, and numerous sites that keep safety at the forefront of the public eye. However, while global risks and day-to-day challenges can be difficult for security operators to manage, today’s advanced and intelligent technologies can ultimately help improve the overall traveler experience.
For the security market, the ‘fine ranging’ capabilities of ultra-wideband (UWB) technology opens up a range of new uses based on the ability to determine the relative position and distance of two UWB-equipped devices with pinpoint accuracy – within centimetres. UWB is more accurate and secure, even in challenging environments full of interference, compared to narrow band wireless technologies. UWB technology transmits a large amount of data over short distances using a small amount of energy. It will be used in seamless access control, location-based services, and device-to-device services across industries including smart homes, cities, retail services, and healthcare. Increasing the accuracy of ranging measurements UWB technology will support any application that benefits from knowing the precise location of a connected deviceUltra-wideband is a mature radio technology that transmits information spread over a large bandwidth, as described by the IEEE 802.154 standard. A new, enhanced amendment to the standard – IEEE 802.15.4z – focusses on improvements to existing modulations to increase the integrity and accuracy of ranging measurements. Moving forward, UWB technology will support any application that benefits from knowing the precise location or presence of a connected device or object. This reflects a move from data communication to secure sensing. New capabilities of UWB are largely unfamiliar to the market, but a new Consortium – the FiRa Consortium – has a mission to educate the market, provide use cases, and promote UWB technology. Delivering interoperability across devices “With a consortium, we can better deliver interoperability across devices, software, and chipsets,” says Ramesh Songukrishnasamy, Director and Treasurer of the FiRa Consortium, and SVP & CTO of HID Global. “This creates a frictionless experience for the user, which is vitally important with a new technology. People are more likely to adopt emerging technology when it runs smoothly without interruptions or errors.” The FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive" An industry consortium can create a UWB ecosystem of interoperable technologies instead of individual companies launching products that consumers struggle to make work together, says Songukrishnasamy. “Simply, the FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive.” Founding members of the FiRa consortium ASSA ABLOY and HID Global, pioneers in secure access and identity solutions, are founding members of the consortium. Their technology manages access to physical and digital places, things, and identities. Another founding consortium member, NXP Semiconductors, is a pioneer in secure connectivity solutions for embedded applications. Other founding members are Samsung, which creates top-of-the-line TVs, smartphones, wearables, and other connected devices; and the Bosch Group, a global supplier of technology and services that is at the forefront of IoT innovations. Sony Imaging Products & Solutions Inc., LitePoint and the Telecommunications Technology Association (TTA) are the first companies to join the newly formed organisation. Immune to radio frequency interference UWB is also immune to radio frequency interference, so it functions in high traffic settingsUWB introduces higher levels of accuracy in positioning capabilities and increased security for ranging data exchange compared to existing technologies. Fine ranging with UWB technology can localise devices and objects to 10 centimetres of accuracy with or without line of sight. UWB is also immune to radio frequency interference, so it functions in high traffic settings. These capabilities will enable a variety of use cases like secure, hands-free access control in hospitals, location-based services for ride sharing, and targeted marketing for retailers. FiRa will demonstrate UWB technology at upcoming trade shows. The FiRa Consortium aims to build on IEEE’s work with an interoperable high rate physical layer (HRP) standard, including defining an application layer that discovers UWB devices and services and configures them in an interoperable manner. The consortium also plans to develop service-specific protocols for multiple verticals and define necessary parameters for applications including physical access control, location-based services and device-to-device services. Promoting the adoption of UWB solutions As a consortium, FiRa is not just setting standards but actively championing use cases for UWB technology. Creating the consortium addresses the need to develop interoperability and implementation standards; brings key players together to create a rich UWB ecosystem; allows for the sharing of intellectual property; and promotes the adoption of UWB solutions. The FiRa Consortium is committed to educating and promoting new use cases" “Since UWB is a mature technology with new potential uses, there is a general lack of awareness of potential applications that take advantage of the technology,” says Songukrishnasamy. “The FiRa Consortium is committed to educating and promoting new use cases.” The FiRa name comes from Fine Ranging to highlight UWB technology’s use cases and distinction from older UWB technologies and solutions. Enhanced security in challenging environments Fine ranging powered by UWB can outperform other technologies in terms of accuracy, power consumption, robustness in wireless connectivity, and security, especially in challenging, high density environments. UWB previously served as a technology for high data rate communication and as such was in direct competition with Wi-Fi. Since then, UWB has undergone several transformations: UWB has evolved from an OFDM-based data communication to an impulse radio technology specified in IEEE 802.15.4a (2ns pulses with Time of Flight); and A security extension being specified in IEEE 802.15.4z (at PHY/MAC level) makes it a unique secure fine ranging technology. Moving from data communication to secure ranging allows ‘spatial context capability’ to be utilised by a variety of applications: seamless access control, location-based services, and device-to-device (peer-to-peer) services. Information is available at firaconsortium.org.
Some of the electronic features we all love in our new cars depend on a connection to the Internet. But what are the cybersecurity risks involved in that connection? Could a widespread cyberattack turn our cars into deathtraps and create a traffic catastrophe on the scale of 9/11? That’s the scenario described in a report from the nonprofit group Consumer Watchdog, which warns that a fleet-wide cyberattack at rush hour could result in a 9/11-style catastrophe with approximately 3,000 deaths. The organisation recommends that automobile manufacturers install a ‘kill switch’ that would disconnect a vehicle from the Internet in an emergency to mitigate the threat. Protecting transportation system Automakers are keeping the public in the dark as they market new features based on Internet connections"Consumer Watchdog contends that the vulnerability of automotive computer systems, and the possibility of a cyberattack, has been communicated privately to investors but not widely to consumers. “Automakers are keeping the public in the dark as they market new features based on Internet connections,” says Consumer Watchdog. “Connecting safety-critical systems to the Internet is an inherently dangerous design,” says Jamie Court, President of Consumer Watchdog. “American car makers need to end the practice or Congress must step in to protect our transportation system and national security.” Future designs should completely isolate safety-critical systems from infotainment systems connected to the Internet or other networks, according to Consumer Watchdog. By 2022, at least two-thirds of new cars on American roads will have online connections to the cars’ safety-critical systems, putting them at risk of deadly hacks. Updating vehicle software over-the-air One economic motive of connecting vehicles to the Internet is the ability of car manufacturers to update vehicle software over-the-air rather than having to recall a vehicle. Systems also enable collection of valuable data on how fast a car owner drives or where he/she shops. Security-critical components inside cars are driven by ‘black boxes’ that may contain software of questionable origin Security-critical components inside cars are driven by ‘black boxes’ that may contain software of questionable origin. Software may be written by third parties and/or include contributions from hundreds or thousands of different authors around the world, with little accountability for flaws. The ability to update software ‘over the air’ without touching the vehicles lets automakers cover up safety problems and sloppy testing practices, contends Consumer Watchdog. “Allowing consumers to physically disconnect their cars from the Internet and other wide-area networks should be a national security priority,” says Court. “If a 9/11-like cyber-attack on American cars were to occur, recovery would be difficult because there is currently no way to disconnect our cars quickly and safely. The nation’s transportation infrastructure could be gridlocked for weeks or months. Mandatory ‘kill switches’ would solve the problem.” Understanding the risks of connected cars In addition to more attention to cybersecurity, there also needs to be more transparency to enable consumers to understand what is at risk and the choices they make. For example, a group of more than 20 car industry engineers and insiders helped to prepare the Consumer Watchdog report, but many of them remained anonymous for fear of losing their jobs. Consumers have a right to understand the risks they are taking and how they can minimise them. In the Internet of things, cybersecurity dangers extend to almost every device in the connected world, from cars to smartphones to medical devices. Increasingly, we will be asked to weigh the convenience of cranking our car with a smartphone, for example, against the possible risk in the form of vulnerability to cyberattack.
Verkada was founded by three computer scientists and security experts who studied together at Stanford University. They connected with a former founder of Meraki and created Verkada with a mission to “modernise the world of physical security”. The fast-growing company currently focuses on delivering an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. On the surface, the product is simple: cameras record video, connect to the internet, and push data to the cloud. “What sets us apart is the system architecture that drives our solution,” says Brandon Davito, Verkada’s VP of Product and Operations. “Starting with edge processing, all data is instantly analysed and processed at the camera. This enables enterprise users to scale coverage without traditional limitations like bandwidth consumption or the costs of supporting additional equipment for processing footage. Simultaneously, all footage is stored directly on each camera and can be streamed securely via Verkada’s centralised management platform to any device.” The product is simple: cameras record video, connect to the internet, and push data to the cloud Hybrid cloud architecture Verkada’s goal is to make it easy to buy, deploy and manage large-scale enterprise video security systems across hundreds of cameras and dozens of sites. The hybrid cloud architecture makes it easy to access video footage from hundreds of cameras across any platform (web, mobile apps, tablets, and AppleTV). Verkada is appropriate for any business, school or enterprise that needs a scalable, secure and reliable video security solution, says Davito. “Our system streamlines surveillance management, removes the need of supporting equipment, and is ready to use, out-of-the-box, without the need for technical configurations,” says Davito. The simplicity and scalability of the end-to-end solution is attractive to security professionals, simplifying the day-to-day of surveillance management and providing insights that drive a business forward in other areas of the organisation. “This approach also allows us to provide customers with a complete experience, as we build our hardware and software to work seamlessly together,” Davito adds. Verkada does not integrate with other equipment or systems. “Taking an end-to-end approach ensures that we are able to develop and roll out features more quickly and take advantage of the edge-processing capabilities of our cameras,” Davito says. The simplicity and scalability of the end-to-end solution is attractive to security professionals Defending against IoT threats An end-to-end solution also increases defenses against threats in today’s Internet of Things (IoT) space. IP cameras have historically been some of the most vulnerable devices. Verkada cameras save time by updating automatically, and they are unable to accept 3rd party software (and the risks that come with it). Verkada partners with many of the leading channel distributors and is always recruiting new integrator/reseller partners. “The solution is easy to sell. It's a bolt-on value-add that doesn't require altering or configurations to existing infrastructure,” says Davito. “Sales cycles are also much shorter because implementation is simple and streamlined; it’s creating a lot of business efficiency.” The world of physical security is always evolving, so Verkada’s ongoing challenge is to continue delivering on the potential of hybrid cloud management of physical spaces. “We are always launching new features and enhancements, as well as ensuring the security and integrity of our customers’ environments,” says Davito. “We will look to continue to push the boundaries of physical security and deepen our use of technologies like machine learning and future advancements in video analytics and AI technologies.”
Located at the very heart of Amman, Jordan, Landmark Amman Hotel is one of the most renowned 5 star hotels in the city, as well as a true local landmark in more than one ways. Boasting seventeen flexible event spaces for everything from small intimate meetings to large-scale exhibitions and 258 rooms that are among the largest hotel accommodation in Jordan, Landmark Amman Hotel is an ideal choice for high-end customers of many types. Dahua Technology, a video-centric smart IoT solution and service provider, is trusted, for the first time in Amman, with the job of keeping Landmark Amman Hotel safe in its phase 2 CCTV improvement. Need of a competent surveillance system The other challenge concerned old system’s storage, which couldn’t meet the requirement of local policeIt is difficult for a large-scale hotel like Landmark Amman to patrol the grounds and premises of the hotel relying only on security personnel. Moreover, there might be no standardised evidence for the police to check without a competent surveillance system when an accident happens. There are two aspects of the old system to be improved. The analogue system the hotel was using was not easy to manage, the problem which was exacerbated by the condition that a great number of cameras were broken. The other challenge concerned old system’s storage, which couldn’t meet the requirement of local police. IP camera and NVR solution Dahua Technology’s CCTV solution comprising IP camera and NVR solves the problems just right. IPC-HDW1431S, the 4MP WDR IR Eyeball Network Camera, supports Smart Coding (H.265+ & H.264+), Intelligent Video Analysis(IVS), Wide Dynamic Range(WDR), Smart IR Technology, etc., which is fully capable of smartly capturing the 4MP resolution images in hotels. NVR4216-4KS2, the 32 Channel 1U 4K&H.265 Lite NVR can be served as edge storage, central storage And NVR4216-4KS2, the 32 Channel 1U 4K&H.265 Lite Network Video Recorder, which supports 4K and H.265 encoding technology, can be served as edge storage, central storage or backup storage with an intuitive shortcut operation menu for remote management and control. Compatible with ONVIF 2.4 protocol Easy to install, it is compatible with numerous third-party devices making it the perfect solution for surveillance systems that work independently of video management system (VMS). It features an open architecture that supports for multi-user access and is compatible with ONVIF 2.4 protocol, enabling interoperability with IP cameras. Dahua surveillance system has helped Landmark Amman Hotel find a new way to enhance the guest experience through improving the level of security with reduced property damage and thefts in hotel. It also improved team cohesion and work efficiency of the hotel employees. Furthermore, the hotel could increase revenue by monitoring and invoicing according to actual numbers of guests, and be compliance with local authorities’ security and safety regulations.
Todd Burgess has an easy answer when asked why he’s used a March Networks video solution in his Quik-E Food convenience stores for more than 15 years. “It’s simple. The system is constantly saving us money.” Networking and IT In his role as Vice President of Quik-E Food Stores, Burgess oversees all the networking and IT requirements for the Lynchburg, Virginia business, which includes 13 convenience stores and gas stations, six car washes, a laundromat and a craft beer pub called The Filling Station known for its unique combination of ‘growlers, grub and gas’. Finding those incidents and stopping them quickly can directly impact Quik-E’s profitability While many things about the family-owned business have changed since its founding in 1973, the need to keep a close eye on each location’s inventory hasn’t. Like every retail organisation, Quik-E can cite numerous examples of theft, fraud and inventory errors that have cost the business thousands of dollars in lost revenue. Finding those incidents and stopping them quickly can directly impact Quik-E’s profitability, and that’s where its March Networks intelligent video solution really proves its worth. Video system helps curb thefts “I can’t tell you how many thefts I’ve caught with the help of our video system,” said Burgess. “I had a former employee just finish paying me back $13,000 they owed us in stolen goods, and we recently caught another employee who was stealing probably $50 worth of cigarettes each day.” “And just this morning I was reviewing video of a weekly delivery with one of our managers,” continued Burgess. “We were able to confirm that we’d been charged for $77 worth of gloves that we didn’t actually receive. The video showed the delivery guy come into the store and put everything down. Two boxes of gloves is easy to spot, so it was obvious that that portion of the delivery was missing.” Quik-E Food Stores has upgraded its video solution over the years and Burgess uses the Searchlight software regularly to check for any unusual or suspect transactions and review the data when an incident occurs New software capabilities Over the years, Quik-E Food Stores has upgraded its video solution to take advantage of better performance and new software capabilities. The March Networks video recorders first installed more than a decade ago have been slowly replaced by new generation 8000 Series Hybrid NVRs, able to support both analogue and IP cameras or a full complement of IP-only video. Hosted networking solution Burgess has also overseen the transition from older Visual Intelligence software to March Networks Command Enterprise software working with Integrated Technology Group (ITG), the retailer’s long-time systems integrator and March Networks certified partner. That’s in addition to moving the organisation from office servers to a hosted networking solution and switching from an existing point-of-sale (POS) system to a new Gilbarco Passport POS solution. “We’ve been proactive about upgrading our IT infrastructure over the last few years, and our video system has always come back online, except in one instance where we couldn’t get the cameras connected again in a couple of locations,” said Burgess. “March Networks Tech Support was wonderful. They managed to diagnose the issue, which wasn’t related to the video products in the end. They were just a big help.” March Networks Searchlight™ Burgess says that he’s a satisfied customer and he won’t be looking for another video solution anytime soon Quik-E is also using March Networks Searchlight™ for retail, a software application that integrates surveillance video with the retailer’s POS transaction data to provide powerful search and investigation tools. Burgess uses the Searchlight software regularly to check for any unusual or suspect transactions and review the data when an incident occurs. “I use Searchlight primarily to look for voids and cancellations, or high dollar value transactions,” said Burgess. “We actually just used it to help catch a manager who probably stole thousands of dollars from us. I knew I was short in inventory, so I pulled up the video and transaction data to see if things were being rung up. It was clear they were not and we had the evidence to prove it. Now we’ll use that evidence to hopefully recoup our losses.” Satisfied customer Ultimately, Burgess says that he’s a satisfied customer and he won’t be looking for another video solution anytime soon. “I think it’s one of the best video surveillance systems on the market. March Networks has been good to me over the years and I’m a very happy customer.”
Vanderbilt’s SPC Wireless is an ideal fit for the retail sector. First off, SPC Wireless devices’ aesthetically appealing design is perfect to fit in with retail environments and compliment the surrounding environments of a modern-day retail store. But, as well as featuring a sleek design, the Wireless devices also have many standout features that specifically benefit the retail sector. Automatic power saving One of these benefits is long battery life as the devices are supported by an automatic power saving mode for a battery life on average of five years. In fact, the SPC Wireless smoke detector comes with a battery life of over ten years. This means retail owners won’t have to go to worry about continually changing out batteries, giving them peace of mind that their shop is under consistent protection against intruders. More so, Vanderbilt also uses conventional batteries meaning they are accessible to source, again focused on making life easier for the system user. Vanderbilt’s SPC Wireless devices are a cost-effective and reliable intruder alarm range Extended range for every detector In commercial environments, the SPC Wireless range can extend to 500 meters meaning one single detector can cover a whole building. This is more cost effective than having to wire an entire building with cable, thus cutting down on install time, and ultimately cutting down on expenses. Easy and seamless installation Lastly, SPC Wireless device installs can be hassle-free. The installer just puts up the control panel, wires the mains to it, positions the wireless device in the shop, and the retail owner is good to go. In contrast, a wired solution can take, at a minimum, a day’s work fitting cable. By reducing the installers time on site, retail owners don’t have to worry about losing out on potential customers due to the disruption to their business that a lengthy install might cause. Efficient intruder alarm range Overall, Vanderbilt’s SPC Wireless devices are a cost-effective and reliable intruder alarm range. The range is a two-way wireless technology that delivers ease of installation without compromising on the reliability of a wired system. The demand for integrated solutions and the growing influence of the Internet of Things (IoT) is an area that Vanderbilt has been paying close attention toward. We believe that wireless technology is coming of age, with two-way communication capabilities now cementing the technology’s potential and reliability.
HID Global, a global provider of trusted identity solutions, announced that Tasmania’s Old Kempton Distillery (OKD) has deployed its Internet of Things (IoT) enablement platform, HID Trusted Tag Services, to combat counterfeiting of its world class whiskeys, gins and other liquor products. HID’s innovative IoT platform for brand protection, combined with the web application developed by local integrator AusNFC, enables Old Kempton Distillery to guard against grey market activities and allows customers to authenticate their product at the point of sale. It also strengthens the appellation registration for the Australian island state of Tasmania, which boasts some of the most pristine water and climate conditions for manufacturing premium, top-shelf liquor products. Taking measures to prevent counterfeiting HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience"“Old Kempton Distillery makes one of the world’s finest whiskeys, and with counterfeiting in our industry becoming a global issue, we recognised the need to take proactive steps to protect our brand,” said Robbie Gilligan, Business Manager and Brand Ambassador for Old Kempton Distillery. “We were seeking the best brand protection technology available and a solution that would also allow us to securely engage with our customers, long after a sale. We believe that HID Trusted Tag Services and the support provided through AusNFC provide just that.” Beyond its anti-counterfeiting features, HID’s IoT offering opens a new and powerful avenue for Old Kempton Distillery to stay connected with customers via direct and hyper-personalised communications that helps the distillery build brand loyalty in a privacy-preserving, closed environment. “We find HID’s solutions to be applicable to many different industries,” said Larry Hower, CEO of AusNFC. “HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience.” Working of the system The distillery’s solution incorporates HID Trusted Tag Services into the AusNFC web application that drive the front-end mobile experience on customers’ phones. A HID cryptographically secure Near Field Communication (NFC) tag is embedded into the label of every liquor bottle, which links to HID’s cloud authentication service. By tapping their iPhone or Android phone to the bottle, the customer activates a secure communications channel that authenticates the provenance of their premium product – down to the actual bottle number. Each tap generates a unique URL, preventing counterfeiters from copying, spoofing or manipulating the URL for false verification. Combining cloud authentication with NFC tags The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied“HID’s IoT technology is enabling mass adoption of brand protection by major brands worldwide that are seeking to address more sophisticated attempts by fraudsters focussed on imitating their products,” said Mark Robinton, Director of Business Development and Strategic Innovation at HID Global. “Manufacturers and consumers alike can rest assured that their product can be authenticated at every stage of its lifecycle – from production to the shopping bag.” HID Trusted Tag Services combine HID’s cloud authentication services with its trusted NFC tags that come in many form factors for variety of product shapes and sizes requiring brand authentication. HID’s trusted NFC tags are embedded into each product during the manufacturing process, and are easily read using NFC-enabled smartphones (both Android and iOS v11 and newer). The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied, and the extended security features in HID’s cloud authentication service provide privacy-preserving brand authentication and consumer engagement in a closed and trusted environment.
HID Global, globally renowned trusted identity solutions provider, and Phunware, Inc., a fully integrated enterprise cloud platform for mobile that provides products, solutions, data and services for brands worldwide, has announced their collaboration to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Wayfinding and HID Location Services Phunware and HID are addressing the need of healthcare institutions to deploy standardised technology “The combination of Phunware’s market-leading wayfinding and mobile engagement capabilities with innovative HID Location Services will ultimately revolutionise wayfinding within healthcare institutions,” said Phunware co-founder and CEO Alan S. Knitowski. “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk. With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” Phunware and HID are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. Unified Healthcare IoT solutions Healthcare organisations can easily lay out the foundation for IoT applications, such as wayfinding" “Wayfinding is one more application that we are integrating into HID’s unified healthcare IoT solution to make it easier for healthcare systems to manage a growing demand for automated and streamlined experiences,” said Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global. “With HID technologies, we have changed the location-aware landscape, delivering location as a service. Now, healthcare organisations can easily lay out the foundation for IoT applications, such as wayfinding.” Healthcare IoT-enabled platform HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Multiscreen-as-a-Service (MaaS) platform Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more.
MOBOTIX has announced a raised focus on cyber security by implementing the “MOBOTIX Cactus Concept.” The concept aims to deliver a comprehensive approach to protecting MOBOTIX products against the threat of cyber-attacks along with education and tools to help customers and partners build and maintain secure video surveillance and access control environments. Multimedia cybersecurity campaign The objective of the Cactus Concept is to implement a multimedia cyber security campaign in order to raise awareness among potential and existing MOBOTIX customers of the importance of data security in network-based video security systems and how organisations can protect themselves through cost-efficient and intelligent solutions. The Cactus Concept protects every element of the design, manufacture and operation of each device End-to-end encryption with no blind spots is required, from the image source via the data cables and the data storage through to the video management system on the user’s computer. Like a cactus, whose every limb is covered in thorns, all of the modules (camera, storage, cables, VMS) in the MOBOTIX system have digital thorns that protect them from unauthorised access. Protecting people, places and property “Modern video surveillance and access control technologies help protect people, places and property across the world but they are increasingly targeted by criminals aiming to infiltrate, take-over or disable these vital systems,” says Thomas Lausten, Chief Executive Officer of MOBOTIX. “With the Internet of Things trend adding billions of IP connected devices each year, our industry must lead the way in creating secure platforms that can reduce the risk posed by these damaging attacks.”MOBOTIX uses the services of SySS, a third-party security-testing company that examines the security of both software and hardware elements As an important company within digital video surveillance, MOBOTIX believes in its “Cactus Concept” that protects every element of the design, manufacture and operation of each device along with end-to-end encryption across the entire usage and management cycle. SySS third party security testing To ensure the highest levels of security, MOBOTIX uses the services of SySS, a highly-regarded and independent third-party security-testing company that examines the security of both software and hardware elements. SySS customers include Basler Versicherungen, Bundeswehr, CreditPlus Bank AG, Daimler, Deutsche Bank, Deutsche Flugsicherung, Festo, Hewlett Packard, Innenministerium/LKA Niedersachsen, SAP, Schaeffler, Schufa, T-Systems and Union Investment. Sebastian Schreiber, SySS CEO said: “MOBOTIX has a contract with us to provide further penetration testing of its technology elements. The initial platform testing on a current camera model revealed very positive results and we will continue security testing as an ongoing process.” “Cyber security has been and will continue to be a core focus for MOBOTIX,” adds Lausten, “and we look forward to working with our peers in the industry, customers and government agencies to protect the very technologies and systems that help make society safer for all.”
Round table discussion
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Driven by technology developments such as voice recognition, smart devices and the Internet of Things, our homes are getting “smarter” all the time. Increasingly, we expect our residential environments to be responsive to our voice commands, whether we are adjusting a thermostat, turning on a light, or lowering the window shade. Smarter home integration yields new opportunities and challenges for home security, too, which contributes an element of safety and protection to the convenience aspects of smart homes. We asked this week’s Expert Panel Roundtable: How are new smart home systems impacting security?
Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilised. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?