Banking & Finance security applications
Retail banks and financial services companies have a long history of dealing with the risk and potential threat of criminal activity. Arecont Vision understands the unique needs of the retail banking and financial services market and provides customer-proven megapixel camera technology to specifically meet those needs for our customers around the world. Bank Crime Statistics In a typical year in the United States, according to the FBI cash losses total around $7.5 million, only about 22% of...
PVcomBank, one of Vietnam’s fastest growing and most progressive banks, has acquired a cutting-edge March Networks video surveillance system. Established in 2013 through a merger of PetroVietnam Finance Corporation and WesternBank, the Hanoi-based financial institution is a joint stock commercial bank with 115 branches throughout the country. Shareholders include Petro Vietnam with a 52 percent stake and Morgan Stanley with a 6.7 percent strategic interest. Prior to s...
Customer: The Absa Group Limited is one of South Africa’s largest financial services groups, offering a complete range of banking and wealth management products and services. Absa Bank's business is primarily in South Africa, and the group has equity holdings in banks in Mozambique and Tanzania. Absa is a subsidiary of Barclays Bank, a major global financial services provider with an extensive international presence in Europe, the United States, Africa and Asia. Challenge: Absa Bank&rsq...
Founded in 1877, Banco de Costa Rica (BCR) is the second-largest state-owned bank in Costa Rica. Today, BCR provides a broad range of financial services, including retail banking.Looking to protect its staff, buildings and financial assets, BCR has set upon a major project that will see its 4,500 employees, in 278 offices across Costa Rica, protected by an integrated hybrid CCTV and alarm system. The fundamental characteristic of the project is its implementation over unshielded twisted-pai...
Security for banks can be a real challenge when faced with a multitude of threats including: fraud, theft and physical attacks. One bank which is setting new standards in the Middle East, when it comes to the application of surveillance technology to keep its infrastructure, staff and customers safe and secure, is National Bank of Kuwait (NBK). This is thanks to the roll out of an advanced NetVu Connected CCTV solution from Dedicated Micros part of AD Group which is focused on the centralized mo...
Headquartered in Tokyo, Nomura is a top tier international bank providing investment and merchant banking services to corporate and institutional customers. With offices in all major financial centres across the globe, the mission of Nomura is to deliver superior services and solutions to meet all investment needs of their clients. To ensure they execute their mission in a safe and secure environment, Nomura has invested in a Honeywell access control solution that is expandable for the future....
One of the biggest recent security divestitures in the news was the sale of Mercury Security to HID Global, which occurred around a year ago. The seller in that transaction was ACRE (Access Control Related Enterprises), also the parent company of Vanderbilt and ComNet. We recently spoke to founder and CEO Joe Grillo, a 30-year industry veteran, about the mergers and acquisitions (M&A) market, ACRE’s future, and new opportunities opened up by the Mercury sale. Q: What’s new with ACRE? Grillo: We have an opportunity to have organic growth and to have some scale on a global basis to be a decent size player" ACRE is a company I founded in 2012, and since then we have had six acquisitions and one divestiture. We’ll never focus on ACRE as a brand, but we currently have more visibility of ACRE as a parent company with our two strong brands, ComNet and Vanderbilt. Last year was a very busy year [with the sale of Mercury Security to HID Global] because it takes as long to sell a brand as to buy one, maybe more so. Q: What’s next? Grillo: What you are seeing from us this year is that we are again in a buying mode. No announcement yet, but we expect one by the end of the year. We are well-funded, have great partners, and see an opportunity to continue to grow acquisitively as our highly fragmented space of access control continues to consolidate. From the standpoint of ACRE, with the ComNet and Vanderbilt brands, we are also doing more integration on the backside – not what the customer sees. We will continue to grow toward a $200 million business. We were there when we owned Mercury, and we will get there again. We have an opportunity to have organic growth and to have some scale on a global basis to be a decent size player. Because ACRE are owned by a private equity company, we are brought into every opportunity: ComNet is a good example" Q: Do you see the M&A market being more competitive – more companies looking to acquire? Grillo: There’s a lot of money chasing not-so-many deals, so evaluations can get expanded. But as interest rates creep up, it is definitely a challenge to find the right valuation, the right financing and the right strategic fit. It is a very strategic market. Q: There have been some big acquisitions lately. Were you guys involved at all in evaluating those opportunities? Grillo: Because we are owned by a private equity company, we are brought into every opportunity. An example of that was ComNet. I would not have been aware that the founder passed away two years ago and that there was this opportunity to own the business. So we look at everything; anything that’s out there we look at. The biggest recent announcement in our world was S2 (being sold to UTC/Lenel), and, yeah, we looked at that. It didn’t fit our profile – it was too expensive. Great business, and it’ll be interesting to see how it fits into the UTC environment. There was also Isonas [which was recently sold to Allegion], but the size didn’t add enough scale, but I like the technology. ComNet sells communication networking solutions and products, which is more attractive than video systems for ACRE Q: So what are you looking for in an acquisition? Grillo: It’s hard for us to find something that moves the needle, and you have to find that right balance. Is it something we can digest and have the financing for, and also is there room on the back end? We are private equity-owned, so we know there will be an exit for our investors, too. So we have to find the right balance, good valuations, the right size and digestible. If you look at our acquisitions, we have done two “carve outs.” The Vanderbilt name didn’t exist until we bought the business from Ingersoll Rand, and then we bought the [intruder] business from Siemens. That’s how Vanderbilt came about. You get a lot of value when you carve out a business, but there’s a lot of work. In the case of Mercury or Access Control Technology (ACT) that we acquired; they were growing and profitable but they stretch your finances a lot more. So you have to find the right mix in there. Q: Does video interest ACRE at all? Grillo: We have to find the right balance, good valuations, the right size and digestible"ComNet is our video play. ComNet sells communication networking solutions and products, and 70 to 80 percent of that is used for video systems. But unlike cameras, which don’t interest us, it’s actually good margins, highly specialized repeat business and with good channel partners. So where are we going to play? Cameras – no (because of commoditization). We have some recorder technology (from the Siemens acquisition) and we have the communication networking technology (with ComNet). On the software side, we have looked at a lot of the VMS companies, and a lot of them have been on the market. But the valuation expectations can be high because they are software companies. And we really believe in partnering as a good thing, too. If we integrate to Milestone or Salient or some of these companies, we will never lose an access control client because they chose a particular VMS. Q: ACRE is also looking to grow organically, isn’t it? Grillo: From a technology perspective, we are a product company and we are continuing to bring new products to the market with the ComNet communication networking business and the access control business. And in Europe, we have a third leg of the stool, which is the very successful intrusion and burgular alarm business we acquired from Siemens (SPC products now sold under the Vanderbilt brand). That business continues to do well and is now one of the highest performing segments in our portfolio.The intrusion and burgular alarm continues to do well and is now one of the highest performing segments in our portfolio" Q: But you don’t have to own a company to make it part of your solution. Grillo: An important word is integration. We have to integrate to all the wireless locks. We have to integrate to the VMS systems. But we don’t have to own them. Q: How has the Mercury Security divestiture impacted the rest of your business? Grillo: It has opened up the opportunity for us to look at Mercury partners as possible acquisition targets without worrying about conflicts with the very good business of Mercury. We have more flexibility now compared to the Mercury era. Q: How will the economic cycle impact the security market? Grillo: Interest rates are a much bigger issue than the overall economic cycle. We talk a lot about it with our owners – clearly interest rates are tightening up. If you go out to do acquisitions or to borrow money to do something with your business, it will be tougher than it was two years ago, and it may get worse in the next two years. Security is less impacted by the economic cycle than some industries.
In the simplest terms, video systems capture and record video. But supporting these basic operations are a growing number of other functions that expand usefulness and the ability to interact with related elements in a larger system. As video system functionality expands, we asked this week’s Expert Panel Roundtable: What is the most important function of a video surveillance system and why?
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our contemporary experience with quadcopters, we are facing a new challenging era that is far more complex to organize and regulate. Integrating Drones In Existing Regulatory Ecosystem Similar to other pioneering technologies in the past, drones need to integrate into a long existing and well-balanced ecosystem, the rules of which have first been drafted some one hundred years ago and have evolved without taking vehicles such as drones into account. Yet the safety risks related to aviation hinder the quick integration of drones into that ecosystem, broadening the gap between existing regulatory landscape and the exponentially growing popularity and ever-advancing technology of drones. The safety risks related to aviation hinder the quick integration of drones into the legislative ecosystem For the past several years, governments and legislators have been trying to tackle this problem by trying to answer two questions: how to properly integrate drones into the airspace without creating a hazardous impact on existing airborne operations, and how to enforce regulations in order to prevent the side-effects related to careless or malicious drone flights, taking into consideration public safety and physical security. Counter-UAS Measures And Regulations Up until 2018, legislators tried to tackle these two questions as a whole by introducing bundled legislation drafts covering the entire landscape of gaps they needed to address, which resulted in multi-parliamentary committee efforts both in the US and abroad to review and approve each bill - a process that is very slow by design. It was only in the beginning of this year that the issues were starting to be addressed separately: legislation related to limitations and counter-drone measures on the one hand, and legislation related to integration into airspace on the other. Let’s take a closer look at Counter-UAS (unmanned aerial systems) measures and what makes them challenging in terms of regulation. Over the past years, various counter-drone technologies have been introduced to enable control over rogue drones in order to either stop them from achieving their flight purpose or prevent them from creating safety hazards to people or property. These measures can be grouped into 3 types of technologies: Military grade solutions - including lasers and surface-air missiles Kinetic solutions - including net-guns and autonomous drones set out to catch the rogue drone and disable it airborne Non-kinetic RF-based solutions - aimed at either disabling, disrupting or accessing the drone’s communications channels in order to trigger a return-to-home function, or guide the drone into a safe landing route Aside from combat military operations, the legality of using the above technologies is questionable as they tamper with an airborne aircraft, might be considered as wiretapping and/or violate computer fraud laws. Therefore, one can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones. One can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones European c-UAS Legislation Next, let’s look at the state of c-UAS legislation in both Europe and US to better understand different legislative ecosystems and how they affect the possibilities of using counter drone measures. In the European Union, there is currently no uniform legislation, and the member countries rely on their own existing legal infrastructures. Roughly speaking, most countries use a method of exemptions to the communications and aviation laws to allow the use of counter drone measures after a close examination by the relevant authorities. Such exemptions are approved under scrutiny to particular sites, which provide some relief, but they do not allow broad use of countermeasures. Further discussion regarding a broader regulation change, on a country level or EU-wide, is only preliminary. US c-UAS Legislation Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ and DHS agenciesUnlike the EU, in the US exemptions are not possible within the existing legal framework, and the possible violation of US code title 18 means that the hands of both the government or private entities are tied when attempting to protect mass public gatherings, sports venues, or critical infrastructure. Therefore, it was more urgent to introduce legislation that would allow countermeasures to some extent. In September, US Congress approved the FAA-reauthorization act for the next 5 years (H.R. 302), which was shortly after signed by the President and came into effect. Division H of the act - Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ (Department of Justice) and DHS (Department of Homeland Security) agencies under strict limitations. However, the act avoids determining which technology the agencies should use, yet it requires minimal impact on privacy and overall safety in order to strike the necessary balance. This is the first profound counter-drone legislation and is expected to be followed by additional measures both in the US and in other countries. Updating Counter-Drone Legal Infrastructure In summary, 2018 has been a pioneering year for counter-drone legislation, and while technology already allows taking action when necessary, legal infrastructure needs further updates in order to close the existing gaps: covering additional federal assets, state-level governments, and private facilities of high importance, such as critical infrastructure sites. Legislators in the US and around the world need to continue working in a rapid tempo to keep up with the growing threat of drones. As with cars a century ago, the number of accidents will rise with the increase in time taken to regulate.
Whether you are a veteran in the access control world or have never installed a card reader before, there are always ways to increase profits in the ever-evolving world of access control. The hope is that by considering a few key focal points, you can find ways to increase market share. Whether we are releasing an electronic lock through a simple intercom button or using biometric and multi-authentication based on a database; the tactics for bringing on more revenue is the same. Learning to focus on a few key items can help open up opportunities. Business Access Controls Understanding vertical markets is a strong strategy for success in increasing your profits with access controlIf you are new to access control, it’s important to determine the right product offerings for your business model and experience level of your team. Mistakes in estimating or installing can be costly and complex. Take advantage of manufacturer training both online and in the classroom for both your sales team and installation department. It’s important to understand the fire and building codes in your area to make sure you design the proper solution for your customers. Furthermore, understanding the products, components and proper wiring can save you money in labor and materials. Today we will look at four focus points: Vertical Markets, Cloud-Based Access Control, Technology Upgrades, and Preventative Maintenance and Service Agreements. These four focal points are simple to implement and can be easily added to your current operation. Vertical Markets Understanding vertical markets is a strong strategy for success in increasing your profits with access control. The concept is that understanding a certain vertical and their security needs can increase your sales team’s marketability. If you spend your time focusing on the healthcare industry, for instance, you will see that HIPA requirements open doors for selling access control. Getting to know the regulatory concerns of different verticals is a great strategy for more effective salesHaving logs of who entered your HR files room or patient records storage is a crucial part of addressing privacy concerns. Getting to know the regulatory concerns of different verticals is a great strategy for more effective sales. Another example could be apartment communities or other multifamily dwellings. In this competitive marketplace, these complexes are looking for ways to stand out in their market. Knowing this and being able to offer amenities like secured locks with Bluetooth credentials that tenants can open with their smartphones is a selling point for you and for your customer. Building on each customer you contact within a vertical is like free sales and marketing training. The more you learn from each potential client, the more you increase your conversation starters for the next potential client. Cloud-Based Access Control With the growing cloud-based access control market, integrators can find more opportunities in small businesses and vertical markets that typically wouldn’t be on the radar of your sales team. A typical card access system often makes the move from the traditional lock and key systems to electronic card access cost prohibitive. This is due to the large upfront costs for a server, software and annual licensing. With cloud access, integrators can offer less expensive upfront costs with low monthly subscription fees that cover all software updates, database backups, security patches and more. The real benefit for the integrator is the reoccurring revenue. By helping our clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for our companies that increase our profitability. Building reoccurring revenue not only provides cash flow but also keeps your name on the top of the minds of your customer and that leads to additional sales. By helping clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for companies that increase profitability Technology Upgrades Another often overlooked opportunity is technology upgrades. Training your sales staff and even service technicians to watch out for clients with older technology can reap major benefits. When you bring new technology to your clients, you show another value that you bring to the table. Even if your client isn’t ready to make an upgrade, you can easily plant a seed that will get their minds and budgets rolling. An easy example is a customer with an older intercom door access system An easy example is a customer with an older intercom door access system. This may have met their needs 10 years ago when it was installed, but the office has grown and perhaps an integrated card access intercom system is a great technology upgrade. Bringing this to the customer will once again show that you are the “subject matter expert” and your customer will be more apt to refer you to their friends and colleagues. Another easy way to find technology upgrades is to dig through your ageing client list and build a list of potential targets that you have not visited lately. If you keep records of what was installed previously, it will make it easier to plan ahead and bring solutions to your next visit, saving your sales staff time and again building confidence with your clients. Preventive Maintenance And Service Agreements One thing that sales teams often miss is the opportunity to add service agreements and preventative maintenance agreements. Even if a customer already has an access control system, they may not have a service provider and may be interested in securing a service agreement. Typically, a service agreement can be written to cover all parts and labor or just labor for an annual feeShowing the value of a service agreement is paramount, adding annual or semi-annual preventative maintenance to your service agreement is one way to add value. Inspecting locking mechanisms, request to exit motions and buttons, door status switches, headend equipment, batteries and power supplies, can save your customer from a costly after-hours service call or the inconvenience of a non-functioning access control system during business hours. Additionally, checking computer hardware and software logs for errors can save a customer from a catastrophic failure. Typically, a service agreement can be written to cover all parts and labor or just labor for an annual fee. It is helpful to come up with a percentage of the install value that makes sense so that your sales team can easily quote a service agreement for your customer. Offering several levels of service also opens the table for negotiations. You can offer an “all parts and labor 24/7” or a “parts and labor M-F 8AM-4PM”, as an example. Offering guaranteed response times can also be a marketing strategy. Critical Area Access Management Checking computer hardware and software logs for errors can save a customer from a catastrophic failureA 24-7 facility that has 200 employees moving in and out of critical areas may be a great potential customer for a high-level service agreement with semi-annual preventative maintenance and a guaranteed 4-hour response time. Where a small office that is only open during standard business hours may be better suited for a labor only M-F with annual preventative maintenance inspection. The point is that a creative, intentional, and focused approach to access control can yield the fruit that brings long-term success to your team. Building a plan and learning from each prospect, sale, and installation will develop a process that brings results. Attending a trade specific expo like ESX will give you the opportunity to meet with manufacturers and other integrators that can help you implement a product offering and strategy for success.
ISC East is making a name for itself as a must-attend regional conference and trade show in New York City that brings together the large community of law enforcement and private sector security professionals from the Tri-State area. ISC East, being held Nov. 14-15 at New York’s Javits Center, is emerging from the long shadow of its sister show – ISC West in Las Vegas in the spring – and making its own mark on the industry. ISC East is 20% larger than last year, and exhibitors have swelled from 230 to more than 300. Familiar names at ISC East this year (who were absent in 2017) include Allegion, Arecont Vision Costar, Bosch Security Systems, and Seagate Technology. In all, there are 115 new exhibitors compared to 2017.Familiar names at ISC East this year (who were absent in 2017) include Allegion, Arecont Vision Costar and Bosch Security Systems “We purposefully make sure we reflect the region we are in,” says Will Wise, Group Vice President, Security Portfolio, Reed Exhibitions. “It’s not a mistake that both our keynote speakers have New York-centric backgrounds and have topics to reach a larger market. We want to tap into the strengths of the region.” ISC East (International Security Conference & Exposition) has come a long way in the last five years. In 2014, the show was a mere 28,000 square feet, and this year it has grown to 44,000 square feet of exhibit space. One factor driving growth has been improvements in the educational session, powered largely by show partner Security Industry Association (SIA). The two-day event is characterized by “good energy” on both days, says Wise. There is less than 10% duplication of attendance with ISC West. Liability Issues Of Event Security A big topic for New York and surrounding areas is event security, and one session covers “Confined Space Protection & Risk Mitigation for Today’s Industry Leaders.” The session will focus on safeguarding event organizers’ brands, protecting them from liability, and balancing the need for security that doesn’t negatively impact the “guest experience.” One factor driving growth has been improvements in the educational session, powered largely by show partner Security Industry Association (SIA) Liability issues of event security are especially timely now, given MGM Resorts' recent lawsuit asking the courts to protect it from legal liability in the wake of the Las Vegas massacre last October. “Event security is integration of physical security with smart technology and not being overzealous,” says James DeMeo, Founder, President and CEO of Unified Sports & Entertainment Security Consulting LLC. DeMeo’s presentation on event security is one of the “back by popular demand” sessions at ISC East – there was a big turnout for his previous sessions at last year’s ISC East and at ISC West. “A big part of event security is integrating technology, but we also need the human element,” says DeMeo. “Good guest security and harmonious relationships require a level of training that includes escalation, behavioral analysis, and communicating more harmoniously.” ISC East is 20% larger than last year, and exhibitors have swelled from 230 to more than 300 Holistic Approach And Technology Integrations From the session, DeMeo hopes attendees will take away awareness of the need for responsible social media monitoring, integration of technology, threat behavior analysis and early attack indicators, proactive risk mitigation, and staff training. The emphasis is on a holistic approach “from the top down and the bottom up,” says DeMeo. “It’s a sophisticated niche based on potential liability, and we must do everything possible to protect fans and patrons.” Crowd security is another ISC East topic that is tailor-made to the New York location of the show Crowd security is another ISC East topic that is tailor-made to the New York location of the show. A session on installation of safety and security barriers to protect pedestrians and crowds is another session that is “back by popular demand.” Rob Reiter, co-founder of the Storefront Safety Council, will present the session on protecting urban environments. Another return session is about drone security and regulations. It will provide an overview of current policy and regulatory framework and provide understanding of how to get involved in the discussion to enable drone use in security applications. Converged Security And Smart Cities A new session at ISC East this year will be “Smart Cities, Smart Buildings and the Evolution of the Converged Security Approach.” Pierre Bourgeix, president of ESI Convergent, will help attendees understand converged security and how it relates to the smart cities and smart buildings movement. Located on the ISC East exhibit floor, Unmanned Security Expo will include exhibits and demos of UAVs, UGVs and autonomous systems SIA and ASIS International will present findings from a study on how successful individuals can gain experience and skills they need to advance their security careers. Co-locating with ISC East will be the Unmanned Security Expo, which focuses on Unmanned Aerial Vehicles (UAVs), Unmanned Ground Robotics & Vehicles (UGVs), counter-drone solutions and software applications to support them. Located on the ISC East exhibit floor, Unmanned Security Expo will include exhibits and demos of UAVs, UGVs and autonomous systems. Also co-locating with ISC East will be Infosecurity North America, which includes a conference program with well-respected industry speakers, an expo floor and networking opportunities.
The initials GDPR have become synonymous with the need for companies within the European Union to provide consumers greater transparency and better control over their personal data. The General Data Protection Regulation (GDPR) has also increased awareness of privacy concerns around the world. It’s not the only factor highlighting a need for greater privacy – high-profile privacy breaches by companies such as Facebook are also driving the trend. But GDPR’s global impact cannot be denied. In fact, no company should assume that the need to address “GDPR-style” requirements is limited to the EU. As awareness has extended to the four corners of the globe, it has emboldened a new wave of laws and regulations that physical security companies ignore at their own peril. GDPR has increased awareness of privacy concerns around the world, and encouraged other areas to take notice GDPR also regulates how and if data about EU citizens can be transferred outside EU member states’ borders; the receiving country should have equal or better data protection laws in place. This factor also expands the potential impact of GDPR globally. California's Consumer Privacy Act 2020 California, which has the world’s fifth largest economy, passed a law this year that some have called “GDPR Lite.” The law gives the state’s 40 million residents the right to view private data held by companies, to correct it, to request that it be deleted and to keep it from being sold to third parties. California’s Consumer Privacy Act takes effect in 2020 and could be amended in the interim. The California law was passed quickly – and unanimously – by the state Assembly and Senate and was signed by Gov. Jerry Brown when it became clear that a ballot initiative was being organized to address the issue of privacy. In California, initiatives can be placed on the ballot by collecting signatures to require a direct vote by the electorate. Once passed, ballot initiatives are difficult to amend, requiring a two-thirds vote of state lawmakers. By passing the law, California’s legislature averted a proposed privacy initiative on the fall ballot. GDPR also regulates how and if data about EU citizens can be transferred outside EU member states’ borders There are differences in the California law and the European Union’s GDPR. For example, the California law only applies to companies that have annual gross revenues in excess of $25 million, that hold data on more than 50,000 people or that derive more than 50% of their annual revenues from the sale of personal information. Therefore, most small businesses are immune to the law’s requirements. However, the existence of the California law is a harbinger of more regulations to come, on the state or federal level. In another development related to the physical security industry, California has passed an Information Privacy: Connected Devices bill that requires electronics manufacturers to equip Internet of Things devices with “reasonable” security features – no more passwords such as “admin,” “password,” or “1234.” California’s Consumer Privacy Act is modeled under the General Data Protection Act Expanding The Definition Of Personal Information Other states are also getting involved. All 50 U.S. states have enacted breach notification laws requiring businesses to notify consumers if personal information is compromised. For example, Alabama’s new law, passed in June, applies to “unauthorized acquisition of sensitive personally identifying information in electronic form.” Many state laws are expanding the definitions of personal information and increasing cybersecurity requirements as they relate to that information. Globally, rapidly growing adoption of data protection laws is often modeled on regulations such as GDPR The problem with a “patchwork” of state requirements is the possibility that businesses may be caught unaware when state laws have different specific requirements addressing the same general mandate. At the federal level, there have been calls for a data breach notification bill that would provide a single set of rules for organizations to follow. In general, privacy is seen differently in the U.S. than in the E.U., due in part to history and a U.S. commitment to the First Amendment. The U.S. also tends to address privacy rights based on the category of information being considered; i.e., HIPAA requirements cover health information and the Gramm-Leach-Bliley Act regulates financial information. Globally, rapidly growing adoption of data protection laws is often modeled on regulations such as GDPR or on the Organization for Economic Co-operation and Development (OECD) Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. According to the United National Conference on Trade and Development, more than 100 countries around the world now have data protection legislation in place. Protecting And Managing Data All 50 U.S. states have enacted breach notification laws requiring businesses to notify consumers if personal information is compromisedWhen you consider the impact GDPR has had on the physical security market, the possible new hurdles can boggle the mind as additional privacy requirements take hold in the U.S and around the world. Challenges range from worries about management of access control and video surveillance data to concerns about biometrics. The success of new technologies using artificial intelligence (AI) depend on access to large data sets, so ensuring that data is protected and managed correctly is paramount. The genie is out of the bottle. GDPR may be driving the first wave of privacy concerns, but there is much more to come. Anyone who dismissed GDPR as a “European” factor is missing an opportunity to address issues proactively and to ensure optimum management of data privacy and transparency in the future.
Banks must meet their customers' requirements for security in a special way on many levels. Whether it is with their savings, taking advantage of over-the-counter services at a branch office, withdrawing money from the teller machines, making deposits via the cash recycling system, online banking etc. - for a long-lasting, trusting cooperation with a bank, customers demand the highest possible level of security. In order to fulfill these demands, banks rely on sophisticated hardware and software solutions that can be easily and efficiently expanded with MOBOTIX high-resolution video surveillance technology at an optimal cost-benefit ratio. Commerzbank - competent services for private and business customers With around 820 branches, a consolidated balance sheet total of more than 600 billion Euro and almost 36,000 employees, Commerzbank is the second biggest financial institution of its kind in Germany and one of the largest in Europe and in the world. The bank's large number of branches ensures a closely meshed network and customer proximity. In the branches, the trend is towards "more service for the customer" and this of course includes being able to withdraw and deposit cash "around the clock." This, in combination with a sophisticated centralized security system, reduces the threat of criminal attacks. The technical implications of this approach are considerable. Every branch has its own quasi-standardized comprehensive security package installed, in which camera surveillance plays an important role. Once a day, the relevant, locally stored events are transferred via the bank's own data network infrastructure to the bank's security center in Frankfurt and analyzed there. This meets the requirements of the Verwaltungs-Berufsgenossenschaft (VBG - German professional trade association) while keeping the usage of the data lines between the branch and the headquarters to a minimum during opening hours. The dome camera series is suitable for use inside buildings Flexible solutions for special tasks Security-related situations that cannot be solved using the standard package solutions are occurring with increasing frequency. This is where competent and creative service providers, such as ADS Networks GmbH come in, together with intelligent IP-based audio and video solutions from the technology leader MOBOTIX AG. Commerzbank required a pilot system installation in their branch in Erfurt. This branch is situated in a shopping arcade that was frequently used after closing time by numerous skateboarders to pursue their hobby. This deterred many bank customers from accessing the foyer of the building which houses the account statement printer and the ATM for cash withdrawals, thus also damaging the image of Commerzbank. The landlord's suggestion of barring the skaters from the arcade after closing time by installing rolling shutters was expensive and counter-productive since the bank customers would then have been equally unable to access the branch. The task was to present a solution that focused on the customer's needs. ADS Key Account Manager Semsettin Özünal suggested introducing MOBOTIX dome cameras to provide surveillance in the arcade. Thanks to its elegant design, the dome camera series is highly suitable for use inside buildings. The camera models are each equipped with two flexible, adjustable camera modules that can be individually positioned in all directions independently of each other. The cameras are additionally equipped with a microphone and speakers The individual models are available with a range of different lenses. Michael Wihan, branch security specialist at Commerzbank and an open-minded technician, was immediately convinced and impressed by the advantages of the easily and quickly installable solution. The high-resolution color images of the two cameras enable around-the-clock visual surveillance of the arcade by staff at the Commerzbank security center in Frankfurt. The additional data traffic on the dedicated line also proved to be no problem at all since MOBOTIX IP cameras have very low bandwidth requirements. The cameras are additionally equipped with a microphone and speakers that allow the security staff to directly address the skaters in real-time and order them to refrain from their activities. The impact was enormous. After a short period of transition, the arcade is now free of skaters and can be accessed by anyone without any concerns for security - even during evening hours. G8 summit in Heiligendamm A further security challenge for the banks was the G8 summit of the eight largest industrial countries that was held in Heiligendamm in mid-2007. The security experts at Commerzbank had to prepare themselves and take precautions against a potential threat to their branches in the Heiligendamm area by militant globalisation activists. Due to the exceptionally positive experience in Erfurt, Commerzbank again chose MOBOTIX IP camera technology. Within just a few days, the branches in Kröpelin, Roggentin and Warnemünde were visually and acoustically linked to the group's security center. MOBOTIX CCTV technology provided an ideal solution for Commerzbank After the G8 summit, the decision was made to keep the highly effective and affordable security solution in place. It had proven to be valuable both in terms of preventing threats to the branches and improving customer service. In the event of technical problems, a member of staff at the security center can directly communicate with the customer in the branch foyer via the microphone and speakers in the cameras. IP cameras in the "branches of the future" In its "branches of the future", Commerzbank wants to achieve its goal of "more service for the customer". Additional security measures were therefore needed in the self-service areas that house the ATMs. To ensure customer protection, a reliable surveillance system is required in areas where an emergency button is also installed. In order to identify criminals "creeping in" at night, MOBOTIX' high-resolution IP camera technology combined with an intruder detection alarm system offers a convenient method of providing additional, cost-effective security. The highly detailed camera images enable all required information to be extracted from the image provided by one single camera. This makes it unnecessary to install several conventional cameras cutting investment, installation and operational costs, reducing administration, simplifying data storage and alarm analysis, reducing network traffic and increasing the general reliability of the system. Additionally, customers more readily accept the MOBOTIX solution because it is visually more discreet. There is no doubt that the "branch of the future" needs the intelligent, high-resolution IP camera technology from MOBOTIX as an alternative to the increased use of security personnel or other conventional security measures. So it's a good thing that MOBOTIX communication and security technology is already available today for the branch concepts of tomorrow.
As the popularity of internet banking increases, the demand for conventional bank counter activity reduces and we see increased reliance on ATMs or other transaction devices. Making the appropriate infrastructure adaptations represents a big challenge for banks and for their security. The increasing number of unmanned areas mean that security, especially CCTV, is needed more than ever. In fact wherever cash is handled, CCTV is vital: at conventional teller counters and ATMs, at cash centres and at every step along the cash logistics chain, as well as at data centres and other data infrastructure sites.Meantime banks have also been migrating from analog video systems to IP ones, and adding HD or megapixel video. Generally in this situation their initial requirement is for hybrid solutions which can replace a mixture of different system types with one common system while incorporating their existing (predominantly analog) cameras. Geutebrucks’s re_porter_bank+ was conceived as the ideal platform to meet this need. Essentially it is an entry level ‘omnibrid’ business surveillance solution specifically designed and configured for the banking environment which can be used with analog and/or IP cameras.FlexibilityThe re_porter_bank+ is intended for dealing with the variety of situations, components and peripherals found in a large existing network of branches and locations. It comes with 4, 8, 12, or 16 analog inputs which can be expanded up to 19 Geutebruck channels with three IP sources and supports the use of many different brands of IP cameras. With 1Gbit onboard Ethernet the re_porter_bank+ offers TCP/IP-based digital matrix functionality and unlimited (LAN/WAN) integration potential. Each unit can take up to 4 hard disks for video database storage.The re_porter_bank+ has camera position analysis and motion detection features to trigger alarms if there is any tampering with the video system itself or if an intruder is detected in any sensitive areas of the site. It can of course be integrated with existing branch alarm, access control and ATM systems. So at night and out of hours it protects against break-ins and vandalism by detecting intruders, forwarding alarms to a remote control center, carrying out guard tours and documenting events. The re_porter_bank+ protects against break-ins and vandalism by detecting intruders, forwarding alarms, carrying out guard tours and documenting events ‘Omnibrid’ technologyGeutebruck’s ‘omnibrid’ technology allows the use of all current compression algorithms and standards – H.264, H264CCTV, MPEG4CCTV, M JPEG and ONVIF compliance – as well as audio recording, for analog and IP cameras. It supports H264CCTV, H.264 and MJPEG formats with freely configurable resolutions. In addition, it can transcode M-JPEG streams from IP cameras into MPEG4CCTV or MPEG4CCTV/MP (megapixel) CCTV-optimized formats. This has the advantage of enabling the user to use highly advantageous specialist CCTV processes like dual channel streaming (DCS) and dynamic live streaming (DLS) which deliver large network and storage savings.Geutebruck’s video sensors and intelligent video analysis software are well-known for their reliability, while its own specialist, CCTV-friendly, standard-compliant compression processes retain fluid motion, and consequently valuable detail, in situations where the vast majority of other H.264 implementations hesitate and shudder. A key advantage of this new omnibrid technology is that it enables video streams from third-party image sources to be processed using Geutebruck’s proven video analysis software. It therefore provides more scope for intelligent data management, enabling different compression formats to be used for different purposes, and gives system designers much more scope to achieve optimum customisations.An all-in-one banking solutionConceived as an all-in-one banking solution, the re_porter_bank+ more than meets the specifications of the BVG, the body which regulates video security systems in German banks and other cash-handling institutions. Its regulations cover details such as the location of cameras, picture resolutions, recording rates, the format of pre- and post-incident histories, evidential security and even the system maintenance regime – all with a view to deterring hold-ups, or failing that, to obtaining useful evidence of events.As a consequence of this German regulation Geutebruck has extensive experience of exchanging metadata with other systems (e.g. ATMs, access control, building management systems and others) and the capabilities of the re_porter_bank+ include some specialist functions which are now of increasing relevance and interest internationally. For example, the re_porter_bank+ was designed to fulfilll the legal requirement that all German financial institutions should document all cash withdrawals at ATM machines, whether these are on their own premises or in public areas. So where ATMs are located in foyers secured by access control systems, the re_porter can record card data when the customer presents his card to the card reader at the foyer door; video as he enters the foyer; video as he approaches the ATM; a portrait from the portrait camera as the customer’s cash card is read by the ATM; account data as the transaction is processed; video of the customer’s hand taking the cash from the ATM and then video of the scene as he leaves the foyer. In short it provides a comprehensive package of readily available, water-tight evidence on each ‘event’ which avoids the enormous costs which could otherwise be involved in investigating card fraud or vandalism.Securing banks is a company traditionGeutebruck is no newcomer to the banking sector. It owes its very existence to supplying banks with the latest security solutions. In the 1970s it was the development of an unconventional film camera which helped solve German bank robberies and brought early success to the company. Later the long-running Multiscope range of digital video platforms were used in their thousands in banks worldwide. Now Geutebruck’s GeViScope+ is the obvious choice for central banks and major institutions and the re_porter_bank+ the trusty workhorse for high street branch networks.
Refurbishment work was recently completed at the K&N Kenanga International building in Kuala Lumpur, Malaysia, a 22-storey commercial structure with a three-and-a-half-storey annexed podium block, located in Kuala Lumpur's central business district. New features of the refurbished main lobby include a physical access control system based on the contactless LEGIC technology, a food and beverage area and an information counter. Kaba Jaya Security was selected to provide electronic access control, visitor management systems and half-height sensor barriers. The system includes six lanes of Argus HSB E11 for tenants and visitors, one lane of Charon HSD E03 for disabled access, and Kaba Exos® 9300 for electronic access control and visitor management. The completed system provides the K&N Kenanga building with: Access rights management of staff and visitors Efficient reception and management of visitors No long queues during rush hour Integrated Malaysian IC reader Asset protection Increased employee safety Defined access restrictions within the security perimeter Reduced operational cost Fewer administrative expenses A flexible, integrated, efficient security solution All systems integrated One point of responsibility for all three system
This project has a main purpose and goal, which is to connect the main bank office with other bank offices and buildings to achieve secure bank data transfer between all offices. This is very necessary for the bank. In most countries, the systems used for data transfer between companies or banks are based on fiber optic networks such as PSTN and GSM. But in Iraq, the situation is different because Iraq does not have the infrastructure for this network and even if it existed, it would have likely been damaged because of the successive wars that Iraq has known. So, Fidaa Group Co. needed to find an alternative idea to manage the installed network of this bank in order to have a reliable network. Fidaa Group Co. had chosen WiMAX technology from Proxim Wireless for many reasons, which will be discussed later. This project is a premier project in the Middle East and the world using the WiMAX technology in banks network, and we hope it will help to open a new vision of WiMAX technology applications. Why WiMAX? Before Fidaa Group started to find a proper solution for the bank network, there were regular solutions like satellite VSAT connection, SCPC-SCPC, connection with public IP and dynamic SCPC-SCPC VSAT and even the shared satellite systems like DVB-S – RCS, but all of these systems shared four main problems: 1-The high costs – Satellite connections bandwidth used to reach about $3,000.00 for each 1 mbps, whereas it costs nearly $0 after initial up-front equipment costs with WiMAX. 2-The high latency – All satellite systems have minimum data packet latency about 550-750 milliseconds latency, even in ideal situations, which caused problems for real time systems and software. Many real-time applications are sensitive and require less 550 milliseconds of latency to operate synchronously. Many networking companies utilize a very complex technology to overcome these problems, but with WiMAX , this problem had already been solved because the maximum latency is about 10-25 milliseconds – which is considered very fast and suitable for real-time systems that require low latency . 3-The deployment and maintenance – Maintenance, weather affection and time to solve any network problems is very difficult especially when you have a third party network operator like PSTN, GSM, and Satellite Operators. You will not have the ability to solve the network problems compared to your private network if you don’t have a WiMAX network. 4-The security factor is very important especially in banking systems. So in the network of any establishment, it is preferred to use a private network without a third party. This will help to decrease the possibility of data sniffing or to be spied on by anyone. With WiMAX, you have this advantage because it’s your network and you can use the latest security encryptions technologies in the world and have full access of your security employees charged to monitor and control the network 24/7/365 continuously easily which is very difficult to be done in with other technologies. Challenges Fidaa Group thinks WiMAX may threaten the fiber optic network from a cost perspective The challenges of this project could be divided in two sections: the first section is related to the non secure circumstances in Iraq which make work very difficult added to the absence of electricity for more 16 hours per day. Sometimes the workers could not reach work locations for more than a week. The hard weather with a temperature up to 50 degrees Celsius in summer and the connection difficulties between the workers who are supposed to make the alignments because the GSM networks which used to stop for more than a day were also problematic. VHF handsets were also banded. When Fidaa Group looked for a project at a very low budget, the WiMAX network was thousands or millions of dollars cheaper and works extremely well with excellent reliability and low cost running, making us very thankful for this new technology. The company thinks the WiMAX with this large spectrum of frequency (2-80 GHz) and the low cost will be the leader in telecommunication technologies and it may threaten the fiber optic network from a cost perspective. So after these years, we can say that our WiMAX network is working very good, which will encourage us to make other networks for a lot of establishments and gives us more confidence in our abilities and WiMAX’s reliability. Conclusions and recommendations This project had added to Fidaa Group a new experience with the newest technology. The difficult situation in Iraq encouraged us to invent a new application for WiMAX technology in co-operation with Proxim Wireless, something which was not feasible before 2006. Departing from our experience, Fidaa Group recommends using the WiMAX technology in establishment’s networks especially in the countries which don’t have the network infrastructure or even enough budgets for other technologies or need a high secured network. Fidaa Group Company is ready to support any establishment worldwide to get full use of this technology with the lowest costs.
Security Systems Design Limited has successfully completed the installation of a Samsung CCTV system at the London offices of the Commonwealth Bank of Australia. Following a refurbishment of its offices on the third floor of Senator House in Queen Victoria Street, EC4, the Bank asked Richard Slee, a Director of Security Systems Design Limited, to design a CCTV system which could assist security personnel to provide a high level of protection for staff as well as the Bank's assets. The Commonwealth Bank of Australia employs 38,000 people worldwide. Staff at its London offices are responsible for developing strategic partnerships with European banks and they also assist migrants to relocate their finances to Australia. "Senator House is a multi-tenanted office building and although no cash is handled on the premises, the Bank nevertheless needs to maintain strict control over visitors, welcome or otherwise," said Richard Slee. "The objective therefore was to install a CCTV system to work alongside an existing access control system." Richard worked closely with the Bank's Facilities Manager to draw up the specification for the system which included a requirement that all cameras should have day/night capabilities, as well as built-in lighting so that high quality color images could be captured during the day and equally good monochrome images in night time conditions. "We considered cameras as well as digital recording equipment from a number of manufacturers. We came to the conclusion that we could source all that was required from Samsung who were able to demonstrate confidence in the reliability of their equipment by offering a full three year warranty," added Richard Slee. "The other important factor that helped us make the decision to use Samsung equipment was that its DVRs are supplied with license-free CMS (Centralized Management Software) which makes it very easy for the Facilities Manager to monitor the CCTV system from a PC on his desk." The Samsung SIR-60 day/night domes capture high quality color images in any environment with its built-in LEDs Security Systems Design Limited installed Day/Night dome cameras with built-in LEDs. The dome cameras can capture very high quality color images at 580TV lines resolution during the day. At night or in any environment where there may be zero light, the camera's built-in LEDs are activated and provide effective lighting up to a distance of seven metres. At the same time, the camera switches to monochrome mode generating superb monochrome images at 700TV lines resolution. The brightness of the LEDs is automatically adjusted to take into account how far away an object or person is from the camera. Images from the nine cameras are recorded simultaneously onto a Samsung DVR which uses a highly efficient MPEG-4 compression method to ensure that the three terabytes of on-board video storage capacity is more than enough to record all activity throughout the Bank's offices. The SVR-945 is located in the Bank's secure comms room. "In the current economic climate, the client was understandably looking for a solution which would not put undue strain on the budget available for security equipment," added Richard Slee. "I am pleased to say that we have been able to provide equipment which can be regarded as the best in its class and is able to exactly match the Bank's demanding requirements."
The Milestone Systems open platform IP video management software is an important tool for Loomis Denmark to ensure transparency throughout the entire cash services process. The transport and counting of cash, financial documents and other valuables is a business that demands ongoing attention to security, which is well covered by Milestone XProtect Corporate managing network cameras from Axis and megapixel cameras from IQinVision documenting every detail of the activities."For us security has the highest priority, for obvious reasons. Our customers' livelihoods are literally in our hands when we carry out our work, so it is therefore vital that there is a strong relationship of trust. And this relates not only to our customers but also just as importantly to our employees, who handle all the assets on a daily basis," explains Risk Manager Tom Andersen at Loomis.Loomis utilizes a number of security measures, where video surveillance plays a big role. Every day over 100 cameras in the Glostrup location and a similar number in the city of Brabrand help to ensure that all procedures and security processes are being upheld. Thereby Loomis makes sure that every instance of cash handling is documented so any eventual irregularity can quickly be resolved. The surveillance technology is based on Milestone Systems open platform IP video management software, XProtect Corporate, with network cameras from Axis and IQinVision. With just a few clicks, operators can control different cameras at the same time and view the live or archived video from any location. Loomis monitors all the entrances and exits, cash handling areas, receiving and deliveries, in addition to the outer perimeters of their premises. The 1st of April 2008 is a day that Loomis will never forget. That night at 3:32 a.m. the police received a robbery alarm from Loomis: a group of men had busted into the cash handling company's building by breaking a hole through the wall with a telescope laser, and managed to get away with DK 62 million. The biggest robbery in the history of Denmark thereby became a reality, despite all of the security measures they had in place at that time. Loomis immediately went to work reviewing all their procedures and systems to improve their security even more. "Of course the robbery sharpened our focus on security! Our business always has to live with the risk of robberies but we can make it more and more difficult for any attempts by dividing our security elements and defences into different levels that hinder and delay any criminal efforts so much that the police can manage to arrive and deal with it. One of our important components is the video surveillance, which is also a fantastic tool for the police to use as evidence in their work," says Tom Andersen, who emphasises that Loomis makes ongoing changes to their security procedures all the time.When the robbery occurred, Loomis had operations at night for cash counting so there were employees present at the time of the incident. Today, Loomis only operates during the day, and another part of the increased defense of the building includes new alarms installed to warn when anyone is even getting near the building from the outside. Loomis previously had an analog system that became outdated, so after a thorough review of their security needs in collaboration with SmartGuard, a Certified Milestone Partner, it became clear that the open platform IP video solution from Milestone Systems provided all of the right options. Transparency and documentation for top integrity The open platform IP video solution from Milestone Systems provided all of the right options for Loomis When an employee is hired, he or she must go through a series of security procedures such as credit and police arrest record checks. Yet even though Loomis takes all these precautions, it is still necessary to have an extra guarantee of accountability, which the video surveillance ensures. Today there are many cameras in the work stations. The zoom functions in the software combined with the megapixel cameras from IQinVision deliver the sharpest images of money bags being opened, and the money counting is monitored from different angles. The video information can be compared with the customers' records so any eventual differences can be revealed and resolved. This saves time and provides thorough documentation and integrity for the asset management process. "With the video surveillance we can document that we do our work properly and this strengthens our objective role with our customers. The video also helps us ensure things for our employees: should anything questionable come up, we can immediately go back in the recorded video and see that the task was handled correctly," says Andersen."The reason that we chose Milestone was precisely because the solution includes an intelligent SmartSearch function that lets us click quickly to the exact date and time for the scanning of a particular money bag and view it. We can also look for an object that's disappeared simply by marking it in the images," he adds, and concludes: "The video monitoring makes it possible for us to live up to our promise of transparency and documentation for our customers. And the Milestone open IP platform also allows us to integrate the system with other innovative solutions over time. This creates a high level of flexibility, and is just one of the ways in which we have future-proofed our business."