Security Assessments
Transportation enables the movement of goods and people, facilitates trade and commerce, and is crucial for businesses to operate and expand. Security technology plays a major role both in protecting today's various transportation systems and increasingly to make them more efficient. We asked this week's Expert Panel Roundtable: What’s new in technology serving the transportation market?
iDenfy, a Lithuania-based AI-powered identity verification, fraud prevention and compliance tool provider, has partnered with Transparent Care, an American-based innovative healthcare staffing platform designed to help hospitals hire nurses and other specialists. This collaboration aims to enhance the identity security of Transparent Care's staffing services to avoid any fraudulent identities, forged ID documents and other illegal activities. Transparent Care team Transparent Care opera...
Codelocks has introduced the CL5000 NetCode® range which adds Codelocks’ time-sensitive code functionality, NetCode®, to its best-selling, heavy-duty electronic CL5000 access control solution for high-traffic areas. Launched in 2004, the original CL5000 has stood the test of time over the last 20 years. The addition of NetCode® technology takes the CL5000’s solid build, ease of installation and operation, and low maintenance features to the next level with the added bene...
Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announced that the lawsuit filed by Sensormatic against Genetec had ended definitively in the company's favour with Genetec exonerated of any patent infringement and with the court awarding Genetec attorney fees. Sensormatic Electronics, LLC, a subsidiary of Tyco International, which is now merged with Johnson Controls, filed suit against Genetec in Delaware in Jun...
PayU GPO, the pioneering online payment service provider operating in over 50+ emerging markets, announces the appointment of Simona Covaliu as Chief Risk Officer. Covaliu brings over 18 years of experience to the role, having worked at various global companies including Booking.com as Senior Risk Manager, Uber as Chief Risk and Compliance Officer, and Mambu as VP of Risk and Compliance. At PayU GPO, Simona will be working with the privacy, compliance, risk, and security teams as the second lin...
iDenfy, a Lithuanian-based RegTech company best known for its identity verification tools, has announced a new partnership with SetFreaks, the world’s first pre-release service for DJs in the dance music industry. This collaboration will enhance regulated compliance and automate user identity verification on the SetFreaks platform while adding an extra layer of security to internal fraud prevention measures. SetFreaks, the world’s first pre-release service for DJs in the dance...
News
Regula, a global developer of forensic devices and identity verification solutions, has improved the onboarding process for Maza, a fintech company dedicated to providing new immigrants in the U.S. with rapid access to essential financial services. By integrating Regula Document Reader SDK and Face SDK, Maza has established a streamlined, secure identity verification process, enhancing customer experience and reducing onboarding costs by 50%. Maza assists newcomers to the USA with obtaining an Individual Tax Identification Number (ITIN), which allows them to file taxes, gain access to the US financial system, and more while waiting for their Social Security Number (SSN). The core part of Maza’s services is the Know Your Customer (KYC) process, which helps verify the identities of around 5,000 clients every month. Partnered with Regula Maza initially implemented special technology from an IDV solutions provider For this purpose, Maza initially implemented special technology from a digital identity verification (IDV) solutions provider. However, the company faced a number of issues, such as too many false negatives and positives, not enough control over the IDV process, and limitations on customer experience. All of this led Maza to seek a more controlled and reliable IDV solution. After extensive market research, Maza partnered with Regula to implement a single-vendor comprehensive IDV solution covering document and biometric verification. The set of Regula Document Reader SDK and Regula Face SDK met Maza’s requirements both in technology and price and allowed it to build a robust identity verification system. How the verification is done Regula Document Reader SDK automatically identifies the paper type, reads and verifies its data Thanks to the implementation of Regula’s solutions, the identity verification process for Maza’s customers is now straightforward and efficient: a person just scans their ID and takes a selfie. Regula Document Reader SDK automatically identifies the document type, reads and verifies its data, and cross-checks all information to detect any inconsistencies or alterations that may indicate fraud. As long as the solution relies on Regula’s proprietary and most comprehensive identity document template database, it is capable of recognising and verifying a great variety of IDs from 250 countries and territories. In its turn, Regula Face SDK matches a person’s selfie with their portraits in the documents to prove the person is the same and performs a liveness check to ensure that the company is onboarding a real live person, not a fraudster who uses masks, video injections, or screen replays. It takes mere seconds to complete, and a new client has access to the full range of Maza’s services. Implementation of Regula's solutions took just six weeks, and they significantly improved Maza's KYC processes. Results Key benefits include: 50% reduction in cost per customer onboarding, which has made the process more affordable and efficient; improved document verification and liveness checks, which has reduced the number of verification issues; enhanced user experience, which has eliminated friction. Importance of precise identity verification “Our cooperation with Regula enabled Maza to adapt swiftly to the needs of our growing customer base. The robust and reliable identity verification system built with Regula Document Reader SDK and Regula Face SDK has significantly improved our onboarding process, reducing costs and enhancing the overall user experience. As a result, we can now focus on higher-value tasks and improve customer satisfaction,” says Siggy Bilstein, CTO & Co-founder at Maza Financial. “We understand the critical importance of precise identity verification, especially if it is about granting access to fundamental financial services. Our extensive document knowledge and advanced IDV technologies help our customers stay ahead of the evolving landscape of identity fraud. We are happy to partner with Maza and support them in ensuring that new U.S. immigrants can securely access essential services with confidence and ease,” says Ihar Kliashchou, Chief Technology Officer at Regula.
BlackFog, the pioneer in ransomware protection and anti-data exfiltration (ADX), announced it has made new appointments to strengthen its leadership team as it witnesses significant growth. John Sarantakes has joined as Chief Revenue Officer, and Mark Griffith has been appointed as Vice President of Strategic Sales. As one of its founding team members, CMO Brenda Robb has also been promoted to President of BlackFog. As executive director of the company, Brenda led the expansion of the company into Northern Ireland, where BlackFog has now established R&D headquarters. As President, Brenda’s strong leadership skills and counsel will be leveraged with BlackFog’s expansion throughout North America. BlackFog’s success “As CMO, Brenda has spearheaded our marketing and communications strategy as BlackFog has launched in new territories and markets, while building a strong brand presence for our pioneering ADX technology,” says Dr. Darren Williams, CEO and Founder, BlackFog. “Brenda is instrumental to BlackFog’s success, and I am thrilled she is taking on the role of President in addition to pioneering our marketing operations.” With over 28 years in technology sales, John Sarantakes will play a pivotal role as CRO in driving global sales through direct sales and the development of a strong channel. He will also target sales growth across State, Federal, Local Government and Education sectors. Partnerships with MSPs and MSSPs John served as Senior Vice President of Strategy and Business Development Previously at InMotion Software, John served as Senior Vice President of Strategy and Business Development. He has also held positions as Executive Vice President at Headspring Systems, Senior Vice President of Sales and General Manager of EMEA at Absolute Software and National Sales Director at Dell. Mark Griffith was also appointed as Vice President of Strategic Sales at BlackFog. Griffith, who has more than 30 years of experience in strategic leadership and innovation, will lead BlackFog efforts to develop partnerships with MSPs and MSSPs, to secure customers in State, Local and Government agencies, and continue to work alongside customers on a tactical and operational standpoint. New effective solutions “We’re thrilled with the appointments of both John and Mark, and we know they will be great assets to both the company and it’s customers,” says Dr. Darren Williams, CEO and Founder, BlackFog. He continues, “Mark is a results-focused and motivated individual who will deliver unprecedented value to our team. John is a respected colleague who brings years of results-driven experience to the table, critical as we target new territories and sectors." These appointments lay the foundation for BlackFog’s next stage of rapid growth. As ransomware threats escalate, the demand for data protection and anti-data exfiltration is at an all-time high. Organisations are seeking new effective solutions to help them protect their systems and data from ransomware attacks.
Sonatype, the end-to-end software supply chain security platform, announced that Sonatype SBOM Manager, its Enterprise-Class Software Bill of Materials (SBOM) solution, and its pre-eminent artefact repository manager, Nexus Repository, is now available in AWS Marketplace, a digital catalogue with thousands of software listings from independent software vendors that make it easy to find, test, buy, and deploy software that runs on Amazon Web Services (AWS). AWS customers will now have access to the full Sonatype platform, including Sonatype Firewall Repository’s open-source malware protection and Sonatype Lifecycle’s software composition analysis solution, directly within AWS Marketplace. Sonatype’s availability provides AWS customers with the ability to streamline the purchase and management of the full Sonatype platform within their AWS Marketplace account. Partnering with Sonatype Enterprises partnering with Sonatype benefit from 26x faster identification and remediation of OSS AWS customers can now manage open-source components and risk throughout the software development life cycle (SDLC) at the enterprise level. This helps eliminate uncertainty in SBOM collection, monitoring, and compliance, automatically blocks malicious code and open-source malware, streamlines policy enforcement, enhances incident response times, and accelerates code delivery. Enterprises partnering with Sonatype benefit from 26x faster identification and remediation of open source software (OSS) components, a 70% reduction in exploitability windows from adversary attacks, and a 99% decrease in developer time spent on researching, securing approval, and downloading quality OSS components. Sonatype’s full platform and solutions "In today's world, where enterprise software is constituted of more than 85% open source, and secure development regulations are increasing, organisations need a trusted partner like Sonatype to empower their developers to innovate, securely at lightning speed," said Mitchell Johnson, Chief Product Development Officer at Sonatype. "With Sonatype’s full platform and suite of solutions available in AWS Marketplace, we're making it easier than ever for businesses to harness the power of open source and fortify their software supply chains against risk, all powered by Sonatype’s unrivalled open source data and security research.” Sonatype available in the AWS Marketplace With Sonatype available in AWS Marketplace, they can expect: Rapid, Reliable SBOM Compliance at Scale: Sonatype SBOM Manager brings Sonatype’s best-in-class component scanning and comprehensive open source (OSS) data intelligence together with market-leading SBOM management support. It streamlines and automates the requesting, auditing, distributing, and monitoring of an organisation’s first and third-party SBOMs. And, by creating a centralised repository for SBOMs, organisations can easily keep up with emerging software security regulations. World’s Leading Artefact Repository: Built by the founders and stewards of Maven Central, Sonatype Nexus Repository empowers software development teams to efficiently scale and manage components, binaries, and build artefacts across their entire software supply chain. It enables teams to build quickly and reliably and publish and cache components in a central repository that connects natively to all popular package managers. The Only Open Source Malware Detection Solution: Sonatype's artificial intelligence (AI)-powered Repository Firewall detects more than 2,100 intentionally malicious components every month, and blocks them, preventing malware from entering the software supply chain and infecting upstream systems. Expanded Software Composition Analysis (SCA): Sonatype's deep understanding of open source components and their vulnerabilities enables precise identification and mitigation of risks throughout the software development lifecycle. Unrivalled Dependency Management: Sonatype empowers organisations to understand and control the complex relationships between software dependencies, ensuring a secure and reliable foundation for applications. Supply chain security solutions Sonatype's proprietary and unique data, amassed from analysing hundreds of millions of open-source components, provides unparalleled insights into the open-source landscape. This information enables Sonatype to deliver the most accurate and comprehensive software supply chain security solutions available in the market, giving organisations the assurance to innovate confidently and quickly, without open source risk.
Secure email and file transfer provider Zivver has been recognised as a High Performer for both Email Encryption and Email Security in the G2 Summer Market Report. G2 is the world's largest and most trusted software marketplace, empowering business professionals to make better software purchasing decisions based on authentic peer reviews. The G2 Summer 2024 Market Report reflects the voice of real users, and Zivver’s comprehensive and robust email encryption and security solution consistently received high ratings from users for its ease of use, reliability, and outstanding customer support. Effortless email security solution Rick Goud, Founder and CIO at Zivver said: "We are incredibly honoured to be recognised as High Performers by G2. This acknowledgment reflects our team's hard work and dedication to providing high-quality email security solutions. We remain committed to innovation and excellence, and this award motivates us to continue improving and delivering the best possible service to our customers." Zivver delivers an effortless email security solution that prevents data incidents As businesses increasingly rely on digital communication, the need for strong email security has never been more apparent. Zivver delivers an effortless email security solution that prevents data incidents through seamless integration with existing email clients, enhancing email with data loss prevention and MFA tools, advanced encryption, and large file transfer capabilities. Aspect of Zivver Email Encryption Designed to empower people to work securely with minimal disruption, Zivver adds an extra layer of security to protect emails and files before, during and after sending. One user on G2 remarked: “The standout aspect of Zivver Email Encryption is its powerful encryption technology combined with effortless usability. The best part? Users don't even have to ponder over how the encryption works; it's seamlessly integrated, making communication secure without any hassle. Plus, the implementation process is a breeze, and the support from the supplier is simply unmatched – whether during setup or ongoing use, their assistance is sublime.”
Check Point Research (CPR) releases new data on Q2 2024 cyber attack trends. The data is segmented by global volume, industry, and geography. These cyber attack numbers were driven by a variety of reasons, ranging from the continued increase in digital transformation and the growing sophistication of cybercriminals using advanced techniques like AI and machine learning. Need for robust cyber security Economic motivation for income from attacks like ransomware and phishing as well as attacks fueled by geopolitical tensions and supply chain vulnerabilities continues to heavily impact this rise in the numbers. This increase in global cyberattacks also stems from hacker interest in Education and Research, which saw the largest increase in cyber attacks in Q2 2024, when compared to all other industries. CPR warns that these factors can continue to accelerate the number of cyber attacks in 2024, driving the need for robust cyber security across all industries. Key statistics In Q2 2024, Check Point Research saw a 30% YoY increase in cyber attacks globally, reaching 1,636 attacks per organisation per week. The top 3 most attacked industries were Education/Research (3,341 attacks per week), Government/Military (2,084 attacks per week), and Healthcare (1,999 attacks per week). Latin America, (+53%), Africa (+37%), and Europe (+35%) showed the largest increases in cyber attacks in Q2 2024, compared YoY. Africa experienced the highest volume of attacks with 2,960 weekly attacks per organisation, followed by Latin America with 2,667 weekly attacks per organisation. North America accounted for 58% of publicly extorted ransomware attack victims. The Manufacturing sector represented 29% of the published ransomware victims globally, marking a 56% year-over-year increase. Cyber-attacks The relentless onslaught of attacks underscores the growing sophistication and persistence of threat actors Cyber-attacks are increasing worldwide, with a 30% increase in weekly attacks on corporate networks in Q2 2024 compared to Q2 2023, and a 25% rise compared to Q1 2024. With an average of 1,636 attacks per organisation per week, the relentless onslaught of attacks underscores the growing sophistication and persistence of threat actors. Several cyber threat trends are all happening at once. Target for cybercriminals Education and research industry For instance, the education and research industry has consistently been a prime target for cybercriminals due to its wealth of sensitive information and often inadequate cyber security measures made further complex by multiple groups of online users within and outside of the network expanding the attack vector surface. The education/research sector was the number one most attacked industry globally, seeing a 53% increase in Q2 2024 compared to Q2 2023, with an average of 3,341 attacks per organisation every week. Government/Military Government/Military was the second most attacked sector with 2,084 attacks per week, reflecting the high stakes involved in state-level cyber espionage and disruption. Looking back at cyber attacks for the Healthcare sector in Q2, healthcare organisations saw an average of 1,999 weekly attacks per organisation, which was 15% higher than last year. Hackers like to target hospitals because they perceive them as short on cyber security resources with smaller hospitals particularly vulnerable, as they are underfunded and understaffed to handle a sophisticated cyber attack. Healthcare and hardware vendor industry The Hardware Vendor industry experienced the largest increase in attacks, with a dramatic rise of 183% Ranking third out of all sectors for the most cyber attacks globally, healthcare is so lucrative to hackers because they aim to retrieve health insurance information, medical records numbers, and, sometimes, even social security numbers. Furthermore, the Hardware Vendor industry experienced the largest increase in attacks, with a dramatic rise of 183%. This surge underscores the expanding target range of cyber criminals as they seek to exploit vulnerabilities across various sectors. Regional analysis of cyber attacks Regionally, Africa experienced the highest average weekly cyberattacks per organisation in Q2 2024, with an average of 2,960 attacks, marking a 37% increase compared to the same period in 2023. Latin America saw the most significant rise, with attacks increasing by 53% year-over-year to an average of 2,667 per week. The Asia-Pacific (APAC) region followed with a 23% increase, highlighting the global spread of cyber threats. Region Avg weekly attacks per org YoY Change Africa 2960 +37% Latin America 2667 +53% APAC 2510 +23% Europe 1367 +35% North America 1188 +17% Ransomware attacks per region and industry In Q2 2024, ransomware attacks that involved public extortion were reported showing a 13% year-over-year increase, totaling approximately 1,200 incidents. North America was the hardest hit, comprising 58% of all reported ransomware attacks, despite a slight 3% decrease from the previous year. Europe experienced 19% of the incidents, marking a notable 28% decrease, while the APAC region saw the largest increase with a 38% surge, accounting for 16% of the attacks. Region Percent of Published Ransomware Attacks YoY Change in Number of Published Attacks North America 58% -3% Europe 19% -28% APAC 16% +38% Latin America 6% +1% Africa 1% -55% Industry impact In terms of industry impact, the Manufacturing sector was the most affected, representing 29% of publicly extorted ransomware attacks’ victims globally, with a significant 56% year-over-year increase. The Healthcare sector followed, accounting for 11% of the attacks and experiencing a 27% increase. The Retail/Wholesale industry saw 9% of the attacks, with a notable 34% decrease from the previous year. Notably, the Communications and Utilities sectors experienced dramatic rises in ransomware incidents, with increases of 177% and 186%, respectively. Industry Percent of Published Ransomware Attacks YoY Change in Number of Published Attacks Manufacturing 29% +56% Healthcare 11% +27% Retail/Wholesale 9% -34% Finance/Banking 7% -8% Education/Research 6% -3% Software vendor 6% -57% Government/Military 6% +31% Transportation 6% +40% Insurance/Legal 5% -25% Communications 5% +177% Leisure/Hospitality 3% +0% Consultant 2% -76% Utilities 2% +186% Energy 1% -25% Tips for prevention and mitigation Organisations must take proactive steps to safeguard their data and systems. Here are some strategies inspired by best practices from Check Point Software: Enhance Security Posture: Regularly update and patch systems to close vulnerabilities. Multi-layered security measures, including firewalls and endpoint protection, are essential. Employee Training and Awareness: Regular training sessions can educate employees about the latest cyber threats and phishing tactics, fostering a culture of vigilance. Advanced Threat Prevention: Utilise technologies such as sandboxing and anti-ransomware tools to detect and block sophisticated attacks. Adopt Zero Trust Architecture: Implement strict identity verification for every person and device attempting to access network resources. Regular Backups and Incident Response Planning: Ensure regular backups of critical data and develop comprehensive incident response plans to quickly address and mitigate the impact of attacks. Network Segmentation: Isolate critical systems to limit the spread of attacks and protect sensitive information. Vulnerability Management: Conduct regular vulnerability assessments and penetration testing, prioritising remediation efforts based on potential impact. Customised strategies The dramatic rise in cyber-attacks globally, particularly ransomware incidents, signals an urgent need for robust cybersecurity frameworks. Organisations must prioritise cyber security, adopting customised strategies to effectively combat the evolving threat landscape. By implementing advanced security measures, fostering a culture of awareness, and preparing for potential incidents, businesses can better defend against the relentless tide of cyber threats. The time to act is before the next wave of attacks strikes.
Sophos, a global pioneer of innovative security solutions for defeating cyberattacks announced that Teresa Anania has joined the company as Chief Customer Officer (CCO). Anania will play a key role in accelerating Sophos’ customer and partner success initiatives to maximise the value of Sophos’ portfolio of cybersecurity solutions and services, including Managed Detection and Response (MDR) services and endpoint, network, email, and cloud security. Teresa Anania Anania has more than 25 years of experience in pioneering customer satisfaction and sales growth across the public and private sectors, excelling in both direct and indirect sales channels. Joining Sophos from Zendesk, Anania was responsible for the management and development of its global client base of more than 110,000 customers from small- and medium-sized businesses (SMBs) to enterprises. During her time at Zendesk, Anania led all post-sales functions, including Professional Services, Customer Support, Customer Service, Customer Success, and Renewals, to deliver top-line growth and measurable impact for customers. Anania has extensive experience specialising in scaling post-sales customer engagement for enterprise, commercial, and volume segments, delivering significant Return on Investment (ROI) and driving revenue. Anania's responsibilities Anania will be responsible for developing a stronger customer-centric culture to deliver a seamless experience As CCO, Anania will be responsible for developing a stronger customer-centric culture, working together with channel partners and Managed Service Providers (MSPs) to deliver a seamless experience for Sophos’ growing customer base of more than 600,000 organisations worldwide. This vision also assures that smaller customers, which are a prime target for attackers, have access to the same innovative security solutions and industry-pioneering threat intelligence as their larger counterparts, a critical overall mission for Sophos in 2024 and beyond. Cybersecurity and managed security services “Sophos is in an exciting phase of its business growth, and I am eager to bring my career success building positive customer experiences to the company,” said Anania. “Sophos has a stellar reputation for continually innovating cybersecurity technology and managed security services that help organisations defend their businesses against ransomware, data breaches, and other potentially business-ending cyberattacks." Interactive assessments "I will be working closely with channel partners, MSPs, and the global team, to advocate for Sophos’ customers and their security defences and to drive value for partners from Sophos’ entire portfolio of solutions and services,” added Anania. “The threat landscape is always changing, and organisations need regular, interactive assessments of their overall IT environments to determine how to most efficiently and effectively adapt to defeat active attackers,” said Joe Levy, CEO of Sophos. Customer experience "To help facilitate this, security vendors need to take responsibility to ensure that customer investments in their products and services are providing real value to them, which requires engagement throughout contract lifecycles." "This also requires world-class customer experience (CX) for renewals and upgrades to the most relevant and appropriate technologies and services, and an awareness of the full potential already available in existing licences. The best tool is of little value without the right operation, so these components are critical to properly and consistently defending against modern attacks." Post-sales relationships “To provide this pathway, we’ve hired Teresa, who has an impressive track record building post-sales relationships and delivering experiences that increase customer satisfaction and drive topline growth." "Her knowledge and expertise will allow us to further put customers at the centre of our business, alongside our channel partners and MSPs. Most importantly, Teresa’s new role will help keep our customers as secure as possible, which is always our top priority. We are delighted to welcome Teresa to the Sophos team.”
Expert commentary
For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdles. A majority of public-school districts today are faced with outdated infrastructure and security controls, requiring necessary upgrades. By addressing these concerns head on, schools will ensure a safer environment for both students and staff, mitigating risks posed by unforeseen physical and digital threats. Common K12 security pain points There’s no one-size-fits-all solution in school district security. School districts may have big plans to implement upgraded security systems but to set out on the right foot, pioneers must have a clear vision of their long-term strategy. When embarking on their security journey, education pioneers often wonder where to start and what exact steps are they need to be taking to identify and address weaknesses. Local K12 and government pioneers are promoting and mandating security assessments to uncover safety gaps on campuses and mitigate these risks with advanced technology solutions. Not only do assessments provide detailed, customisable roadmaps for district pioneers, but they also recommend technologies and funding opportunities to help close threat gaps. K12 school districts are mainly vulnerable to cyber-attacks due to the sensitive nature of student records In today’s climate, schools face a growing number of physical and digital security threats. From a cybersecurity standpoint, K12 school districts are particularly vulnerable to cyber-attacks due to the sensitive nature of student records. However, only one-third of these districts have adequate staffing to address threats effectively. In addition, according to a recent survey from Johnson Controls and Forrester Consulting, security decision-makers are having trouble receiving actionable insights. Nearly two-thirds of respondents said that they struggle to receive information from all necessary systems regarding their security threats. To gain more clarity into what school districts need in terms of security tools and threat mitigation, implementing system-wide monitoring and optimisation can be invaluable. This approach enhances equipment and operational efficiency, while providing necessary resources and expertise for critical patch updates across all systems, strengthening their overall security posture. Achieving a well-rounded security program In the past few years, AI technology has emerged as a trending solution and is generating considerable attention. While the allure of implementing cutting-edge technologies is undeniable, it’s important to recognise that a robust security program hinges on solid access control. Access control technology provides administrators with the means to oversee and regulate entry into facilities, serving as the foundation for basic physical security. The technology helps administrators and staff control access to multiple areas from web-enabled devices, even during lockdowns which is crucial in emergency situations. School district pioneers should utilise available digital risk assessment tools to uncover threat areas Once basic security controls are in place, school districts must address their next set of security pain points and identify which solutions meet their specific needs. This involves identifying and prioritising the highest need and most cost-effective investments that will have the greatest impact on enhancing security measures. To accurately determine which security solutions are needed for a specific environment, school district pioneers should utilise available digital risk assessment tools to uncover threat areas and determine levels of priority. By focusing on these priority areas, districts can allocate their resources and efforts where they are needed most, ensuring maximum effectiveness in mitigating risks and vulnerabilities. Securing funding before approaching deadlines A major challenge for school districts surrounding campus security is identifying and securing the necessary funding to implement solutions aligned with their goals. Leveraging available funding sources is critical, especially considering certain programs are approaching their deadline, like the Elementary and Secondary School Emergency Relief (ESSER) fund. Announced during the pandemic, ESSER is a funding program that has allocated nearly $190 billion in aid to U.S. public school districts to fund projects benefitting the well-being of occupants. Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024 Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024, when schools must attribute all of their funds to assigned contracts. Following this date, pioneers will need to complete all ESSER spending by January 2025 unless approved for an extension into March 2025. As ESSER wanes, school districts are acutely aware of the fiscal cliff in budgets through 2025. However, many states are ramping up grant funding to close the deficit gap. Administrators should become familiar with these grant opportunities at a local and state level. Get started on security plans The time for school district pioneers to act is now. While the safety and well-being of students and staff are always top priorities, it’s crucial to acknowledge that a lack of insight into necessary security upgrades and available funding options will leave districts behind the curve. Seizing the final months of ESSER funding presents an ideal window to address security pain points and build a safer future for K12 facilities. Looking beyond ESSER, pioneers must proactively seek out and leverage other funding avenues to help ensure the continuity of their security efforts and maintain a proactive stance in safeguarding healthy and safe educational environments.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
Collaboration among manufacturers in the physical security industry can result in systems that are easier to install for integrators and that provide a better customer experience for end users. Illustrating the point is the recent collaboration among a turnstile technology company, a supplier of short-range wireless readers/writers, and a biometric business focused on ‘frictionless’ access control. “The more manufacturers collaborate with each other, the more benefits for end users,” says Steve Caroselli, the Chief Executive Officer (CEO) of Orion Entrance Control. Better collaboration means a better user experience We look for opportunities to collaborate and make sure the experience is above and beyond" Steve Caroselli adds, “Better collaboration means a better user experience. We look for opportunities to collaborate and make sure the experience is above and beyond.” Orion’s collaboration with ELATEC RFID Systems and SAFR touchless biometrics by RealNetworks Inc. highlights the advantages of manufacturers working together to ensure technologies operate smoothly in the real world. Taking ownership of the customer experience When Orion Entrance Control provides a SpeedGate swing-glass optical turnstile, they take full ownership of the customer’s experience. That means ensuring the turnstile application operates as it should, regardless of which component of the broader system might be at fault. To the customer experience, a card reader that doesn’t work is the equivalent of a turnstile that doesn’t work. Which component is at fault is irrelevant, and in fact, invisible, to the overall customer experience. Importance of dependable operation of turnstiles As the most visible element in many access control systems, dependable operation of turnstiles reflects positively on the manufacturer and on the entire system. Orion tests various third-party components with their turnstiles To ensure an optimum customer experience, Orion tests various third-party components with their turnstiles, in order to ensure flawless operation before a turnstile is delivered to a customer. Customers buying an Orion turnstile send the card readers they want to use to Orion’s corporate headquarters in Laconia, New Hampshire, USA, where Orion engineers ensure seamless operation. Ensuring optimum customer experience All readers are designed to be bolted to the wall rather than installed inside a turnstile In addition to scenario-based testing, readers are placed inside the turnstile for a streamline appearance, which can be a challenge given the variety of sizes and types of readers a customer might choose. All readers are designed to be bolted to the wall rather than installed inside a turnstile, which complicates adaptation efforts. In short, historically for Orion, ensuring the optimum customer experience involved extra time and effort, although obviously it was worth it. Providing flexibility for any environment Seeking to simplify the process, Orion has found an alternative to using many different types and models of card readers for its turnstiles. Deploying an RFID reader/writer from ELATEC provides flexibility to operate in a variety of card and reader environments, including almost all 125 kHz and 13.56 MHz contactless technologies. The product is compatible with low-frequency (LF), high-frequency (HF), near field communication (NFC) or Bluetooth Low Energy (BLE) signals. An integrated BLE module supports mobile ID and authentication solutions. There is an integrated antenna for LF and HF to ensure excellent contactless performance. ‘Universal’ configuration of the ELATEC reader hardware Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is compatible with any card system. It works with all the access control protocols, including SEOS, OSDP and other open protocols. “We can stock an open SKU and flash the firmware as per the customer requirement,” says Steve Caroselli. The small form factor (around 1 1/2 inches square) of the ELATEC module lends itself to easy installation inside the turnstile housing. Easy availability of the ELATEC readers helps Orion continue to serve customers, despite recent disruptions in the supply chain. And, ELATEC’s reader hardware has earned global certifications that enable Orion to use their products for customers around the world. Testing to ensure smooth operation ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing Before embracing the ELATEC reader module, Orion tested it for several months to ensure compatibility with its turnstiles. ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing and working closely with the Orion team. Everyone in the ELATEC sales and engineering team, right up the company’s C-suite, worked to support Orion during the testing phase. In the end, in addition to other advantages, ELATEC’s detection speed and read range compares favorably to competing technologies. “We move really fast as an organisation, so we are looking for other organisations that move very fast,” says Steve Caroselli, adding “We met with ELATEC one week and had the equipment for testing the next week. We like to work with companies that move fast, and they are culturally aligned with how we do business.” Orion turnstiles with ELATEC TWN4 Palon Compact panel The Orion turnstiles incorporate an ELATEC TWN4 Palon Compact panel, a versatile panel-mount reader designed for integration into third-party products and devices. It supports enhanced interfaces, especially RS-485, and reflects the advantages and integrated tool support of the ELATEC TWN4 family. Orion is implementing SAFR SCAN biometric technology using hardware and software from RealNetworks Inc. “The selection of ELATEC products allows Orion to provide their customers and partners with a flexible RFID reader solution that supports numerous credential options and virtually all transponder technologies,” said Paul Massey, the Chief Executive Officer (CEO) of ELATEC, Inc., adding “This is especially valuable in multi-tenet, multi-credential environments.” Orion works with all the various stakeholders – architects, consultants, integrators, and end users – to ensure total satisfaction with an installation. Biometric technology for ‘frictionless’ access control Orion is also implementing SAFR SCAN biometric technology into their turnstiles using hardware and software from RealNetworks Inc. The facial recognition reader technology, designed for mainstream commercial access control, provides a ‘frictionless’ experience, and allows users to pass through turnstiles at a walk. The system can authenticate up to 30 individuals per minute with 99.9% accuracy, despite varied lighting conditions. SAFR’s system provides a good user experience Orion designed a mounting system to incorporate the biometric reader into their turnstile design Orion designed a mounting system to incorporate the biometric reader into their turnstile design. SAFR’s system provides a good user experience, when it comes to enrollment. On each turnstile, the SAFR technology can operate separate from the ELATEC reader or in conjunction with it for multi-factor authentication in higher-security applications. Innovation for new applications A broad approach to the customer experience reflects Orion’s positioning as a technology company, in addition to being a manufacturer of turnstiles. Their Infinity software is the ecosystem ‘nerve centre’ platform to ensure operation and connected through a single ‘pane of glass.’ The need to protect more entrances beyond the lobby led Orion to develop its recently patented DoorGuard, a LIDAR-based solution that detects each person who passes through a doorway and prevents tailgating (like a turnstile) for applications, such as stairway doors, perimeter doors, data centres, IDF closets, etc. The software mimics the advantages of a turnstile to monitor access control and occupancy. Removing friction during installation and beyond Orion’s Constellation is a presence detection system that uses UWB (ultra-wideband) radar to sense where people are in a building for emergency response and building utilisation applications. “One of our core values is to remove friction and make customers’ lives easier,” says Steve Caroselli, adding “Our people-first philosophy is: What can we do to make your life better? We want to be systematic, and everything must be repeatable in terms of how we react and interact with customers.”
Case studies
Cognitec Systems is providing reliable face recognition technology to Brazilian payment solutions provider Billingpay for use in Rio de Janeiro’s public transport system. Billingpay has implemented automated face recognition to facilitate digital ticketing via the transport application Jaé, to be used by more than four million users daily. Currently, about 11 thousand capture devices are installed throughout the city’s transportation system. Evasion in public transportation Facial biometrics match the ticket holder to the correct ticket, preventing fraudulent use The process starts with the enrolment of facial images during the registration service, which is then used to prevent revenue evasion in public transportation. Facial biometrics are matching the ticket holder to the correct ticket, therefore preventing fraudulent use of subsidised tickets. “The second largest city in Brazil now operates one of the most modern and secure ticketing systems in the world, with added high-performance technology from Cognitec!” comments Marcello Perrotta, CCO of Billingpay. Face recognition technologies Public transport users can also present their faces to log into the Jaé platform and to access buses or trains without the need of a ticket or identification. “This use case is a testament to the countless capabilities of face recognition technologies for modern identification services,” says Alfredo Herrera, Cognitec’s Managing Director. “We are excited to be a part of this innovative project, and this successful international partnership with Billingpay!”
One of India's fastest-growing entertainment networks, renowned for its iconic brands, offers a diverse array of experiences across multiple platforms. This network profoundly impacts the Indian entertainment landscape, engaging audiences through its on-air, online, on-ground, cinema, and merchandise properties. With a portfolio of over 30 channels, it captivates audiences nationwide with a variety of programming, including general entertainment, movies, sports, youth content, music, and children's genres. Additionally, the network has been successfully producing and distributing acclaimed Hindi and regional films in India for over a decade. Challenge/requirements The client required a unified communication solution, prioritising emergency communication, for over 500 users. Future scalability was a crucial factor as well. A major challenge involved integrating Matrix devices with existing SIP-enabled systems. Their key requirements were as follows: Unified Communication Solution: Implement a system that ensures seamless connectivity across various devices via a single unified communication platform. Mobility: Guarantee connectivity for users on the go. SIP Integration: It was essential to integrate Matrix devices with the existing SIP-enabled systems to maximise investment efficiency without revamping the current infrastructure. Emergency Communication: Provide features that facilitate contacting emergency services during times of distress. Redundancy: To minimise or eliminate downtime, particularly during emergencies, redundancy was a critical requirement. Solution Matrix, in collaboration with Space Office Systems (I) Pvt. Ltd., created a Unified Communication solution that integrated existing devices with Matrix devices via SIP. This solution included the ANANT unified communication server, standard SIP desk phones, and the VARTA softphone. The deployment was carried out as follows: The server-based PBX, ANANT, housed in the server room, provides LAN and WAN connectivity with the crucial feature of redundancy. The media house utilised ANANT's LAN connectivity, facilitated by a network switch that allowed multiple devices on the premises to access IP connectivity. The network switch, connected to ANANT via LAN, provides connectivity for SPARSH VP510 and SPARSH VP210 phones, along with the VARTA softphone. Moreover, a connection through the router facilitates SIP integration with third-party devices via the SIP trunk. Results Emphasising SIP integration of Matrix devices with existing systems optimised investments The results included significant enhancements to their communication capabilities. Collaboration was streamlined through a unified communication solution, and mobility was boosted with VARTA. Emphasising SIP integration of Matrix devices with existing systems optimised investments. Overall, the solution markedly improved operational efficiency with advanced calling features. Now, let's delve into the specifics of the solution provided. Collaboration: The unified communication solution, featuring the server-based PBX ANANT, enabled seamless teamwork between office-based and mobile staff through VARTA. This ensured uninterrupted transfer and reception of information. Investment Optimisation: The SIP integration with Matrix Solution seamlessly integrated into the existing network infrastructure, meeting the client's uncompromising requirement. This integration effectively utilised current resources, eliminating the need for additional investments. Operational Efficiency: The redundancy offered by ANANT ensured minimal to no downtime, enabling smooth information flow and greatly enhancing workflow efficiency. This capability was especially critical during emergencies and related communications. Modern Features: The office now enjoys enhanced capabilities with Matrix Standard SIP desk phones such as SPARSH VP210 and SPARSH VP510. These include advanced call routeing, integration with global directories, VPN connectivity support, thereby significantly bolstering the media house's communication capabilities. The Matrix solution empowered the media house to elevate its communication capabilities with advanced call features. Notably, it excelled in emergency communication functionality, provided scalability for future needs, and seamlessly integrated with third-party devices through SIP.
Revader Security was selected by safety & security specialists North to provide over 75 re-deployable CCTV cameras to the London Borough of Hammersmith and Fulham as part of their contract to upgrade the council’s public space CCTV network. Revader’s re-deployable CCTV cameras are all-in-one professional surveillance solutions that combine an HD camera, recording, onboard storage and wireless transmission in a single compact unit. Fleet of re-deployable cameras They can operate from a wide range of power sources, including mains, battery and solar The cameras can be installed in virtually any location and can be easily moved to target crime hotspots and other areas of interest, enabling police and local authorities to deter offenders, respond to developing incidents and secure prosecutions. They can operate from a wide range of power sources, including mains, battery and solar. The fleet of re-deployable cameras is used by the council’s CCTV operators to tackle street crime, anti-social behaviour and fly-tipping, protect property, prevent trespass, improve public safety and monitor traffic flow. Delivered over a three-year period, this purchase was part of the London Borough of Hammersmith and Fulham’s £5.4 million investment into its CCTV network. The borough has a surveillance network of over 1,900 cameras in total, representing the highest-density network of CCTV cameras in the UK. Longstanding partnership with North Stuart Caldecourt, Managing Director at Revader Security, said: “We are delighted that the investment being made by Hammersmith & Fulham Council into its surveillance network is delivering results, with more police arrests enabled by high-quality CCTV footage and more prosecutions supported by video evidence. We are proud to continue our longstanding partnership with North to deliver cutting-edge solutions that make our communities safer and more secure.” Revader Security continues to work alongside the partners to support Hammersmith & Fulham Council and a wide range of other local authorities, police forces and industrial users across the UK.
Arana Security, a specialist in providing end-to-end security systems for businesses, has chosen Custom Consoles control room desks for a major client in the manufacturing sector. The project includes a main desk and supervisor’s desk from the Custom Consoles SteelBase series plus a MediaWall and auxiliary furniture. Arana Security was founded in 2013 to serve a growing market of smart card solutions and security systems. In 2015 it started to move towards providing clients with the advanced security that biometric technology offers. The company is a globally active service provider specialising in integrated biometric security solutions for the corporate, financial, governmental and logistics sectors. Latest-generation models “This is the most recent of many security-related control room commissions we have worked on over the years,” says Gary Fuller, sales manager at Custom Consoles. “Both SteelBase desks are latest-generation models with blue LED lighting on the underside of the worktop. This style of lighting provides sufficient illumination for staff to concentrate on the monitor displays without distraction while still being able to move around the room easily. It also helps to reduce fatigue during a long or uneventful operating shift." “The main desk is a 4.3-metre wide six-bay unit configured for use by two operators. Each bay is fitted with a lockable front and rear door providing easy access to computer equipment and related cabling. The desktop is 80 cm high and has a 120 cm front-to-back reach. A removable section of the worktop covers a full-desk-width cable tray. Four monitor screens are mounted near the rear edge of the desk. The desk faces directly towards a 3 metre wide MediaWall supporting six large multiscreen monitor video screens forming three wide by two high display grid." Desk worktops Desk worktops are finished in grey Marmoleum with black PVC edging, plus matching grey doors Fuller added: “Situated behind and to the right of the main control desk, the supervisor’s desk is a 1.6-metre wide two-bay SteelBase with dual 24-inch monitor screens, again located near the rear of the worktop. This desk too has blue LED underlighting.” The desk worktops are finished in grey Marmoleum with black PVC edging, plus matching grey doors and side panels. Also provided were a dual-bay control room and crisis room storage units with doors, a 2.2 x 1-metre crisis room meeting table, 24/7 operator chairs, monitor arms plus meeting table chairs. Cable management features Custom Consoles' SteelBase is a high-strength desking system developed to withstand the demands of heavy industry. Built around steel frames with hinged lockable front and rear doors, SteelBase can be configured for use by individual operators or teams of practically any number without the cost and long delivery time usually associated with project-specific furniture. Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs. Predrilled monitor arm mounting points are positioned at the rear upper edge of each bay. Cable management features include a removable worktop section with dual brush strips providing an uninterrupted cable exit for telephones, monitor cables and computer peripherals. Integral cableways allow heavy-duty wiring to be fully concealed within the desk structure while retaining easy access for routine maintenance or adjustment. SteelBase desktops Desktop equipment pods can be specified if required. SteelBase desktops are available in a choice of 120 cm (standard) or 100 cm (SteelBase Lite) front-to-back sizes with a choice of hard-wearing Marmoleum or laminate work surfaces. All elements are guaranteed against component failure for five years of normal use. All elements are guaranteed against component failure for five years of normal use MediaWall is a video and audio monitor support frame system providing a combination of structural rigidity and operational versatility. Flat-screen video displays of practically any size can be mounted in almost any configuration. Video display screens Incorporating height-adjustable horizontal beams and T-slot mounts, MediaWall is fully adjustable to ensure optimal sight lines. Individual or multiple frames can be used in self-supporting mode or coupled directly to the studio wall. Video display screens can be positioned so that the edges meet exactly to form a continuous horizontal display limited only by the monitor panel bezel. Monitor signal and power cables are fully concealed and can enter or leave the structure at any desired point.
Jacksons Fencing has recently completed a project with the Kingdom Hall in Hoddesdon, striving to enhance both the safety and visual appeal of its premises. As a place of worship for Jehovah’s Witnesses, the Kingdom Hall is meticulously maintained by its congregants to embody modesty and purpose. Enhancing security and aesthetics The primary goal was to bolster security against unauthorised access, vandalism, and theft, while also complementing the dignified exterior of the place of worship. Recognising the importance of creating a secure yet welcoming environment for congregation members and visitors alike, Jacksons Fencing was entrusted to install vertical bar railings around the building’s perimeter. These railings, coated in black architectural grade polyester powder, were chosen for their security features and aesthetic compatibility with the existing brick façade. The solution The black polyester powder-coated finish was chosen for its longevity and low maintenance The selection of a black polyester powder coating not only ensures durability and weather resistance, but also aligns with the hall’s commitment to sustainability and environmental stewardship, by minimising maintenance needs. Safety and security were paramount concerns for the premises. To prevent unauthorised access, vandalism, and theft, and to safeguard everyone within the premises, the installation of vertical bar railings was deemed essential. Additionally, enhancing the building's exterior aesthetics was a key consideration. The decision to use black polyester powder-coated railings was driven by the ability to harmonise with the brick façade, thereby enhancing the overall sophistication of the hall’s appearance. Jacksons Fencing’s experienced installation team anchored the Barbican Imperial® vertical bar railings to the brick wall, utilising cranked posts for added stability. The black polyester powder-coated finish was chosen for its longevity and low maintenance, reflecting Jehovah’s Witnesses' emphasis on sustainable practices and responsible investments. Ensuring sustainability Environmental stewardship is at the heart of Jehovah’s Witnesses teachings, and this principle guided every aspect of the project. Emphasising quality and longevity reduces lifetime costs and environmental impact by decreasing waste and the need for replacements. Jacksons Fencing’s 25 year guarantee on both steel and timber products further ensured that the fencing and gates were an ideal fit for this project. The power of protection Project not only managed the useful needs of the flock but also enhanced the visual harmony The installation of the vertical bar railings not only delineated clear boundaries but also effectively deterred unauthorised access, ensuring unobstructed views from inside the building to the surroundings and contributing to a safer environment. Through detailed planning, bespoke design, and precise execution, the Kingdom Hall achieved significant advancements in both security and aesthetics. This project not only addressed the practical needs of the congregation but also enhanced the visual harmony of the premises, creating a secure and welcoming environment for all. Well-being of congregation members Peter Jackson, Managing Director, Jacksons Fencing, says “We are proud to have contributed to creating a secure and welcoming environment for the Kingdom Hall in Hoddesdon. In today’s world, ensuring the safety and well-being of congregation members and visitors is more important than ever." "We have worked closely with the congregation to ensure the final solution is fit for purpose now and well into the future. Our products aim to help the community feel safe and secure as they worship and gather.”
Smiths Detection, a global pioneer in threat detection and security screening technologies, announces that it is partnering with Flughafen Zürich AG (Zurich Airport) to trial the use of the industry-pioneering HI-SCAN 6040 CTiX Model S carry-on baggage X-ray scanners and the iLane A20 ATRS, the smart automatic tray return system, at two security lanes in the airport. The 3D images produced by Smiths Detection’s HI-SCAN 6040 CTiX will allow some of Zurich’s 2.7 million monthly passengers to leave their liquids and electronics in their carry-on luggage as they pass through security, resulting in a more convenient and streamlined security screening experience. Installation of CT scanners The iLane ensures a consistent flow of trays and provides a seamless checkpoint journey for passengers In addition to providing more efficient and effective security screening, the HI-SCAN 6040 CTiX is the most energy-efficient scanner of its type available in the market, featuring low noise levels, zero vibration, and a 30% higher belt speed than other CT X-ray scanners – helping to promote a calmer checkpoint. The iLane ensures a consistent flow of trays and provides a seamless checkpoint journey for passengers. Alongside passengers, employees at security checkpoints will also benefit from the installation of CT scanners via the addition of 'remote screening' capabilities. This means that security staff no longer have to check the images of the baggage contents directly next to the devices, but can work from a separate room, facilitating a quieter and more concentrated work environment. Layout of the new security lanes Zurich Airport will test the CT equipment in various configurations over several months, in order to optimise the layout of the new security lanes, with the intention of equipping all 26 lanes with this cutting-edge technology in the future. Although passengers will be able to leave liquids in their bags, the maximum container size of 100 ml and total carry-on size of one-litre rules will remain in place until further notice. Matthew Clark, Vice President (VP) of Commercial, Smiths Detection, commented: "We are delighted that Zurich Airport has selected Smiths Detection to trial the use of this pioneering technology that will enhance security outcomes and improve efficiency, providing a smoother experience for passengers and staff alike."
Round table discussion
Factors such as stable demand and large contracts make the government market particularly enticing for security companies and professionals. However, entering and thriving in the government market presents a number of challenges. We asked this week's Expert Panel Roundtable: What are the unique aspects of the government market, and how should the industry adapt?
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?
In the complex world of physical security systems, standards can enable disparate systems to be combined to function together as a cohesive whole. Standards help to ensure that all the “pieces” fit together to create a clear, unified picture. More broadly speaking, standards also play a role in ensuring best practices are deployed in a range of security-related situations. We asked this week’s Expert Panel Roundtable: Which standards have had the greatest positive impact on physical security?
White papers
Safeguard Students With New Techniques And Technology
DownloadCybersecurity in keyless access management
DownloadAssessing safety readiness for education campuses
DownloadPreparing your organisation with quality situational awareness
DownloadExpanding video surveillance in the enterprise market
DownloadHoneywell GARD USB threat report 2024
DownloadThe role of artificial intelligence to transform video imaging
DownloadAccess control system planning phase 1
DownloadKey Findings from the 2024 Thales Cloud Security Study
DownloadFacial recognition
Download