Banking & Finance security applications
Retail banks and financial services companies have a long history of dealing with the risk and potential threat of criminal activity. Arecont Vision understands the unique needs of the retail banking and financial services market and provides customer-proven megapixel camera technology to specifically meet those needs for our customers around the world. Bank Crime Statistics In a typical year in the United States, according to the FBI cash losses total around $7.5 million, only about 22% of...
PVcomBank, one of Vietnam’s fastest growing and most progressive banks, has acquired a cutting-edge March Networks video surveillance system. Established in 2013 through a merger of PetroVietnam Finance Corporation and WesternBank, the Hanoi-based financial institution is a joint stock commercial bank with 115 branches throughout the country. Shareholders include Petro Vietnam with a 52 percent stake and Morgan Stanley with a 6.7 percent strategic interest. Prior to s...
Customer: The Absa Group Limited is one of South Africa’s largest financial services groups, offering a complete range of banking and wealth management products and services. Absa Bank's business is primarily in South Africa, and the group has equity holdings in banks in Mozambique and Tanzania. Absa is a subsidiary of Barclays Bank, a major global financial services provider with an extensive international presence in Europe, the United States, Africa and Asia. Challenge: Absa Bank&rsq...
Founded in 1877, Banco de Costa Rica (BCR) is the second-largest state-owned bank in Costa Rica. Today, BCR provides a broad range of financial services, including retail banking.Looking to protect its staff, buildings and financial assets, BCR has set upon a major project that will see its 4,500 employees, in 278 offices across Costa Rica, protected by an integrated hybrid CCTV and alarm system. The fundamental characteristic of the project is its implementation over unshielded twisted-pai...
Security for banks can be a real challenge when faced with a multitude of threats including: fraud, theft and physical attacks. One bank which is setting new standards in the Middle East, when it comes to the application of surveillance technology to keep its infrastructure, staff and customers safe and secure, is National Bank of Kuwait (NBK). This is thanks to the roll out of an advanced NetVu Connected CCTV solution from Dedicated Micros part of AD Group which is focused on the centralized mo...
Headquartered in Tokyo, Nomura is a top tier international bank providing investment and merchant banking services to corporate and institutional customers. With offices in all major financial centres across the globe, the mission of Nomura is to deliver superior services and solutions to meet all investment needs of their clients. To ensure they execute their mission in a safe and secure environment, Nomura has invested in a Honeywell access control solution that is expandable for the future....
Security trade fairs can be daunting for attendees. At big shows like ISC West and Global Security Exchange (GSX), there can be hundreds of physical security manufacturers and dealers vying for your attention. Booths are sometimes spread out across multiple halls, often accompanied by a confusing floor plan. As the scope of physical security expands from video surveillance and access control to include smart building integrations, cyber security and the Internet of Things (IoT), there is an increasing amount of information to take in from education sessions and panels. Here, SecurityInformed.com presents eight hints and tips for visitors to make the most out of trade shows: 1. Outline your objectives. As the famous saying goes, “Failing to plan is planning to fail!” Before you plan anything else, ensure you know what you need to achieve at the show. By clearly noting your objectives, you will be able to divide your time at the show appropriately, and carefully choose who you speak to. If there is a particular project your organization is working on, search out the products and solutions that address your security challenges. If you are a security professional aiming to keep up with the latest trends and technologies, then networking sessions and seminars may be more appropriate. 2. Bring a standard list of questions Prepare a list of specific questions that will tell you if a product, solution or potential partner will help you meet your objectives. By asking the same questions to each exhibitor you speak to, you will be able to take notes and compare their offerings side by side at the end of the day. This also means you won’t get bogged down in details that are irrelevant to your goals. Most trade fair websites provide the option to filter exhibitors by their product category 3. Do your homework Once you know your objectives, you can start to research who is exhibiting and decide who you want to talk to. Lists of exhibitors can be daunting, and don’t always show you which manufacturers meet your needs. Luckily, most trade fair websites provide the option to filter exhibitors by their product category. Many exhibitions also offer a downloadable floor plan, grouping exhibitors by product category or by relevant vertical market. It may be easier to download the floor plan to your phone/tablet or even print it out, if you don’t want to carry around a weighty map or show-guide. 4. Make a schedule Once you have shortlisted the companies you need to see, you can make a schedule that reflects your priorities. Even if you are not booking fixed meetings, a schedule will allow you to effectively manage your time, ensuring you make time for the exhibitors you can’t afford to miss. If the trade show spans several days, aim to have your most important conversations early on day one. By the time the last afternoon of the show comes around, many companies are already packing up their booth and preparing to head home. When scheduling fixed meetings, keep the floor plan at hand to avoid booking consecutive meetings at opposite ends of the venue. This will ensure you can walk calmly between stands and don’t arrive at an important meeting feeling flustered! Look for panels and seminars which address the specific needs of your project, or which will contribute to your professional growth 5. Make time for learning If you’re on a mission to expand your knowledge in a given area, check the event guide beforehand to note any education sessions you may want to attend. Look for panels and seminars which address the specific needs of your project, or which will contribute to your professional growth. This is one of the best opportunities you will have to learn from industry leaders in the field. Be sure to plan your attendance in advance so you can schedule the rest of your day accordingly. 6. Keep a record Armed with your objectives and list of questions, you will want to make a note of exhibitors’ responses to help you come to an informed decision. If you’re relying on an electronic device such as a smartphone or tablet to take notes, you may like to consider bringing a back-up notepad and pen, so you can continue to take notes if your battery fails. Your record does not have to be confined to written bullet points. Photos and videos are great tools remind you what you saw at the show, and they may pick up details that you weren’t able to describe in your notes. Most mobile devices can take photos – and images don’t need to be high quality if they’re just to refresh your memory. 7. Network – but don’t let small talk rule the day It may be tempting to take advantage of this time away from the office to talk about anything but business! While small talk can be helpful for building strong professional relationships, remember to keep your list of questions at hand so you can always bring conversations back to your key objectives. Keeping these goals in mind will also help you avoid being swayed by any unhelpful marketing-speak. It may seem obvious, but don’t forget to exchange business cards with everyone you speak to, or even take the opportunity to connect via LinkedIn. Even if something doesn’t seem relevant now, these contacts may be useful in future. Have a dedicated section in your bag or briefcase for business cards to avoid rummaging around. With your most important conversations planned carefully, there should be time left to explore the show more freely 8. Schedule time for wandering With your most important conversations planned carefully, there should be time left to explore the show more freely. Allowing dedicated time to wander will give you a welcome break from more pressing conversations, and may throw up a welcome surprise in the form of a smaller company or new technology you weren’t aware of. Security Trade Fair Checklist: Photo Identification: As well as your event pass, some events require photo identification for entry. Notebook and pen: By writing as you go, you will be able to compare notes at the end of the day. Mobile device: Photos and videos are great tools to remind you what you saw at the show, and may pick up details you missed in your notes. Paper schedule & floor plan: In case batteries or network service fail. Business cards: Have a dedicated pouch or pocket for these to avoid rummaging at the bottom of a bag. Comfortable shoes: If you’re spending a whole day at an event, and plan on visiting multiple booths, comfortable shoes are a must!
I have been thinking a lot about the U.S. government’s ban on video surveillance technologies by Hikvision and Dahua. In general, I question the wisdom and logic of the ban and am frankly puzzled as to how it came to be. Allow me to elaborate. Chinese Camera Manufacturers Reality check: The government ban is based on concerns about the potential misuse of cameras, not actual misuse. Before the government ban, you occasionally heard about some government entities deciding not to use cameras manufactured by Chinese companies, although the reasons were mostly “in an abundance of caution.” Even so, I find the targeting of two Chinese companies – three if you count Hytera Communications, a mobile radio manufacturer – in a huge government military spending bill to be a little puzzling. I can’t quite picture how these specific companies got on Congress’s radar. The government ban is based on concerns about the potential misuse of cameras, not actual misuse What level of lobbying or backroom dealing was involved in getting the ban introduced (by a Missouri congresswoman) into the House version of the bill? And after the ban was left out of the Senate version, was there a new wave of discussions to ensure it was included in the joint House-Senate version (with some minor changes, and who negotiated those?). It all seems a little random. Concerns For The U.S. Furthermore, the U.S. ban solves neither of the two main concerns that are generally used as its justification: Concern: Cybersecurity. The U.S. ban “solves” the issue of cybersecurity only if both of the following statements are true. No security system that uses a Hikvision or Dahua camera or other component is cybersecure. Any system that does not use a Hikvision or Dahua camera or other component is cybersecure. What level of lobbying or backroom dealing was involved in getting the ban introduced into the House version of the bill? The ban ignores the breadth and complexity of cybersecurity and instead offers up two companies as scapegoats. Our industry has sought to address cybersecurity, and the one principle that has guided that effort is that cybersecurity is an issue that must be addressed by manufacturers, consultants, integrators and end users – in effect, everyone in the industry. Cybersecurity does not begin and end with the manufacturer and banning any manufacturers from the market does not ensure better cybersecurity. Concern: “Untrustworthy” Chinese companies. Hikvision and Dahua are only two Chinese companies. Any response to concerns about whether Chinese companies are trustworthy would need to cover many more companies that manufacture their products in China. Australian TV recently claimed that “All Chinese companies pose a risk. Because of Chinese laws, there is a requirement for companies to be engaged in espionage on behalf of the state.” Even if one embraces that extreme view, the logic fails when only two companies are targeted. One source told me that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, so it’s a much bigger issue than two companies.The Chinese government has much more effective ways of conducting espionage than exploiting security cameras And is U.S. security at risk unless or until it is cut off from more than half of the world’s supply of video cameras? Even Western camera companies manufacture some of their cameras and/or components in China. Why name only two (or three) companies, only one of which has ties to the Chinese government? If the goal of the U.S. ban was to address the possibility of cybersecurity and/or espionage by the Chinese government, shouldn’t there be other companies and product categories included? Clearly, video surveillance is not the only category that has the potential for abuse. The Chinese government has much more effective ways of conducting espionage than exploiting security cameras. Global Response To U.S. Ban And now that the U.S. ban has been passed, how is the ban being misused to justify a new level of alarm about Chinese companies? Australian television effortlessly made the leap from “software backdoors” to a concerted and organized effort by the Chinese government to use cameras to be the “number one country for espionage.” And it’s not just about government facilities: “Even on the street, [cameras] have the potential to inadvertently contribute toward Chinese espionage activity by providing real-time information about the situation on the ground,” says the Australian TV report. If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies? If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies, or at least those with electronics or computer products that could be used for espionage? What about the espionage potential of the 70% of mobile phones that are made in China? What about other consumer electronics such as PCs or smart TVs? How many government facilities that are eliminating Dahua and Hikvision cameras have employees who use iPhones or use other electronic equipment from China? Artificial Intelligence & IP-Over-Coax Also, consider the impact of the ban on business. Hikvision and Dahua have had many successes in the video surveillance market, including in the U.S. market. They have added value to many integrators and end user customers. They have been on the forefront of important trends such as artificial intelligence and IP-over-coax. And, yes, they have made technologies available at lower prices.Cybersecurity issues have plagued several companies in the industry, not just Hikvision and Dahua Cybersecurity issues have plagued several companies in the industry, not just these two, and both Hikvision and Dahua have worked to fix past problems, and to raise awareness of cybersecurity concerns in general. Is a U.S. ban on two companies an appropriate response to a series of geo-political concerns that are much bigger than those two companies (and bigger than our entire market)? Should two companies take the brunt of the anti-Chinese backlash? Video Surveillance Cameras Is the video surveillance market as a whole better or worse for the presence of Hikvision and Dahua? Is it up to the U.S. government to make that call? In some ways, thoughts of Chinese espionage are a sign of these uncertain political times. Fear of video surveillance is perfectly congruent with long-standing anxieties about “Big Brother;” suspicion about China taking over our video cameras just rings true at a time when Russia is (supposedly) controlling our elections. But should two companies be targeted while broader concerns are shrugged off?
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organizations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalization and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're likely to find a difference in size between companies. Whether it’s a global retail chain versus a small family-owned store, a corporate restaurant chain versus a mom-and-pop diner or a small bed and breakfast versus a large hotel chain — each side of the coin presents unique characteristics and advantages in a number of areas. Disparity In Physical Security Industry Customers are drawn to products and services from large enterprises as the big names typically imply stability This disparity very clearly exists in the physical security industry, and differences in the sizes of product manufacturers and service providers could have important implications for the quality and type of the products and services offered. All too often, customers are drawn to products and services from large enterprises, as the big names typically imply stability, extensive product offerings and global reach. And that's not to say that these considerations are unwarranted; one could argue that larger companies have more resources for product development and likely possess the combined expertise and experience to provide a wide range of products and services. But the value that a company’s products and services can bring isn’t necessarily directly related to or dependent on its size. In an age where the common wisdom is to scale up to be more efficient and profitable, it’s interesting to pause and think about some of the possible advantages of small- and medium-sized businesses (SMBs). Typically, “small” companies are defined as those with less than 100 employees and “medium” with less than 500. Providing Social Mobility Schumacher argued that smaller companies are important engines of economic growth. Indeed, according to the Organization for Economic Cooperation and Development (OECD), a group of 36 member countries that promotes policies for economic and social well-being, SMBs account for 60 to 70 percent of jobs in most OECD countries. Importantly, SMBs provide resilience in that there are often large economic and social impacts when big companies fail. Smaller companies are better for regional economies in general, as earnings stay more local compared to big businesses, which in turn generates additional economic activity. SMBs are also better at providing social mobility for disadvantaged groups by giving them opportunities and enabling them to realize their potential. Smaller companies are often more innovative, bringing to the market novel technologies and solutions such as Cloud, analytics, AI, and IoT New Companies Introduce New Technologies There's no denying the role of start-ups when it comes to innovation. In the security industry, many new technologies (e.g. Cloud, analytics, AI, IoT) are first brought to the market by newer companies. In general, smaller companies’ products and services often have to be as good or better than others to be competitive in the marketplace. They are therefore often more innovative, bringing to the market novel technologies and solutions. And these companies are also more willing to try out other new B2B solutions, while larger companies tend to be more risk-averse. Customer Service Aside from the quality of products and services, arguably one of the most important components of a security company’s success is its ability to interact with and provide customers the support that they deserve. Smaller companies are able to excel and stand out to their customers in a number of ways: Customer service. Customers’ perceptions of a product’s quality are influenced by the quality of support, and smaller manufacturers often possess a strong, motivated customer service team that can be relatively more responsive to customers of all sizes, not just the large ones. A superior level of support generally translates into high marks on customer satisfaction, since customers’ issues with products can be resolved promptly. Flexibility. SMBs have a greater capacity to detect and satisfy small market niches. While large companies generally create products and services for large markets, smaller companies deal more directly with their customers, enabling them to meet their needs and offer customized products and services. And this translates to adaptability, as SMBs become responsive to new market trends. By having a pulse on the market, smaller companies have much more flexibility in their supply chain and can adjust much faster in response to changing demand. Decision-making. Smaller companies are much more agile in decision-making, while larger enterprises often suffer from complex, tedious and lengthy decision-making processes. Communication is easier throughout SMBs, as smaller teams enable new ideas to flow and can solve problems faster. Job Satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction. SMBs are also generally more connected to local communities and participation in community activities leads to a greater sense of purpose. Additionally, SMBs have a much smaller impact on the environment, which is increasingly becoming an important consideration for today’s employees and customers. Though Schumacher's book takes a much deeper dive into the large global effects of scale on people and profitability, the general impact of a company’s size on its products and services is clear. It’s important for all players in the security industry to remember that the commitment and dedication to product quality can be found in businesses of all sizes. Ensuring Safety Of People, Property And Assets Large manufacturers may catch your eye, but small business shouldn’t be forgotten, as they can offer end users a robust set of attributes and benefits. While all security companies are aiming to achieve a common goal of providing safety for people, property and assets, smaller businesses can provide extensive value when it comes to driving the economy, innovating in the industry, providing quality employment and offering superior customer service.
Repercussions are rippling through the physical security industry since President Trump signed into law the ban on government uses of surveillance equipment by Chinese manufacturers Hikvision and Dahua. In addition to the direct and indirect consequences of the new law, there have also been other developments likely to impact the future of Chinese companies in the video surveillance market. The ban has raised awareness of Chinese companies’ role in video surveillance, and other developments are related to tariffs and possible sanctions, all playing out amid the backdrop of an escalating trade war. One Chinese manufacturer previously dismissed security concerns about its role in video surveillance as “Cold War rhetoric.” There has been an almost nostalgic tone recently to the escalating concerns about video cameras being used for spying. Hikvision and Dahua have both stated emphatically that they have not conducted any espionage-related activities. Even so, the U.S. government ban has emboldened the concerns. However, to be clear: No one has alleged that technologies from either of the companies have been used for espionage. Rather, the concerns are about the potential for misuse, not actual misuse. Also aggravating the situation are Chinese companies’ previous, actual problems with cybersecurity, which the companies say they have addressed. Here are some recent developments related to the U.S. government ban and Chinese manufacturers in general: Tariffs And Trade Concerns Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods, including data storage and processing components such as printed circuit boards, as well as video camera lenses. The escalating trade war has kept generalized concerns about China and its trade practices in the public eye and fomented a level of uncertainty in many markets, including physical security. Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods Involvement Of Surveillance In Chinese Human Rights Violations Concerns have surfaced in a Congressional hearing recently about the Chinese government’s surveillance activities targeting the Uyghurs and other Muslim ethnic minorities in the Zinjiang Urghur Autonomous Region (XUAR). Specific attention is being directed at the region’s surveillance system including “thousands of surveillance cameras, including in mosques,” and Hikvision and Dahua were mentioned in the Congressional hearing as profiting from security spending in the area. Increased Global Media Attention The ban has not been widely publicized in the U.S. mainstream media, but the topic has attracted global attention. For example, the Australian Broadcasting Corporation broadcast a 10-minute expose on the use of Chinese-made cameras in Australian government facilities, including “sensitive military facilities.” The report, which mentioned the U.S. ban, noted that “Both [Hikvision and Dahua] have had security flaws be exposed leading to fears that some of the flaws were placed there to help the Chinese government spy.” The report continues: “China is trying to set itself up as the number-one country for cyber-espionage, and this is part of that platform.” How broadly should one interpret the inclusion of "critical infrastructure" mentioned in the bill? Broader Interpretation Of The Bill Beyond The Federal Government The language in the bill leaves a level of ambiguity in terms of the scope of its application, and the security marketplace as a whole has been struggling to understand its full impact. Does the ban only restrict an integrator’s use of Chinese technology on a specific government job, or does it eliminate an integrator who installs the technology (even in non-government projects) from consideration for government jobs? How broadly should one interpret the inclusion of “critical infrastructure” mentioned in the bill, for example, non-governmental facilities? Will other governments and private entities assume they should ban Hikvision and Dahua in order to be compliant? For example, Suffolk, VA., has announced it will not to use Dahua or Hikvision cameras because the federal ban applies to “U.S. government-funded contracts and for critical infrastructure and national security usage.” The result of these developments is a kind of snowball effect, simultaneously drawing attention to the issues and adding new elements to an overall narrative. Taken together, these developments suggest the U.S. ban has set off a level of concern about Chinese companies that will have an industry-transforming impact in the months to come.
Banks must meet their customers' requirements for security in a special way on many levels. Whether it is with their savings, taking advantage of over-the-counter services at a branch office, withdrawing money from the teller machines, making deposits via the cash recycling system, online banking etc. - for a long-lasting, trusting cooperation with a bank, customers demand the highest possible level of security. In order to fulfill these demands, banks rely on sophisticated hardware and software solutions that can be easily and efficiently expanded with MOBOTIX high-resolution video surveillance technology at an optimal cost-benefit ratio. Commerzbank - competent services for private and business customers With around 820 branches, a consolidated balance sheet total of more than 600 billion Euro and almost 36,000 employees, Commerzbank is the second biggest financial institution of its kind in Germany and one of the largest in Europe and in the world. The bank's large number of branches ensures a closely meshed network and customer proximity. In the branches, the trend is towards "more service for the customer" and this of course includes being able to withdraw and deposit cash "around the clock." This, in combination with a sophisticated centralized security system, reduces the threat of criminal attacks. The technical implications of this approach are considerable. Every branch has its own quasi-standardized comprehensive security package installed, in which camera surveillance plays an important role. Once a day, the relevant, locally stored events are transferred via the bank's own data network infrastructure to the bank's security center in Frankfurt and analyzed there. This meets the requirements of the Verwaltungs-Berufsgenossenschaft (VBG - German professional trade association) while keeping the usage of the data lines between the branch and the headquarters to a minimum during opening hours. The dome camera series is suitable for use inside buildings Flexible solutions for special tasks Security-related situations that cannot be solved using the standard package solutions are occurring with increasing frequency. This is where competent and creative service providers, such as ADS Networks GmbH come in, together with intelligent IP-based audio and video solutions from the technology leader MOBOTIX AG. Commerzbank required a pilot system installation in their branch in Erfurt. This branch is situated in a shopping arcade that was frequently used after closing time by numerous skateboarders to pursue their hobby. This deterred many bank customers from accessing the foyer of the building which houses the account statement printer and the ATM for cash withdrawals, thus also damaging the image of Commerzbank. The landlord's suggestion of barring the skaters from the arcade after closing time by installing rolling shutters was expensive and counter-productive since the bank customers would then have been equally unable to access the branch. The task was to present a solution that focused on the customer's needs. ADS Key Account Manager Semsettin Özünal suggested introducing MOBOTIX dome cameras to provide surveillance in the arcade. Thanks to its elegant design, the dome camera series is highly suitable for use inside buildings. The camera models are each equipped with two flexible, adjustable camera modules that can be individually positioned in all directions independently of each other. The cameras are additionally equipped with a microphone and speakers The individual models are available with a range of different lenses. Michael Wihan, branch security specialist at Commerzbank and an open-minded technician, was immediately convinced and impressed by the advantages of the easily and quickly installable solution. The high-resolution color images of the two cameras enable around-the-clock visual surveillance of the arcade by staff at the Commerzbank security center in Frankfurt. The additional data traffic on the dedicated line also proved to be no problem at all since MOBOTIX IP cameras have very low bandwidth requirements. The cameras are additionally equipped with a microphone and speakers that allow the security staff to directly address the skaters in real-time and order them to refrain from their activities. The impact was enormous. After a short period of transition, the arcade is now free of skaters and can be accessed by anyone without any concerns for security - even during evening hours. G8 summit in Heiligendamm A further security challenge for the banks was the G8 summit of the eight largest industrial countries that was held in Heiligendamm in mid-2007. The security experts at Commerzbank had to prepare themselves and take precautions against a potential threat to their branches in the Heiligendamm area by militant globalisation activists. Due to the exceptionally positive experience in Erfurt, Commerzbank again chose MOBOTIX IP camera technology. Within just a few days, the branches in Kröpelin, Roggentin and Warnemünde were visually and acoustically linked to the group's security center. MOBOTIX CCTV technology provided an ideal solution for Commerzbank After the G8 summit, the decision was made to keep the highly effective and affordable security solution in place. It had proven to be valuable both in terms of preventing threats to the branches and improving customer service. In the event of technical problems, a member of staff at the security center can directly communicate with the customer in the branch foyer via the microphone and speakers in the cameras. IP cameras in the "branches of the future" In its "branches of the future", Commerzbank wants to achieve its goal of "more service for the customer". Additional security measures were therefore needed in the self-service areas that house the ATMs. To ensure customer protection, a reliable surveillance system is required in areas where an emergency button is also installed. In order to identify criminals "creeping in" at night, MOBOTIX' high-resolution IP camera technology combined with an intruder detection alarm system offers a convenient method of providing additional, cost-effective security. The highly detailed camera images enable all required information to be extracted from the image provided by one single camera. This makes it unnecessary to install several conventional cameras cutting investment, installation and operational costs, reducing administration, simplifying data storage and alarm analysis, reducing network traffic and increasing the general reliability of the system. Additionally, customers more readily accept the MOBOTIX solution because it is visually more discreet. There is no doubt that the "branch of the future" needs the intelligent, high-resolution IP camera technology from MOBOTIX as an alternative to the increased use of security personnel or other conventional security measures. So it's a good thing that MOBOTIX communication and security technology is already available today for the branch concepts of tomorrow.
As the popularity of internet banking increases, the demand for conventional bank counter activity reduces and we see increased reliance on ATMs or other transaction devices. Making the appropriate infrastructure adaptations represents a big challenge for banks and for their security. The increasing number of unmanned areas mean that security, especially CCTV, is needed more than ever. In fact wherever cash is handled, CCTV is vital: at conventional teller counters and ATMs, at cash centres and at every step along the cash logistics chain, as well as at data centres and other data infrastructure sites.Meantime banks have also been migrating from analog video systems to IP ones, and adding HD or megapixel video. Generally in this situation their initial requirement is for hybrid solutions which can replace a mixture of different system types with one common system while incorporating their existing (predominantly analog) cameras. Geutebrucks’s re_porter_bank+ was conceived as the ideal platform to meet this need. Essentially it is an entry level ‘omnibrid’ business surveillance solution specifically designed and configured for the banking environment which can be used with analog and/or IP cameras.FlexibilityThe re_porter_bank+ is intended for dealing with the variety of situations, components and peripherals found in a large existing network of branches and locations. It comes with 4, 8, 12, or 16 analog inputs which can be expanded up to 19 Geutebruck channels with three IP sources and supports the use of many different brands of IP cameras. With 1Gbit onboard Ethernet the re_porter_bank+ offers TCP/IP-based digital matrix functionality and unlimited (LAN/WAN) integration potential. Each unit can take up to 4 hard disks for video database storage.The re_porter_bank+ has camera position analysis and motion detection features to trigger alarms if there is any tampering with the video system itself or if an intruder is detected in any sensitive areas of the site. It can of course be integrated with existing branch alarm, access control and ATM systems. So at night and out of hours it protects against break-ins and vandalism by detecting intruders, forwarding alarms to a remote control center, carrying out guard tours and documenting events. The re_porter_bank+ protects against break-ins and vandalism by detecting intruders, forwarding alarms, carrying out guard tours and documenting events ‘Omnibrid’ technologyGeutebruck’s ‘omnibrid’ technology allows the use of all current compression algorithms and standards – H.264, H264CCTV, MPEG4CCTV, M JPEG and ONVIF compliance – as well as audio recording, for analog and IP cameras. It supports H264CCTV, H.264 and MJPEG formats with freely configurable resolutions. In addition, it can transcode M-JPEG streams from IP cameras into MPEG4CCTV or MPEG4CCTV/MP (megapixel) CCTV-optimized formats. This has the advantage of enabling the user to use highly advantageous specialist CCTV processes like dual channel streaming (DCS) and dynamic live streaming (DLS) which deliver large network and storage savings.Geutebruck’s video sensors and intelligent video analysis software are well-known for their reliability, while its own specialist, CCTV-friendly, standard-compliant compression processes retain fluid motion, and consequently valuable detail, in situations where the vast majority of other H.264 implementations hesitate and shudder. A key advantage of this new omnibrid technology is that it enables video streams from third-party image sources to be processed using Geutebruck’s proven video analysis software. It therefore provides more scope for intelligent data management, enabling different compression formats to be used for different purposes, and gives system designers much more scope to achieve optimum customisations.An all-in-one banking solutionConceived as an all-in-one banking solution, the re_porter_bank+ more than meets the specifications of the BVG, the body which regulates video security systems in German banks and other cash-handling institutions. Its regulations cover details such as the location of cameras, picture resolutions, recording rates, the format of pre- and post-incident histories, evidential security and even the system maintenance regime – all with a view to deterring hold-ups, or failing that, to obtaining useful evidence of events.As a consequence of this German regulation Geutebruck has extensive experience of exchanging metadata with other systems (e.g. ATMs, access control, building management systems and others) and the capabilities of the re_porter_bank+ include some specialist functions which are now of increasing relevance and interest internationally. For example, the re_porter_bank+ was designed to fulfilll the legal requirement that all German financial institutions should document all cash withdrawals at ATM machines, whether these are on their own premises or in public areas. So where ATMs are located in foyers secured by access control systems, the re_porter can record card data when the customer presents his card to the card reader at the foyer door; video as he enters the foyer; video as he approaches the ATM; a portrait from the portrait camera as the customer’s cash card is read by the ATM; account data as the transaction is processed; video of the customer’s hand taking the cash from the ATM and then video of the scene as he leaves the foyer. In short it provides a comprehensive package of readily available, water-tight evidence on each ‘event’ which avoids the enormous costs which could otherwise be involved in investigating card fraud or vandalism.Securing banks is a company traditionGeutebruck is no newcomer to the banking sector. It owes its very existence to supplying banks with the latest security solutions. In the 1970s it was the development of an unconventional film camera which helped solve German bank robberies and brought early success to the company. Later the long-running Multiscope range of digital video platforms were used in their thousands in banks worldwide. Now Geutebruck’s GeViScope+ is the obvious choice for central banks and major institutions and the re_porter_bank+ the trusty workhorse for high street branch networks.
Refurbishment work was recently completed at the K&N Kenanga International building in Kuala Lumpur, Malaysia, a 22-storey commercial structure with a three-and-a-half-storey annexed podium block, located in Kuala Lumpur's central business district. New features of the refurbished main lobby include a physical access control system based on the contactless LEGIC technology, a food and beverage area and an information counter. Kaba Jaya Security was selected to provide electronic access control, visitor management systems and half-height sensor barriers. The system includes six lanes of Argus HSB E11 for tenants and visitors, one lane of Charon HSD E03 for disabled access, and Kaba Exos® 9300 for electronic access control and visitor management. The completed system provides the K&N Kenanga building with: Access rights management of staff and visitors Efficient reception and management of visitors No long queues during rush hour Integrated Malaysian IC reader Asset protection Increased employee safety Defined access restrictions within the security perimeter Reduced operational cost Fewer administrative expenses A flexible, integrated, efficient security solution All systems integrated One point of responsibility for all three system
This project has a main purpose and goal, which is to connect the main bank office with other bank offices and buildings to achieve secure bank data transfer between all offices. This is very necessary for the bank. In most countries, the systems used for data transfer between companies or banks are based on fiber optic networks such as PSTN and GSM. But in Iraq, the situation is different because Iraq does not have the infrastructure for this network and even if it existed, it would have likely been damaged because of the successive wars that Iraq has known. So, Fidaa Group Co. needed to find an alternative idea to manage the installed network of this bank in order to have a reliable network. Fidaa Group Co. had chosen WiMAX technology from Proxim Wireless for many reasons, which will be discussed later. This project is a premier project in the Middle East and the world using the WiMAX technology in banks network, and we hope it will help to open a new vision of WiMAX technology applications. Why WiMAX? Before Fidaa Group started to find a proper solution for the bank network, there were regular solutions like satellite VSAT connection, SCPC-SCPC, connection with public IP and dynamic SCPC-SCPC VSAT and even the shared satellite systems like DVB-S – RCS, but all of these systems shared four main problems: 1-The high costs – Satellite connections bandwidth used to reach about $3,000.00 for each 1 mbps, whereas it costs nearly $0 after initial up-front equipment costs with WiMAX. 2-The high latency – All satellite systems have minimum data packet latency about 550-750 milliseconds latency, even in ideal situations, which caused problems for real time systems and software. Many real-time applications are sensitive and require less 550 milliseconds of latency to operate synchronously. Many networking companies utilize a very complex technology to overcome these problems, but with WiMAX , this problem had already been solved because the maximum latency is about 10-25 milliseconds – which is considered very fast and suitable for real-time systems that require low latency . 3-The deployment and maintenance – Maintenance, weather affection and time to solve any network problems is very difficult especially when you have a third party network operator like PSTN, GSM, and Satellite Operators. You will not have the ability to solve the network problems compared to your private network if you don’t have a WiMAX network. 4-The security factor is very important especially in banking systems. So in the network of any establishment, it is preferred to use a private network without a third party. This will help to decrease the possibility of data sniffing or to be spied on by anyone. With WiMAX, you have this advantage because it’s your network and you can use the latest security encryptions technologies in the world and have full access of your security employees charged to monitor and control the network 24/7/365 continuously easily which is very difficult to be done in with other technologies. Challenges Fidaa Group thinks WiMAX may threaten the fiber optic network from a cost perspective The challenges of this project could be divided in two sections: the first section is related to the non secure circumstances in Iraq which make work very difficult added to the absence of electricity for more 16 hours per day. Sometimes the workers could not reach work locations for more than a week. The hard weather with a temperature up to 50 degrees Celsius in summer and the connection difficulties between the workers who are supposed to make the alignments because the GSM networks which used to stop for more than a day were also problematic. VHF handsets were also banded. When Fidaa Group looked for a project at a very low budget, the WiMAX network was thousands or millions of dollars cheaper and works extremely well with excellent reliability and low cost running, making us very thankful for this new technology. The company thinks the WiMAX with this large spectrum of frequency (2-80 GHz) and the low cost will be the leader in telecommunication technologies and it may threaten the fiber optic network from a cost perspective. So after these years, we can say that our WiMAX network is working very good, which will encourage us to make other networks for a lot of establishments and gives us more confidence in our abilities and WiMAX’s reliability. Conclusions and recommendations This project had added to Fidaa Group a new experience with the newest technology. The difficult situation in Iraq encouraged us to invent a new application for WiMAX technology in co-operation with Proxim Wireless, something which was not feasible before 2006. Departing from our experience, Fidaa Group recommends using the WiMAX technology in establishment’s networks especially in the countries which don’t have the network infrastructure or even enough budgets for other technologies or need a high secured network. Fidaa Group Company is ready to support any establishment worldwide to get full use of this technology with the lowest costs.
Security Systems Design Limited has successfully completed the installation of a Samsung CCTV system at the London offices of the Commonwealth Bank of Australia. Following a refurbishment of its offices on the third floor of Senator House in Queen Victoria Street, EC4, the Bank asked Richard Slee, a Director of Security Systems Design Limited, to design a CCTV system which could assist security personnel to provide a high level of protection for staff as well as the Bank's assets. The Commonwealth Bank of Australia employs 38,000 people worldwide. Staff at its London offices are responsible for developing strategic partnerships with European banks and they also assist migrants to relocate their finances to Australia. "Senator House is a multi-tenanted office building and although no cash is handled on the premises, the Bank nevertheless needs to maintain strict control over visitors, welcome or otherwise," said Richard Slee. "The objective therefore was to install a CCTV system to work alongside an existing access control system." Richard worked closely with the Bank's Facilities Manager to draw up the specification for the system which included a requirement that all cameras should have day/night capabilities, as well as built-in lighting so that high quality color images could be captured during the day and equally good monochrome images in night time conditions. "We considered cameras as well as digital recording equipment from a number of manufacturers. We came to the conclusion that we could source all that was required from Samsung who were able to demonstrate confidence in the reliability of their equipment by offering a full three year warranty," added Richard Slee. "The other important factor that helped us make the decision to use Samsung equipment was that its DVRs are supplied with license-free CMS (Centralized Management Software) which makes it very easy for the Facilities Manager to monitor the CCTV system from a PC on his desk." The Samsung SIR-60 day/night domes capture high quality color images in any environment with its built-in LEDs Security Systems Design Limited installed Day/Night dome cameras with built-in LEDs. The dome cameras can capture very high quality color images at 580TV lines resolution during the day. At night or in any environment where there may be zero light, the camera's built-in LEDs are activated and provide effective lighting up to a distance of seven metres. At the same time, the camera switches to monochrome mode generating superb monochrome images at 700TV lines resolution. The brightness of the LEDs is automatically adjusted to take into account how far away an object or person is from the camera. Images from the nine cameras are recorded simultaneously onto a Samsung DVR which uses a highly efficient MPEG-4 compression method to ensure that the three terabytes of on-board video storage capacity is more than enough to record all activity throughout the Bank's offices. The SVR-945 is located in the Bank's secure comms room. "In the current economic climate, the client was understandably looking for a solution which would not put undue strain on the budget available for security equipment," added Richard Slee. "I am pleased to say that we have been able to provide equipment which can be regarded as the best in its class and is able to exactly match the Bank's demanding requirements."
The Milestone Systems open platform IP video management software is an important tool for Loomis Denmark to ensure transparency throughout the entire cash services process. The transport and counting of cash, financial documents and other valuables is a business that demands ongoing attention to security, which is well covered by Milestone XProtect Corporate managing network cameras from Axis and megapixel cameras from IQinVision documenting every detail of the activities."For us security has the highest priority, for obvious reasons. Our customers' livelihoods are literally in our hands when we carry out our work, so it is therefore vital that there is a strong relationship of trust. And this relates not only to our customers but also just as importantly to our employees, who handle all the assets on a daily basis," explains Risk Manager Tom Andersen at Loomis.Loomis utilizes a number of security measures, where video surveillance plays a big role. Every day over 100 cameras in the Glostrup location and a similar number in the city of Brabrand help to ensure that all procedures and security processes are being upheld. Thereby Loomis makes sure that every instance of cash handling is documented so any eventual irregularity can quickly be resolved. The surveillance technology is based on Milestone Systems open platform IP video management software, XProtect Corporate, with network cameras from Axis and IQinVision. With just a few clicks, operators can control different cameras at the same time and view the live or archived video from any location. Loomis monitors all the entrances and exits, cash handling areas, receiving and deliveries, in addition to the outer perimeters of their premises. The 1st of April 2008 is a day that Loomis will never forget. That night at 3:32 a.m. the police received a robbery alarm from Loomis: a group of men had busted into the cash handling company's building by breaking a hole through the wall with a telescope laser, and managed to get away with DK 62 million. The biggest robbery in the history of Denmark thereby became a reality, despite all of the security measures they had in place at that time. Loomis immediately went to work reviewing all their procedures and systems to improve their security even more. "Of course the robbery sharpened our focus on security! Our business always has to live with the risk of robberies but we can make it more and more difficult for any attempts by dividing our security elements and defences into different levels that hinder and delay any criminal efforts so much that the police can manage to arrive and deal with it. One of our important components is the video surveillance, which is also a fantastic tool for the police to use as evidence in their work," says Tom Andersen, who emphasises that Loomis makes ongoing changes to their security procedures all the time.When the robbery occurred, Loomis had operations at night for cash counting so there were employees present at the time of the incident. Today, Loomis only operates during the day, and another part of the increased defense of the building includes new alarms installed to warn when anyone is even getting near the building from the outside. Loomis previously had an analog system that became outdated, so after a thorough review of their security needs in collaboration with SmartGuard, a Certified Milestone Partner, it became clear that the open platform IP video solution from Milestone Systems provided all of the right options. Transparency and documentation for top integrity The open platform IP video solution from Milestone Systems provided all of the right options for Loomis When an employee is hired, he or she must go through a series of security procedures such as credit and police arrest record checks. Yet even though Loomis takes all these precautions, it is still necessary to have an extra guarantee of accountability, which the video surveillance ensures. Today there are many cameras in the work stations. The zoom functions in the software combined with the megapixel cameras from IQinVision deliver the sharpest images of money bags being opened, and the money counting is monitored from different angles. The video information can be compared with the customers' records so any eventual differences can be revealed and resolved. This saves time and provides thorough documentation and integrity for the asset management process. "With the video surveillance we can document that we do our work properly and this strengthens our objective role with our customers. The video also helps us ensure things for our employees: should anything questionable come up, we can immediately go back in the recorded video and see that the task was handled correctly," says Andersen."The reason that we chose Milestone was precisely because the solution includes an intelligent SmartSearch function that lets us click quickly to the exact date and time for the scanning of a particular money bag and view it. We can also look for an object that's disappeared simply by marking it in the images," he adds, and concludes: "The video monitoring makes it possible for us to live up to our promise of transparency and documentation for our customers. And the Milestone open IP platform also allows us to integrate the system with other innovative solutions over time. This creates a high level of flexibility, and is just one of the ways in which we have future-proofed our business."