Suprema, a globally renowned company in access control, biometrics and solutions for time and attendance management, has announced that they have been selected as one of the ‘2021 Top 50 Global Security Companies’, by A&S Magazine. Top 50 global security companies Suprema has ranked on this top 50 list for 11 consecutive years now, which acknowledges them as a major security company in the global market. Suprema was also listed as one of the world’s top four entry system...
ATG Access has achieved the international ISO 45001 standard, having demonstrated an outstanding commitment to occupational health and safety (OH&S) as part of its ongoing ambition to enhance trust and professionalism across the security sector. The manufacturer of road blockers, bollards and vehicle barriers has become one of a small number of businesses across the UK to be accredited to the ISO 45001 standard, after undergoing a comprehensive audit of its OH&S processes. Reduced insu...
Traffic congestion and road accidents are the toughest challenges faced by traffic management agencies across the world. With rapid global urbanisation, the growing amount and type of vehicles has led to more road-related issues every year. According to a MarketsandMarkets report, the global number of cars and commercial vehicles on the road will nearly double by 2040, putting tremendous pressure on the existing urban infrastructure. Traffic management strategies Various countries have formul...
Despite the challenges resulting from the COVID-19 pandemic, nearly four in five video security systems-related businesses reported growth in the past 12 months, according to a 23-nation survey conducted by Calipsa, the market renowned provider of Deep Learning-powered video analytics. Slightly less than half of the businesses reported growth in a 2020 report. Calipsa 2021 Video Monitoring Report The Calipsa 2021 Video Monitoring Report is a look inside the industry and its biggest trends. The...
With its major global Innovation Splash in November, MOBOTIX AG is placing 18 new hardware and software solutions on the market at once. New products The first hemispherical camera that combines infrared and LED white light in a single system is a major highlight. In addition, there is a new convenient dome camera, hemispherical modules, and Thermal CIF modules specially designed for perimeter protection for the MOBOTIX7 cameras with up to 105° wide angle of view (FoV). A fiber optic...
Metal theft is nothing new, but the impact of the pandemic has left many in financial uncertainty, couple this with the rising price of metal, and one result is an increase in the level of acquisitive crime. It seems there is no limit to the types of materials stolen. Just recently, lead stolen from church roofs has caught the media’s attention again, but this type of theft reaches to more commonplace materials too, including steel, cast iron, and aluminium, and even items like street sig...
Simon Shawley, Business Development Manager at Smart R Distribution, explains “How recent advances in video recording technology means that installers can help end-user clients to extend the life of their existing analogue CCTV systems, while enabling them to migrate to a full IP network based video surveillance system, at their own pace.” IP network-based video surveillance solutions offer users significant advantages over traditional analogue CCTV systems. These include the ability to benefit from the latest generation of multi-megapixel and ultra-high definition cameras, as well as the opportunity to monitor and manage the system from anywhere on the network. IP network-based video surveillance For mission-critical applications, IP network-based video surveillance provides a high level of resilience For mission-critical applications, IP network-based video surveillance provides a high level of resilience, as the captured images can be recorded and stored at any location on the network and retrieved via a PC or smart device. However, despite these benefits, it was not that long ago, when security managers agonised over whether they should attempt to persuade their financial masters and IT colleagues, to agree to the replacement of an existing analogue CCTV system with an IP network-based video surveillance solution. Need to deploy IP cameras and recorders The choice was either/or and although there was an understandable inclination to want to deploy cameras and recorders, which capitalise on the very latest technology, there was inevitably budgetary restrictions and ‘don’t even think about it’ resistance from technical colleagues, who were concerned about the impact on the company’s network infrastructure. In 2021, the question is no longer whether or not there is a justifiable need to immediately migrate to video over IP. Users can now choose from a range of fully functional hybrid solutions, which enable them to extend the life and cost-effectively enhance the performance of their existing analogue CCTV systems. This is because hybrid solutions allow users to benefit from the superb quality high definition images captured by IP cameras, without having to move to a complete IP network solution. Hybrid video surveillance For users, who want to immediately benefit from being able to capture and record high definition images, but are not yet ready or able to install an IP-based system, HD analogue cameras, which are able to capture and transmit images, and audio without any latency, at distances up to 500 metres, using standard coax, provide a cost-effective way to upgrade and extend the life of their existing analogue CCTV systems. Users can then migrate to an IP network-based video surveillance solution, at some point in the future and at their own pace. Hybrid XVR recorders Hybrid XVR recording devices, which are also known as Pentabrid video recorders, have been available for some time Hybrid XVR recording devices, which are also known as Pentabrid video recorders, have been available for some time. They facilitate the recording of images, captured by a mix of analogue and IP cameras, and this means that an existing analogue CCTV system can be significantly upgraded, with users able to benefit from the recording of images, which have a resolution of up to 4K. Until recently, the number of channels that could be allocated to IP cameras on a 16 channel machine was typically limited to just 2. The latest generation of hybrid XVR devices, however, now offers a far greater level of flexibility. With the use of a relatively low cost switch, the available number of channels on these NVRs can be configured to meet the users’ immediate needs, e.g. 4 channels allocated to IP cameras and the remainder for analogue cameras, but with the option to change the mix as and when requirements change. Transmission and power Traditionally, analogue cameras and recorders were installed with a coax cable between them, for the purposes of transmitting video data and they required the provision of a local power supply, in order to operate. When IP network-based cameras were first introduced, they worked in the same way, but a subsequent significant technological advance saw the development and introduction of Power over Ethernet (PoE). This allowed electrical power to be supplied via a network switch or a PoE-enabled network video recorder (NVR), and the power could be provided over the same cable carrying the video data. Development of Power over Coax (POC) Further advances in technology then saw the development of Power over Coax (POC), which offered the benefits of PoE, but over coax cabling to HD analogue cameras. It, therefore, became possible to power the cameras directly from an XVR recorder and most impressively, over distances of typically up to 500 metres, with at least one camera/recorder manufacturer able to achieve this over 800 metres. Now, with the latest generation of transmission products available, hybrid solutions are available, where PoE can be provided over coax to IP cameras and so whatever type of cabling is in place, users can benefit from this hybrid joint power and transmission option. POC Ethernet Extender devices POC Ethernet Extender devices are readily available from distributors, such as Smart R Distribution POC Ethernet Extender devices are readily available from distributors, such as Smart R Distribution, which provide the flexibility to upgrade and/or expand an existing analogue based CCTV system over existing coax, e.g. by adding multiple new IP cameras to take advantage of Deep Learning AI or intelligent video analytics, as well as the cameras’ ability to capture high definition images. They can also be used to provide a data only connection for a myriad of other network devices. It is worth noting that a 4-channel POC Ethernet Extender can enable the transmission of video and power to 4 cameras over a single cable, which makes it highly cost-effective to expand and upgrade a system, without having to install new network cabling. New surveillance systems based on IP network technology While the majority of new surveillance systems installed in the future are likely to be based on IP network technology, HD analogue cameras combined with XVRs, provide a significant opportunity to upgrade and extend the life of the countless number of existing analogue CCTV systems. However, they also provide a platform to add new IP cameras and other devices as well. The good news is that hybrid video surveillance solutions are very easy to implement, with the added bonus that there is no need to incur the cost and time of installing encoders or converters.
SALTO Systems (SALTO) has introduced the XS4 Original+, the next generation of the world’s most flexible and reliable smart locking solution that features a beautiful design, with a sleek flat reader in two new colours. SALTO XS4 Original+ The new SALTO XS4 Original+ takes the trusted and proven flagship XS4 Original electronic lock product family and incorporates the latest technology, to accommodate access control needs of both today and tomorrow. Our customers, partners and users rely on the XS4 every day, which is why we’ve made XS4 Original+ more powerful" “Our customers, partners and users rely on the XS4 every day, which is why we’ve made XS4 Original+ more powerful, capable, and redefined to elevate any door’s security, and management,” said Marc Handels, SALTO Systems’ Chief Technology Officer (CTO). Marc Handels adds, “When you have an excellent product like the SALTO XS4 Original electronic lock that has withstood both the test of time and technology, it makes sense to improve upon what is already working very well.” Embedded with BLUEnet functionality The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability, which enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. The SALTO XS4 Original+ is compatible with the array of SALTO platform solutions, including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE, and NFC technology functionality. “By incorporating the latest in technology into the XS4 Original+ locking range, SALTO has delivered a product that extends up-to-date and comprehensive electronic access control to any door,” said Handels. Engine of XS4 Original+ XS4 Original+ is much faster than the XS4 Original, delivering more performance, new security architecture" The XS4 Original+ is much faster than the XS4 Original, delivering more performance, new security architecture and the same electronic functionalities, which is based on BLUEnet connectivity, and better power efficiency. The feature rich new security architecture, which is protected against internal and external attacks, makes everything more fluid, transforming the way users’ access, operators manage, and installers’ set-up the electronic lock. Catering to a range of access and customer needs There is an XS4 Original+ model for every type of access and customer need. The existing XS4 Original models are fully available in the XS4 Original+ product range, from the key override option to mechanical or electronic privacy models. Just as with the original version, the SALTO XS4 Original+ is suitable for a wide range of customer applications, including interior doors in educational or commercial buildings or tailored solutions for other specific building requirements. Easy to install and retrofit Easy to install and retrofit, the SALTO XS4 Original+ works with ANSI, Euro, DIN and Scandinavian door industry standards. Universally compatible, it can replace the existing door hardware and fits any door with unlimited model options. XS4 Original+ wide reader models are slightly wider and the reader is now flatter. “SALTO has long sought feedback from our end-users and partners on what they desire in an upgrade and, taking their input into account, we have developed the XS4 Original+ which delivers everything needed for current and future smart lock solutions,” said Aznar Sethna, SALTO Systems’ Chief Sales & Marketing Officer (CSMO). Aznar Sethna adds, “With restyle designs, industry-leading performance and advanced access control features, with impressive communication capabilities, all with incredible durability, the XS4 Original+ ensures customers get secure and safe access when they need it.” Redefined and stylish design The XS4 Original+ works with existing XS4 Original door hardware. A broad range of different models and functions make smart access to any door possible, in order to cover all needs of any type of building. Visually, the XS4 Original+ differs from the conventional XS4 Original only in a few details, with improved reader aesthetics. Thanks to a sleek design update, the XS4 Original+ looks better than ever Thanks to a sleek design update, the XS4 Original+ looks better than ever. The reader is now flatter and available in black and white colour options, for a simplified, modernised front. The ANSI, Euro Wide, and Scandinavian Wide standard reader models are a little wider, thereby creating a more harmonious version. The XS4 Original+ can be tailored to varying building and door needs, with a wide variety of colours and finishes, including the new Dark Bronze finish, and black or white reader options. These can be visualised on a wide range of door styles, by using the SALTO MyLock Configuration tool. Environment-friendly access control solution The XS4 Original+ is designed to minimise its impact on the environment. Today, SALTO Systems is carbon neutral for corporate factory operations and is committed to having net-zero climate impact, across the entire business, which includes manufacturing supply chains and all product life cycles. The XS4 Original+ is the latest model from SALTO to be delivered to customers as a net CO2-neutral access control solution. This concept involves offsetting the CO2 emissions generated during the manufacturing process and the logistics until it is delivered to the customer.
Intersec, the globally renowned emergency services, security, and safety event, has announced that ex-MI6 Chief, Sir Alex Younger is one of the first announced international headliners, speaking for the first time in the UAE, as a guest speaker. Ex-MI6 Chief, Sir Alex Younger Alex Younger joined the United Kingdom’s Secret Intelligence Service (SIS), also known as MI6, in 1991 and served as a Diplomat and Undercover Operative. He was appointed Chief or ‘C’ of MI6 in 2014 and retired in 2020, making him the longest-serving Chief in 50 years. Throughout his career, Alex was posted to the Middle East in highly sensitive roles Throughout his career, Alex was posted to the Middle East in highly sensitive roles. He also acted as the Senior SIS Officer in Afghanistan, a position that marks him out as one of the world’s top authorities, on matters related to human rights in the country. Intersec’s Global Security Leaders’ Summit He will be sharing his unique insights, as the best minds in the industry gather, between January 16-18, 2022, at Intersec’s Global Security Leaders’ Summit, one of six conferences at the event, with hard-hitting discussions featuring global leaders debating and exchanging perspectives on challenges, strategic initiatives and cooperation, to foster safety and security of all. The full programme features over 500 speakers, the largest conference platform for the sector on a world class stage. Commenting on his participation at the event, Sir Alex Younger said, “I am delighted to be speaking for the first time in the UAE at Intersec, and at a time when conversations for the Security and Safety industry has been thrust into the spotlight from recent global events.” He adds, “The Middle East has always fascinated me - the ever-shifting intricate dynamics of geopolitical relationships in the region and the impact they have internationally create a complex security landscape that I have been immersed in for much of my career.” Intersec 2022 For this industry, Intersec offers the most valuable platform for knowledge exchange" Alex Younger stated, “For this industry, Intersec offers the most valuable platform for knowledge exchange, on the protection of citizens from existing and future threats, and I look forward to sharing my perspective on a topic, which remains a global priority.” Sir Alex Younger is recognised for his unrivalled understanding of the region and has also spoken widely on matters pertaining to human rights in Afghanistan, academic freedom and the geopolitical nature of China’s digital and technological interests in western infrastructure. Intelligence and security community veteran Alex Nicholl, Messe Frankfurt Middle East’s Head of Intersec, said “Intersec’s commitment to bringing the brightest, most qualified experts to the stage in 2022 is at the forefront of our strategy, to deliver the most relevant content for our audience. Sir Alex Younger is undoubtedly a legend in the intelligence and security community, and his storied career in the Middle East makes him the perfect addition to our conference line-up.” Alex adds, “This is Mr. Younger’s first time speaking publicly in the UAE and his participation underscores the value Intersec is bringing to its visitors, with exclusive opportunities, to engage with and learn from the very best in the industry. We are delighted to have Sir Alex onboard and look forward to welcoming him at the show.” Safety and security of future generations The 23rd edition of the flagship event is being held under the patronage of His Highness Sheikh Mansoor Bin Mohammed Bin Rashid Al Maktoum, at the Dubai World Trade Center, in Dubai, UAE and will be focused on the theme of ‘Uniting the world’s leading industry specialists for the safety & security of future generations.’ Demonstrating Intersec’s strategic importance to the UAE, Official Supporters include Dubai Police, Dubai Civil Defense, Security Industry Regulatory Agency (SIRA), the UAE Cyber Security Council and Dubai Municipality.
The new IDIS Intelligent Video Wall Station, designed as a simple plug-in for the cost and licence-free IDIS Center VMS, brings the benefits of video wall services to a wider market, including smaller and mid-sized customers. The new offering makes it easier for businesses to plan, design, configure, and use dynamic video walls. It lets them optimise safety and security, with centralised monitoring for single or multiple-sites, without the traditional price tag. IDIS Intelligent Video Wall Station Integrating seamlessly with IDIS’ full line-up of network and analogue cameras and devices, as well as third-party technologies, the IDIS Intelligent Video Wall Station uses a single server and network wall controller, to manage up to 12 UHD monitors as standard. The station connects up to 4,096 cameras and lets operators monitor 64 panes simultaneously, including de-warped 360-degree fish-eye video. Now, users can easily customise their monitors to display the most critical video streams and event data, to provide a real-time visual overview. Fast and efficient incident response The new solution combines remote and straightforward configuration with batch firmware updates Advanced features enable a quicker and more efficient incident response, paired with smoother and more dynamic video search, playback, and forensic export. The new solution combines remote and straightforward configuration with batch firmware updates, simple role-based access management, audit trails, and device health monitoring. For customers, this results in increased efficiency and minimal maintenance, delivering on the IDIS promise of a low total cost of ownership (TCO). Designed for 24/7 video surveillance operations And with H.264 and H.265 dual codec fully supported, users can retain their existing and third-party screens, reducing waste and saving budgets, or for upgrades, they can also choose from the IDIS range of reliable, low power consumption monitors, designed for powerful, but economical 24/7 surveillance operations. The IDIS Intelligent Video Wall Station also integrates seamlessly with the enterprise-level IDIS Solution Suite VMS, making it easy to expand or adapt the system, as operational requirements change, giving customers the assurance of a future-proof investment. Dynamic video wall monitoring solution “It’s more important than ever for organisations to enhance situational awareness, while increasing efficiency,” said Andrew Myung, the President at IDIS America. He adds, “The addition of the IDIS Intelligent Video Wall Station delivers the benefits of advanced and dynamic video wall monitoring, without the need to design and build dedicated control rooms, or incur the costs of traditional VMS recurring maintenance agreements, or ongoing device connection fees.”
The Physical Security Interoperability Alliance (PSIA) announces it has approved the Secure Credential Interoperability (SCI) 1.0 specification. The PSIA has been working with a broad group of industry pioneers in the access control industry to come up with this specification, which is likely to have a significant influence on the future of secure mobile credentials. Mohammad Soleimani, the Chief Technology Officer of Kastle Systems and the Chairman of the SCI Work Group, introduced this concept to the organisation in 2020 and has had a strong influence in engaging other companies in its development. Compatible secure credential “A standard for secure mobile credentials has been long overdue in the industry. SCI relies on established standards and the Public Key Infrastructure, to provide a simple, but elegant solution,” said Soleimani. SCI addresses the need for a universally compatible secure credential for the physical access control industry in the form of cards, fobs, mobile devices, and wearables. Progress has been dramatic, with the technology being demonstrated at a PSIA technical meeting in August featuring apps from IDEMIA and Johnson Controls and a Kastle reader developed by WaveLynx. “It has been our mission from day one, to drive secure credentials and interoperability into the market” said Laurie Aaron, Executive Vice President at WaveLynx Technologies Corp. “Joining PSIA to collaborate and execute on a standard that is made available to all, has been a fast track to mission success.” Different mobile platforms The SCI specification helps the industry to take steps towards the last mile of credential evolution" One of the important characteristics of SCI is its interoperability across different mobile platforms including iOS and Android or devices with the ability to generate ephemeral key pair, which can be communicated over various protocols such as BLE (Bluetooth Low Energy), NFC (Near Field Communication), and UWB (Ultra-wide band). “The SCI specification helps the industry to take steps towards the last mile of credential evolution where interoperability of credentials can exist. The simplicity of the use of a public key leveraging standards and best practices ensure a secure and open way to manage credentials that takes proprietary out of the picture.” says Jason Ouellette, the Head of Technology and Business Innovation for Johnson Controls Access Control and Video Solutions business. Security industries’ efforts Participants in the spec development include, ASSA ABLOY, Deister Electronics, Farpointe Data (a dormakaba company), HID, IDEMIA, Kastle Systems, LenelS2, rf IDEAS, SentryCard, Siemens, and Johnson Controls. “This is an important milestone in the security industries’ efforts to enable flexible, interoperable and scalable solutions,” states Peter Boriskin, Chief Technology Officer for ASSA ABLOY Opening Solutions Americas. “It will be essential to consider how this and other standards apply across various industries, and how current and emerging standards impact each other.”
RaySecur, a security imaging technology company with the world’s first DHS Safety Act-designated millimetre wave (mmWave) desktop scanner, for mail and package threat detection, announced that former Boston Police Commissioner, Ed Davis has joined the company’s Advisory Board. Ed Davis will leverage his decades of law enforcement experience, in order to help RaySecur accelerate adoption of its flagship MailSecur mail and package threat detection solutions. MailSecur scanners MailSecur scanners use safe mmWaves to see inside of objects. They can detect more and smaller threats than X-ray scanners, including explosives, weapons, radiation, and other suspicious contents, as well as liquids and powders at 300x the sensitivity of X-rays. Unlike X-ray scanners, there are no safety concerns or need for specialised training. Mail threat incidents have been increasing, with the United States Postal Inspection Service (USPIS) and the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), responding to an average of more than 10 dangerous mail or package incidents each day, for the last three years. In the last 16 months, AstraZeneca’s COVID-19 vaccine plant, Subway Sandwiches’ corporate headquarters, and Dr. Anthony Fauci have all been victims of dangerous mail threats. Mail and package threat detection Mail and package threat detection is an underestimated and vitally important component of public safety" Ed Davis stated, “Mail and package threat detection is an underestimated and vitally important component of public safety, and I’m excited to join the Advisory Board of a company that offers the only safe and scalable solution for organisations and individuals, to combat this problem.” He adds, “It’s crucial that law enforcement, enterprises, correctional facilities and government institutions have access to this technology, and ensure they can seamlessly scan every package, in a quick and efficient manner. I look forward to working with RaySecur, to help meet this important security need.” RaySecur's Advisory Board Ed Davis is the latest addition to a world-class team comprising technology, military, security and law enforcement professionals. He has a 35-year proven track record and is the President and Chief Executive Officer (CEO) of business strategy and security services firm, Edward Davis Company. Ed Davis served as the Boston Police Commissioner from December 2006 to October 2013, where he led the highly successful response to the Boston Marathon bombing. Prior to that, he was the Superintendent of the Lowell, Massachusetts Police Department for 12 years. Davis also serves on AT&T’s Advisory Board and was a former Safety Advisory Board Member at Uber. Enhancing mail security “We are honoured to have an esteemed law enforcement figure, such as Ed Davis join our Advisory Board and help us continue closing the mail security gap,” said Alex Sappok, Ph.D., the Chief Executive Officer (CEO) of RaySecur. Alex adds, “Ed’s strong interest in RaySecur not only highlights the importance of improving mail security across industry and government, but also our solutions, which can easily address the problem at scale.”
In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of face recognition. However, another reason the technology is gaining traction is due to the swiftly rising demand for touchless access control solutions that can help mitigate the spread of disease in public spaces. Effective for high volumes Face recognition eliminates security risks and is also virtually impossible to counterfeit Modern face recognition technology meets all the criteria for becoming the go-to solution for frictionless access control. It provides an accurate, non-invasive means of authenticating people's identities in high-traffic areas, including multi-tenant office buildings, industrial sites, and factories where multiple shifts per day are common. Typical electronic access control systems rely on people providing physical credentials, such as proximity cards, key fobs, or Bluetooth-enabled mobile phones, all of which can be misplaced, lost, or stolen. Face recognition eliminates these security risks and is also virtually impossible to counterfeit. Affordable biometric option Although there are other biometric tools available, face recognition offers significant advantages. Some technologies use hand geometry or iris scans, for example, but these options are generally slower and more expensive. This makes face recognition a natural application for day-to-day access control activities, including chronicling time and attendance for large workforces at construction sites, warehouses, and agricultural and mining operations. In addition to verifying personal credentials, face recognition can also identify whether an individual is wearing a facial covering in compliance with government or corporate mandates regarding health safety protocols. Beyond securing physical locations, face recognition can also be used to manage access to computers, as well as specialised equipment and devices. Overcoming challenges with AI So how did face recognition become so reliable when the technology was once dogged by many challenges, including difficulties with camera angles, certain types of facial expressions, and diverse lighting conditions? Thanks to the emergence of so-called "convolutional" neural network-based algorithms, engineers have been able to overcome these roadblocks. SecurOS FaceX face recognition solution FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces One joint effort between New Jersey-based Intelligent Security Systems (ISS) and tech giant Intel has created the SecurOS FaceX face recognition solution. FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces and facial expressions, including those captured under changing light, at different resolution levels, and varying distances from the video camera. Secure video management system A common face recognition system deployment begins with IP video cameras that feed footage into a secure video management system connected to a video archive. When the software initially enrolls a person’s face, it creates a "digital descriptor" that is stored as a numeric code that will forever be associated with one identity. The system encrypts and stores these numeric codes in a SQL database. For the sake of convenience and cost savings, the video server CPU performs all neural network processes without requiring any special GPU cards. Unique digital identifiers The next step involves correlating faces captured in a video recording with their unique digital descriptors on file. The system can compare newly captured images against large databases of known individuals or faces captured from video streams. Face recognition technology can provide multi-factor authentication, searching watchlists for specific types of features, such as age, hair colour, gender, ethnicity, facial hair, glasses, headwear, and other identifying characteristics including bald spots. Robust encryption SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 To support privacy concerns, the entire system features an encrypted and secure login process that prevents unauthorized access to both the database and the archive. An additional layer of encryption is available through the use of Self-Encrypting Drives (SEDs) that hold video recordings and metadata. SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 (short for Advanced Encryption Standard). Anti-spoofing safeguards How do face recognition systems handle people who try to trick the system by wearing a costume mask or holding up a picture to hide their faces? FaceX from ISS, for example, includes anti-spoofing capabilities that essentially check for the "liveliness" of a given face. The algorithm can easily flag the flat, two-dimensional nature of a face mask, printed photo, or image on a mobile phone and issue a "spoof" alarm. Increased speed of entry Incorporating facial recognition into existing access control systems is straightforward and cost-effective Incorporating facial recognition into existing access control systems is straightforward and cost-effective. Systems can operate with off-the-shelf security cameras and computers. Users can also leverage existing infrastructure to maintain building aesthetics. A face recognition system can complete the process of detection and recognition in an instant, opening a door or turnstile in less than 500ms. Such efficiency can eliminate hours associated with security personnel checking and managing credentials manually. A vital tool Modern face recognition solutions are infinitely scalable to accommodate global enterprises. As a result, face recognition as a credential is increasingly being implemented for a wide range of applications that transcend traditional access control and physical security to include health safety and workforce management. All these capabilities make face recognition a natural, frictionless solution for managing access control, both in terms of performance and cost.
More than a year and a half after the COVID-19 pandemic began, countless workers are still doing their jobs remotely rather than from their offices. While there are many positives to working from home, there can also be some negatives at play like nefarious actors taking advantage of the tools and connections that employees use in work from home environments. Insider threats, a security risk that comes from within the organisation, are posing a major security problem for businesses. This is partially due to the widespread use of social media, encrypted communication platforms, and other tools. Now more than ever insider threats need to be identified, thwarted, and prevented. Social distancing policies When social distancing policies and mandates began keeping people apart, many turned to social media to stay connected. While social networking tools have provided a positive outlet and a way for people to feel more connected, these platforms have also become a hotspot for insider targeting because they provide a way to propagate disinformation and target individuals likely to be receptive to it. The ideal mark for an insider threat is someone who is active on social media Even more so, they have provided a means to develop relationships with organisational insiders and socialise with them. The ideal mark for an insider threat is someone who is active on social media, has sufficient access to sensitive information, lacks supervision in their day-to-day work, and works remotely. As the relationship develops, through the process of grooming, an employee can become more likely to disregard company policies and commitments. Disregarding company policies One reason insiders might act against their own organisation involves monetary gain. The pressures of the pandemic have led to record levels of unemployment and financial strain for millions of Americans. Financial issues can include struggling to pay for childcare, supporting family obligations, paying rent and more. Those who find themselves in a financial bind might not just act against their own company but could also more easily fall victim to a threat. Another reason that insiders act is that they may be disgruntled. Insiders may hold a grudge because they were passed over for promotion, were given an unsatisfactory performance rating, or they may be facing termination. While just one of these factors may not be a trigger to involve the company’s security team, any combination of these factors along with a change in the employee’s demeanour or behaviour should serve as a red flag to pay closer attention to the situation. Potentially malicious insiders Sending confidential information to an unsecured location in the cloud exposes the organisation to risk Another challenge employers face directly relates to the somewhat limited supervision of employees who work remotely. In this situation, identifying potentially malicious insiders is more difficult, largely because face-to-face interactions are limited. When the pandemic began, many companies shifted their primary areas of focus to keeping the business viable, which is understandable. However, with this shift of focus, less attention may have been paid to security issues. The proactive company will have ensured their employees are aware of the following: Steps they should take to ensure their devices -- both company-issued and personal -- are secured at all times. Sending confidential information to an unsecured location in the cloud exposes the organisation to risk. Breaking security policies to simplify tasks is prohibited. Ensuring their devices are updated with the latest security patches. A failure in any of these areas can produce an environment ripe for malicious insider activity. Cyber security teams This multidisciplinary group can lead the initiatives that are paramount to keeping the company secure The insider threat is an organisational threat and so it is most effectively addressed from a holistic perspective. Stakeholders from different parts of the organisation need to be at the table to understand and address such threats. An effective team includes personnel from the legal, human resources, communications, and physical and cyber security teams. This multidisciplinary group can lead the initiatives that are paramount to keeping the company and its employees secure. Conduct a risk assessment of the company’s security processes or a threat assessment to the company’s people or assets. No organisation is without some level of vulnerability, so identify the most critical assets, information, and systems; identify those who have access to these critical assets; and build controls around them to provide extra security. Delivering refresher training Build a training program to help employees and management identify concerning behaviours. Educate staff about insider threat indicators and provide instructions for how to report concerns. Require employees to complete training and deliver refresher training and updates throughout the year. Training on this matter is not a one-and-done situation. Ensure there is an impartial and confidential process in place for employees to report possible insider threats. Employees need to trust that if they report concerns about behaviours or actions on the part of a fellow employee, their information will be handled discreetly and if warranted, acted upon. Write a communications strategy clearly defining the process for relaying insider threat incidents. An effective plan lays out what information and when this information should be shared with specific individuals and to the broader community, who has authority to communicate sensitive information, and how the information should be disseminated. Remote working challenges Establish a check-in process for managers and their direct reports to enable a means for employees to share concerns and for managers to identify challenges or opportunities to assist employees working in the virtual environment. Make an EAP (employee assistance program) readily available to employees. Ensure they understand how to access their EAP and assure them that contacting the EAP will not have a negative impact on their career or growth potential. Providing venues for employees to share their concerns and talk with trained staff can greatly help organisations navigate insider threats and general remote working challenges. Security risk environment The virtual workplace has created a serious security risk environment for companies in which employees who would not normally engage in insider threats become more vulnerable to them. Through new technologies and possibly due to new financial hardships, those looking to harm an organisation are out there, searching for opportunities to strike. It is leadership’s responsibility to take proactive action to ensure their employees are aware of the possibility of insider threats, the seriousness with which management views them, and the resources available should someone fall victim. It is everyone’s responsibility to remain vigilant.
It’s been almost exactly a decade since HID Global launched the world's first university pilot of smartphones carrying secure mobile IDs. A lot has changed in the following 10 years. Today’s technology has matured, advanced, and proliferated across a variety of high-value use cases. To catch up on the latest developments in mobile access, we contacted Luc Merredew, Product Marketing Director, Physical Access Control, at HID Global. Q: What has changed since the first pilot implementation of smartphones used for secure mobile identification? Merredew: One of the biggest milestones several years ago was when mobile access solutions achieved certification to the ISO 27001:2013 Information Security Management System (ISMS) standard. With increasing awareness of cloud-based security threats and resulting high expectations from a solution, today’s system owners, operators, and users insist on companies being able to demonstrate that they have had their services vetted by independent laboratories and/or agencies. When adopting mobile access solutions that maximise convenience and efficiency, and deliver dramatically improved user experiences, it is neither necessary nor acceptable to compromise security in either the physical or digital domains. Q: Do universities continue to be the biggest users? Mobile IDs on devices eliminate person-to-person credentials when accessing secured areas Merredew: The use cases have grown dramatically, spread evenly across all types of organisations in locations ranging from high-rise buildings to multi-campus global enterprises. But yes, universities continue to be big adopters, and they were among those most eager to leverage the technology so they could bring people back to campus in person during the pandemic. In this environment, mobile IDs on smartphones and other devices eliminate person-to-person credential (e.g., badge or ID card) issuance or revocation, as well as the need to physically touch cards, readers, or keypads when accessing secured areas. Q: How were mobile IDs employed by your customers as they brought people back to physical locations after the pandemic shutdown? Merredew: One example is Vanderbilt University, where the challenges of COVID-19 brought renewed attention to the importance of a modern system for identity management and access control that was compatible with Near Field Communication (NFC) and Bluetooth technologies. Members of the campus community could more conveniently access buildings and services with their mobile devices, and the university could efficiently provision and de-provision credentials remotely without person-to-person contact. More recently, Vanderbilt leveraged HID Mobile Access® to deploy campus IDs on iPhone and Apple Watch through Apple Wallet. Q: Is there another example outside the university vertical? Merredew: Another example is the iconic tower Arcos Bosques Torre 1 in Mexico City, where the owners and tenants enjoy the simplicity of using their trusted mobile devices to seamlessly access their spaces. As with the Vanderbilt deployment, the drive for operational efficiency and convenience in the tower was combined with a desire to minimise the need for users to come in physical contact with the system. Having a solution like HID Mobile Access that delivers touchless entry and increased safety and security is important. Q: What have been the biggest mobile access advancements? The mobile credential provides contactless, seamless access to a wide range of devices and services Merredew: One of the most important advancements was simplifying upgrade paths to mobile access. In the Vanderbilt example, our HID Reader Manager was used to upgrade the firmware on the university’s physical access control readers and extend support for NFC-based credentials in Apple Wallet. The university uses the HID Origo™ Mobile Identities API integrated with CS Gold®, a higher education transaction system from CBORD, for credential lifecycle management. Another significant enhancement has been the expanded range of uses cases for the mobile credential, going beyond simply opening doors to include providing contactless, seamless access to a wide range of devices and services such as time-and-attendance terminals, cashless vending machines, printers, computers, workstations, and many other applications. Q: Wearables are also having an impact. Merredew: Contactless mobile experiences are also delivered through wearable wristbands. One example is the Nymi band which, once authenticated, continuously authenticates the identity of the user until it’s removed from the wrist. This delivers zero-trust security principles and access control using convenient fingerprint and heartbeat biometrics to users seeking touchless authentication. Q: What is the impact of the cloud? Merredew: The move to a cloud-based system to issue and manage mobile identity credentials has unified, automated, and simplified identity issuance at a single facility or across any number of distributed office or remote work locations. Q: What should end users look for in a mobile access solution? Look for solutions that use a secure element in the reader as well as cloud certificates, to ensure security and data privacy Merredew: Solutions should support the largest possible number of popular mobile devices – in HID’s case, this includes more than 250. Look for solutions that use a secure element in the reader, and a secure key management process, as well as cloud certificates, to ensure both security and data privacy. Make sure the solution supports Bluetooth Low Energy (BLE), Near Field Communication (NFC), and both iOS and Android operating systems. Solutions that provide Application Programming Interface (API) and Software Development Kit (SDK) support offer direct access to the solution’s access control hardware, speeding deployment while enabling integration partners to continue innovating products that deliver even better user experiences. Q: Wonder what this market will look like in 10 more years. What’s next for mobile access? Merredew: Future innovations are on the horizon with technologies such as Ultra-Wideband (UWB) wireless connectivity, which HID expects will become ubiquitous on mobile devices. It provides unprecedented accuracy and security when measuring the distance or determining the relative position of a target. It is not HID’s expectation that UWB will replace Near Field Communication (NFC) or Bluetooth, but rather supplement Bluetooth and other technologies to provide the assurance, reliability, and granularity of device position that enables truly seamless experiences.
Video is an enormous wellspring of unstructured data in the enterprise environment. Finding new ways to use video data requires easy access for analysis. Gone are the days when video was recorded just to be played back later. New computer capabilities can analyse video to provide business intelligence and trends, all of which requires that a lot of unstructured data be captured, stored and kept immediately accessible. It's a driving force for companies specialising in video storage such as Quantum, which is focused on storing and managing unstructured data, including video, photos, music and sound. Managing various analytics “Unstructured data is driving the massive growth in storage today, and video surveillance fits right in there,” says Jamie Lerner, CEO and President, Quantum. As data multiplies in business, matters of storing and accessing the data take on a larger profile. Especially challenging is meeting the need to store and access expanding amounts of unstructured data, such as video. Video is also part of a changing end-to-end architecture in the enterpriseWhereas 10 years ago, video surveillance was all about recording and playback, now the emphasis is much more on an end-to-end approach. In addition to capturing and playing back video, systems have to manage various analytics, archival and data retention aspects as well as recording. Video is also part of a changing end-to-end architecture in the enterprise, including hybrid, cloud and on-premise storage. Video surveillance industry Historically, structured data, such as financial information, was stored to allow future analytics. The same trend extends to unstructured data, such as video analytics. Quantum has expanded its video storage capabilities with acquisition this year of the video surveillance business of Pivot3, provider of a hyperconverged system that provides recording, analysis and seamlessly archives data on a converged platform that is less expensive and easier to manage. In acquiring Pivot3, Quantum is refocusing the smaller company on the video surveillance industry. “We are now focused 100% on surveillance and having the highest quality while being very cost-effective,” says Lerner. “The industry is ready for an IT-forward solution that is totally focused on surveillance. You can’t make a platform all things to all people.” Traditional security customers There is overlap in large stadiums and theme parks, where Lerner sees even more opportunity to expand Pivot3 will also help to expand Quantum’s customer base. The larger company has a history of serving customers in entertainment, movies, television and sports production. The addition of Pivot3’s 500 new customers in large surveillance, transportation and critical infrastructure markets will expand the mix. There is overlap in large stadiums and theme parks, where Lerner sees even more opportunity to expand. Pivot3 also helps to bridge the gap between traditional security customers and the information technology (IT) department. “Pivot3 has a reputation as simple to use,” says Lerner. “My belief is that physical security can run separately [from IT] until you reach a certain size, then IT has to be involved. Pivot3 gives IT people in the security space a product that is well formed and fits into an IT strategy. They are not undertaking a piece of equipment that will be a burden.” Physical security presence Customers expect their infrastructure vendors to provide systems that allow them to “Set it and forget it,” says Lerner. It’s one of the big advantages of cloud computing and also central to Quantum’s approach with their traditional products. “At the end of the day, you want to run a hospital, for example, so you want your systems to be easy to use,” says Lerner. The Pivot3 acquisition will also allow Quantum to expand their physical security presence more broadly and globally. Previously, the geographic reach of Pivot3 was limited by the high cost of placing personnel in diverse locations. Under Quantum, which has been serving global companies for 40 years, the problem disappears. “Quantum has global support on all continents and in more countries,” says Lerner. “It’s a higher level of support, given size and legacy of our organisation.”
The city of Baltimore has banned the use of facial recognition systems by residents, businesses and the city government (except for police). The criminalisation in a major U.S. city of an important emerging technology in the physical security industry is an extreme example of the continuing backlash against facial recognition throughout the United States. Facial recognition technology ban Several localities – from Portland, Oregon, to San Francisco, from Oakland, California, to Boston – have moved to limit use of the technology, and privacy groups have even proposed a national moratorium on use of facial recognition. The physical security industry, led by the Security Industry Association (SIA), vigorously opposed the ban in Baltimore, urging a measured approach and ‘more rational policymaking’ that preserve the technology’s value while managing any privacy or other concerns. Physical security industry opposes ban In such cases, it is local businesses and residents who stand to lose the most" “Unfortunately, an outright ban on facial recognition continues a distressing pattern in which the clear value of this technology is ignored,” said SIA’s Chief Executive Officer (CEO) Don Erickson, adding “In such cases, it is local businesses and residents who stand to lose the most.” At the national level, a letter to US President Biden from the U.S. Chamber of Commerce Coalition asserts the need for a national dialogue over the appropriate use of facial recognition technology and expresses concern about ‘a blanket moratorium on federal government use and procurement of the technology’. (The coalition includes Security Industry Association (SIA) and other industry groups.) The negativity comes at a peak moment for facial recognition and other biometric technologies, which saw an increase of interest for a variety of public and business applications, during the COVID-19 pandemic’s prioritisation to improve public health hygiene and to promote ‘contactless’ technologies. Prohibition on banks, retailers and online sellers The ordinance in Baltimore prohibits banks from using facial recognition to enhance consumer security in financial transactions. It prevents retailers from accelerating checkout lines with contactless payment and prohibits remote online identity document verification, which is needed by online sellers or gig economy workers, according to the Security Industry Association (SIA). At a human level, SIA points out that the prohibition of facial recognition undermines the use of customised accessibility tools for disabled persons, including those suffering with blindness, memory loss or prosopagnosia (face blindness). Ban out of line with current state of facial recognition Addressing the Baltimore prohibition, the Information Technology and Innovation Foundation reacted to the measure as ‘shockingly out of line with the current state of facial recognition technology and its growing adoption in many sectors of the economy’. Before Baltimore’s decision to target facial recognition, Portland, Oregon, had perhaps the strictest ban, prohibiting city government agencies and private businesses from using the technology on the city’s grounds. San Francisco was the first U.S. city to ban the technology, with Boston, Oakland; Cambridge, Massachusetts; and Berkeley, California, among others, following suit. Police and federal units can use biometrics Unlike other bans, the Baltimore moratorium does not apply to police uses Unlike other bans, the Baltimore moratorium does not apply to police uses, but targets private uses of the technology. It also includes a one-year ‘sunset’ clause that requires city council approval for an extension. The measure carves out an exemption for use of biometrics in access control systems. However, violations of the measure are punishable by 12 months in jail. The law also establishes a task force to evaluate the cost and effectiveness of surveillance tools. Transparency in public sector use of facial recognition Currently, the state of Maryland controls the Baltimore Police Department, so the city council does not have authority to ban police use of facial recognition, which has been a human rights concern driving the bans in other jurisdictions. A measure to return local control of police to the city could pass before the year lapses. SIA advocates transparency in public-sector applications of facial recognition in identity verification, security and law enforcement investigative applications. SIA’s CEO, Don Erickson stated, “As public sector uses are more likely to be part of processes with consequential outcomes, it is especially important for transparency and sound policies to accompany government applications.”
MT Educare, a coaching institute since 1988, is a trusted brand in-classroom coaching and e-learning across India. With multiple locations and substantial growth, timely processing of staff and faculty payroll is crucial for MT Educare. With teaching faculty working at different locations for a varied time duration, capturing this diverse input correctly was a challenge. Besides, the confidentiality of payouts has been a major concern for MT Educare. Also, their HR team spent considerable time collating and checking the payroll input data. Streamlining entire process Capturing online attendance was considered however because the attendance input was not linked to payroll input, the HR team's involvement remained high. The output of the payroll was not shared with the business heads and hence they had to seek the information each month from the finance team. TopSource Worldwide streamlined the entire process and offered automation at various levels Given this scenario, MT Educare was looking out for an outsourced provider to offer a solution that will tackle all the above pain points. TopSource Worldwide streamlined the entire process and offered automation at various levels. For faculty payroll, TopSource Worldwide designed a timesheet and established a process of proactively sending those to all centers at the beginning of the month to capture the input. This gave great results in terms of timeliness and correctness. Getting clear visibility TopSource Worldwide also developed programs to check input at the source. This resulted in less time in the collation of input. Portico became the suite of choice for MT Educare from where their employees could view, download and print payslips. Business heads received reports for their business lines. Linking of online attendance and leave to payroll eased the input generation load of the HR team. Portico has taken over from the HR team thus the HR team is free to focus on the core HR function. The business heads are getting clear visibility of their own business line. MT Educare and TopSource relationship has changed from client-vendor to business partners.
RPG Life Sciences Ltd. formerly Searle (India) Ltd. is a full spectrum, world class, customer focussed, innovative pharmaceutical organisation. They develop, manufacture and market, for national and international markets, a broad range of branded formulations, generics and bulk drugs developed through fermentation and chemical synthesis routes. RPG Life Sciences were facing service issues with their outsourced payroll provider. Not only was the service not up to the mark, the payroll solution provided did not include any employee self service module. This led to a large number of employee queries being unanswered each month. Comprehensive payroll solution Also the multi-location nature of the business made distribution of reports and payslips a challenge. Delays were encountered in the delivery of reports along with inflexibility of reporting formats. RPG Life Sciences approached TopSource Worldwide to provide a comprehensive payroll solution that needed to be delivered on time, accurately and be able to respond to their growing needs. The Payslip distribution took place thru Portico to the multiple locations TopSource Worldwide provided employee self service thru Portico that gave access to employees to their payslips and enabled them to make investment declarations. The Payslip distribution took place thru Portico to the multiple locations. 24X7 access to payslips was provided by Portico from anywhere via the web. Adhoc reporting requirements Special reports such as Cumulative MSR, CARO Report, Additions and Deletions report and many more were provided to facilitate internal reporting for Finance and HR. A customised JV program was built to provide the journal entries from payroll to SAP. Bonus, Exgratia and Superannuation calculations were provided along with the necessary Journal entries for accounting each month. A Cheque writing service was also implemented in a few cases where required. RPG Life Sciences has to no longer spend time on administrative work and queries related to payroll. They have eliminated the risk of issues caused due to employee dissatisfaction with payroll and are now getting their payroll reports on time. Online availability of information has changed all that. They also have the added benefit of a flexible service provider to meet their adhoc reporting requirements.
Sauer-Danfoss designs, manufactures and sells a complete range of engineered hydraulic and electronic components including Hydrostatic transmissions, Mobile electronics, Open circuit products, Orbital motors, Steering components and valves. The company has more than 20 engineering and manufacturing facilities in Europe, the Americas and Asia- Pacific regions with total employee size of more than 6000. Sauer Danfoss India Pvt limited is located at Kesnand, Pune and the unit is mainly into manufacturing of steering components and valves. The company has sales branch offices in Mumbai, Bangalore, New Delhi and Ahmedabad. Issuing TDS certificates Sauer-Danfoss were facing issues with their outsourced consultant for filing the TDS returns and issuing of TDS certificates on a quarterly basis. The company was put in a situation of filing the TDS returns after the expiry of the due date. This would have resulted into a financial penalty for the company. The other issues faced by the company were complaints from suppliers for issuing the wrong TDS certificates The other issues faced by the company were complaints from suppliers for issuing the wrong TDS certificates, TDS deducted details not matching in spite of providing correct information by the company to the consultant. Sauer-Danfoss approached TopSource Worldwide to take over the activity of filing the TDS return and issuing TDS certificates on a quarterly basis. Maker-checker process TopSource Worldwide started filing the TDS returns and issuing TDS certificates on quarterly basis to more than 200 suppliers. TopSource Worldwide experts ensured cross-verification of PAN number each time a new supplier was registered. This was done through NSDL so as to avoid any future complications. Quality checks were done by a separate team for each TDS certificate before issuing to respective supplier(s) ensuring following of a maker-checker process. TopSource Worldwide also did cross verification post filing the TDS returns by verifying the acknowledgement of TDS return filed with NSDL. Information recorded with NSDL was checked to avoid future litigations and take corrective actions wherever required. Supplier's complaints have reduced completely and the company does not face any risk of future litigation with respect to TDS compliances.
Dorabjee's identified that there was a problem in their bank reconciliation and invited TopSource Worldwide in May 2012 to review their Bank reconciliation process and controls and provide recommendations to address this problem. Bank reconciliation at Dorabjee's was reconciled till March 2011 with unreconciled transactions from 2006. Bank reconciliation was also completed episodically. There was no specific process or controls in bank reconciliation process. Bank reconciliation process TopSource Worldwide took a number of steps to arrive at an effective solution: Dorabjee's internal accounts team completed the bank reconciliation as on 31/3/12. Dorabjee's internal accounts team cleared historic unreconciled transactions from 2006. Dorabjee's internal accounts team recorded payment transactions which were not posted for the period - April'12 till July'12. TopSource Worldwide completed reconciliation from April'12 till July'12 as a 1st step. In reconciliation completed as on July'12 TopSource Worldwide identified all open items > 30 days and resolved them with the help of Dorabjee's internal accounts team. TopSource Worldwide then completed reconciliation from Aug'12 till Sep'12. TopSource Worldwide prepared a delivery schedule for receiving inputs, delivery of reconciliation and completed reconciliation from October'12 on a monthly basis. Cash flow monitoring Bank reconciliation is up to date and completed on monthly basis. All open issues are reported to Dorabjee's and resolved. Dorabjee's can rely on and use the bank reconciliation as a tool to identify any errors in the accounting records of the company or bank. It provides an added comfort to Dorabjee's that the bank transactions have been recorded correctly in the company records. Monthly preparation of bank reconciliation assists Dorabjee's in the regular monitoring of cash flow of a business.
Croatia has selected Intersec’s GeoSafe technology as the basis for its new national public warning system (PWS). The decision sees Croatia adopting a best practice response to the European mandate that all EU member states must implement a modern digital public warning system by June 20221. Ingolf Ruh, Chief Revenue Officer, for Intersec says: “The Croatian government wanted the best technology possible in order to serve its population in a crisis. Simply complying with the European regulations regarding public warning systems was not enough: they wanted to innovate and prepare for the future.” Public warning system “As part of an end-to-end solution that enables government and network operators to work seamlessly together from the outset, GeoSafe will deliver a public warning system for Croatia that will keep citizens informed and protected for many years to come.” Croatia has a population over 4 million but attracts almost five times as many tourists annually (19.6 million in 2019). Croatia’s Ministry of the Interior and Civil Protection Directorate (MoI/CPD) was tasked with improving its current processes and introducing new communication channels to provide a single national system to alert citizens and visitors during crisis situations. A key requirement was the ability to target specific segments of the population in real time using mobile messaging, dependent on their (changing) position relative to the crisis. Powerful data processing GeoSafe can differentiate between users of Croatian mobile networks and foreign national operators Using a combination of cell broadcast and location-based SMS, Intersec GeoSafe provides the technology that will enable the MoI/CPD to provide early warning and subsequent crisis communications in case of national emergencies such as floods, fires, epidemics or terrorist incidents. Providing critical alert aggregation capability, its powerful data processing will enable anonymised geolocation data to be used to provide the best possible information in an emergency. The system will also help to track whether messages have been received and how people are responding. GeoSafe can differentiate between users of Croatian mobile networks and foreign national operators, so crisis communications can be sent in foreign languages, in real time, without violating personal data protection regulations. Future-proof solution Intersec partnered with Croatian companies King ICT and GDI to respond to the competitive tender. As one of four businesses bidding for the project, the Intersec consortium won by proving that its system was technically superior, offered robust data anonymisation processes for maintaining citizen privacy, and could deliver a cost-efficient, future-proof solution at both governmental and network operator level. All three national telecommunications operators in Croatia have confirmed their participation in the project, thereby ensuring coverage of the entire Republic of Croatia, and enabling the government to reach up to 100% of mobile device users.
Institución Ferial de Madrid (IFEMA) Exhibition Centre hosts over 100 events every year including trade shows and business meetings, but also large public events in the fields of sport, culture, and leisure. Boasting an exhibition area that covers 200,000 square metres of covered pavilions, 12 halls, two convention centres, and 14,000 parking spaces, the complex is operated by IFEMA Madrid and is one of the most up-to-date, technologically best equipped exhibition venues in Europe. Visitors from all over the world trust to be in a safe and pleasant environment, which is secured by systems that are state-of-the-art and cover the entire site – indoor and outdoor areas, parking garages and logistics zones. Analogue video system The sheer size of the exhibition grounds, the large number of events in a wide variety of very different setups and a large number of people on site – visitors, exhibitors, service providers, suppliers – require a high-performance, holistic physical security system. IFEMA MADRID required a solution to replace its analogue video system that had reached end-of-life IFEMA MADRID required a solution to replace its analogue video system that had reached end-of-life. It expected the new solution to provide substantial improvements in processing video footage and helping them resolve incidents quickly. Prerequisites included state-of-the-art technology, an open and integrated platform, with easy integration of third-party solutions such as video analytics, access control and LPR and event search. Physical security ecosystem As a public body, IFEMA MADRID launched a public tender for the update of their video system. Qognify together with Sicuralia System and video analytics partner Briefcam, presented the best overall solution, complying with all the customer needs, thus winning the contract. The powerful security functions of Qognify’s Cayuga VMS, as well as its openness to third party software integrations, especially with video analytics, tipped the scales and it was chosen to be at the core of its new video-based security system. To achieve overall surveillance for the entire complex within one system, Cayuga is used as a video surveillance platform to not only expand and upgrade the technology, but also offer complete integration with IFEMA’s physical security ecosystem. Responding to developing situations To date, more than 650 cameras – both fixed and PTZ models – have been installed to improve the security To date, more than 650 cameras – both fixed and PTZ models – have been installed to improve the security and safety on site and to allow for video analysis in critical areas, thus making the video system more efficient and actionable. The VMS’s reliability was key, to ensure the continuous protection of people and goods in coherence with the envisioned growth of the events that take place at the Madrid Exhibition Centre. At the heart of the installation sits a central control room that was designed from scratch. It is here where all information converges – allowing for immediate assessment and response to any developing situations. Video security system The implementation of Cayuga has improved the performance of the video security system, accelerated investigations, and is delivering improved situational awareness. It has helped to produce a better resolution on the video stream, combined with the ability to easily switch from live to recorded video for investigation. All this allows the security team to get a better overview of every situation, while at the same time reducing the number of people needed for monitoring or patrolling. The new system makes easier to provide a higher level of security for exhibitors and for the visitors to IFEMA MADRID.
Round table discussion
Diversity in a company’s workforce is arguably more important now than ever. Societal awareness of the importance of diversity has grown, and many people see diversity as an important factor that reflects positively (or negatively) on a company’s culture and image in the marketplace. We asked this week’s Expert Panel Roundtable: What should the security industry do to promote workplace diversity?
The death of Michael Brown at the hands of police in Ferguson, Missouri, in August 2014, highlighted to the public, the importance of body-worn cameras. There was no bodycam footage of the Ferguson tragedy. Arguably, it would have shed additional light on the shooting. Since then, body cameras have become a tangible legacy of Ferguson, Missouri. Bodycam footage is seen as providing greater accountability and ensuring an impartial record that can support, or debunk, any claims of police misconduct. Body-worn cameras are also finding their way into broader usage, even including customer service applications. We asked this week’s Expert Panel Roundtable: How important will body-worn cameras be moving forward?
Many of the threats facing the energy and utility sector are related to cybersecurity, as recent incidents have confirmed. Another problem is that operating systems for utilities tend to be outdated, which presents extra challenges in a connected world. There are also physical security demands, not to mention regulatory and social issues. We asked this week’s Expert Panel Roundtable: What are the security trends in energy and utilities?
Security devices: Manufacturers & Suppliers
- Dahua Technology Security devices
- Vicon Security devices
- Bolide Security devices
- Vanderbilt Security devices
- Seagate Security devices
- Bosch Security devices
- Hanwha Techwin Security devices
- Aritech Security devices
- Parabit Security devices
- VIVOTEK Security devices
- LILIN Security devices
- Hikvision Security devices
- BCDVideo Security devices
- Sony Security devices
- ComNet Security devices
- Videotec Security devices
- CEM Security devices
- Pelco Security devices
- Arecont Vision Security devices
- HID Security devices