Banking & Finance security applications
Brian Ishikawa has always kept tight control over his video surveillance system, allowing only authorized personnel within his corporate security division to access video footage. So it was a change for Ishikawa, Senior Vice President and Director of Corporate Security for the Bank of Hawaii, to get used to the idea of authorized staff from the bank’s branch division being able to review video for operational, compliance and marketing-related purposes. The insights collected from the vide...
Retail banking combines a demand for high security with complex workflows. Staff need efficient access. Facility managers need the flexibility to design access permissions around individual needs, so not everyone can access every area whenever they choose. Nobody wants to carry or track large numbers of keys. These were the requirements, managers of Creval — a regional bank in Italy — faced when seeking an alternative to a mechanical master-key system. Creval needed new access contr...
Retail banks and financial services companies have a long history of dealing with the risk and potential threat of criminal activity. Arecont Vision Costar understands the unique needs of the retail banking and financial services market and provides customer-proven megapixel camera technology to specifically meet those needs for our customers around the world. Bank Crime Statistics In a typical year in the United States, according to the FBI cash losses total around $7.5 million, only about...
As technology continues to catapult forward at a significant pace in the 21st century, banks are increasingly facing new security challenges to safeguard their buildings, staff, customers, and financial operations. Because of this, it is critical that banks invest in security systems that meet the complex and unique requirements of the financial environment. Vanderbilt’s SPC provides this solution through advanced, dedicated intruder detection features and products for banking applic...
Financial institutions of all sizes demand simple, reliable solutions to protect against fraud, theft, and accidents in the workplace. Advancements in camera resolution and storage capabilities have put pressure on banks and credit unions to upgrade their video surveillance systems. Upgrading to a modern, economical NVR server will greatly increase system performance and scalability for small-budget projects with benefits seen across both loss prevention and business insights. Reliable High Per...
To the lay person they appear to be simple LED light spots going back to the original style of illumination of the old 1800s palace (1876) that currently houses the Italian Ministry of Economy and Finance, and that historically represents the first great building of the newly reborn Roman capital, as commissioned by the former Minister Quintino Sella. Hidden In Plain Sight The carefully hidden technology, however, transforms each of the 20 light points (appropriately designated “Roma lig...
Booth number: 14039 Dahua Technology USA Inc. will display video surveillance solutions, access control and intercoms at ISC West. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. The first year that we exhibited at ISC West was in 2012. That was before we had a local US operation. The market started to pick up our brand and was surprised that we offer extensive product portfolios. In 2014, we registered our US office and continued to participate in ISC West. Through our presence at the show, customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints. We are local here and help our customers to grow their business and increase their satisfaction with us. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization Q: What strategies do you use to get the most out of exhibiting at ISC West? A trade show is definitely a lot of investment within a few days. Therefore, how we create the best ROI and meet the right customers are very important. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organization, including products and technical expertise as well as the sales team. We use an internal and highly coordinated plan with the team to get a better result. We make sure everyone is on the same page in terms of the products/technology we are going to present and have the people with the best knowledge to present to customers who visit our booth. Therefore, a highly coordinated team strategy is required. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Every company has their ways to follow up with the leads and evaluate the ROI from the show. The way we are using is to upload all our leads to our software and track all these leads afterwards. If they are not already buying from us, our goal is to convert them to become a registered dealer. Customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints If they are already our registered dealers, we seek to grow their business by using our latest technology solutions. In general, all marketing activities in business today require a clear ROI, and it has to tie into the sales numbers. From our experience, the ISC West show provides the best ROI among other shows in the North American market. Q: What company activities (outside the show floor) does your company organize each year? We have a partner event and invite our value-added dealers and partners. We’ve been hosting this event since 2015. Q: What sets ISC West apart from other trade shows on the calendar? As I mentioned, ISC West provides the highest ROI among other shows in the North America market. This show also brings many of our customers and partners to the city as well. I guess people value this opportunity to meet and discuss the technology, the industry trends, and the business to figure out how we can grow together. Other trade shows might be smaller than ISC West and targeted at different markets or address different scopes of the industry need. Every show we attend in 2019 plays a strategic role for us to communicate with the market and find the customers we are looking for.
Booth number: 8045 Costar Technologies, Inc. is a public company that designs, develops, manufactures and distributes a full range of products for the video surveillance and machine vision markets. Costar consists of five operating companies: Arecont Vision Costar, CohuHD Costar, Costar Video Systems, Innotech, and IVS Imaging. The combined product portfolio consists of surveillance cameras, video surveillance systems, recorders, monitors, lenses, cables, accessories, and cloud-enabled services. For more about their presence at ISC West, we contacted Jeff Whitney, Vice President of Marketing for Arecont Vision Costar, a Costar Technologies, Inc. business unit. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. One of our companies, Arecont Vision, exhibited in ISC West booth 17147 in 2005, a tiny space on which the hopes of the company rested. At the time AV was focused on pioneering IP megapixel surveillance cameras, but today we are part of Costar Technologies, offering cameras, VMSs, and recorders. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry. Talking with those who were with the company at time, the enthusiasm of the booth team reached the security dealers and systems integrators who were attending, helping bring megapixel cameras to a much wider audience. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The Costar companies have a very deep portfolio of products for the security market, and we bring our latest products from each business unit to ISC West. Attendees come in part to see the latest tech, and we drive our development cycle to have exciting new products to unveil on the show floor. We also have meeting space in the booth to provide one-on-one time with our executives and sales team, while sponsoring free admission to the expo for all who want it. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Unveiling our latest products and solutions to existing customers and partners is key to a successful event, and ISC West’s large impact on the industry ensures that many will attend. Perhaps even more important is informing those attending of the strength of the Costar product portfolio, including many Made in USA products and services that others don’t deliver. Both help to drive leads for projects in which we can really benefit our partners and end user customers. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? A large show like ISC West brings many of the Costar business units together, providing an excellent opportunity to continue bonding as a team, as well as to participate in events beyond the show floor. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West brings a very large number of interested, security-focused systems integrators, dealers, consultants, and end user customers all to one place for a three-day expo. That audience and opportunity to share our message validates the investment any large show requires from Costar or others. While some industry events have struggled to find and maintain their audiences, ISC West continues to deliver quality, knowledgeable attendees from across the Americas and around the world. The show differs from other events we do, which are typically regional in attendance or focused more on specific vertical markets.
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. We have come a long way from a little-known surveillance manufacturer with a small booth size VIVOTEK has been an exhibitor at ISC West for many years now. Looking back, we have come a long way from a little-known surveillance manufacturer with a small booth size to one of the global providers in the security industry with a recognizable and trusted brand. Now, we are well-known in the industry and are proud of our accomplishments, but we feel greater things are still in front of us. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? Each year, we want our booth to tell our stories – who we are, what we do and what we are capable of, and where we are heading. We do not want to just be another camera manufacturer who only promotes and displays products; we want to be the solution provider that customers are looking for. In addition, we have very knowledgeable sale managers who can assist visitors at our booth who are looking for surveillance, whether it’s an upgrade or a totally new solution. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Gain industry knowledge and perspective as to where surveillance security industry is heading Like any trade show, it is difficult to quantify success. We attend ISC West to promote the VIVOTEK brand, meet and discuss with customers and gain industry knowledge and perspective as to where surveillance security industry is heading. If we achieve these, then ISC West is a success for us. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? Our main focus each year at ISC West has always been the interaction with customers and potential customers on the show floor. We pride ourselves in the products and technology we offer, and there aren’t any other trade shows in North America to showcase our capabilities than ISC West. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? ISC West is the industry standard of security trade shows in North America. Since we are a security surveillance manufacturer, ISC West is the one show that all manufacturers in this industry must attend.
Booth number: 26041 March Networks is a global provider of video surveillance and video-based business intelligence solutions. Their product portfolio is end-to-end, ensuring that customers can deploy comprehensive solutions designed to help them address real business challenges and improve performance. At ISC West this year, March Networks will be showcasing new hosted services, new PTZ cameras and additional offerings. Attendees will also be encouraged to discover their solutions for banking, retail, cannabis and transportation – all of which help organizations transform video into business intelligence through the integration of surveillance video, analytics, and data from business systems and IoT devices. For more about their presence at ISC West, we contacted Peter Strom, President and CEO, March Networks. And not surprisingly, the technology was a lot less sophisticated compared to what we see today Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. I believe March Networks first exhibited at ISC West in 2001. I did not join the company until 2003, however I had been working in the industry for several years already, and can recall that the exhibitions back then had a much different feel. For one thing, there weren’t the very large companies we see today dominating a lot of the landscape. And not surprisingly, the technology was a lot less sophisticated compared to what we see today. Anyone who has worked in physical security for a long time can attest to the remarkable shift we have seen over the years, first with the transition from analog to IP video and all that entails, to security analytics, to today’s truly advanced business intelligence applications, hosted solutions, and artificial intelligence, computer vision and similar content analytics. Q: What strategies do you use to get the most out of exhibiting at ISC West? Our most effective strategy by far is scheduling our business meetings in advance of ISC West. Our sales team does a very good job of planning meetings with enterprise end users and channel partners ahead of time, so we’re hitting the ground running even before the doors open on Day 1 of the event. In addition, our channel partners are also very well organized, and know which organizations they are going to bring to our booth during ISC West. This pre-planning saves us a tremendous amount of time and ensures that we make the most of the opportunity to meet face-to-face with the many decision-makers who have traveled to the show. The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year Q: How do you quantify your success at ISC West? What ROI do you receive from the show? The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year. Of course we do track the number and quality of the leads we capture as well; however, our face-to-face meetings with end user organizations and channel partners are the primary measures of our ROI. Q: What company activities (outside the show floor) does your company organize each year? The activities we organize outside of the show floor vary from year to year. We have hosted customer appreciation events and roundtable events. We will typically organize an internal sales meeting as well to take advantage of the fact that many of our salespeople and product managers are in the same location. Q: What sets ISC West apart from other trade shows on the calendar? The timing of ISC West is good for most people, as it is still early enough in the budget cycle for most customers to leverage the show to help make decisions – particularly in our banking, retail, cannabis and transit target verticals. Holding the event consistently in Las Vegas is also beneficial, as it makes it easier for people and exhibitors to plan in advance. The city itself is well equipped to handle large exhibitions, offering everything from a central conference space at the Sands to the convenience of nearby accommodations, restaurants etc. Travel is typically convenient as well. In our opinion, ISC West is the premier industry show in North America and appears to be gaining momentum each year.
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valuable business intelligence analytics; TurboHD (HD over coax) for high resolution video using existing cabling; PanoVu and multi-sensor cameras. We will also feature Hikvision’s central management system, HikCentral, which provides a highly-scalable, reliable, and efficient centralized system management. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience? Hikvision has exhibited at ISC West since 2006. Our presence has grown considerably since then. Each year we showcase Hikvision’s latest technologies and the evolution of the brand through ad campaigns: “Heartbeat of Security” (2016), “Art of Video Surveillance” (2017), and “Achieve Extraordinary” (2018). At ISC West, Hikvision enjoys re-connecting with existing customers and developing new partnerships. Over the years, Hikvision has demonstrated growth and strength within the industry and will continue to support its partners through the dedicated workforce that makes up Hikvision North America. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? The strategy is simple. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners. With our latest products displayed at our booth and our team of product managers, vertical-market leaders, and other technical gurus readily available in one place, it’s a great opportunity to connect with our current and future partners. Of course, we also have one-on-one client meetings in our meeting rooms throughout the show. And, we also host interactive experiences including trivia games, product demonstrations, and other technical presentations at the Thought Theater in our booth. Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? Hikvision quantifies its success with a variety of metrics including traffic throughout the booth, attendance at educational sessions we host, the number of meetings we conduct with customers, and responses from our sales team on the engagement with integrators and end users after the show. We also measure the feedback we receive from our advertising campaigns whether it’s through our signage at the show or coverage in publications. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners, and end users. We consider it a fun way for us to say thank you to our valued partners in a casual setting. We’re also an enthusiastic sponsor of the Mission 500 Security 5/2K. Hikvision is fielding a running team, and we’ve begun our fundraising in earnest. Corporate social responsibility is part of our DNA at Hikvision, and the Security 5/2K is a wonderful way to join with our security industry colleagues to make a difference in kids’ lives and give back. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? Hikvision attends a variety of important conferences and trade shows throughout the year, but ISC West is the big show that attracts international attendees that everyone looks forward to. We wouldn’t miss it.
Booth number: 20031 Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond Pelco’s priorities for 2019 at ISC West are informed by worldwide trends in the security industry. As a result, Pelco will be focusing on enhancing cloud connectivity and cybersecurity for their customers. In addition, VideoXpert is Pelco’s best-selling video management solution, so this system will be the primary solution focus moving forward. Pelco is also planning to build upon Pelco Professional Services, which will include VxCare, a three-tier service plan for VideoXpert owners available worldwide this May. Overall, Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond. Q: What Was The First Year Your Company Exhibited At ISC West? Please Share Your Remembrances Of That Experience. Pelco was established in its current form around the year 1987, we have been attending ISC West since at least then. One memory that stands out is having to make many coax cables connect with all the analog cameras and switchers. Q: What Strategies Do You Use To Get The Most Out Of Exhibiting At ISC West? We truly value the media relationships we’ve nurtured over the years. The security trade media specifically have played a pivotal role in sharing the latest news as it relates to our industry and ISC West. In addition to media relations, e-mail blasts and blogs are also key tools to build buzz around our exhibit. Lastly, we utilize a playbook and training protocols developed for our sales department. This information ultimately benefits our customers because they will receive accurate and up-to-date information about our video surveillance solutions. One way we quantify our success at ISC West is to keep track of the number of people attending our booth Q: How Do You Quantify Your Success At ISC West? What ROI Do You Receive From The Show? One way we quantify our success at ISC West is to keep track of the number of people attending our booth. The show is considered the premier event in North American security so a major way we measure our ROI is through initial or final meetings with customers and partners. These initial connections can happen on or near the show floor. In addition, our product managers and engineers create a dialog with our customers so they can determine the transferrable value of a potential solution, which in turn influences our product world map. Q: What Company Activities (Outside The Show Floor) Does Your Company Organize Each Year? We have participated in the Security 5K in support of Mission 500. Additionally, we sometimes host customers at local end user sites so they get to see the system in operation. Q: What Sets ISC West Apart From Other Trade Shows On The Calendar? It’s the best-attended security conference in North America by far, attracting both domestic and international visitors.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centers and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialized care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in pediatric health care, education and research. comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priorityAlso crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-Critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organization's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organizations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realizing it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyze a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analog technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organization open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organization is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organization is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organizations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organization, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR world. Large cloud environment But modern applications are difficult to secure. SaaS based, web, mobile, or custom made all work on different platforms and frameworks. It’s a headache managing all the APIs needed to automate and sync tools. This introduces risk. The greater the number of apps the broader the attack surface and therefore the greater the chance there will be blind posts. Keeping up to date with updates and new security policies is never easy There are also added hazards. Applications are always changing. Keeping up to date with updates and new security policies is never easy, but especially hard in a large cloud environment. Failure to adopt changes puts the organization and customers at further risk. But the biggest obstacle is keeping applications and APIs out of harm’s way. It’s a near on impossible task when attack methods and sources are constantly changing. More advanced threats To be specific there are four emerging challenges when it comes to protecting apps. Firstly, managing the good and the bad bots and spotting which is which, secondly securing APIs as IoT adoption intensifies, thirdly the relationship between securing apps and DevOps and ensuring ownership of security, and finally denial of service attacks that use newer tactics such as brute force. Basic security hygiene dictates that security teams refer to the OWASP Top 10. It’s considered the ‘ten commandments’ in security circles, providing a starting point for ensuring the most common threats and vulnerabilities are managed, detected and mitigated. Web Application Firewalls also come into the fray with guidance on testing for the ways hackers exploit vulnerabilities. However, though the basics are good to have in place, there are always more advanced threats to take care of. Bots being a big one. Bot management The more sophisticated bots will go as far as to mimic human behaviorAstonishingly about half of internet traffic is bot generated. Half of it is from bad bots. Discerning the good from the bad isn’t easy though and explains why around 80% of organizations can’t make a clear distinction between the two. Bad bots can do a lot of damage like take over user accounts and payment information, scrape confidential data, or hold up inventory and skew marketing metrics. The more sophisticated bots will go as far as to mimic human behavior and bypass tools like CAPTCHA and even device fingerprinting based protection ineffective. Securing APIs Then there’s the complications derived from machine-to-machine and internet of things (IoT) communications. The more integrated ‘things’, the more data there is, the more events there are report on, and the more activity there is reliant on APIs to make the ‘things’ useful and agile. That’s what makes them a target and the threats to API vulnerabilities include injections, protocol attacks, parameter manipulations, invalidated redirects and bot attacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks Denial of service (DoS) You might think there’s little to add to the swathes of denial of service warnings. Yet when businesses are still being targeted and feeling the ill effects it’s worth mentioning again that different forms of application-layer DoS attacks are still very effective at bringing application services down. Even the greatest application protection is worthless if the service itself can be knocked down This includes HTTP/S floods, low and slow attacks (famous examples being Slowloris, LOIC, Torshammer), dynamic IP attacks, buffer overflow, Brute Force attacks and more. The IoT botnets are the culprits and have made application-layer attacks so popular that they have become the preferred DDoS attack vector. Even the greatest application protection is worthless if the service itself can be knocked down. Continuous security It may seem easy to say but for modern DevOps, agility is valued at the expense of security. We see time and again examples of where development and roll-out methodologies, such as continuous delivery, mean applications are exposed to threats each time they are modified. There’s no doubt it is extremely difficult to maintain a valid security policy and protect sensitive data in dynamic conditions without creating a high number of false positives. But we now find that this task has gone way beyond the capability of humans. Organizations now need machine-learning based solutions that map application resources, analyse possible threats, and create and optimise security policies in real time. Reaching this level in security planning should be a big wake-up call that security automation is an essential not a nice to have. Running security plans The board needs to know that investment is critical to protect their profits It’s critical that the security solution your company adopts protects applications on all platforms, against all attacks, through all the channels and at all times. The board needs to know that investment is critical to protect their profits. As such there are six things they need to know: Application security solutions must encompass web and mobile apps, as well as APIs. Bot management solutions need to overcome the most sophisticated bot attacks. DDoS mitigation must be an essential and integrated part of application security solutions. A future-proof solution must protect containerized applications, severless functions, and integrate with automation, provisioning and orchestration tools. To keep up with continuous application delivery, security protections must adapt in real time. A fully managed service should be considered to remove complexity and minimise resources. No amount of human power will beat the bots. That last point is the most critical. Skill is essential in designing and running security plans and policies that work. But the plans can’t be executed without automated tools. There are just too many decisions to make in a split second. Combining both is the path to an effective app protection strategy and a stronger brand to boot.
As political winds present new challenges for Chinese companies doing business in the U.S. market, the countdown is under way to implementation of a ban on sale of Chinese manufacturers’ video surveillance products to the Federal government. Some good news is a delay enacting the wider-reaching “blacklist” aspects of the ban. Meanwhile, possible sanctions to prevent U.S. manufacturers from selling components to Chinese companies are posing immediate public relations difficulties – and the possibility of eventual more tangible ones. Chinese ban imposed by U.S. government The “Chinese ban” provision [[Paragraph (a)(1)(a) of section 889 of Title VII of the National Defense Authorization Act (NDAA) for FY 2019] prohibits Federal government procurement of “equipment, systems, or services provided by specified entities.” The “specified entities” are Huawei Technologies Co., ZTE Corp., Hytera Communications Corp., Hangzhou Hikvision Digital Technology Co. and Dahua Technology Co. Hikvision and Dahua are two of the largest manufacturers of video surveillance equipment, and Huawei manufactures HiSilicon chips widely used in video cameras. NDAA specifies that the ban be implemented within a year of the law taking effected The “Chinese ban” provision is an open Federal Acquisition Regulations (FAR) Case, and a proposed FAR draft rule is due in early June. NDAA specifies that the ban be implemented within a year of the law taking effected (signed by President Trump on August 18, 2018). Blacklisting Chinese video surveillance parts Implementation of a “blacklist” provision has been spun off into a separate FAR Case, and enactment has been delayed allowing time for public comments on its ramifications. The provision [Paragraph (a)(1)(B) of section 889 of Title VII of the National Defense Authorization Act (NDAA) for FY 2019] addresses “entities that use covered equipment.” As it relates to the video surveillance market, this provision has been interpreted to mean, for example, that an integrator that sells Hikvision equipment to anyone (e.g., to a small retailer) would be banned even from selling non-Hikvision equipment to the U.S. government or ‘recipients of Federal loan or grant funds.’ Obviously, this represents a broader impact on the industry compared to the Chinese equipment sale ban. The government’s stated reasons for the delay include concern about a dramatic reduction in the available industrial base Reduction in available industrial base The government’s stated reasons for the delay include concern about a dramatic reduction in the available industrial base (including small business suppliers), who will no longer be able to sell to the government, either because their non-government business is more valuable, or due to the cost of the potential regulatory burdens associated with compliance. Another concern is that Federal grant recipients in rural areas may be ‘disproportionally impacted … due to the limited number of market options in rural areas.’ The delay will allow time for a public meeting to solicit input on the proposed rulemakingThe delay will allow time for a public meeting to solicit input on the proposed rulemaking. In fact, the Department of Defense (DoD), General Services Administration (GSA) and NASA (National Aeronautics and Space Administration) are hosting a public meeting on July 19 from 9 a.m. to 3 p.m. at the Department of Interior (DOI) Auditorium in Washington, D.C. Interested parties may also attend virtually via the Internet. NDAA ban on Chinese technology, equipment Furthermore, a proposed rule of implementation will be published, followed by a second public meeting. The Office and Management and Budget will solicit feedback on proposed changes to existing grants and loans and consider public comments and feedback prior to finalizing changes. The White House has sent a legislative proposal to Congress to "adjust certain implementation deadlines to allow for additional stakeholder engagement." The Federal Acquisition Security Council would be tasked with submitting a report “containing a discussion and recommendations regarding any changes required for effective implementation of that section.” Do these processes represent hope for leniency? Hikvision targeted in ban The NDAA ban is one of several issues facing Chinese companies in the U.S. market The NDAA ban is one of several issues facing Chinese companies in the U.S. market. Another is snowballing backlash about the involvement of surveillance companies in human rights abuses at detention camps in the Xinjiang region of China. For example, a number of Congressmen and Senators have sent a letter asking the U.S. State Department and Treasury to impose sanctions, export controls and financial disclosures to counter the human rights abuses. In response, Hikvision has retained human rights expert and former U.S. Ambassador Pierre-Richard Prosper to advise the company regarding human rights compliance. According to a company spokesperson: “Hikvision takes these concerns very seriously and has engaged with the U.S. government regarding all of this since last October.” (See Hikvision USA’s full statement here.) Furthermore, Hikvision expressed optimism at the ISC West trade show. The Trump administration has also singled out Hikvision and is considering seeking limits on the video surveillance giant’s ability to buy American technology, similar to a ban already implemented against chipmaker Huawei. HiSilicon chips, manufactured by Huawei, currently run millions of security cameras across the United States, and several video camera manufacturers are rethinking their use of HiSilicon chips in wake of the ban.
IFSEC Global, like any large trade show, can be daunting for attendees. At big shows, there can be hundreds of physical security manufacturers and dealers vying for your attention. As the scope of physical security expands from video surveillance and access control to include smart building integrations, cybersecurity and the Internet of Things (IoT), there is an increasing amount of information to take in from education sessions and panels. With IFSEC Global approaching next week, we present eight hints and tips for visitors to make the most out of trade shows: 1. Outline Your Objectives As the famous saying goes, “Failing to plan is planning to fail!” Once you know your objectives, you can start to research who is exhibiting Before you plan anything else, ensure you know what you need to achieve at the show. By clearly noting your objectives, you will be able to divide your time at the show appropriately, and carefully choose who you speak to. If there is a particular project your organization is working on, search out the products and solutions that address your security challenges. If you are a security professional aiming to keep up with the latest trends and technologies, then networking sessions and seminars may be more appropriate. 2. Bring a standard list of questions Prepare a list of specific questions that will tell you if a product, solution or potential partner will help you meet your objectives. By asking the same questions to each exhibitor you speak to, you will be able to take notes and compare their offerings side by side at the end of the day. This also means you won’t get bogged down in details that are irrelevant to your goals. 3. Do your homework Once you know your objectives, you can start to research who is exhibiting and decide who you want to talk to. Lists of exhibitors can be daunting, and don’t always show you which manufacturers meet your needs. Luckily, most trade show websites provide the option to filter exhibitors by their product category. Once you know your objectives, you can start to research who is exhibiting and it may be easier to download the floor plan to your phone/tablet Many exhibitions also offer a downloadable floor plan, grouping exhibitors by product category or by relevant vertical market. It may be easier to download the floor plan to your phone/tablet or even print it out, if you don’t want to carry around a weighty map or show-guide. 4. Make a schedule Once you have shortlisted the companies you need to see, you can make a schedule that reflects your priorities. Even if you are not booking fixed meetings, a schedule will allow you to effectively manage your time, ensuring you make time for the exhibitors you can’t afford to miss. When scheduling fixed meetings, keep the floor plan at hand If the trade show spans several days, aim to have your most important conversations early on day one. By the time the last afternoon of the show comes around, many companies are already packing up their booth and preparing to head home. When scheduling fixed meetings, keep the floor plan at hand to avoid booking consecutive meetings at opposite ends of the venue. This will ensure you can walk calmly between stands and don’t arrive at an important meeting feeling flustered! 5. Make time for learning If you’re on a mission to expand your knowledge in a given area, check the event guide beforehand to note any education sessions you may want to attend. Look for panels and seminars which address the specific needs of your project, or which will contribute to your professional growth. This is one of the best opportunities you will have to learn from industry leaders in the field. Be sure to plan your attendance in advance so you can schedule the rest of your day accordingly. Check the event guide beforehand to note any education sessions you may want to attend and be sure to plan your attendance in advance 6. Keep a record Armed with your objectives and list of questions, you will want to make a note of exhibitors’ responses to help you come to an informed decision. If you’re relying on an electronic device such as a smartphone or tablet to take notes, you may like to consider bringing a back-up notepad and pen, so you can continue to take notes if your battery fails. Your record does not have to be confined to written bullet points. Photos and videos are great tools remind you what you saw at the show, and they may pick up details that you weren’t able to describe in your notes. Most mobile devices can take photos – and images don’t need to be high quality if they’re just to refresh your memory. 7. Network – but don’t let small talk rule the day It may seem obvious, but don’t forget to exchange business cards with everyone you speak to It may be tempting to take advantage of this time away from the office to talk about anything but business! While small talk can be helpful for building strong professional relationships, remember to keep your list of questions at hand so you can always bring conversations back to your key objectives. Keeping these goals in mind will also help you avoid being swayed by any unhelpful marketing-speak. It may seem obvious, but don’t forget to exchange business cards with everyone you speak to, or even take the opportunity to connect via LinkedIn. Even if something doesn’t seem relevant now, these contacts may be useful in future. Have a dedicated section in your bag or briefcase for business cards to avoid rummaging around. 8. Schedule time for wandering With your most important conversations planned carefully, there should be time left to explore the show more freely. Allowing dedicated time to wander will give you a welcome break from more pressing conversations, and may throw up a welcome surprise in the form of a smaller company or new technology you weren’t aware of. Allowing dedicated time may throw up a welcome surprise in the form of a smaller company or new technology you weren’t aware of Security Trade Show Checklist Photo Identification: As well as your event pass, some events require photo identification for entry. Notebook and pen: By writing as you go, you will be able to compare notes at the end of the day. Mobile device: Photos and videos are great tools to remind you what you saw at the show, and may pick up details you missed in your notes. Paper schedule and floor plan: In case batteries or network service fail. Business cards: Have a dedicated pouch or pocket for these to avoid rummaging at the bottom of a bag. Comfortable shoes: If you’re spending a whole day at an event, and plan on visiting multiple booths, comfortable shoes are a must!
Panasonic is selling off 80% of its video surveillance business to a private equity firm but will retain 20%, and the new company will continue to use the well-known Panasonic brand. The move is aimed at reinvigorating a business challenged by new competition from large Chinese companies and lower prices of video surveillance equipment. Strategic business alliances Panasonic is establishing a new company made up of its security systems business, and Polaris Capital Group Co. will acquire 80% of the outstanding shares of the new company. The decision was approved by the board of directors on May 31, and the transaction is expected to be completed by Oct. 1.The new company’s security cameras and software will be sold under the Panasonic brand Polaris has experience in strategic capital alliances with manufacturers and large-scale companies. Based on that experience, Polaris expects to smoothly and rapidly build the structure necessary for an independent business while preserving the strengths and unique characteristics of the business. The goal is to 'maximize corporate value as an independent company toward IPO (initial public offering) in the future.' Panasonic brand name to continue The new company – named Panasonic i-PRO Sensing Solutions Co., Ltd. – will encompass the Panasonic Connected Solutions Company’s Security Systems Business Division and the industrial and medical vision compact camera R&D department of its Innovation Center. The Public Safety sales and development functions of Panasonic System Solutions Company of North America (PSSNA), and the security camera manufacturing factory in China – Panasonic System Networks Suzhou Co., Ltd. (PSNS) – will become subsidiaries of the new company. Polaris expects to smoothly and rapidly build the structure necessary for an independent business After establishment, the new company’s security cameras and software will be sold under the Panasonic brand. Sales will be handled directly by the new company in the U.S. market; through Panasonic System Solutions Japan Co., Ltd. (PSSJ) in the Japanese domestic market; and through existing Panasonic sales companies in other regions including Europe, China, Southeast Asia, Oceania and Canada, which will all sign sales agreements with the new company. Future outlook An announcement from Panasonic details plans for the new company: “It will build on the strengths of the Division while benefitting from management and resources of Polaris to seamlessly implement the necessary structure to operate as an independent organization. Strengthening its solutions capabilities with proactive alliances and M&As, the new company will aim to enhance its revenue and profitability globally centered on the North American market. With new and next-generation products and services, and a strategic growth plan to expand sales of medical camera modules, the new company will build a solid foundation as an independent entity.” The core business of video surveillance equipment is more competitive than eveThe Security Systems Business Division of Panasonic has a roughly 60-year history of developing security cameras and advanced edge devices and combining these with unique software such as facial recognition to meet the needs of the market. It has established itself as a top brand. Effect on U.S. market Panasonic in the U.S. broadened its business approach to increase systems sales with the acquisition of Houston, Texas-based Video Insight in 2015. The developer of video management software especially helped to boost business opportunities in the education market in North America. More recently, Panasonic has sought to differentiate itself with an emphasis on R&D and new product developments, including artificial intelligence. Last year, the company highlighted its FacePro deep learning facial recognition system using extreme sensing and enhanced detection technology to identify persons of interest and alert authorities of their presence in real-time. Developments in the offing The Security Systems Business Division of Panasonic has a roughly 60-year history of developing security camerasIn the near future, Panasonic is also looking to apply AI-based capabilities to vehicle recognition, with the ability to identify vehicle characteristics such as color, type of vehicle and direction of travel. On the VMS side, Panasonic announced last year its intent to transition its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved. Still, the core business of video surveillance equipment is more competitive than ever. As Panasonic looks to regain its former dominance, it will face an uphill battle. A sharper focus and new management, resulting from the acquisition, may help to turn the tides.
PVcomBank, one of Vietnam’s fastest growing and most progressive banks, has acquired a cutting-edge March Networks video surveillance system. Established in 2013 through a merger of PetroVietnam Finance Corporation and WesternBank, the Hanoi-based financial institution is a joint stock commercial bank with 115 branches throughout the country. Shareholders include Petro Vietnam with a 52 percent stake and Morgan Stanley with a 6.7 percent strategic interest. Prior to selecting the March Networks technology, PVcomBank had a variety of different video surveillance systems installed throughout its branch network. The bank wanted to upgrade to a high-performance solution it could eventually standardize on for all of its retail branches, ATMs and corporate offices, and centrally manage from its headquarters in Hanoi. “The March Networks system gives us the central management capability that we didn’t have before. It’s also reliable, user friendly and provides us with excellent quality video.” Enterprise-Class Video Surveillance The enterprise-class March Networks system PVcomBank is now deploying consists of 8000 Series Hybrid NVRs, Command Enterprise video management software and hundreds of March Networks IP cameras, including MegaPX WDR MiniDomes Zs and MegaPX Indoor IR Domes.More than 450 banks and credit unions worldwide rely on March Networks’ intelligent IP video solutions to keep their customers and employees safe PVcomBank relied on the advice of Intelligent Building Solutions (IBS), a security systems integrator and March Networks certified partner with offices in Hanoi, Ho Chi Minh City, Singapore and Phnom Penh. “We wanted to upgrade to a high quality, enterprise system with central management and health monitoring,” said Nguyen Manh Hai, PVcomBank. “IBS recommended March Networks because of its track record as a global leader in the delivery of video surveillance solutions to the financial sector.” More than 450 banks and credit unions worldwide rely on March Networks’ intelligent IP video solutions to keep their customers and employees safe, and help reduce losses due to fraud, theft and liability claims. IBS, a supplier of security and building automation products, including video surveillance, access control and intrusion detection systems, began rolling out the March Networks system across PVcomBank’s branch network in June 2015 and expects to complete the deployment by the end of 2016. Hybrid Capability Results In Lower Costs The hybrid capability of the March Networks 8000 Series NVRs is ideal because, in addition to approximately 250 new March Networks IP cameras, PVcomBank opted to continue using analog cameras from its previous video surveillance systems. Continuing to use its existing cameras with the March Networks system kept costs down and resulted in noticeably improved video quality from the analog cameras. Access to video is restricted to the bank’s security staff and used to obtain evidence of burglaries, fraud and other reported incidents. Eight and 16-channel NVRs are equipped with 6 and 8 TB of onboard storage, respectively — sufficient for approximately 60 days of video retention. The 8000 Series recorders are available in 4, 8, 16 and 32 channel models and can accommodate two simultaneous recording streams — one lower resolution stream for viewing online, and another full resolution, full frame rate version for investigation purposes. Built for maximum reliability, they feature a secure Linux operating system to better protect against viruses and malware, and an internal battery backup for systematic shutdown in the event of power loss.The 8000 Series recorders can accommodate two simultaneous recording streams The 8000 Series recorders are also designed for easy maintenance with docking station architecture that keeps all cables securely connected to the back of the unit for faster, more convenient installation and servicing. Technicians can also take advantage of March Networks’ industry-first GURU Smartphone Application to scan the QR code on any 8000 Series NVR to quickly find the recorder’s serial number and warranty status, speed troubleshooting, link to video tutorials and use an installation audit feature to run automated reports on the video system’s configuration complete with camera field-of-views. Simplifying Day-To-Day System Administration The Command Enterprise video management software used by PVcomBank simplifies day-to-day system administration with centralized management and mass configuration tools, and provides real-time health monitoring that alerts administrators to performance issues. A customisable user interface with motion histogram and thumbnail images allows investigators to quickly zero in on video evidence. “We are very pleased with our March Networks video surveillance system,” said Nguyen Manh Hai. “We worked closely with IBS, our security systems integrator, to select a system that would meet all of our needs. The March Networks system gives us the central management capability that we didn’t have before. It’s also reliable, user friendly and provides us with excellent quality video.”
Customer: The Absa Group Limited is one of South Africa’s largest financial services groups, offering a complete range of banking and wealth management products and services. Absa Bank's business is primarily in South Africa, and the group has equity holdings in banks in Mozambique and Tanzania. Absa is a subsidiary of Barclays Bank, a major global financial services provider with an extensive international presence in Europe, the United States, Africa and Asia. Challenge: Absa Bank’s objective was to streamline its processes and reduce costs while maintaining a clear focus on the individual customer’s experience. Their decision to deploy megapixel network cameras in a proof-of-concept video surveillance installation was based on leveraging the greater system efficiencies, functionality and superior image quality of megapixel technology. Megapixel Solution: The new security surveillance system at Absa Bank was installed by AV Enforce Electronics (AVEE) of South Africa. The system employs Arecont Vision's 2.0 and 3.0 Megapixel Cameras positioned behind teller stations to closely monitor transactions between bank employees and clients. In addition, Arecont Vision's 8 Megapixel 180-degree and 360-degree Panoramic Cameras (AV8185 and AV8365) watch over customer queues, automated teller machines (ATMs) and the general banking hall with extreme image detail. Each Arecont Vision megapixel camera at the Absa Bank installation is connected to a power-over-Ethernet network switch that serves as the network video connection and also as the power source to the camera. Cameras are recorded on Luxriot network video recorders. The system is monitored locally by authorized management personnel. Arecont Vision's AV3105 3-Megapixel Camera uses a ½ inch CMOS sensor to provide 2048x1536-pixel progressive scan images at up to 15 frames per second (fps). The camera is built with Arecont Vision's massively-parallel MegaVideo technology, providing image processing at billions of operations per second. It can output multiple image formats of larger areas to allow simultaneous viewing of the full resolution field of view and regions of interest. The Arecont Vision AV2105 2-Megapixel Camera provides 1600x1200-pixel video at up to 24 fps, with light sensitivity of 0.1 lux at F1.4. Features include forensic zooming on archived video, region-of-interest views, as well as image cropping and motion detection. The panoramic view cameras used at the Absa Bank proof-of-concept installation are the 180-degree Arecont Vision AV8185 and 360-degree Arecont Vision AV8365 8-Megapixel Cameras. Both models employ four 2-megapixel sensors enclosed in 6-inch IP66-rated domes and provide up to 6400x1200-pixel images at 5.5 fps. The cameras can be set for lower resolutions at higher frame speeds, such as 1600x1200-pixel images at 22 fps or 800x600-pixel images at 88 fps. The cameras also use Arecont Vision MegaVideo video processing at billions of operations per second. Light sensitivity is 0.2 lux at F2.0, and the cameras provide image cropping and up to four regions-of-interest. “Arecont Vision outperforms all the current competitors,” said Alex De Barros of AV Enforce. “The price compared to analog cameras is better considering the fact that you gain so much. We were able to capture images for the bank that were never achieved before.” Megapixel Benefit: The proof-of-concept system atAbsa Bank has demonstratedthat megapixel cameras aresuitable for applications inthe banking environment andrepresent a significant upgradein system functionality comparedto standard-resolution cameras Arecont Vision megapixel network cameras use H.264 compression to minimize bandwidth and storage needs and are available at costs comparable to standard-resolution alternatives. Megapixel images provide much more detail in playback mode for forensic investigations. Operators can zoom in for up-close views on stored images. They can view specific parts of a larger image, such as a person's face. A benefit for Absa Bank is creation of a database of suspected criminals to allow operators to identify them easily. The use of megapixel video enables a larger area to be covered with fewer cameras, which reduces overall system cost which make it easier to realize ROI. Higher-resolution images boost the functionality of systems, enabling pristine image quality at industry-leading high frame rates, while minimizing bandwidth usage with H.264 video compression. The proof-of-concept system at Absa Bank has demonstrated that megapixel cameras are suitable for applications in the banking environment and represent a significant upgrade in system functionality compared to standard-resolution cameras. In addition to lower bandwidth and storage requirements, megapixel cameras can dramatically decrease costs related to other elements of a system, such as fewer software licenses, less cabling, fewer lenses, and a decrease in man-hours needed to bring it all together. “There is a lot at stake in the banking environment, and megapixel imaging can vastly improve the performance of the video surveillance systems in this important market,” said Ethan Maxon, Middle East and Africa Regional Sales Manager of Arecont Vision. “We continue to spread the word about the unparalleled image quality and resolution of Arecont Vision's megapixel IP video cameras. It's good to know that Absa Bank has experienced those benefits first-hand.”
Founded in 1877, Banco de Costa Rica (BCR) is the second-largest state-owned bank in Costa Rica. Today, BCR provides a broad range of financial services, including retail banking.Looking to protect its staff, buildings and financial assets, BCR has set upon a major project that will see its 4,500 employees, in 278 offices across Costa Rica, protected by an integrated hybrid CCTV and alarm system. The fundamental characteristic of the project is its implementation over unshielded twisted-pair (UTP) structured cabling networks, which will allow the use of legacy equipment to be integrated into a scheme that paves the way for migration to security solutions based entirely on this transmission media.Network Video Technologies (NVT) UTP CCTV video transmission equipment plays a fundamental role in the hybrid solution, enabling both legacy and new systems to be combined, delivering high-quality real-time video over large distances; to help ensure a measured and rapid response by the bank to any alarm scenario.One of the most important government financial institutions in Costa Rica, BCR was previously protected by a CCTV system based on coax cable and using monochrome cameras. Consequently, one of the aims of the bank's directors in implementing the new solution was to unify all of its systems to operate over UTP networks.Protection on multiple frontsThe new solution will encompass the bank's 278 branches, public offices and administrative buildings across Costa Rica, 450 buildings in total. Randall Ruiz Parajeles, the Bank's Director of Electronic Security explains about the project roll out: "At the moment 80% of the bank's buildings are covered, thanks to the installation of NVT video transmission equipment. Our aim was to improve video signal quality, eliminate interference noise, and most importantly, using NVT technology we will be greatly extending the video transmission distances without suffering video quality losses, which is what happens with coax."From coaxial to hybrid systemsBanco de Costa Rica has always had a surveillance system, the purpose of which was to protect the security of visitors to each of the bank's offices, as well as their money. These consisted of analog recording systems and standard-resolution monochrome cameras, with transmission via coaxial cables. Analogue recording systems as well as standard resolution monochrome cameras were included in the solution from NVT "For the system-wide renewal, the number of cameras has been increased, but many of them were re-used," explains Parajeles. "There are currently more than 4,500 NVT UTP transmission links installed that transmit the camera video over twisted pairs, using high-resolution day/night and low-light equipment. As for the recording systems, we are using digital equipment that works over the IP network.""It should be noted that NVT equipment was installed right from the start of the renewal programme. NVT allowed us to retain existing equipment as an infrastructure and adapt it to work with the newer devices, making this match between the two without having to discard units that might still give us some useful working life. We were able to integrate these units with the new ones in a manner entirely transparent to the monitoring personnel, who are now able to have everything integrated seamlessly on a single platform."The current configuration of the security system, installed by Seguridad y Protección de Centro América, has a threefold purpose: it is intended to be dissuasive, but also persuasive, and to allow verification of the events reported by the alarms. In this sense, it can be said that it is designed for both supervision and recording.But a major component of the system is the automation programme. This means that the CCTV system is complemented by the alarm system, which, when an event occurs, generates pop-up windows in the control center. There is also a link to the lighting systems, so that when an alarm is given, the lights in a particular area are switched on.The cameras and PTZ domes installed in the system are all Pelco models. Recording is carried out by Honeywell Rapid Eye units. In total, around 450 recording units have been installed. NVT technology allows extending the video transmission distances without suffering video quality losses A fundamental decision: hybrid instead of IPHowever, a review of the characteristics of this system immediately prompts a question. If the system was designed to run over UTP based structured networks, why implement a hybrid model instead of installing end-to-end IP.Parajeles explains that the use of UTP and NVT devices allows the linking of analog and digital equipment on a given IP network helps businesses to start down the road towards a single-stage system, because they are designed to work over structured cabling. "For us, it was rather difficult to install IP cameras because of bandwidth considerations, the quantity of IP addresses needed and the infrastructure that would require us to have individual physical connections for each camera in each branch. After looking into the matter, we could not find an IP camera that would, on its own, allow us to transmit over the network without adversely affecting the establishment's bandwidth."High-satisfaction technologyWhen a large institution implements such an important project, it is looking to simplify its operation and enhance its ability to respond when that operation finds itself put to the test. From this point of view, it can be declared that Banco de Costa Rica has fully met its target, in terms of guarantees, ease of installation and professional achievements; NVT has become an important ally.Summarising the entire process, Parajeles concludes: "This is an investment that will pay for itself over time. And because the quality of the NVT equipment is so good, visits to the sites of the various installations have also been reduced."
Security for banks can be a real challenge when faced with a multitude of threats including: fraud, theft and physical attacks. One bank which is setting new standards in the Middle East, when it comes to the application of surveillance technology to keep its infrastructure, staff and customers safe and secure, is National Bank of Kuwait (NBK). This is thanks to the roll out of an advanced NetVu Connected CCTV solution from Dedicated Micros part of AD Group which is focused on the centralized monitoring of all of its branches and critical ATM infrastructure.Awarded the Best Bank in the Middle East 2010 accolade by EuroMoney, National Bank of Kuwait (NBK), which was incorporated in 1952 as the first indigenous bank in the entire Gulf region, remains the preeminent banking institution in Kuwait as well as being an established banking franchise across the Middle East and supporting a large branch network, spanning 17 countries, including many of the world's financial and business centers.Dedicated Micros connection with National Bank of Kuwait stretches back over four years. The catalyst for the surveillance specialist being brought on board for this ambitious ATM protection project was the bank's dissatisfaction with the CCTV solutions it tested from other providers. A spokesperson for the Engineering Services Division, NBK, takes up the story: "We looked at and tested several brands of DVRs as potential answers to our pressing ATM surveillance needs before deciding to go ultimately with Dedicated Micros. The solutions that fell by the wayside were simply too cumbersome and complicated in terms of all the extra equipment (and software licenses) that would have been required to activate the functionality we wanted. This was in stark contrast to Dedicated Micros which was able to meet our needs based around an effective hardware-based package." Said Salim Idris, General Manager (Middle East), Dedicated Micros: "When contacted by NBK we were delighted to assist Kuwait's foremost banking establishment, not only were we able to demonstrate that we had the solutions available, such as the DV-IP ATM, that could address their specific requirements head-on, without lots of add-ons, but could also point to an unparallelled track record. To put our extensive experience, protecting the banking sector, into some sort of context, across the Gulf Cooperation Council area alone, we can now count 10 major banks - in Bahrain, Dubai, Kuwait, Oman, Qatar and Saudi Arabia - as customers. Significantly, as our CCTV systems are embedded, rather than PC based, they are recognized for their stability - essential in the banking environment - whereas PC dependent solutions have a reputation for crashing without warning."ATM FocusLooking in more detail at the systems from Dedicated Micros which have been put in place at NBK, since 2006, to support the effective monitoring of vital local and overseas ATM related infrastructure. These comprise 28 individual DV-IP ATM units which are used primarily to protect standalone Automated Teller Machines, with numbers expected to rise as part of the ongoing ATM project. There are also 145 NetVu Connected DS2 DVRs, with typically two systems connected at each National Bank of Kuwait branch plus an associated RAID (Redundant Array of Independent Disks) unit giving additional storage capacity to the existing internal hard disk of the DVR.This set-up offers redundancy and resilience to ensure any recorded video images are securely stored. In the case of the larger Dubai branch this combination was doubled up and four (DS2s and RAIDs) were installed at NBK's extensive Bahrain site. To help with the management of the geographically dispersed NetVu Connected CCTV infrastructure, at an early stage, Dedicated Micros was called upon to assist NBK in the setting-up of centralized monitoring from a control room. This was achieved by deploying NetVu Observer video management software to allow operators to seamlessly view distributed images from any NetVu Connected product. DV-IP ATM units from Dedicated Micros have proved useful in making transactions more secure and safe The robust DV-IP ATM units specified for the National Bank of Kuwait project are designed to work, primarily, within the confines of an Automated Teller Machine. Certainly the security challenges with regards to banking are most keenly felt when it comes to the safe operation of Automated Teller Machines (ATMs) whose accessibility makes them a convenient target for card skimming, shoulder surfing, and even physical theft from customers. It is CCTV systems, specifically remotely accessible DVRs, that are at the very heart of efforts to deal with these types of threat.Combining Video and Transaction DataThe Dedicated DV-IP ATM, based on NetVu Connected technology which ensures its interoperability with other DM and AD Group systems, is able to process transaction data which is then recorded with video footage. Post event analysis, via a powerful text search engine, provides video imagery of the ATM user plus the associated transaction information. For NBK this allows security staff to deal with any fraudulent activity and ensures that customer services representatives are well placed to quickly resolve any genuine customer withdrawal disputes.Marrying up the DS2 DVRs with RAID units at every NBK branch, also facilitated the effective monitoring of each location including the in-branch ATMs not covered by the DV-IP ATMs. With, in this case, the cameras in the ATMs connected to the DVRs which had been specifically programmed to have the capability to associate transaction data with the appropriate video footage.The ability of both the DV-IP ATM systems and DS2 DVRs, deployed for the NBK project, to apply Dedicated Micros' TransCoding technology to record evidential quality MJPEG locally and simultaneously support low bit rate data streaming in MPEG-4 compression format for remote viewing has proved to be advantageous in keeping bandwidth demands on NBK's network to an absolute minimum. Of course local recording (including the additional capacity provided by the RAID units) has the added benefit that, even in the event of a network failure, recording is not interrupted or vital evidence lost. Adding-Up the Benefits NetVu connected solution from Dedicated Micros has enabled National Bank of Kuwait to monitor all the branches Reflecting on the success of the project to date, a spokesperson for the Engineering Services Division, NBK, commented: "The NetVu Connected solution from Dedicated Micros we have adopted has given us the opportunity, for the first time, to monitor all of our branches remotely 24/7 wherever they might be and to cover a large number of ATMs (181 at the latest count) through the ATM transactions interface. We have been very pleased with the performance of the NetVu Observer viewing software over the past four years - which we are in the process of upgrading to Pick-a-Point Icon - as it has made it extremely easy to retrieve footage and to playback recordings over the network. With numerous cases involving ATMs reported on a daily basis and, with the Dedicated Micros' solution in place, we have been able to provide recorded footage, in a timely manner, to offer proof of what has actually happened. In practice, we have found the speed that video can be delivered across the network to be extremely favourable, for management and archiving, when set against the limited bandwidth provided."The distributed architecture of the solution has also meant that even, when there has been a network issue, critical recording has been able to continue unabated. Testament to this is the fact that since the start of the project no footage has been lost in this way. A major benefit we have also seen, in terms of cost of ownership, is the fact that from an Engineering Services' point of view the DVRs have been much easier to maintain, compared to what was in place before, and we have been very impressed with the stability of the DVRs in operation with zero reported failures. Alongside this the web-based configuration for the Dedicated Micros' systems has proved to be very intuitive."Future Plans Looking ahead, Dedicated Micros is working closely with NBK to expand the capabilities of the surveillance infrastructure. One key development soon to go 'live' is the implementation of the Pick-a-Point Icon multi-site video management solution in the bank's main control room to further enhance the remote monitoring of all of the bank's geographically dispersed locations. The uplift in functionality provided by Pick-a-Point Icon's more extensive features, compared to NetVu Observer, should greatly enhance the ability of the bank's security staff to manage and control their CCTV infrastructure. Dedicated Micros has formed many of the building blocks for the success of today's CCTV industry From the start Pick-A-Point Icon has been designed to be intuitive for operators, simplifying and speeding up image retrieval. In future, operators in the main NBK control room will be able to select cameras using Pick-A-Point Icon's enhanced GUI (Graphical User Interface) via multiple map screens and highly detailed map images, allowing them to pick a camera on-screen without having to know which digital video recorder the camera is linked to. Pick-A-Point Icon is based around a robust standalone hardware based workstation, which eliminates the reliability issues associated with PC based systems - a key consideration in the banking sector.Closed IPTV InvestmentCommented Salim Idris, General Manager (Middle East), Dedicated Micros: "As the surveillance solution moves ahead, we are delighted that National Bank of Kuwait has confirmed that it will also act as a trailblazer for the deployment of our award winning Closed IPTV 'IP Video' solution. This follows on from the successful testing of the Closed IPTV version of the SD Advanced hybrid NVR/DVR, which will now be rolled out gradually across all of the bank's extensive branch network, making NBK one of the first customers in the Middle East region for this new solution."Essentially, adopting Closed IPTV systems such as the SD Advanced - in conjunction with a Layer 3 Enhanced CCTV Switch which provides greater security for less configuration effort than a conventional managed switch - makes deploying an IP Video, CCTV system safe, secure and simple. Combining patent-pending innovation with zeroconf networking technology, Closed IPTV automatically allocates IP addresses to IP cameras by physical port. In this way the system is completely deterministic, creating firewalls and monitoring IP connections by individual network ports so they cannot be hacked or intercepted. This ground breaking solution provides a very simple and secure answer to IP Video, where no prior knowledge of IP networking is required. National Bank of Kuwait is going to adopt Dedicated Micros' HyperSense APNR cameras for its car park management A further enhancement, in the pipeline for NBK, is the adoption of Dedicated Micros' HyperSense ANPR cameras for its car park management, in this case combining an Overview and ANPR camera, with alerts triggered by car park barriers to monitor vehicles entering and leaving a location. The sophisticated HyperSense technology built in to the cameras removes ambient light from the scene leaving only the objects that strongly reflect the IR light emitted by the integrated invisible IR LED flash to be displayed. The ability to eliminate glare from vehicle headlights delivers a more distinct image for evidential purposes and the black and white ANPR camera ensures that details of the numberplate can be seen, whilst the 'overview' camera allows this to be tied-up with other details such as the color of the vehicle.Banking on SecurityUltimately, National Bank of Kuwait, through continuing investment in the latest surveillance infrastructure from Dedicated Micros, has demonstrated a real commitment to not only be a leader in the banking services it provides but also, crucially, to back this up with the best possible levels of security for customers, staff, and physical assets such as the branch network and ATMs making NBK ideally placed to deal expeditiously with any form of criminal attack.
Security management in banking is a discipline unlike any other. Rather than integrating all security into one centralized system, some banks choose decentralized security for their branch offices. AEOS, a leading platform in integrated security, turns out to be just as effective when deployed decentrally. ”We were already using Nedap AEOS in our headquarters, as well as various regional offices. Then, in 2011, the security system used by our 800 branch offices in Belgium needed to be extended with access control. Because we were already aware of AEOS’s capabilities and very satisfied with its performance, it was a logical step to ask Nedap to solve our problem.” - Joris de Greve, Security Manager at ING Belgium. Key Management Challenge ING’s 800 branch offices in Belgium were already equipped with autonomous intrusion detection and camera surveillance. All doors and their accessories, such as locks, push buttons and door contacts, were monitored and controlled by the intrusion detection system. Doors were opened and closed using keys in security cylinders. A central alarm management system handled alarms coming in from local intrusion control systems.It was virtually impossible to keep track of the physical keys and who was authorised to use them" Key management had become a problem, according to De Greve. ”It was virtually impossible to keep track of the physical keys and who was authorized to use them. We had no central database in which authorisations could be assigned or retracted.” In addition, changing locks, replacing keys and keeping key plans up to date had become difficult. “It was time for an electronic access control system,” explains Peter Rommens, Country Manager at Nedap Belgium. “Since all peripherals were connected to the intrusion detection system, the scope of the project was clearly defined. We were looking purely at access control at one or more doors per office.” Expanding The Centralized AEOS System After considering a wide range of solutions, ING eventually selected two for further evaluation. One was to add access control to the existing intrusion detection systems. This was technically the least complicated option, because the basic infrastructure and necessary hardware were already in place. The other option was to expand the centralized AEOS system that was already up at headquarters and regional offices to include access control at the branch offices. The latter offered the major advantage of being able to connect all branch offices to one central database, while retaining the ability to delegate responsibility for authorisations to lower-level security management layers. Other benefits of this option included its system architecture, the proven stability of the system for large numbers of offices and cardholders, the system’s scalability and flexibility, the native IP controllers’ ability to communicate peer-to-peer and bypass the server, and the system’s redundant facilities and security (failsafe, switching servers, etc.). Flexible And Extra Secure The factor that clinched the deal was that AEOS allowed for decentralized management of separate units and the use of entrance filters. This meant local offices could be authorized to manage their own security without access to other offices’ data, Joris de Greve explains. “The bank’s security structure is based on central access to buildings and central facilitation of technical solutions, but decentralized security and access responsibility per zone. Therefore, the system must allow us to cluster cardholders into groups with different authorisations. AEOS supports this.”Cardholders who lose or forget their badge are issued a replacement while the original badge is invalidated" “Another factor was ING’s requirement that authorisations not be assigned to a badge, but to a cardholder,” adds Rommens. ”This builds in extra security: cardholders who lose or forget their badge are issued a replacement while the original badge is invalidated. This guarantees there are no unaccounted-for, authorized badges ‘floating around’. Decentralized Approach ING combines centralized and decentralized policies. Overall security policy is set at top headquarters; security management there decides who is authorized to manage accounts and which authorisations may be assigned. This is part of the bank’s security structure. We ask ING Belgium Security Manager De Greve to illustrate. “For example, the Milan office uses a server in Belgium and the technical facilities provided by central security management. However, the management in Milan are in full control of who is allowed access to their building and when,” he says. User training is also decentralized. There are some 500 administrators, all of whom were trained internally and decentrally. AEOS enables this flexibility. Because AEOS is web-based, interventions are simply and swiftly carried out. Keeping An Eye On Things A consequence of decentralisation is the need for reports. “Central management wants to keep an eye on what is happening at the various branch offices,” De Greve says. ”Is security functioning properly? And are offices complying with security policy?” He believes reports “are also a valuable management tool.” For example: how many people are at work at any given time, or whether people only come in a few times a week. “This helps us to make sound decisions concerning flexible office space, for instance, and that’s an important way to reduce costs.” Proxy Offices Roll-Out ING BE has two different types of offices: Proxy offices where all money is distributed by ATMs and Full Service where staff behind counters provide service. In both types of branches local staff is present and mobile specialists are available to respond to specific needs or questions customers may have. Nedap is currently installing AEOS at the 800 Belgian branch offices at an approximate rate of nine offices per week. Peter Rommens explains how the roll-out is being organized logistically: “In preparation for installation, ING centrally creates the appropriate authorisations in AEOS. Then, Nedap’s business partner defines the configuration and uploads this to the controller. This means on-site installation is quick; once the controller is connected and deployed, the system is up and running.”Each office is prepared for expansion of its access control or the addition of other security functionalities" AEOS At Proxy Offices “The bank preferred our proposed solution, with one AP4803x per branch office, over a solution with one or more AP6003 network controllers per office but only one AEpu per ten offices,” Rommens says. “Although having one AEpu per office is costlier, availability is more sure with the AP4803x and it offers more long-term advantages. It means each office is prepared for expansion of its access control or the addition of other security functionalities.” Proxy offices are defined as individual access control zones. Each office has its own profiles defining who is allowed access and on what basis. Proxy offices are secured with readers and a key replacement badge. The alarm system runs separately from the access control system. The badge only provides access, while arming and disarming the alarm system requires identification. In line with existing policy, if an unauthorized person finds a badge and tries to use it when the office is empty, this sets off an alarm. If a person tries to use a stray badge when the office is manned, he or she is immediately exposed by staff (social control). “Badges are also blocked based on expiry date or end of contract because in general the fewer badges in circulation and the fewer people with access, the smaller the security risk,” says De Greve.
Headquartered in Tokyo, Nomura is a top tier international bank providing investment and merchant banking services to corporate and institutional customers. With offices in all major financial centres across the globe, the mission of Nomura is to deliver superior services and solutions to meet all investment needs of their clients. To ensure they execute their mission in a safe and secure environment, Nomura has invested in a Honeywell access control solution that is expandable for the future. The situation Having offices located around the world, it is imperative that Nomura has a secure and easy to use access control system with a global footprint. One that is flexible enough to manage the access control demands at any Nomura office location from a single point whilst maintaining local operational autonomy. With the ever-present threats of terrorism, choosing the right access control system for Nomura was crucial. In London, Nomura has prestigious offices in Angel Lane. When it acquired the site, upgrading the access control solution quickly became a priority for the company's head of security in order to securely manage authorized visitors, account for people while on site and keep staff members secure at all times. The Angel Lane building contains a large number of personnel, all requiring varying levels of access control authority, some to strictly controlled, authorized areas. The access control system must operate 24/7 to accommodate varying shift patterns and provide customised reports with multiple criteria. The system would need to store up to 4000 cardholders, including staff, authorized contractors and visitors. In addition, the solution needed to enable Nomura to separate and isolate people who make investment decisions from people who are privy to undisclosed material information, which may influence those decisions. These ‘Chinese walls' are a Financial Services Authority (FSA) regulation to safeguard insider information and ensure no improper trading occurs. Pro-Watch Enterprise Edition is perfect to meet the challenges of Nomura's growing business. Pro-Watch combines the flexibility and scalability that Nomura requires without compromising simplicity The solution A Honeywell Pro-Watch® security management system (Enterprise Edition) was specified by Nomura who then invited independent security consultant CornerStone GRG to carry out security design, production of specification and manage the tendering and installation process. As a result, security integrator Universal Security Systems was awarded the installation contract. The Pro-Watch solution would run on the bank's own network via a single database and enable Nomura to centrally control access to an unlimited amount of doors and areas across not just the Angel Lane site, but also every other Nomura office in the world including its remote data centres. It consists of one enterprise server that provides global management of a number of independent regional servers. The enterprise server acts as central storage area for system configurations and stores cardholder information and transaction history. The regional servers function independently as local databases while sharing information with the enterprise server. The benefits Supporting an unlimited number of cardholders and readers, Pro-Watch Enterprise Edition is perfect to meet the challenges of Nomura's growing business. Pro-Watch combines the flexibility and scalability that Nomura requires without compromising simplicity. The system takes the term ‘user-friendly' to a higher level and has made it simple to enforce Nomura's access policy via built-in wizards and shortcuts. The Windows®-based graphical user interface minimizes operator training and the built-in software wizards enhance system uniformity across sites. This contributes to a reduced installation time and a shorter overall learning curve for new users. "The Honeywell Pro-Watch solution is fantastic [...] It's a robust, resilient and flexible security management system capable of integration [...]" Integrated with the Nomura intranet system also makes it simple for line managers to request changes to access rights for people in their department. And in relation to complying with FSA regulations, access rights are managed such that separate groups are created for employees in the corporate-advisory area and the brokering department to help enforce the ‘Chinese walls' within the bank. With its built-in redundancy, Pro-Watch provides additional value in disaster recovery planning too. In the case of a power failure or a problem on part of the main server, access control rights can be managed at any one of the other Nomura sites on the global Pro-Watch network. "The Honeywell Pro-Watch solution is fantastic!," comments Andy Williams, Head of Security (Europe, Middle East and Africa) for Nomura. "It's a robust, resilient and flexible security management system capable of integration. Integrating it with our own PeopleSoft® human resource system and intranet saves us significant administrative time by eliminating repetitive data entry associated with managing and aligning cardholder information and access rights." Using Pro-Watch, Andy Williams' security team now has complete command and control over all system and event information and can monitor door alarms in multiple locations simultaneously. Reporting is straight-forward as well. In the event that historical data is required, access control logs can be quickly and simply accessed. Should a fire alarm occur, a report can be generated quickly to show the details of all personnel within the building at that point in time. ‘Gate/time' reports are also beneficial as they can be given to the HMRC as supporting evidence that an individual was present on site on a particular time and date. Pro-Watch Enterprise Edition is perfect to meet the challenges of Nomura's growing business Partners of choice Universal Security Systems Universal Security Systems Ltd. specialises as a security systems integrator in the design, installation and support of technology based security solutions. Clients are primarily medium and larger sized organizations of many kinds, who require protection for major, prestigious and/or multi-site property estates. "Universal Security Systems was selected because of its excellent technological ability and cost-effective solutions," said Andy Williams. Head of Security EMEA, Nomura. "They have a positive attitude and made achieving the aggressive installation schedule look easy. They are commercially astute and we benefit from them being our central point of contact for our security requirements in the EMEA region." CornerStone Consulting Group CornerStone GRG Ltd. is an independent, international consultancy firm providing a range of security services. They help organizations protect their people, assets, intellectual property and profits by identifying the threats and minimizing the risks that face today's global businesses. CornerStone is committed to providing specialist guidance, unbiased advice and support to their clients. "CornerStone interpreted our requirements precisely, managed the project perfectly and made essential recommendations on how to value engineer the installation without leaving Nomura exposed in any way," said Andy Williams. Head of Security EMEA, Nomura. The products Honeywell Pro-Watch® Enterprise Edition
Round table discussion
With the advent of online shopping, brick-and-mortar retail businesses are challenged to make transactions more convenient while enhancing the “experience” aspects that differentiate real-life shopping from the simpler route of clicking on a website. Technology is helping retailers create that differentiation, including technologies such as video systems, deep learning analytics and point-of-sale (POS) integrations that have evolved from innovation in the physical security market. For more insights, we asked this week’s Expert Panel Roundtable: What new security industry technologies are having an impact on the retail market?
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase the cybersecurity of physical security systems?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?