Video Surveillance software - Expert commentary

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Physical Security And The Cloud: Why One Can’t Work Without The Other
Physical Security And The Cloud: Why One Can’t Work Without The Other

Human beings have a long-standing relationship with privacy and security. For centuries, we’ve locked our doors, held close our most precious possessions, and been wary of the threats posed by thieves. As time has gone on, our relationship with security has become more complicated as we’ve now got much more to be protective of. As technological advancements in security have got smarter and stronger, so have those looking to compromise it. Cybersecurity Cybersecurity, however, is still incredibly new to humans when we look at the long relationship that we have with security in general. As much as we understand the basics, such as keeping our passwords secure and storing data in safe places, our understanding of cybersecurity as a whole is complicated and so is our understanding of the threats that it protects against. However, the relationship between physical security and cybersecurity is often interlinked. Business leaders may find themselves weighing up the different risks to the physical security of their business. As a result, they implement CCTV into the office space, and alarms are placed on doors to help repel intruders. Importance of cybersecurity But what happens when the data that is collected from such security devices is also at risk of being stolen, and you don’t have to break through the front door of an office to get it? The answer is that your physical security can lose its power to keep your business safe if your cybersecurity is weak. As a result, cybersecurity is incredibly important to empower your physical security. We’ve seen the risks posed by cybersecurity hacks in recent news. Video security company Verkada recently suffered a security breach as malicious attackers obtained access to the contents of many of its live camera feeds, and a recent report by the UK government says two in five UK firms experienced cyberattacks in 2020. Cloud computing – The solution Cloud stores information in data centres located anywhere in the world, and is maintained by a third party Cloud computing offers a solution. The cloud stores your information in data centres located anywhere in the world and is maintained by a third party, such as Claranet. As the data sits on hosted servers, it’s easily accessible while not being at risk of being stolen through your physical device. Here’s why cloud computing can help to ensure that your physical security and the data it holds aren’t compromised. Cloud anxiety It’s completely normal to speculate whether your data is safe when it’s stored within a cloud infrastructure. As we are effectively outsourcing our security by storing our important files on servers we have no control over - and, in some cases, limited understanding of - it’s natural to worry about how vulnerable this is to cyber-attacks. The reality is, the data that you save on the cloud is likely to be a lot safer than that which you store on your device. Cyber hackers can try and trick you into clicking on links that deploy malware or pose as a help desk trying to fix your machine. As a result, they can access your device and if this is where you’re storing important security data, then it is vulnerable. Cloud service providers Cloud service providers offer security that is a lot stronger than the software in the personal computer Cloud service providers offer security that is a lot stronger than the software that is likely in place on your personal computer. Hyperscalers such as Microsoft and Amazon Web Service (AWS) are able to hire countless more security experts than any individual company - save the corporate behemoth - could afford. These major platform owners have culpability for thousands of customers on their cloud and are constantly working to enhance the security of their platforms. The security provided by cloud service providers such as Claranet is an extension of these capabilities. Cloud resistance Cloud servers are located in remote locations that workers don’t have access to. They are also encrypted, which is the process of converting information or data into code to prevent unauthorized access. Additionally, cloud infrastructure providers like ourselves look to regularly update your security to protect against viruses and malware, leaving you free to get on with your work without any niggling worries about your data being at risk from hackers. Data centres Cloud providers provide sophisticated security measures and solutions in the form of firewalls and AI Additionally, cloud providers are also able to provide sophisticated security measures and solutions in the form of firewalls and artificial intelligence, as well as data redundancy, where the same piece of data is held within several separate data centres. This is effectively super-strong backup and recovery, meaning that if a server goes down, you can access your files from a backup server. Empowering physical security with cybersecurity By storing the data gathered by your physical security in the cloud, you're not just significantly reducing the risk of cyber-attacks, but also protecting it from physical threats such as damage in the event of a fire or flood. Rather than viewing your physical and cybersecurity as two different entities, treat them as part of one system: if one is compromised, the other is also at risk. They should work in tandem to keep your whole organization secure.

Making School Safety A Priority With Smart Technology
Making School Safety A Priority With Smart Technology

With pupils in the UK set to go back to school on 8 March, there are a number of safety measures schools need to implement to ensure the health and wellness of the staff, students, and school communities.  The first lockdown and closure of schools brought on by the coronavirus pandemic fired a “warning shot” for education facilities managers, forcing head-teachers to re-examine school safety standards. Now that a third lockdown is here and schools have been shut down for a second time, anyone behind the curve with the benefits of smart technology should get on board now before children return to the school environment. And with the ever-changing variants of the COVID-19 virus, schools can’t afford to be “late to class” when it comes to health and safety. Preventing the spread of disease Some schools in the US have been using smart technologies for a while to measure utility consumption and efficiency, streamline maintenance and enhance general school safety. These technologies are playing a significant role in keeping school buildings healthy and preventing the spread of disease. Let’s take a look at how smart technology can help schools to become safer, as well as more energy-efficient and cost-effective.   Thermal detection cameras  Smart cameras placed at entry points of a school can remove the manual task of temperature testing Smart cameras placed at entry points of a school can remove the manual task of temperature testing. These cameras provide medically-accurate, real-time temperatures of individuals in real-time. If a high temperature is detected, the software sends an instant alert to the relevant party. It can also be set to deny access to those with high temperatures or to people not wearing masks.  Safer water  As the coronavirus continues to sweep through the world’s population, healthcare providers should also be on heightened alert for Legionnaires’ disease, another potential cause of pneumonia with similar symptoms. Legionella is a potentially deadly bacteria that can infect a school’s water supply and cause an outbreak of Legionnaire’s disease. It’s a school's duty of care to prevent Legionella infection by monitoring the risk of the bacteria proliferating.  Particularly as schools reopen and previously stagnant plumbing and cooling systems return to use, additional Legionella cases could rear their ugly head to emergency departments in the coming months. Traces of Legionella were recently found at a Worcestershire school. The school was forced to remain shut while treatment and testing took place. Automated flushing and temperature testing Instant alerts will notify relevant staff if water temperatures fall within “Legionella-friendly” parameters The Health and Safety Executive advises, “If your building was closed or has reduced occupancy during the coronavirus (COVID-19) outbreak, water system stagnation can occur due to lack of use, increasing the risks of Legionnaires’ disease… If the water system is still used regularly, maintain the appropriate measures to prevent legionella growth.” Typically, managing the risk of Legionella includes running all outlets for two minutes, taking and recording the temperature of the water to ensure that it’s not conducive to Legionella growth. This is a time-consuming process, which is why schools are looking for automated water temperature monitoring systems. This smart system with automated flushing and temperature testing reports and records water temperature data in real-time. Instant alerts will notify relevant staff if water temperatures fall within “Legionella-friendly” parameters.  Cleaner air  Advisers say that improving air filtration and ventilation in schools can help mitigate the potential airborne transmission of COVID-19. Strategies include: Increasing outdoor air ventilation Filtering indoor air Using portable air cleaners with HEPA filters  Smart building technologies such as advanced HVAC controls can help facilities managers promote cleaner air with less hassle. For example, smart HVAC systems use sensors to remotely monitor and control variables such as:  Humidity Temperature Indoor air quality The level of carbon dioxide and other pollutants The technology is also energy-efficient and cost-effective.  While these solutions may be key to the reopening of schools in the era of COVID-19, they also bring long-term benefits. Although COVID-19 may have accelerated the adoption of smart technology, many of these solutions are focused on health, wellness, and security in general; which have been needed in school systems for a long time.

Latest AMAG Technology, Inc. news

HID Global Enables Organizations To Bring Remote Workers And Students Back On-site With Their Chromebooks
HID Global Enables Organizations To Bring Remote Workers And Students Back On-site With Their Chromebooks

Organizations around the world sent an unprecedented number of people home during 2020 to work and attend school remotely, many of them with Chromebook laptops whose shipments more than doubled year over year. HID Global, identity solutions company, is helping organizations bring these people and their Chromebooks back to a hybrid work and classroom environment using its HID HydrantID Account Certificate Manager (ACM) digital certificate management offering.  Seamless connections According to the market research firm Canalys, “Chromebooks set record shipment volumes, reaching 11.2 million units in Q4 2020, a remarkable 287% increase over Q4 2019, bringing the full-year 2020 total to 30.6 million units.”   HID HydrantID ACM and its new Chromebook Certificate Enrollment Extension (CEE) feature enable organizations to issue and manage the digital certificates for bringing these devices back to physical work and study settings, ensuring they can connect to networks seamlessly and securely without passwords.  Easy, cloud-based approach “The traditional walled-fortress IT security posture isn’t feasible as we transition to hybrid remote and in-person work and study environments using a growing variety of computing devices and operating systems,” said By Mrugesh Chandarana, Senior Product Manager, Commercial CA and PKI Services with HID Global, Identity and Access Management. “The huge influx of Chromebooks is here to stay and HID HydrantID ACM with its CEE feature is the first solution to provide an easy, cloud-based approach to digital certificate management that enables these devices to authenticate to enterprise networks in a passwordless, Zero Trust network access environment.”   Digital certificate lifecycle management The solution offers automated digital certificate lifecycle management with tracking, installation, and renewal HID HydrantID ACM with the CEE feature offers automated digital certificate lifecycle management with tracking, installation, and renewal. It enables users of any Chromebook to make or model to be securely up and running on the network by simply plugging in their devices and seamlessly deploying certificates for passwordless authentication without any user intervention. Early adopters of the HID HydrantID CEE solution for Chromebooks include a large financial institution with a sizable remote workforce, as well as high schools and colleges where Chromebook usage grew substantially during the 2020/2021 academic year.   Passwordless authentication The CEE feature is especially valuable for users as it allows them to have passwordless authentication while seamlessly navigating between remote connectivity and direct connection to the in-office network.  For organizations that do not have an internal Microsoft Active Directory Certificate Services (ADCS) infrastructure, the CEE allows them to implement a seamless experience for their users while freeing up Help and\or Service Desk resources. By implementing the CEE using HID HydrantID Managed PKI-as-a-Service, organizations eliminate operational complexity and dramatically reduce costs related to operating and deploying an organizational private PKI.  

AMAG Technology And IES Communications Selected For 100 Mill Development Project
AMAG Technology And IES Communications Selected For 100 Mill Development Project

AMAG Technology announced that Gilbane Building Company selected AMAG’s Symmetry Security Management System to deploy at the new Hines 100 Mill high rise in Tempe, Arizona. Gilbane Building Company will install AMAG’s Symmetry Access Control, Symmetry CompleteView Video Management, and Zenitel Turbine Intercom. Gilbane chose IES Communications, LLC, a subsidiary of IES Holdings, Inc. to deploy the integrated system. Symmetry security management Located in the heart of downtown Tempe, 100 Mill is an 18 floor, 280,000 square foot commercial building that will include 10’ floor-to-ceiling glass, a rooftop amenity deck, a fitness center, a training room, and a conference center, and a tenant bar/lounge. “We value our partnership with IES Communications and look forward to a long working relationship,” said Gilbane Building Company’s Area Manager, John Clays. “The Symmetry Security Management System easily met all of 100 Mill’s security needs and can easily grow as they add tenants to the system.” Deployment completion is expected in November 2021. Comprehensive approach Gilbane selected IES Communications for its comprehensive approach to projects along with its strong emphasis on client relationships. AMAG’s Symmetry Security Management System met all system requirements and can grow to fit future expansion requirements and tenant needs. “IES Communications is proud to work with Gilbane Builders to deliver a first-class security system using AMAG’s Symmetry Security Management System,” said IES Communications, Special Systems Project Manager, Barry Pistone. “As 100 Mill expands and adds tenants, Symmetry will easily expand with them and its open architecture will allow for easy technology integrations in the future.”

AMAG Releases Latest Version Of Symmetry CONNECT And Symmetry GUEST
AMAG Releases Latest Version Of Symmetry CONNECT And Symmetry GUEST

AMAG Technology recently released a new version of Symmetry CONNECT Identity Management and Symmetry GUEST Visitor Management. These enhancements are centered on globalization as well as increasing the capabilities of the Public API, including the ability to schedule visits. Enhancements include: The hosted Symmetry CONNECT and GUEST environment now support both English and Spanish languages. With this update, the language preference can be set at both the identity and group level. Additional language options can be provided for On-Premise customers. Companies can now be added, retrieved, and updated via the Public API. Buildings can now be added, retrieved, and updated via the Public API. An identity's user-defined fields (UDFs) can now be added and updated via the Public API. Symmetry GUEST visitors can now be added, updated, and retrieved via the Public API Symmetry GUEST visits can now be added, updated, retrieved, and deleted via the Public API. An identity's intrusion detection system (IDS) and PIN Codes can now be added, updated, and deleted via the Public API. Access groups can now be added, updated, and deleted by name via the Public API. A credential’s activation and deactivation date can now be updated via the Public API. An online help site covering Symmetry CONNECT, GUEST, and IDM is now available by clicking the Question Mark icon in the upper right of the portal (directly left of the sign-out button).

Related white papers

Delivering a Smart, Secure and Healthy Workplace with Cloud

Cloud Video and Smart Cities

Security Investments Retailers Should Consider For Their 2021 Budget