Analog Transmission - Expert commentary

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Physical Security And The Cloud: Why One Can’t Work Without The Other
Physical Security And The Cloud: Why One Can’t Work Without The Other

Human beings have a long-standing relationship with privacy and security. For centuries, we’ve locked our doors, held close our most precious possessions, and been wary of the threats posed by thieves. As time has gone on, our relationship with security has become more complicated as we’ve now got much more to be protective of. As technological advancements in security have got smarter and stronger, so have those looking to compromise it. Cybersecurity Cybersecurity, however, is still incredibly new to humans when we look at the long relationship that we have with security in general. As much as we understand the basics, such as keeping our passwords secure and storing data in safe places, our understanding of cybersecurity as a whole is complicated and so is our understanding of the threats that it protects against. However, the relationship between physical security and cybersecurity is often interlinked. Business leaders may find themselves weighing up the different risks to the physical security of their business. As a result, they implement CCTV into the office space, and alarms are placed on doors to help repel intruders. Importance of cybersecurity But what happens when the data that is collected from such security devices is also at risk of being stolen, and you don’t have to break through the front door of an office to get it? The answer is that your physical security can lose its power to keep your business safe if your cybersecurity is weak. As a result, cybersecurity is incredibly important to empower your physical security. We’ve seen the risks posed by cybersecurity hacks in recent news. Video security company Verkada recently suffered a security breach as malicious attackers obtained access to the contents of many of its live camera feeds, and a recent report by the UK government says two in five UK firms experienced cyberattacks in 2020. Cloud computing – The solution Cloud stores information in data centres located anywhere in the world, and is maintained by a third party Cloud computing offers a solution. The cloud stores your information in data centres located anywhere in the world and is maintained by a third party, such as Claranet. As the data sits on hosted servers, it’s easily accessible while not being at risk of being stolen through your physical device. Here’s why cloud computing can help to ensure that your physical security and the data it holds aren’t compromised. Cloud anxiety It’s completely normal to speculate whether your data is safe when it’s stored within a cloud infrastructure. As we are effectively outsourcing our security by storing our important files on servers we have no control over - and, in some cases, limited understanding of - it’s natural to worry about how vulnerable this is to cyber-attacks. The reality is, the data that you save on the cloud is likely to be a lot safer than that which you store on your device. Cyber hackers can try and trick you into clicking on links that deploy malware or pose as a help desk trying to fix your machine. As a result, they can access your device and if this is where you’re storing important security data, then it is vulnerable. Cloud service providers Cloud service providers offer security that is a lot stronger than the software in the personal computer Cloud service providers offer security that is a lot stronger than the software that is likely in place on your personal computer. Hyperscalers such as Microsoft and Amazon Web Service (AWS) are able to hire countless more security experts than any individual company - save the corporate behemoth - could afford. These major platform owners have culpability for thousands of customers on their cloud and are constantly working to enhance the security of their platforms. The security provided by cloud service providers such as Claranet is an extension of these capabilities. Cloud resistance Cloud servers are located in remote locations that workers don’t have access to. They are also encrypted, which is the process of converting information or data into code to prevent unauthorized access. Additionally, cloud infrastructure providers like ourselves look to regularly update your security to protect against viruses and malware, leaving you free to get on with your work without any niggling worries about your data being at risk from hackers. Data centres Cloud providers provide sophisticated security measures and solutions in the form of firewalls and AI Additionally, cloud providers are also able to provide sophisticated security measures and solutions in the form of firewalls and artificial intelligence, as well as data redundancy, where the same piece of data is held within several separate data centres. This is effectively super-strong backup and recovery, meaning that if a server goes down, you can access your files from a backup server. Empowering physical security with cybersecurity By storing the data gathered by your physical security in the cloud, you're not just significantly reducing the risk of cyber-attacks, but also protecting it from physical threats such as damage in the event of a fire or flood. Rather than viewing your physical and cybersecurity as two different entities, treat them as part of one system: if one is compromised, the other is also at risk. They should work in tandem to keep your whole organization secure.

HD Over Coax Provides Cost-effective Video Surveillance Upgrade
HD Over Coax Provides Cost-effective Video Surveillance Upgrade

According to IHS Market, it is estimated that there are over 60 million security cameras in the United States, and other reports say these cameras capture more than four billion hours of footage per week. Over the last decade, IP camera technology has dominated the conversation as it has provided users with a broad offering of enhanced image quality and features. With a large percentage of existing security systems relying on analog, many end users looking for high definition (HD) video quality have been forced to take on a complete system overhaul. Infrastructure Overhaul For HD Video To make the switch, customers would need to change everything, from cameras to hardware to wiring– not to mention the lengthy installation process that would ensue. IP cameras also require higher Internet speeds and more cloud space. Whether constrained by budget, bandwidth or storage, many end users have been unable to adopt this new video surveillance method.Thanks to technological advancements within the security industry, HD over Coax offers a viable solution for integrators and end users alike Thanks to technological advancements within the security industry, HD over Coax offers a viable solution for integrators and end users alike. By utilising the current Coaxial cables, this offering yields high definition video, while requiring minimal infrastructure changes and is an optimal surveillance choice for security customers. Plus, with new advancements and updates being made frequently to this technology, there is a solution for every security need. The enhanced alternative of HD over Coax has been warmly welcomed in the security industry, thanks to its simple solutions and ever-evolving features. Many new analog HD cameras are “plug and play,” able to connect directly to existing Coaxial cables. This eliminates the need for a complete system change, creating cost-savings for the end user and an enhanced video quality offering. Easy Solutions For HD Video As a result, integrators can cost-effectively upgrade their customer’s surveillance solution while using their legacy infrastructure, making it an attractive option for end users and an easy sell for dealers. Latency in video is another common issue with network-based camera systems, where even the slightest delay in video surveillance can hinder security response HD over Coax cameras themselves are always expanding and evolving to meet a wide array of security needs. With the introduction of fisheye and multi-sensor cameras, users now have a multitude of coverage options, not to mention the introduction of 4K bringing resolution options to the same level as IP. Some newer technologies are even touting 4K cameras paired with 4K digital video recorders (DVRs) made specifically for analog systems. Longer cables grant transmission for up to 1600 feet, double the distance of standard analog solutions, and triple that of IP systems. This single cable is able to transmit both HD video and audio. Recently, broadcast quality audio over Coax has become available in limited models, a substantial improvement over older analog technology, which was unable to transmit audio. Stopping Video Delay Latency in video is another common issue with network-based camera systems. Even the slightest delay in video surveillance can hinder security response. IP cameras are forced to compress and packetize their video for transmission. The outcome of this is a reduced number of images per video, which in turn causes delay. HD over Coax on the other hand, delivers an unlimited amount of HD images in real time, with smooth motion and impressive clarity. Additionally, the point-to-point transmission delivers uncompressed video free of lag. Another touted benefit is that, unlike IP networked cameras, analog systems provide a more secure video transmission. With so much sensitive information housed on a businesses’ network, adding another point of network access through an IP camera can create concerns for cyber security risks. HD over Coax delivers an unlimited amount of HD images in real time, with smooth motion and impressive clarity Preventing Network Hacking With HD over Coax, the physical connections between the camera and DVR prevent network hacking. By keeping the video surveillance system offline, security professionals are able to direct their attention to the physical threats at hand, rather than having to focus on deterring cyber security risks. One of the primary difficulties of deploying HD video solutions is the fact that many older systems utilize a wide variety of HD standards and platforms. To make matters more complicated, after HD over Coax was brought to market, manufacturers raced to create their own version of this technology. Today, the most popular proprietary standards are HD-CVI, HD-TVI and AHD. However, integrators and customers found that attempting to manage multiple HD technologies proved to be near impossible.Integrators and customers found that attempting to manage multiple HD technologies proved to be near impossible Diversifying Surveillance Through One DVR To combat these issues, manufacturers have introduced products with more flexibility to their portfolios. One example of this is the penta-brid DVR which grants the ability to seamlessly integrate multiple technologies deployed across one application. This means that systems with diverse camera brands and technologies, such as a mix of HD-CVI, HD-TVI, AHD, analog or IP, can be connected through one DVR. For many end users with legacy analog systems, penta-brid DVRs give them greater freedom to choose between a variety of solutions, rather than being limited to one option. With video resolution increasing, the space needed to store the footage is similarly rising. Penta-brid technology has been able to adapt to these evolving needs, giving users ample storage space to house the HD and 4K surveillance video with some of the newest models including H.265 compression.  HD Casino Surveillance Made Simple For casinos, HD images are critical for identifying unauthorized personnel and unlawful behaviours to create a safe environment for guests and staff While HD over Coax is beneficial to many end users and integrators, those in the casino and hospitality markets find it crucial. With a combination of high profile guests, large amounts of cash on hand, constant crowds and strict industry regulations, reliable video surveillance is a must. Deploying new IP systems comes at a stiff price. When looking to upgrade their video surveillance, casinos must also be mindful of the installation process. When moving to an IP-based system, ripping out old wires and replacing them with new is the standard practice. This practice can be both disruptive and costly, not to mention gaming regulations require casino activities be monitored at all times so a complete system shutdown would result in revenue loss. This cost can be hard to justify, especially when the current legacy analog system remains in working condition with only the lower image resolution to date it. For these scenarios, the most cost-effective option is to leverage the legacy infrastructure, replace the existing cameras with new devices, and reap the benefits that HD video has to offer without any lapse in security. For casinos, HD images are critical for identifying unauthorized personnel and unlawful behaviours to create a safe environment for guests and staff. HD over Coax cameras now offer the same resolution as IP cameras with a plug and play approach, that cuts down on expense without sacrificing quality. For businesses and applications that are unable to adopt IP technology, whether it be cost or time prohibitive, HD over Coax now features most of the same benefits IP has to offer without breaking the bank. By providing clear images in real time, maximizing existing infrastructure, and affording cyber security benefits, HD over Coax provides an attractive solution for many end users and integrators.

Latest Visonic Ltd. news

Johnson Controls Acquires Qolsys, Inc. To Enhance Its Smart Building Solutions Portfolio
Johnson Controls Acquires Qolsys, Inc. To Enhance Its Smart Building Solutions Portfolio

Johnson Controls has announced it has acquired the remaining stake of Qolsys Inc., a globally renowned residential and commercial security and smart-home manufacturer, after owning a majority stake in the company since 2014. Smart building solutions expert Qolsys enhances Johnson Controls global innovation platform, delivering next generation security and smart building solutions. The Qolsys founders and leadership team will remain in Silicon Valley (San Jose, California), assuming key roles in Johnson Controls’ global intrusion business. Qolsys enhances Johnson Controls global innovation platform, delivering next-gen smart building solutions Johnson Controls continues in its mission to deliver smarter, safer, more intelligent and connected buildings, by deploying emerging technologies, such as embedded IP, artificial intelligence and machine learning through state-of-the-art solutions and partnerships. Johnson Controls is at the forefront of fundamental transformation of how spaces and places are perceived and enjoyed by balancing and responding to the flow of information, services and people that occupy buildings. OpenBlue digital platforms By applying data from both inside and outside buildings, Johnson Controls’ OpenBlue digital platforms empower customers to manage operations, while delivering safety and security in dynamic and agile environments.       "Qolsys has grown from a startup to a renowned security platform provider with over 4,000 dealers and service providers worldwide. Johnson Controls sees long-term opportunities to bring Silicon Valley innovation and culture to our broader cloud-enabled IoT solutions in building management, fire and HVAC businesses," said Jeff Williams, President of Global Products, Johnson Controls. "The opportunity to acquire Qolsys allows Johnson Controls to achieve operational efficiencies and scale across our global markets, while further enhancing the suite of products and services offered on our digital platform, OpenBlue." IQ Panel 2 Plus and peripherals The award-winning IQ Panel 2 Plus and peripherals have driven explosive growth in North America and across the globe with future-proof features, supported by over-the-air software updates, built-in panel camera, Bluetooth disarming and innovative installation, and diagnostic tools to reduce costs and increase user engagement and satisfaction. Qolsys continues to show consistent growth of services and dealers, which led to US$ 150 million in revenues during fiscal year 2019.    "As the world becomes more connected and the innovation curve continues to ramp at unprecedented speed, we are excited to join Johnson Controls," said Dave Pulling, Qolsys Chief Executive Officer (CEO). Dave will be occupying the post of Vice President and General Manager of the global intrusion products business for Johnson Controls, which had US$ 500 million in revenue in fiscal year 2019. Advanced cloud-enabled solutions firm This is a major milestone in our 10-year journey to disrupt and transform the security industry" Dave adds, "We are committed to our customers in the security channel while continuing to invest in our roadmap and emerging verticals around the globe. This is a major milestone in our 10-year journey to disrupt and transform the security industry with advanced cloud-enabled solutions that transcend traditional intrusion offerings including advanced automation, energy management, apartment management, building management and wellness for aging in place." The combined volume of Qolsys, DSC, Bentel, Visonic - PowerG and Tyco products positions Johnson Controls as the market share major in advanced security solutions worldwide. IQ Hub, Panel, Water and Router products Qolsys recently announced roadmap products, including the IQ Hub, a lower-priced, third-generation IQ Panel; the IQ Router, a next-generation mesh networking solution to elegantly address the rapidly complex connected home; IQ Water, a connected water shut-off valve designed for mass market retrofit and a fourth generation IQ Panel due in 2021 with Qualcomm chipset supporting AI, M2M and next generation connectivity. Johnson Controls will offer Qolsys products throughout global markets. The IQ Panel 2 Plus and a full line of security and home automation devices are available from authorized Qolsys distributors.

Tyco To Launch A Wide Range Of Access Control, Intrusion And Video Products At The Security Event 2019
Tyco To Launch A Wide Range Of Access Control, Intrusion And Video Products At The Security Event 2019

Visitors to The Security Event will be among the first to see live demonstrations of some of the latest products to be launched by Tyco, the security division of Johnson Controls. A wide range of access control, intrusion and video products from the American Dynamics, Exacq, Illustra, Bentel, CEM Systems, DSC, Kantech, Software House and Visonic brands, which are supplied under the Tyco umbrella, will be on show on stand SE102. These include: Access Control Credential iotega, an all-in-one smart security and home automation platform for residential and small commercial properties A new camera to cloud solution which provides a cost-saving and efficient and method of managing IP cameras and securely storing video in the cloud. The recently launched Illustra Flex IR 30 x PTZ cameras which have adaptive IR illumination that adjusts the intensity of the IR in line with the operator controlled zoom setting of the camera. A new 8 channel VideoEdge Deep Intelligence Network Video Recorder (NVR), which utilizes machine learning techniques with the help of a powerful Graphic Processing Unit (GPU). This optimizes the ability of the NVR to display highly accurate video intelligence compared to standard methods of video analytics. Kantech EntraPass software which enables users to operate any number of doors where card access is required and provides support for a server based Go Pass mobile App that allows card holders to use their mobile phones as an access control credential. iotega, an all-in-one smart security and home automation platform for residential and small commercial properties. Commercial Security Exhibition Tyco is a Founding Partner of The Security Event which takes place at the NEC Birmingham on 9-11th April, 2019 and is intended to fulfill the need for a UK focused commercial security exhibition. “The opportunity to take an active role as a Founding Partner in an industry event which will be at a location which so many of our customers consider ‘home’, is extremely welcome,” said Gordon Morrison, GB Sales Director for the Tyco Security Products access control and video brands. “The concept, focus and size of the show makes it ideal for us to showcase our unified fits with our requirements and plans for a major part of our business."

OnSSI’s Ocularis 5.0 And C2P Integration Enhances Security Systems
OnSSI’s Ocularis 5.0 And C2P Integration Enhances Security Systems

On the heels of the release of Ocularis 5.0, OnSSI has now announced the introduction of several new technology integrations for its recently released VMS with C2P’s software solution. Ocularis 5.0, which is based on a new recorder, maximizes HDD storage effectiveness with dynamic data management for automatic storage load balancing, End-to-End 256 bit AES Encryption and edge recording support. The newly certified integrations with Ocularis 5.0, provide security professionals with valuable situational information across a wide range of applications including banking, access control, asset tracking, license plate recognition and point-of-sale. “The correlation of video and data creates an extremely effective and intelligent security solution,” said Ken LaMarca, VP of Sales and Marketing, OnSSI. “Ocularis’ open architecture not only makes this integration possible, it results in a powerful tool that meets a variety of demanding applications and delivers comprehensive intelligence across multiple platforms. Most important, beyond the power of these integrations, the systems provide vital information, better enabling the operators to assess emerging situations and provide them with information to choose an appropriate course of action.” Details On These Integrations Are As Follows: Banking Integrations with Diebold and Fiserv for teller terminals and ATM deployments allow for TCP/IP text and/or events to be streamed live directly to Ocularis in the form of JPEG images. The TCP/IP data is also stored as texts for forensic searches afterwards. All banking transactions are time synchronized with area video surveillance in real-time and includes real-time charting of specific events. Access Control These integrations with Axis, DMP, DSX, FST21, Hirsch, ISONAS, Keri Systems, Keyscan, and RBH provide for real-time access control activity and user defined, real-time on-screen event annotation. The seamless integration with OnSSI provides real-time analytics which enables users to define rules based on the text received from the access control system. These rules are then used to engage the full power of the Ocularis Event Fusion engine to push video of the event to predefined client screens, lock/unlock doors, blow horns, turn PTZs, send email and SMS alerts, etc. The C2P framework also includes a powerful text search tool, linking all texts received from the access control system with stored surveillance video. Reports are available for export as CSV files and also as video evidence. Asset Tracking Traditional asset tracking is enhanced by this integration, allowing users of Visonic RFID or generic bar code readers to see real-time onscreen notifications of asset activity, as well as email and SMS alerts. The information can be exported for video evidence or as a CSV file for reporting purposes. License Plate Recognition This LPR integration with ELSAG, HTS, Inex/Zamir, Mango, PlateSmart and Vigilant Solutions provides users with real-time onscreen confirmation of LPR activities, the ability to graph specific events, and time synchronization of all license plate reads with area surveillance video. Onscreen event connotation, email and SMS alerts, a powerful search tool for all LPR text, and stored video are included. Exports include reports as a CSV file or video evidence. Point-Of-Sale Integrations with IBM RMS, LOC, Micros, NCR Radiant, and POSitouch provide for all POS transactions to be time-synchronized with all Ocularis surveillance video. Real-time features include onscreen POS terminal activity, time graphing of specific events and POS transaction analytics enabling users to quickly find activities of interest. User-defined event annotation via onscreen messaging and push video, email and SMS alerts are also included. Video evidence can easily be exported as CSV files or displayed onscreen as a camera view. “Working with OnSSI to accomplish this integration has been a smooth and positive experience thanks to the open architecture of Ocularis 5.0,” said Paul Eaton, President and CTO, C2P. “The solution efficiently addresses the complexities of bringing together video and data for highly effective use in security applications.”

Related white papers

Security Investments Retailers Should Consider For Their 2021 Budget