A survey of UK GDPR decision-makers conducted on behalf of Egress, the provider of people-centric data security solutions, reveals that 52% of businesses are not fully compliant with the regulation, more than a year after its implementation. The survey also found that 37% of respondents had reported an incident to the ICO in the past 12 months, with 17% having done so more than once. Interestingly, the results showed that over half (53%) of mid-size companies had reported data breaches to the I...
CSCUK - Cyber Security Connect UK – renowned forum for Chief Information Security Officers (CISO), has called for the cyber security community to respond to the UK Government policy paper published on 11 September 2019 about post-Brexit cyber security. Cyber security certification The British Government has asked for the cyber security industry in the UK to provide views and opinions about the proposed approach to cyber security certification following the UK’s departure from the E...
Matrix Comsec, a manufacturer of IP based phone systems and voice gateways is participating in GITEX Technology Week 2019, Dubai. During this event Matrix will unveil its server based ANANT UCS and will showcase its complete range of business IP-PBXs, VoIP & GSM gateways and new portfolio of IP communication endpoints. Matrix is going to unveil ANANT UCS at the event. ANANT is an enterprise-grade high capacity, high durability, high scalability and high efficacy software-based communication...
An agreement between site protection provider Orbis Protect and the makers of the UK’s most secure smart key safe is set to significantly improve security for site managers and FM staff across the country. Orbis Protect has agreed an exclusive distribution deal with Keynetics, the makers of the Bluetooth-enabled SentriKey®, to offer a full-proof security solution for thousands of contractors across the UK. Secure key management system It benefits users by saving time, increasing sec...
At GSX 2019, SilverShield™ Safety & Information Systems will showcase their award-winning visitor and information management system (Booth #1594). The solution is an easy-to-use, cloud-based SAAS approach to security, with several different modules that provide a complete safety solution. “The SilverShield Visitor and Information Management System is the most effective way for users to vet and manage visitors for any size facility,” said Robin Baker, CTO, SilverShield. &ldq...
Tamworth-based trade association, DHF (Door & Hardware Federation), has published a new downloadable document for the building and hardware sector, named TS 007 - 2:2019 - Enhanced security for mechatronic cylinders and/or associated hardware. Security for mechatronic cylinders New door assemblies are covered by PAS 24 and complete mechatronic lock assemblies by DHF TS 621DHF's new Technical Specification (produced in association with the Glass and Glazing Federation) has been prepared fol...
Airbus and Telespazio (Leonardo/Thales) have set up a partnership to market military telecommunications services using the future Syracuse IV satellites. This partnership will lead to the creation of France’s leading private operator of military satellite telecommunications. It demonstrates the desire for cooperation by European industrial prime contractors Airbus, Thales and Leonardo, as well as the French State, in marketing Syracuse IV satellite capacity for the benefit of armed and security forces in Europe and around the world. Bringing down total cost of ownership Airbus and Telespazio will be able to sell Syracuse IV satellite capacity and high-added-value services like anchor capacity The French Defence Procurement Agency (DGA), Airbus, Thales Alenia Space and Telespazio have put together an innovative financing initiative, enabling any excess satellite capacity to be sold to third-party customers, thereby bringing down the total cost of ownership of the Syracuse IV system. These sales contracts, scheduled for a 10-year period, will enable allied countries or organisations to be offered simple, flexible and reactive access to a strategic resource, thus strengthening France’s international cooperation arrangements in the field of defence and security. With this partnership, Airbus and Telespazio will be able to sell Syracuse IV satellite capacity and various high-added-value services such as anchor capacity (connection of satellite communications to the ground networks of third-party customers), end-to-end services with capacity and throughput guarantees, engineering and maintenance services. These services will be accessible over a broad area ranging from French Guiana to the Straits of Malacca and will be deployed for maritime, terrestrial and air uses. Video, voice and data via IP Allied forces will thus have access to communication capacity in X-band, military Ka-band and X/Ka dual-band mode, offering unique flexibility while benefiting from the highest levels of protection and hardening provided for in the NATO standards. Their units deployed in the field will be able to exchange video, voice and data via all-IP (Internet Protocol) communications at rates of up to several hundred Mbit/s. Telespazio is proud to consolidate its role as a trusted operator of French military telecommunications satellites" “Airbus is capitalising on the unique experience of satellite services for the armed forces to enhance its range with a system equipped with the most advanced space and terrestrial telecommunication technologies,” said Eric Souleres, Head of Communications, Intelligence & Security Engineering at Airbus Defence and Space. “Building on its expertise in the field, Telespazio is proud to consolidate its role as a trusted operator of French military telecommunications satellites and contribute to an innovative operation which will round out its world-class range of government capacity services,” said Jean-Marc Gardin, CEO of Telespazio France and Deputy CEO of the Telespazio Group. Ensuring communications in operational areas Syracuse IV is a telecommunication system consisting of two military satellites, Syracuse 4A and 4B, plus ground stations to ensure communications in the operational areas and with mainland France. These two 3.5-tonne class, electric-propulsion geostationary satellites are being built by an industrial group consisting of Thales Alenia Space and Airbus, with launch planned for 2022. They will be supplemented in around 2030 by a third satellite in order to meet the growing needs, in particular the specific needs of air vehicles (aircraft, UAVs). These new-generation satellites will be the first to offer a completely flexible reconfiguration of the X and Ka-band military payload as well as the means of protection and hardening against cyber, jamming, intercept and EMP-type threats.
RT LTA Systems Ltd. – a world-class designer, developer and manufacturer of aerostats for use in intelligence, surveillance, reconnaissance and communications applications – will present the latest capabilities of the SkyStar aerostat family, at DSEI 2019. RT's Skystar™ family of aerostats includes the SkyStar 110, SkyStar 120, SkyStar 180, and SkyStar 330. The recent improvements on the SkyStar aerostats minimise the drift and drag, which normally occur due to ordinary aerodynamic changes. This will further enhance the aerostat availability. Low operational and maintenance costs Ideal for defence, security, border control and HLS missions, the SkyStar aerostat systems are deployed by many forces around the world and have already provided more than two million operational hours. The SkyStar aerostat systems are operational under extreme weather conditions with low operational and maintenance costs, and offering over 85% availability in any given area. "These enhanced capabilities of the SkyStar family have been developed to meet the needs of our customers around the world who require an operational system at any given time,” says Rami Shmueli, CEO of RT LTA Systems. “We have recently completed successful field trials of these new capabilities, including testing them under severe weather conditions. SkyStar is one of the worlds' most popular aerostats, with more than 100 systems sold and operated worldwide.”
People and vehicle access control specialist Nortech is now offering Nedap’s ANPR Lumo, an advanced licence plate camera for vehicle access control. The ANPR Lumo is an all-in-one licence plate camera, including embedded software, analyser and IR illuminator. With a range of action of 2 to 10 metres, the advanced camera ensures a smooth recognition of vehicles. Applications include automatic toll collection Typical applications include vehicle access control, automatic toll collection, free flow applications at parking facilities or other situations in which it not desirable to issue RFID tags. If vehicles need to be granted access temporarily or incidentally, the licence plate camera is the perfect solution. Features include: Standalone solution - The ANPR Lumo offers built-in vehicle access control features. The option to configure time-based access control lists (white list, black list, ignore list, etc.) in the web based software enables the camera to be used as a standalone solution. High accuracy - The deep learning algorithms enable a high accuracy with common license plate formats, like Europe, and regions with non-standardised license plate formats, such as the USA and Pacific. In addition, the ANPR Lumo is able to recognise ADR Hazard Identification Numbers (HIN), also known as Kemler Codes, which are used for the road transport of dangerous goods. Libraries - The ANPR Lumo covers a broad list of countries supporting a large range of IR-reflective license plates. User-friendly configuration - The web based software enables easy configuration of the ANPR Lumo. It allows for configuration of the output messages for RS485, Wiegand or Ethernet. In addition, digital I/O, region of interest and network settings can be defined. REST interface - The ANPR Lumo is equipped with a REST API that allows third parties to easily integrate the camera. The REST interface enables third party systems to request the last read licence plate and add licence plates to the white list. Easy installation - A mounting bracket is included as standard with the ANPR Lumo to ensure easy installation. With this bracket, the licence plate camera can be mounted onto a wall or pole and allows the camera to be adjusted to ensure reliable reading. Communication interfaces - The ANPR Lumo supports the industry-standard communication interfaces: RS485, Wiegand and Ethernet. This enables seamless integration into any existing or new access control/parking system. Wiegand interface - Most access control panels support Wiegand. The ANPR Lumo converts licence plate numbers into Wiegand ID strings and the built-in Wiegand option ensures easy and seamless integration into any new or existing access control panel.
Videx, a manufacturer and supplier in access control and door entry systems, improves its flagship VX2200 door entry system, by introducing a lift interface module which enables lift control via the entry intercom within an apartment or office. The 2216 is the latest accessory for the VX2200 system, a two-wire audio and six wire video system for up to 998 apartments with multiple entrances and full concierge facilities. Door entry system The 2216 makes the VX2200 an even more ideal door entry system for a wide range of buildings" Neil Thomas, National Sales Manager at Videx UK, said: “The 2216 makes the VX2200 an even more ideal door entry system for a wide range of buildings, from residential flats to commercial offices, by enabling occupants to control the lift from their office or home.” “When entry is granted, the lift can be called and access to floors can be restricted accordingly so the visitor can only access the floor where they’ve been given authority by the resident or occupant. For example, a tenant on floor two can call the lift for their visitor and will only allow them to get off at floor two. Restricting visitors’ access to only the floors they’re allowed to visit strengthens the building’s security while also helping the visitor to find the apartment or office they’re visiting.” Serving eight floors The 2216 is fully programmable via bespoke software allowing any floor to be assigned to any apartment. Additionally, the entrance panels which are allowed to call the lift can also be selected. The interface includes eight relay outputs, which can each be assigned to a floor, serving eight floors at a time. It’s possible to use multiple 2216 modules for a maximum of 128 floors For buildings with more than eight floors, it’s possible to use multiple 2216 modules for a maximum of 128 floors. Neil continued: “Once set up, the module is controlled via the lock button on the intercom telephone within the apartment. When the occupant grants access to the visitor by pressing the lock button on their telephone or videophone, as well as opening the door to allow them into the building, the lift will also be called automatically.” Third party technology The 2216 can be used on new or existing installations and is powered from a 12VDC power source. Additional features include a lift override feature to either disable all lift calls or enable calls to all floors and both USB & RS485 connection for programming via the Videx VX2200 PC software. The 2216 accessory is also ready for the new Videx IP system where it can be used as either a lift interface or additional relays controlled by apartments for features such as turning on lights and activating third party technology and integrated appliances.
AMG, the ISO 9001:2015 approved UK manufacturer and provider of environmentally robust fibre, analogue, IP/Ethernet, wireless & hybrid communication transmission solutions, has released a new 3F outdoor wireless radio transmitter. Extremely compact and lightweight, AMG AMG8870F-06 Skywave 3F Outdoor Wireless Radio has been designed to deliver the highest performance and stability available in the 5GHz 802.11ac class. Providing the ideal solution for capacity demanding point-to-point, or point-to-multipoint network applications, the AMG8870F-06 Skywave 3F wireless radio’s feature-rich operating system is optimised for high-performance wireless communication. High-performance transmission solutions Supporting up to 450Mbps compressed video throughput (depending on the configurable channel size utilised), it utilises a powerful hardware platform incorporating a QCA 9563 CPU (750 MHz), QCA 9882 radio, 64Mbs of RAM and 16Mb flash memory. “The new AMG AMG8870F-06 Skywave 3F Outdoor Wireless Radio complements the existing AMG range of technologies to provide a broad portfolio of high-performance transmission solutions suitable for any application,” says Sara Fisher, Sales and Marketing Director at AMG. “With the options of integrated high-gain 16 and 90 Degree, dual-polarisation MIMO 2x2 technology, directional antennae (up to 6Km range), and models accepting a choice of external antennae for greater range, the new wireless range is the ideal choice to support any size of system project.” AMG8870F-06 Features Base station / Satellite, PtP Smart Station Coordination Function (SSCF) Up to 6km (integrated antenna) Up to 500Mbps compressed video throughput 5/10/20/40/80MHz Channelisation support User configurable gain up to 23dBm (30dBm max) 24V passive PoE Extremely compact and light IP66 rated enclosure -40°C to +65°C operating range
At GSX 2019, Bosch will announce a significant expansion of its video portfolio with the introduction of more than 50 new products, including fixed and moving cameras, and recording and management solutions. Bosch now offers intelligent video solutions for all segments of the security market – from those that need simple, cost-effective surveillance to those that demand the highest performance in all lighting and environmental conditions. “Intelligent devices with on-board Video Analytics are creating new possibilities for smart data capture and connected IoT applications that improve security and help organisations make smarter business decisions," said Brian Wiser, Regional President of Bosch Security and Safety Systems – North America. The cameras offer built-in Video Analytics as standard – a first for competitively priced cameras"With our expanded portfolio, users in environments of all sizes can benefit from the tremendous value Video Analytics brings by delivering data for business intelligence purposes, by enabling customised solutions that solve business challenges, and by notifying people and triggering other systems to take action based on security and safety risks." FLEXIDOME and DINION IP 3000i cameras At GSX, Bosch will expand its portfolio of intelligent ‘i’ series cameras with the launch of the FLEXIDOME and DINION IP 3000i cameras that extend smart video surveillance to small security applications. The cameras offer built-in Video Analytics as standard – a first for competitively priced cameras. They are built for high quality performance and designed for easy installation. In addition, new FLEXIDOME IP panoramic 6000 and 7000 outdoor cameras feature a fish eye lens to deliver a 180- or 360-degree overview of an area – eliminating blind spots by showing everything in a single image. The cameras resist vandalism with an IK10 rating and feature an IP66 rating to protect against dust and water ingress in challenging weather conditions. AUTODOME IP starlight 7000i cameras The MIC IP ultra 7100i delivers 4K ultra HD resolution for mission critical applicationsWith built-in Intelligent Video Analytics, the ability to track and zoom in on moving objects at a distance and to deliver colour images in extreme low light, the AUTODOME IP starlight 7000i cameras capture high-quality video and informative data. As with the entire ‘i’ series from Bosch, this latest AUTODOME camera includes intelligent bitrate management techniques combined with H.265 compression to reduce bitrate by up to 80 percent. Bosch will also demonstrate the new MIC IP starlight and MIC IP ultra 7100i cameras. These rugged cameras are made with anti-corrosive metal and can function at temperatures ranging from -40 to +140 degrees Fahrenheit. The MIC IP ultra 7100i delivers 4K ultra HD resolution for mission critical applications, such as city and highway surveillance, making them ideal for monitoring highways, bridges, ports, perimeters, and more. Improved data security with BVMS 10.0 The new DIVAR IP all-in-one 5000, 6000, and 7000 combines recording and video management for a complete ready-to-use solution. They have the option to come pre-equipped with the Bosch Video Management System that offers viewing, recording, and playback, as well as advanced management features, including event and alarm handling and forensic search. Dealers and integrators can also configure the recording solutions for video storage only. BVMS version 10.0 adds improved levels of data security and privacy, greater flexibility with ONVIF Profile S certificationBosch Video Management System (BVMS) version 10.0 will also be introduced at the show. It adds improved levels of data security and privacy, greater flexibility with ONVIF Profile S certification, and enhanced monitor wall functionality. Integration for enhanced capabilities At GSX 2019, Bosch will highlight how its video, intrusion, access control and communication products integrate together and with other systems to provide powerful solutions for common security, safety and business concerns while reducing complexity. Bosch will show how integrated solutions can protect sensitive areas, improve management of video and security data, and automate announcements and alerts. The Bosch booth will also feature a new exhibit that demonstrates how customers can harness machine learning capabilities to teach Bosch intelligent cameras to detect the things that matter most.
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimisation easier. In most cases, digital transformation will fundamentally change how an organisation operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more.As the data from each of these sensors is collected and analysed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organisations are using for enhancement and improvements is comprehensively protected from unauthorised access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organisations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organisations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centres and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialised care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in paediatric health care, education and research. Comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priority Also crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
For the security market, the ‘fine ranging’ capabilities of ultra-wideband (UWB) technology opens up a range of new uses based on the ability to determine the relative position and distance of two UWB-equipped devices with pinpoint accuracy – within centimetres. UWB is more accurate and secure, even in challenging environments full of interference, compared to narrow band wireless technologies. UWB technology transmits a large amount of data over short distances using a small amount of energy. It will be used in seamless access control, location-based services, and device-to-device services across industries including smart homes, cities, retail services, and healthcare. Increasing the accuracy of ranging measurements UWB technology will support any application that benefits from knowing the precise location of a connected deviceUltra-wideband is a mature radio technology that transmits information spread over a large bandwidth, as described by the IEEE 802.154 standard. A new, enhanced amendment to the standard – IEEE 802.15.4z – focusses on improvements to existing modulations to increase the integrity and accuracy of ranging measurements. Moving forward, UWB technology will support any application that benefits from knowing the precise location or presence of a connected device or object. This reflects a move from data communication to secure sensing. New capabilities of UWB are largely unfamiliar to the market, but a new Consortium – the FiRa Consortium – has a mission to educate the market, provide use cases, and promote UWB technology. Delivering interoperability across devices “With a consortium, we can better deliver interoperability across devices, software, and chipsets,” says Ramesh Songukrishnasamy, Director and Treasurer of the FiRa Consortium, and SVP & CTO of HID Global. “This creates a frictionless experience for the user, which is vitally important with a new technology. People are more likely to adopt emerging technology when it runs smoothly without interruptions or errors.” The FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive" An industry consortium can create a UWB ecosystem of interoperable technologies instead of individual companies launching products that consumers struggle to make work together, says Songukrishnasamy. “Simply, the FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive.” Founding members of the FiRa consortium ASSA ABLOY and HID Global, pioneers in secure access and identity solutions, are founding members of the consortium. Their technology manages access to physical and digital places, things, and identities. Another founding consortium member, NXP Semiconductors, is a pioneer in secure connectivity solutions for embedded applications. Other founding members are Samsung, which creates top-of-the-line TVs, smartphones, wearables, and other connected devices; and the Bosch Group, a global supplier of technology and services that is at the forefront of IoT innovations. Sony Imaging Products & Solutions Inc., LitePoint and the Telecommunications Technology Association (TTA) are the first companies to join the newly formed organisation. Immune to radio frequency interference UWB is also immune to radio frequency interference, so it functions in high traffic settingsUWB introduces higher levels of accuracy in positioning capabilities and increased security for ranging data exchange compared to existing technologies. Fine ranging with UWB technology can localise devices and objects to 10 centimetres of accuracy with or without line of sight. UWB is also immune to radio frequency interference, so it functions in high traffic settings. These capabilities will enable a variety of use cases like secure, hands-free access control in hospitals, location-based services for ride sharing, and targeted marketing for retailers. FiRa will demonstrate UWB technology at upcoming trade shows. The FiRa Consortium aims to build on IEEE’s work with an interoperable high rate physical layer (HRP) standard, including defining an application layer that discovers UWB devices and services and configures them in an interoperable manner. The consortium also plans to develop service-specific protocols for multiple verticals and define necessary parameters for applications including physical access control, location-based services and device-to-device services. Promoting the adoption of UWB solutions As a consortium, FiRa is not just setting standards but actively championing use cases for UWB technology. Creating the consortium addresses the need to develop interoperability and implementation standards; brings key players together to create a rich UWB ecosystem; allows for the sharing of intellectual property; and promotes the adoption of UWB solutions. The FiRa Consortium is committed to educating and promoting new use cases" “Since UWB is a mature technology with new potential uses, there is a general lack of awareness of potential applications that take advantage of the technology,” says Songukrishnasamy. “The FiRa Consortium is committed to educating and promoting new use cases.” The FiRa name comes from Fine Ranging to highlight UWB technology’s use cases and distinction from older UWB technologies and solutions. Enhanced security in challenging environments Fine ranging powered by UWB can outperform other technologies in terms of accuracy, power consumption, robustness in wireless connectivity, and security, especially in challenging, high density environments. UWB previously served as a technology for high data rate communication and as such was in direct competition with Wi-Fi. Since then, UWB has undergone several transformations: UWB has evolved from an OFDM-based data communication to an impulse radio technology specified in IEEE 802.15.4a (2ns pulses with Time of Flight); and A security extension being specified in IEEE 802.15.4z (at PHY/MAC level) makes it a unique secure fine ranging technology. Moving from data communication to secure ranging allows ‘spatial context capability’ to be utilised by a variety of applications: seamless access control, location-based services, and device-to-device (peer-to-peer) services. Information is available at firaconsortium.org.
Global Security Exchange (GSX) 2019 will blow into the Windy City this fall, combining a tradeshow, a full schedule of professional education sessions, plenty of industry networking opportunities, and an annual reunion of the top professionals from around the world tasked with protecting people, property and assets. GSX – the trade show and industry event 'formerly known as' the ASIS Annual Seminar and Exhibits – will be Sept. 8-12 at Chicago’s McCormick Place. The show promises to 'elevate the event experience with modern education learning experiences, revitalised networking opportunities, and a reimagined trade show floor.' More than 550 exhibitors will be featured in the expo hall (open Sept. 10-12), according to ASIS International. Chicago is a great location for GSX, as evidenced by the successful 2013 ASIS show. Cutting-edge solutions X1 Stage sessions are designed to highlight cutting-edge solutions and increase contextual understanding GSX seeks to attract more attendees to the exhibition hall with education events positioned alongside the industry’s latest-and-greatest equipment and technology exhibits. On the expo floor, the GSX: Disruption District will include new and enhanced programs such as the X Learning stages, the D3 (drones, droids, defence) Learning Theater, the Pitch Competition and the Innovative Product Awards. X Learning is a series of experiential sessions. X1 Stage sessions are designed to highlight cutting-edge solutions and increase contextual understanding of new technology. GSX: Startup Sector highlights new companies with emerging technologies; and GSX: Pitch Competition brings together entrepreneurs, investors and industry leaders to feature early-stage startup pitches. Career HQ will provide free resume reviews, career coaching, professional development and networking opportunities. A Sharpshooter Contest sponsored by Smart Simulators and SB Tactical will allow contestants donating $20 to compete for $500 in prizes each day. Pre-conference certification courses More than 300 security courses, plus pre-conference certification courses, will provide security professionals expertise to enhance their career development. Programming will be led by ASIS and InfraGard subject matter experts. (InfraGard is a non-profit organisation serving as a public-private partnership between U.S. businesses and the Federal Bureau of Investigation.) Seventeen education tracks will serve the needs of security professionals interested in topics from business continuity to crime/loss prevention, law and ethics to national security, information security to physical and operational security. The show also provides opportunities for dealers, installers, integrators, consultants, specifiers, architects and engineers 'Game Changer' sessions will address hot and controversial topics, including 'The Ever-Changing Drone Landscape: What You Need to Know' and 'Accelerating Digital Transformation: Insights and Applications.' Ian Bremmer of Eurasia Group will speak on navigating the geopolitical landscape; Steve Demetriou and Joe Olivarez of Jacobs, a global professional services company, will speak about harnessing technology and big data to make strategic decisions. Providing new opportunities Wednesday morning, General John F. Kelly of the U.S. Marine Corps (Ret), will provide insight into the evolving geopolitical landscape around the world. His keynote presentation on Sept. 11 will kick off Military and Law Enforcement Appreciation Day. Tarah Wheeler, cyber security researcher, will speak on protecting assets in the age of cybersecurity leaks and scandals. More than 20,000 registered attendees are expected from 110-plus countries across the entire industry Although the attendee emphasis is on security end-users, the show also provides opportunities for dealers, installers, integrators, consultants, specifiers, architects and engineers. More than 20,000 registered attendees are expected from 110-plus countries across the entire industry, according to ASIS International. Networking events will include an ASIS Town Hall Meeting on the afternoon of Sept. 8, aimed at opening communication between ASIS staff and membership. There will be an Opening Night Celebration Sept. 8 centred on the theme 'Chicago on the Silver Screen' at Revel Motor Row, a popular Chicago landmark originally home to the Illinois Auto Club. Emphasis on education On Monday (Sept. 9) a networking luncheon will be followed by the Awards Reception later in the day. A reception in the evening will present the Karen Marquez Honors Award, recognising a female security professional. Tuesday (Sept. 10) will have a Happy Hour at the exhibit hall, followed later by a Women in Security and Young Professionals Happy Hour. Wednesday evening will be the President’s Reception at Wintrust Arena, with a 1980s theme. The annual trade show has declined in recent years, and ASIS International has implemented changes that seek to reinvigorate the show, culminating in the rebranding last year. One challenge is that the show’s emphasis on education keeps attendees engaged for hours of the day, making it harder to meet the expectations of exhibiting companies who want more booth traffic. More attractions on the show floor, including the Tuesday happy hour, are aimed at increasing overall foot traffic in the hall.
While security salesmen are touting megapixels and anti-passback features, they are missing an opportunity to communicate the role of technology in the broader context of risk management and incident response – and in saving lives. That’s the message of Gerald Wilkins, PSP, Vice President of Active Risk Survival. Incident response is at the core of how an enterprise reacts to risk and is a standardised approach to the command, control, and coordination of emergency response. Effective incident response requires integrating a combination of facilities, equipment, personnel, procedures, and communications operating within a common organisational structure. All the elements must work together to achieve the desired outcome – to mitigate a risk using countermeasures. Capabilities of systems during emergencies I want to see us have more meaningful conversations with security directors and emergency operations planners"Equipment such as CCTV, access control and mass notification systems can provide effective countermeasures, but salesmen in the physical security market are not ‘connecting the dots’ between equipment specifications and its capabilities as part of the broader incident command system. “Historically, purchases of security technologies have not been considered in that context,” says Wilkins. “Rather, the industry’s sales pitches have been about features and capabilities – pixels or communication distances or intelligence – not about how those capabilities are useful in the specific context of emergency response.” “My goal is to change the industry,” says Wilkins. “I want to see us have more meaningful conversations with security directors and emergency operations planners.” Focusing on the Emergency Operations Plan “We are in the life safety business, and we need to have more conversations about where technology fits into the Emergency Operations Plan (EOP). When was the last time you [as a security salesman] asked a client to look at their Emergency Operations Plan? No one knows the technology better than we do.” What’s missing, however, is attention to how technology is applied to risk management and response“There are so many folks in our industry who are technology gurus, who ‘get’ the technology, and are good at selling it,” he says. What’s missing, however, is attention to how technology is applied to risk management and response. “As an industry, even guys who have been in the business a long time have never heard about incident command,” says Wilkins. “How are we weaponising technology to maximise the outcome? We don’t talk about it. We want to talk about megapixels and wide dynamic range. But when are we going to talk about how we can apply that technology to mitigate our tangible and intangible risks?” Importance of security equipment In the wake of each active shooter or other incident in the news, Wilkins looks back to consider the missed opportunities and how security equipment could have saved lives. “What technology did we have to help first responders – video, access control and paging – but they weren’t used?” he asks. An example is the San Bernandino shooting in 2015, when police officers were heard asking “has anybody found that access control card?” In effect, a law enforcement officer was asking for technology that should have been included as part of the emergency plan. Situational awareness, such as that provided by video systems, can help responders judge which areas are safe fasterSituational awareness, such as that provided by video systems, can help responders judge which areas are safe faster and provide Emergency Medical Services (EMS) personnel more time to save lives. However, video is not being viewed in that light as a part of the broader life-saving mission. “Our industry needs to sit down with a security director or operations manager and ask: How are you using technology as a resource tool that will become part of your critical response?” says Wilkins. Understanding how equipment works Technology is often not being incorporated in emergency planning, even with something as simple as a fire drill. Most fire drills are ‘one size fits all’ – every person knows where they should go and how they should exit. But what if there is a fire in a particular part of the building? Today’s fire alarms operate in zones to communicate the location of a fire, but this capability is not being used to practice a variety of resulting scenarios that could save lives. “We need to understand as an industry how our partners in law enforcement and EMS do their jobs,” says Wilkins. “We can help stakeholders in a building understand how our equipment works every day and how they can use it in a critical incident. We need to understand Emergency Operations Plans (EOPs), how incident command works, and how we can help emergency responders.” Security training for salespeople I want to know everything I can know to help guys sell things that can change the outcome if something bad happens"“If a guy wants to talk about his pixels or his anti-passback, he should instead consider having a meaningful conversation with the client about best practices and how to mitigate risk. This creates a different position [for the salesman], and if there is a critical incident, something you said or did might save someone’s life.” When it comes to training and taking a more strategic approach to sales, to some extent, the security technology industry has been a victim of its own success. When business is good, security companies are less likely to look for ways to train their salespeople. “We’re in the life safety business, not in the ‘stuff’ business,” says Wilkins. “I want to know everything I can know to help guys sell things that can actually change the outcome if something bad happens.” Another problem is “we don’t know what we don’t know.”
IP video intercom systems are becoming more popular not only in industrial environments but also in residential projects. Security business has moved towards IP technology. Video intercom, on the other hand, is a key system that should be considered as a link between the user and the security systems due to its integration capabilities. With MEET, it’s easy to integrate video surveillance systems and receive alarms at home. It can be integrated with third-party home automation systems and access control solutions. Face recognition, CCTV visualisation MEET system is a 100% IP technology based on a Point-to-Point infrastructure MEET, the most advanced IP system from FERMAX, was specially designed for residential communication. Secure, reliable and with cutting-edge functionalities, it ensures an outstanding high-quality audio & video, featuring call divert. Moreover, it is easy to install and maintain, with almost unlimited capacity. The system is a 100% IP technology based on a Point-to-Point infrastructure, highly efficient, flexible and powerful. As pointed out by Juan Madrid, Business Development Director and IP Product Manager at FERMAX, “MEET second-generation technology allows our customers to benefit from a top-notch 100% full IP system, even compatible with GPON infrastructure, and a broad range of built in security functions as proximity reader, lift control, face recognition, CCTV visualization and alarm detection”. Monitoring CCTV cameras The devices communicate directly, so MEET does not require central units or servers which could compromise the availability of the system in the event of an unforeseen error. MEET allows the installer to freely assign the range of IP addresses according to the needs of each project, and thus facilitate the control of the networks in every building. MEET system, has already been successfully adopted by FERMAX integrators worldwide MEET system, launched in January 2018, has already been successfully adopted by FERMAX integrators worldwide. “The market feedback has been very positive, especially due to the flexibility of the system, its capability to integrate with Wiegand controllers or readers and to monitor CCTV cameras through RTSP protocol. All these features allow the system to fulfil project requirements from different markets around the world” assures Francisco Alapont, Solutions Department Director and Digital Business at FERMAX. Home automation integration MEET is the system that brings to life the state-of-the-art digital panels which include a triple access control system: face recognition, keypad and proximity. The system’s range is made up of digital panels, one-button panels, touch screen monitors, concierge stations and various accessories. KIN panel, for instance, is an interactive approach featuring touch screen. While being elegant and customizable, it allows the visitor to interact in a simple way with its user interface. MILO panel and MEET Guard Unit are outstanding due to their design and intuitive interaction features. When it comes to the apartments, MEET offers indoor monitors with a simple and compact design. WIT PoE monitor, with its technology and exclusivity, is specially designed for home automation integration and suitable to fit in the most sophisticated environments; MIO monitor, is a symbol of urban and modern residences, represented by its compact and simple design. Single internet connection Our customers will benefit from a wide variety of intercom and security functions in all MEET products" Call Divert function to smartphone has been one of the key goals achieved thanks to MEET ME App, which features a high-resolution image even in portrait mode. It is not only an additional gadget; it is a part of the core features of MEET, which implements by default this function at zero cost. “Connectivity is the cornerstone of FERMAX´s strategy. With MEET system we can offer a seamless and enhanced experience to our installer, connecting our MEET monitors by default without any additional costs related to servers, gateways or licenses. Only one single Internet connection for the building is required.” adds Francisco Alapont. Competitiveness is key for FERMAX and MEET IP technology allows to offer a complete bundle of features already built in the product without increasing its price. “Our customers will benefit from a wide variety of intercom and security functions in all MEET products. This adds value to the MEET system and revert back to the installer as a turnkey solution in terms of easiness of installation and cost reduction” says Juan Madrid.
Airbus provided secure communications technology to French security forces (police, gendarmerie, and fire brigades) during the long-awaited socio-economic and political summit which took place in the Southwestern coastal town of Biarritz between the 24th and 26th August.With the high-security measures promised by Christophe Castaner, French Minister of the Interior, 13 200 police officers and gendarmes, as well as over 400 firefighters, were involved in safeguarding the high-profile event. The high security and resilience of the dedicated networks and terminals provided by Airbus to the teams in charge of securing the G7 summit was an essential aspect to protecting both the government officials from over the world taking part in the summit, the venue and its perimeter, and the people working on-site. Full interoperability between forces Airbus is also a long-term provider of INPT, the nationwide radio communications network for the French police On top of providing the necessary equipment and secure mission-critical communications technology through a dedicated network overlay deployed for this major event, Airbus is also a long-term provider of INPT, the nationwide radio communications network for the French police, fire brigades, emergency healthcare services, customs, national defense forces, mobile gendarmerie, prefectural authorities and penitentiary administration for prisoner transfers. This network allows full interoperability between forces. Furthermore, Airbus has been a reliable provider of the French gendarmerie’s secure communications network RUBIS, as well as portable material, and other essential communication equipment for their vehicles, for over 30 years.“With various kinds of threats that weigh in on political gatherings of this kind, optimal security conditions are an absolute priority. Through its state-of-the-art technology and highly reliable networks implemented to support secure communications operations, Airbus was able to ensure the smooth running of the communication between each member entrusted to protect and secure the G7 summit”, declared Olivier Koczan, Head of Secure Land Communications of Airbus.
Airbus, a provider of secure communication and collaboration solutions, provides mission critical communications technology to the Kingdom of Saudi Arabia for this year’s Hajj pilgrimage. Airbus has been a trusted supplier of secure communication solutions for the Hajj pilgrimage every year since 2017. With the implementation of its systems to ensure faster emergency response for public safety, and use of its state-of-the-art technology, Airbus and STC Specialized ensured the smooth running of security operations which safeguard millions of visitors each year. Th1n Tetra radio and AVL technology Various security organisations benefited from Airbus’ trusted solutions which include the slimline Th1n Tetra radio and Automatic Vehicle Location (AVL) technology. These inform dispatchers of each mobile unit’s location, status, and active Tetra talk groups. The information is then sent to all the relevant emergency personnel using the STC Specialized network powered by Airbus’ Tetra solution; such as the Ministry of Hajj, the Ministry of Health, and the Mecca Municipality. Airbus’ mission critical solutions facilitated the monitoring of this major event, as well as the communication between ground staff and the control rooms, enabling them to immediately address any on-site emergency while benefitting from the stability, continuity, and reliability of Airbus technology when and where it is needed the most. The Hajj is the largest Muslim gathering in the world and takes place every year over a period of six days. This year, from the 9th of August onwards, around 1.8 million Muslims visited the holy city of Mecca.
Motorola Solutions and Avigilon Corporation, a Motorola Solutions company, announced that they have been selected to help protect Georgetown County School District (‘GCSD’) in South Carolina, USA. Serving over 9,500 students throughout its 10 elementary schools, 4 middle schools, 4 high schools, career centre and adult education centre, GCSD sought to undergo a major security upgrade to increase safety, help mitigate misconduct and offer greater ease-of-use for school administrators, security officers and law enforcement officials using the security system. Deployment of Avigilon Control Center VMS To enhance safety throughout its locations, a complete Avigilon video security system was deployed, with over 1,000 cameras including the H4A Bullet with self-learning video analytics, H4 Mini Dome and H4 Fisheye cameras, all of which helped achieve a tailored security solution for each location while allowing school security operators to leverage the benefits of real-time analytics. Avigilon Control Center video management software was also deployed to provide a more efficient way to manage video from a central location. GCSD also uses Motorola Solutions XPR 3500e radios across its locations GCSD also uses Motorola Solutions XPR 3500e radios across its locations. If suspicious activity is flagged using the Avigilon solution, security operators can quickly contact each other using the Motorola Solutions radios and take immediate action to keep students and staff safe. By using the two systems together, school officials can seamlessly improve operations from the time an emergency call is placed until after an incident is resolved. Unified security solution for schools “Georgetown County School District is an excellent example of how Motorola Solutions and Avigilon provide a unified security solution for schools,” said John Kedzierski, senior vice president, Video Security Solutions at Motorola Solutions. “We are committed to continuing to develop products and technologies that can help enhance school safety and protect what matters most: students, staff and faculty.” “The ability of Avigilon and Motorola Solutions to provide an integrated solution for security, and critical communications is quite unique and extremely valuable to us,” said Alan Walters, executive director, Safety and Risk Management at GCSD. “We selected this system knowing that it is designed with every step of the response process in mind, which can make a world of difference in the moments that matter most.”
Traka has launched a new downloadable white paper to open a discussion on the changing nature of retail banking in the UK, using latest case examples to consider branch management and shifting customer expectations. The white paper, titled ‘Shaping the retail banking industry’ looks at several factors influencing the sector, including the increasing expectations and values of customers demanding a more personalised branch experience. Key and equipment management Incorporating analysis from globally renowned financial services, including PwC, Accenture and Deloitte, the paper highlights the opportunities for innovation, together with collaboration and adoption of new operational processes. This incorporates key and equipment management to enable retail banks to deliver on top quality service. The future for retail banking could arguably also be cited as bleak and in a state of industry disruption" Says Mike Hills, Traka UK Market Development Manager and Author of the white paper: “Against a backdrop of negative press concerning the state of UK high streets, the future for retail banking could arguably also be cited as bleak and in a state of industry disruption, as customers move towards a more mobile-connected lifestyle.” Staff and customer security “However, our research in putting together this white paper tells a different story. That actually, the sector has a real chance to embrace the changes occurring and entice their customers, meeting demands for personal service. We found that brands riding the storm are taking small yet significant steps to tailor their services and make operational differences that are proving key to their success.” The white paper focusses on Traka’s experience with Nationwide Building Society to demonstrate how supporting operational efficiency can benefit banking staff and ensure they can focus on serving their customers, without compromising on security. Retail Banking security Mike concluded, “We have brought this white paper together using the latest research and intrinsic market reports, together with case evidence on the future of the retail banking industry and the issues faced by the sector to ensure long term success.” “Within this, we wish to stimulate debate and encourage views and contributions from as many different voices as possible. We look forward to your opinion, experience or comment on this matter of growing importance so together, we can look to support and shape the future of retail banking.”
Ping Identity, the provider of Identity Defined Security, announces its successful completion of the Financial-grade API (FAPI) conformance testing, as part of the process defined by Open Banking Ltd. This builds on Ping Identity’s previous success as the first identity platform to pass all 70 technical security tests, as set by Open Banking Ltd., with zero warnings. The most recent set of FAPI conformance testing evaluated the latest versions of the Ping Intelligent Identity platform, including PingFederate, PingAccess and PingDirectory, within a mock banking environment. Additional technical requirements It switches to an API model with structured data that utilises a token model such as Open Authorisation The inclusion of FAPI within the Ping Identity solution for Open Banking helps allow banks to overcome insecure practices such as screen scraping by using stored user credentials. Instead, it switches to an API model with structured data that utilises a token model such as Open Authorisation. FAPI is a technical specification developed as a multi-industry standard by the FAPI Working Group of OpenID Foundation (OIDF). It leverages OAuth 2.0 and OpenID Connect (OIDC) to define additional technical requirements for the financial industry and other sectors requiring higher security. For banks specifically, FAPI provides various advantages. This includes enabling applications to securely interact with financial accounts, while also enhancing the user’s ability to control security and privacy settings. Secure identity requirements In concurrence with the specification, OpenID Foundation maintains a cloud-based testing suite for conformance testing by banks, certified third-party security providers and platform vendors—such as Ping Identity. The Ping Intelligent Identity platform is used by hundreds of financial services enterprises, including many of the CMA 9 and Open Banking Ltd. itself. Additionally, FAPI is of increasing relevance to the growing number of new fintech start-ups in areas such as investment, wealth management, insurance, payments and even real estate. “This is significant beyond the Open Banking and financial services sector,” explains Rob Otto, EMEA Field CTO, Ping Identity. “Other digitally-focused sectors, with similar secure identity requirements, now have a proven template that can allow them to quickly deploy their own security controls, which have been stringently tested by the largest financial institutions in the UK.”
Round table discussion
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditisation is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
The definition of a standard is “an authoritative principle or rule that usually implies a model or pattern for guidance, by comparison with which the quantity, excellence, correctness, etc., of other things may be determined.” In technology markets, such as physical security, standards are agreed-upon language, specifications or processes that are used across the board by multiple stakeholders to enable easier interconnectivity and smoother operation of systems. We asked this week’s Expert Panel Roundtable: How are standards shaping change in the physical security market?