Banking & Finance security applications
PINs protect, just ask your credit card company. How many rooms at your office shouldn’t offer an open access, free-for-all? Probably quite a few. But expecting everyone to keep them locked, and the key-carrying and-tracking that entails, is unrealistic. This is when you need Code Handle. Access control system This simple, secure, easy-to-fit handle works with your current door lock. There is no need for you to change the door lock mechanism; just replace the existing handle to add PIN s...
Financial institutions require reliable IP video surveillance systems that provide high-performance, quality, and scalability. Unfortunately, with limited budgets, many financial institutions are still utilising outdated appliances. When security is not a priority, they are putting themselves at risk for fraud, theft, and data breaches. Security Integrators have an opportunity to help financial institutions by upgrading their systems with an up-to-date NVR server and overall video surveillance...
Columbia Bank, a Northwest community bank headquartered in Tacoma, Washington, sought to upgrade their video surveillance solution to improve image quality and retention time. They also wanted to maximize field of view to deliver a more forceful and expansive – yet, less intrusive – solution. Working with Cook Security Group, Inc., Ross Armstrong, vice president of physical security at Columbia Bank, chose to overhaul video surveillance in their 150-plus branches across the Northwes...
Brian Ishikawa has always kept tight control over his video surveillance system, allowing only authorized personnel within his corporate security division to access video footage. So it was a change for Ishikawa, Senior Vice President and Director of Corporate Security for the Bank of Hawaii, to get used to the idea of authorized staff from the bank’s branch division being able to review video for operational, compliance and marketing-related purposes. The insights collected from the vide...
Retail banking combines a demand for high security with complex workflows. Staff need efficient access. Facility managers need the flexibility to design access permissions around individual needs, so not everyone can access every area whenever they choose. Nobody wants to carry or track large numbers of keys. These were the requirements, managers of Creval — a regional bank in Italy — faced when seeking an alternative to a mechanical master-key system. Creval needed new access contr...
Retail banks and financial services companies have a long history of dealing with the risk and potential threat of criminal activity. Arecont Vision Costar understands the unique needs of the retail banking and financial services market and provides customer-proven megapixel camera technology to specifically meet those needs for our customers around the world. Bank Crime Statistics In a typical year in the United States, according to the FBI cash losses total around $7.5 million, only about...
Motorola Solutions has agreed to acquire IndigoVision, a U.K.-based provider of end-to-end video security solutions. The boards of Motorola Solutions, its holding company and IndigoVision have reached an agreement on the terms of a recommended cash acquisition for approximately $37.2 million, representing a premium of approximately 116 percent based on the average share price over the most recent 12-month period. The acquisition will be funded by existing cash resources of Motorola Solutions and become final in May 2020. Motorola Solutions has a strong presence in the large and expanding area of video security since acquiring Avigilon in March 2018. Their product offerings include high-definition cameras, advanced video analytics, network video management hardware and software and access control solutions. IndigoVision is a developer of complete, end-to-end video security solutions from cameras to video recorders to body worn cameras to security management software. Motorola Solutions says the IndigoVision range of products, global presence and customer base are "highly complementary" to Motorola Solutions' existing presence in video security. Among the benefits is enhanced geographical reach across a wider customer base. "The access we will now have to Motorola Solutions' range of innovative technologies will create new opportunities for IndigoVision and enable us to bring an exciting proposition to the market that allows us to further deliver on our goal of delivering safety, security and business intelligence," says Pedro Vasco Simoes, Chief Executive Officer of IndigoVision. "We share IndigoVision's commitment to providing next-generation, end-to-end video security solutions that enhance safety, security and efficiency," says John Kedzierski, Senior Vice President, Video Security Solutions, Motorola Solutions.
With just days left until the planned industry trade show, Reed Exhibitions has canceled ISC West over concerns about the COVID-19 coronavirus. Here is the statement on the decision: 'We at ISC West want to express our concern for everyone impacted by the COVID-19 coronavirus. Based on our close monitoring of ongoing developments with the virus, recent reports from public health officials and extensive consultation with our partners in the global security community, ISC West, scheduled to be held March 17-20, will now occur in July at the Sands Expo Center in Las Vegas. We take pride in offering vital business opportunities to our customers, including networking, education and access to new products and technologies, and commit ourselves to making July’s ISC West 2020 event live up to high standards. Over the coming weeks, along with ISC West’s Premier Sponsor SIA - we will continue to serve the industry, creating ways to connect, collaborate and keep our world moving during this difficult period.'
With growing concerns over the COVID-19 coronavirus, Motorola Solutions and its Avigilon brand have released a statement on their decision to pull out of this year's ISC West. The trade show, one of the biggest in the security industry, hosts over 30,000 security professionals and over 1000 exhibitors each year. The company states: "After careful consideration, we have withdrawn from this year’s ISC West trade show due to the widespread impact of the coronavirus." Official sources of updates "While ISC West is one important opportunity to demonstrate the power of Motorola Solutions' video security and analytics portfolio, the safety and well-being of our employees, customers and partners is our top priority. We are grateful to the ISC West organizers for their understanding and look forward to attending and supporting future ISC West events." ISC West will occur as scheduled March 17th through 20th, 2020, says Reed Exhibitions, despite the concerns. A statement from the show organizers is as follows: "While we regret that some companies have made the decision not to take part in ISC West 2020, we are focused on making ISC West 2020 a successful, safe, and enjoyable event for all attendees and exhibitors."
ISC West will occur as scheduled March 17th through 20th, 2020, says Reed Exhibitions. Following is a statement from show organizers: We take pride in offering vital business opportunities to our customers, including networking, education and access to new products and technologies and are working diligently to ensure ISC West 2020 and our other events live up to our high standards. While we regret that some companies have made the decision not to take part in ISC West 2020, we are focused on making ISC West 2020 a successful, safe, and enjoyable event for all attendees and exhibitors. Close Monitoring Over the last few weeks, Reed Exhibitions and our partners in ISC West have been closely monitoring the COVID-19 virus and its impact on members of the global security community. We are collaborating closely with the Sands Expo Center and local public health authorities and following local, state and federal public health guidelines, including those issued by the CDC. We have additional precautionary measures in place, including enhanced cleaning and sanitization across all public areas and customer touchpoints in the show and we are constantly reviewing our health protection activities, public health messaging, hygiene and medical control measures with the aim of strengthening our COVID-19 response further in line with up to date public health advice and guidance, including that of the CDC. Health and Safety We will continue to provide updates on our website as we get closer to ISC West. The health and safety of our team members and guests is our utmost priority. Our policies and best practices are in close collaboration with our venue partner, Sands Expo Center. The Sands Emergency Management Team works closely with local officials and are taking appropriate steps to protect team members and guests as outlined by the Centers for Disease Control and Prevention (CDC) and the Southern Nevada Health District (SNHD). Sands is prepared to follow any additional protocols or guidance, as they are made available by the CDC or SNHD.
Rapiscan Systems RTT 110 is the first high-speed Computed Tomography Explosive Detection System (EDS) to be approved on TSA's Air Cargo Screening Technology List (ACSTL). This was achieved last month after a thorough testing process with the TSA and means that the RTT 110 will now undergo further field test activities which it must pass before it can be formally qualified. The RTT 110 has revolutionized the EDS market by providing exceptional performance at significantly lower cost of ownership. With its unique stationary gantry design and belt speed of 0.5m/s, the RTT 110 produces industry-leading high-resolution full volumetric 3D images at high speed, giving excellent security. Reliable and effective high-Speed screening “We are very excited to be included on the ACSTL and the only approved CT EDS on the list”, said Mal Maginnis, President, Rapiscan Systems. “Our teams have worked extremely hard to create an exceptional product which we are all proud of. The technology has been designed to the highest quality to provide reliable and effective high-speed screening with many features ideally suited for the fast parcel industry and we are really pleased that our hard work is now being recognized”. By February 2021, all cargo shipments leaving, entering or traveling within the USA must be screened by a product included on the latest TSA’s Air Cargo Screening Technology List (ACSTL). The RTT 110 is the only EDS to be approved by the TSA and to be included on the ACSTL.
Cybersecurity services and Integrated Risk Management solutions provider SureCloud has announced that it has been accredited to provide Simulated Target Attack and Response (STAR) Intelligence-Led Penetration Testing services by the not-for-profit accreditation and certification body, CREST that represents the technical information security market. CREST developed the STAR framework to deliver intelligence-led cybersecurity testing, incorporating advanced penetration testing and threat intelligence services to more accurately replicate cybersecurity threats to critical assets. To meet CREST’s stringent requirements to secure STAR service provider status, SureCloud had to demonstrate its robust methodologies and sophisticated capabilities relating to the latest vulnerabilities and cybercrime techniques, as well as meeting government and risk management requirements. We have recognized their high professional service standards and the rigorous approach" Mitigating risks President of CREST, Ian Glover said, “SureCloud has been successfully assessed against our strict criteria for the supply of Simulated Target Attack and Response (STAR) Intelligence-Led Penetration Testing services. In accrediting SureCloud, we have recognized their high professional service standards and the rigorous approach they take in helping their customers mitigate risks and safeguard against advanced cyber-attacks. We congratulate them on this excellent achievement.” SureCloud’s VP of Cybersecurity, Mike Harrison, said, “The CREST STAR accreditation is a real testament to our capabilities as a business and it’s an important industry benchmark for delivering STAR intelligence-led penetration testing services. We’re proud to be amongst only 5% of UK penetration testing vendors that have been awarded this accreditation and are therefore able to offer STAR services in line with the high standards set by CREST. The fact we can deliver this excellent service through our vulnerability management platform means further value for our clients.” This accreditation reinforces the strong performance of the SureCloud team in undertaking Red-Team simulated Cyber Attack services for their clients. Techniques used are typically a blend of penetration testing, social engineering and physical breach attempts, with the overall aim being that organizations can prevent, detect and respond to the attack as if it were real. Crucially, this gives them a realistic overview for testing crisis management procedures, and how they might need to improve. SureCloud’s Penetration Testing services have been CHECK approved since 2009 Minimizing risks of potential data breaches Given the complexity of these engagements, the standards you need to achieve a STAR accreditation are set exceptionally high, as it is imperative that the increasing number of organizations looking to undertake these engagements can understand who has the capability to deliver the highest quality service to them. SureCloud’s Penetration Testing services have been CHECK approved since 2009, and has been re-certified by the Payment Card Industry Security Standards Council (PCI SSC) as a PCI Approved Scanning Vendor (PCI ASV) for more than 10 years running. SureCloud is certified by internationally recognized ISO/ IEC 27001 for achieving operational excellence, minimizing the risks of potential data breaches. SureCloud is also certified by Cyber Essentials Plus, complying with the requirements of the scheme, which focuses on technical control themes such as firewalls, secure configuration, user access control, malware protection and patch management.
News reports and opinion columns about face recognition are appearing everyday. To some of us, the term sounds overly intrusive. It even makes people shrink back into their seats or shake their head in disgust, picturing a present-day dystopia. Yet to others, face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crime. What are the facts about face recognition? Which side is right? Well, there is no definitive answer because, as with all powerful tools, it all depends on who uses it. Face recognition can, in fact, be used in an immoral or controversial manner. But, it can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence. Concerns of facial recognition With the increased facial recognition applications, people’s concerns over the technology continuously appear throughout news channels and social media. Some of the concerns include: Privacy: Alex Perry of Mashable sums up his and most other peoples’ privacy concerns with face recognition technology when he wrote, “The first and most obvious reason why people are unhappy about facial recognition is that it's unpleasant by nature. Increasing government surveillance has been a hot-button issue for many, many years, and tech like Amazon's Rekognition software is only making the dystopian future feel even more real”. Accuracy: People are worried about the possibilities of inaccurate face detection, which could result in wrongful identification or criminalization. Awareness: Face recognition software allows the user to upload a picture of anyone, regardless of whether that person knows of it. An article posted on The Conversation states, “There is a lack of detailed and specific information as to how facial recognition is actually used. This means that we are not given the opportunity to consent to the recording, analyzing and storing of our images in databases. By denying us the opportunity to consent, we are denied choice and control over the use of our own images” Debunking concerns The concerns with privacy, accuracy, and awareness are all legitimate and valid concerns. However, let us look at the facts and examine the reasons why face recognition, like any other technology, can be responsibly used: Privacy concerns: Unlike the fictional dystopian future where every action, even in one’s own home, is monitored by a centralized authority, the reality is that face recognition technology only helps the security guard monitoring public locations where security cameras are installed. There is fundamentally no difference between a human security guard at the door and an AI-based software in terms of recognizing people on watchlist and not recognizing those who are not. The only difference is that the AI-based face recognition software can do so at a higher speed and without fatigue. Face recognition software only recognizes faces that the user has put in the system, which is not every person on the planet, nor could it ever be. Accuracy concerns: It is true that first-generation face recognition systems have a large margin for error according to studies in 2014. However, as of 2020, the best face recognition systems are now around 99.8% accurate. New AI models are continuously being trained with larger, more relevant, more diverse and less biased datasets. The error margin found in face recognition software today is comparable to that of a person, and it will continue to decrease as we better understand the limitations, train increasingly better AI and deploy AI in more suitable settings. Awareness concerns: While not entirely comforting, the fact is that we are often being watched one way or another on a security camera. Informa showed that in 2014, 245 million cameras were active worldwide, this number jumped to 656 million in 2018 and is projected to nearly double in 2021. Security camera systems, like security guards, are local business and government’s precaution measures to minimize incidents such as shoplifting, car thefts, vandalism and violence. In other words, visitors to locations with security systems have tacitly agreed to the monitoring in exchange for using the service provided by those locations in safety, and visitors are indeed aware of the existence of security cameras. Face recognition software is only another layer of security, and anyone who is not a security threat is unlikely to be registered in the system without explicit consent. The benefits In August 2019, the NYPD used face recognition software to catch a rapist within 24 hours after the incident occurred. In April 2019, the Sichuan Provincial Public Security Department in China, found a 13-year-old girl using face recognition technology. The girl had gone missing in 2009, persuading many people that she would never be found again. Face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crimeIn the UK, the face recognition system helps Welsh police forces with the detection and prevention of crime. "For police it can help facilitate the identification process and it can reduce it to minutes and seconds," says Alexeis Garcia-Perez, a researcher on cybersecurity management at Coventry University. "They can identify someone in a short amount of time and in doing that they can minimize false arrests and other issues that the public will not see in a very positive way". In fact, nearly 60% Americans polled in 2019 accept the use of face recognition by law enforcement to enhance public safety. Forbes magazine states that “When people know they are being watched, they are less likely to commit crimes so the possibility of facial recognition technology being used could deter crime”. Saving time One thing that all AI functions have been proven to achieve better results than manual security is speed. NBC News writes, “Nearly instantaneously, the program gives a list of potential matches loaded with information that can help him confirm the identity of the people he’s stopped - and whether they have any outstanding warrants. Previously, he’d have to let the person go or bring them in to be fingerprinted”. Facial recognition can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence With AI, instead of spending hours or days to sift through terabytes of video data, the security staff can locate a suspect within seconds. This time-saving benefit is essential to the overall security of any institution, for, in most security threat situations, time is of the utmost importance. Another way in which the technology saves time is its ability to enable employees (but not visitors) to open doors to their office in real-time with no badge, alleviating the bottleneck of forgotten badge, keycode or password. Saving money A truly high-performance AI software helps save money in many ways. First, if the face recognition software works with your pre-existing camera system, there is no need to replace cameras, hence saving cost on infrastructure. Second, AI alleviates much of the required manual security monitoring 24/7, as the technology will detect people of interest and automatically and timely alert the authorities. Third, by enhancing access authentication, employees save time and can maximize productivity in more important processes. The takeaway AI-enabled face recognition technology has a lot of benefits if used correctly. Can it be abused? Yes, like all tools that mankind has made from antiquity. Should it be deployed? The evidence indicates that the many benefits of this complex feature outweigh the small chance for abuse of power. It is not only a step in the right direction for the security industry but also for the overall impact on daily lives. It helps to make the world a safer place.
Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data center, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. CV-19 means that huge numbers of people are getting access to the same desktop and files, and collaborative communication toolsBut as we know, CV-19 means that huge numbers of people are getting access to the same desktop and files, applications and collaborative communication tools that they do on a regular basis from the office or on the train. Indeed, the new generation of video conferencing technologies come very close to providing an “almost there” feeling. Hackers lie in wait Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical servers. Less than a month ago, we emerged from a period of chaos. For months hackers had been exploiting a vulnerability in VPN products from Pulse Secure, Fortinet, Palo Alto Networks, and Citrix. Patches were provided by vendors, and either companies applied the patch or withdrew remote access. As a result, the problem of attacks died back. But as companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on. That’s because remote desktop protocol (RDP) has been for the most part of 2019, and continues to be, the most important attack vector for ransomware. Managing a ransomware attack on top of everything else would certainly give you sleepless nights. As companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical serversExposing new services makes them also susceptible to denial of service attacks. Such attacks create large volumes of fake traffic to saturate the available capacity of the internet connection. They can also be used to attack the intricacies of the VPN protocol. A flow as little as 1Mbps can perturbate the VPN service and knock it offline. CIOs, therefore, need to acknowledge that introducing or extending home working broadens the attack surface. So now more than ever it’s vital to adapt risk models. You can’t roll out new services with an emphasis on access and usability and not consider security. You simply won’t survive otherwise. Social engineering Aside from securing VPNs, what else should CIO and CTOs be doing to ensure security? The first thing to do is to look at employee behavior, starting with passwords. It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposed. Best practice would be to get all employees to reset their passwords as they connect remotely and force them to choose a new password that complies with strong password complexity guidelines. As we know, people have a habit of reusing their passwords for one or more online services – services that might have fallen victim to a breach. Hackers will happily It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposedleverage these breaches because it is such easy and rich pickings. Secondly, the inherent fear of the virus makes for perfect conditions for hackers. Sadly, a lot of phishing campaigns are already luring people in with the promise of important or breaking information on COVID-19. In the UK alone, coronavirus scams cost victims over £800,000 in February 2020. A staggering number that can only go up. That’s why CIOs need to remind everyone in the company of the risks of clickbait and comment spamming - the most popular and obvious bot techniques for infiltrating a network. Notorious hacking attempts And as any security specialist will tell you, some people have no ethics and will exploit the horrendous repercussions of CV-19. In January we saw just how unscrupulous hackers are when they started leveraging public fear of the virus to spread the notorious Emotet malware. Emotet, first detected in 2014, is a banking trojan that primarily spreads through ‘malspam’ and attempts to sneak into computers to steal sensitive and private information. In addition, in early February the Maze ransomware crippled more than 230 workstations of the New Jersey Medical Diagnostics Lab and when they refused to pay, the vicious attackers leaked 9.5GB or research data in an attempt to force negotiations. And in March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHO and healthcare organizations in general since the pandemic broke. We’ll see lots more opportunist attacks like this in the coming months. More speed less haste In March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHOFinally, we also have bots to contend with. We’ve yet to see reports of fake news content generated by machines, but we know there’s a high probability it will happen. Spambots are already creating pharmaceutical spam campaigns thriving on the buying behavior of people in times of fear from infection. Using comment spamming – where comments are tactically placed in the comments following an update or news story - the bots take advantage of the popularity of the Google search term ‘Coronavirus’ to increase the visibility and ranking of sites and products in search results. There is clearly much for CIOs to think about, but it is possible to secure a network by applying some well thought through tactics. I believe it comes down to having a ‘more speed, less haste’ approach to rolling out, scaling up and integrating technologies for home working, but above all, it should be mixed with an employee education program. As in reality, great technology and a coherent security strategy will never work if it is undermined by the poor practices
Artificial Intelligence. You’ve heard the words in just about every facet of our lives, just two words, and they’re quite possibly the most moving, life-changing words employed in everyday conversations. So what exactly is AI, who currently uses it and should be using it? What is AI? AI is a powerful way of collecting, qualifying and quantifying data toward a meaningful conclusion to help us reach decisions more quickly or automate processes which could be considered mundane or repetitive. AI in its previous state was known as “machine learning” or “machine processing” which has evolved into “deep learning” or, here in the present, Artificial Intelligence. AI as it applies to the security and surveillance industry provides us the ability to discover and process meaningful information more quickly than at any other time in modern history. Flashback - VCR tapes, blurred images, fast-forward, rewind and repeat. This process became digital, though continued to be very time-consuming. Today’s surveillance video management systems have automated many of these processes with features like “museum search” seeking an object removed from a camera view or “motion detection” to create alerts when objects move through a selected viewpoint. These features are often confused with AI, and are really supportive analytics of the Artificial Intelligence, not AI themselves. Machine Learning Fully appreciating AI means employment of a machine or series of machines to collect, process and produce information obtained from basic video features or analytics. What the machines learn depends on what is asked of them. The truth is, the only way the AI can become meaningful is if there is enough information learned to provide the results desired. If there isn’t enough info, then we must dig deeper for information or learn more, properly described as “deep-learning” AI. Translated, this means that we need to learn more on a deeper level in order to obtain the collaborative combined information necessary to produce the desired result. Deep learning AI Deep learning AI can afford us the ability to understand more about person characteristic traits & behaviors. Applying this information can then further be applied to understand how to interpret patterns of behavior with the end goal of predictable behavior. This prediction requires some degree of human interpretation so that we are able to position ourselves to disrupt patterns of negative behavior or simply look for persons of interest based on these patterns of behavior. These same patterns evolve into intelligence which over time increases the machine’s ability to more accurately predict patterns that could allow for actions to be taken as a result. This intelligence which is now actionable could translate to life safety such as stopping a production manufacturing process, if a person were to move into an area where they shouldn’t be which might put them in danger. Useful applications of intelligence Informative knowledge or intelligence gathered could be useful in retail applications as well by simply collecting traffic patterns as patrons enter a showroom. This is often displayed in the form of heat mapping of the most commonly traveled paths or determining choke points that detract from a shopper’s experience within the retail establishment. It could also mean relocating signage to more heavily traveled foot-paths to gain the highest possible exposure to communicating a sale or similar notice, perhaps lending itself to driving higher interest to a sale or product capability. Some of this signage or direction could even translate to increased revenues by realigning the customer engagement and purchasing points. Actionable Intelligence From a surveillance perspective, AI could be retranslated to actionable intelligence by providing behavioral data to allow law enforcement to engage individuals with malicious intent earlier, thus preventing crimes in whole or in part based on previously learned data. The data collection points now begin to depart from a more benign, passive role into an actionable role. As a result, new questions are being asked regarding the cameras intended purpose or role of its viewpoint such as detection, observation, recognition or identification. Detecting human presence By way of example, a camera or data collector may need to detect human presence, as well as positively identify who the person is. So the analytic trip line is crossed or motion box activated or counter-flow is detected which then creates an alert for a guard or observer to take action. Further up the food chain, a supervisor is also notified and the facial characteristics are captured. These remain camera analytics, but now we feed this collected facial information to a graphic processing unit (GPU) which could be employed to compare captured characteristics with pre-loaded facial characteristics. When the two sources are compared and a match produced, an alert could be generated which results in an intervention or other similar action with the effort of preventing a further action. This process- detect, disrupt, deter or detain could be considered life-saving by predictably displaying possible outcomes in advance of the intended actions. The next level is deep-learning AI which employs the same characteristics to determine where else within the CCTV ecosystem the individual may have been previously by comparatively analyzing other collected video data. This becomes deep-learning AI when the GPU machine is able to learn from user-tagged positive identification, which the machine learns and begins to further reprocess its own data to further understand where else the person of interest (POI) may have existed on the ecosystem and more correctly improve its own predictive capabilities, thus becoming faster at displaying alerts and better at the discovery of previously archived video data. The future In conclusion, the future of these “predictables” wholly rests in the hands of the purchasing end-user. Our job is to help everyone understand the capabilities and theirs is to continue to make the investment so that the research perpetuates upon itself. Just think where we’d be if purchasers didn’t invest in the smartphone?
Even though ISC West 2020 was canceled, many of the product introductions planned for the trade show still happened. For example, physical security and secure identification company Identiv introduced the Hirsch Velocity Cirrus and MobilisID. Hirsch Velocity Cirrus is a cloud-based Access Control as a Service (ACaaS) solution. It is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. Smart mobile physical access control solution Identiv’s MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. We caught up with Jason Spielfogel, Identiv’s Director of Product Management, to discuss the new products and other topics. Q: How is Identiv positioned in the market as a whole? What philosophy drives your product offerings? What vertical markets do you target? Every customer needs every one of these components Spielfogel: Identiv provides a total solution. Our platforms provide access control hardware and software, video surveillance and analytics, door access readers, and ID credentials, both cards and mobile, for a variety of vertical markets: Federal government, state, local and education government agencies (SLED), healthcare, schools, banks/financial services, retail, airports and transportation, and infrastructure. Every customer needs every one of these components in every physical security deployment, and we ensure that all parts are working together at all times, even as technology continues to evolve. With that said, our philosophy is very customer-centric, and we position ourselves as a trusted partner. Our products and technology platform always strive to reflect and anticipate the environment our customers are facing, both in terms of technical requirements and functional capabilities. Q: How does the MobilisID system eliminate "friction?" Spielfogel: Identiv’s MobilisID eliminates the “friction” of access control by forgiving the user from presenting a physical credential to the reader. A simple wave of their hand over the MobilisID reader establishes a connection, and the reader reads their mobile device’s credential from the MobilisID app. No badge or access card to read, and no contact with the reader, makes this a frictionless access control experience. Administrative friction is also eliminated because there is no physical credential to issue or withdraw; it’s all done via the MobilisID Manager. Q: Discuss the advantages of Bluetooth over competing technologies. Bluetooth offers a blend of reliability and specificity Spielfogel: There are two primary competing technologies: WiFi and Near Field Communication (NFC). The problem with WiFi is that it’s not location-specific. In other words, the WiFi router can’t tell which door the user is near. NFC has the opposite problem in that it’s impossible to get credential reads unless the phone is presented within an inch or two of the reader. Bluetooth offers a blend of reliability and specificity to create frictionless access. Q: "Touchless" has always been a big selling point. Doesn't the coronavirus improve the outlook for these systems even more? Spielfogel: The coronavirus certainly highlights the value of frictionless access. But the vast majority of access systems today use proximity which was already touchless. But for systems using touchpads or contact-based credentialing, certainly frictionless is offering some alternatives that would help keep employees and visitors safer in the current climate. Q: How else might the current pandemic change the security market forever (i.e., more teleworking?) Spielfogel: Permanent changes are not likely, but it does force security directors to rethink how their employees interact physically with systems for both physical and logical access. As a result, we might see accelerated adoption of some emerging technologies, such as greater use of mobile logical access solutions, as well as frictionless physical access control. We’ve already seen an uptick in our smart card reader and token line and our Thursby enterprise and personal mobility offering during the coronavirus pandemic. Q: There are a lot of cloud systems in the access control space. How is your Cirrus cloud product different? Velocity already has all those features Spielfogel: Cirrus is different from many others in that it’s built on one of the most mature, feature-rich, secure physical access solutions available today – Hirsch hardware and Velocity Software. While many competitors are scrambling to add features to their relatively new ACaaS platforms, Velocity already has all those features. While they are building up their encryption capabilities and cybersecurity testing, we’ve already been doing that for two decades. We certainly have some more development ahead of us for Cirrus, but most of it is just surfacing features we already have into the Cirrus interface. Q: How do you guide customers as their needs change? Spielfogel: Whether users want solutions that are on-prem, in the cloud, or anything in between, Identiv’s full architecture ensures that customers can adopt and migrate to new solutions as they see fit. No two customers are alike, so providing the flexibility to gradually update or change systems is a real differentiator. Our competitors either want customers to jump all at once to the cloud or push to keep everything on-prem/legacy. CSOs and CISOs live in a different world: They've got it all to deal with. We're there with them across all of it, because that's the true reality.
The global pandemic caused by the novel coronavirus is changing work environments to an unprecedented degree. More employees than ever are being asked to work remotely from home. Along with the new work practices comes a variety of security challenges. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Covid-19 concerns Concerns about the coronavirus have increased the business world’s dependence on teleworking. According to Cisco Systems, WebEx meeting traffic connecting Chinese users to global workplaces has increased by a factor of 22 since the outbreak began. Traffic in other countries is up 400% or more, and specialist video conferencing businesses have seen a near doubling in share value (as the rest of the stock market shrinks). Basic email security has remained unchanged for 30 years Email is a core element of business communications, yet basic email security has remained unchanged for 30 years. Many smaller businesses are likely to still be using outdated Simple Mail Transfer Protocol (SMTP) when sending and receiving email. “The default state of all email services is unencrypted, unsecure and open to attack, putting crucial information at risk,” says Paul Holland, CEO of secure email systems provider Beyond Encryption. “With remote working a likely outcome for many of us in the coming weeks, the security and reliability of our electronic communication will be a high priority,” says Holland. The company’s Mailock system allows employees to work from any device at home or in the office without concerns about data compromise or cybersecurity issues. Acting quickly and effectively As the virus spreads, businesses and organizations will need to act quickly to establish relevant communication with their employees, partners and customers surrounding key coronavirus messages, says Heinan Landa, CEO and Founder of IT services firm Optimal Networks. Employers should also enact proper security training to make sure everyone is up to speed with what’s happening and can report any suspicious online activity. Reviewing and updating telework policies to allow people to work from home will also provide flexibility for medical care for employees and their families as needed. Scammers, phishing, and fraud An additional factor in the confusing environment created by the coronavirus is growth in phishing emails and creation of domains for fraud. Phishing is an attempt to fraudulently obtain sensitive information such as passwords or credit card information by disguising oneself as a trusted entity. Landa says homebound workers should understand that phishing can come from a text, a phone call, or an email. “Be wary of any form of communication that requires you to click on a link, download an attachment, or provide any kind of personal information,” says Landa. Homebound workers should understand that phishing can come from a text, a phone call, or an email Email scammers often try to elicit a sense of fear and urgency in their victims – emotions that are more common in the climate of a global pandemic. Attackers may disseminate malicious links and PDFs that claim to contain information on how to protect oneself from the spread of the disease, says Landa. Ron Culler, Senior Director of Technology and Solutions at ADT Cybersecurity, offers some cyber and home security tips for remote workers and their employers: When working from home, workers should treat their home security just as they would if working from the office. This includes arming their home security system and leveraging smart home devices such as outdoor and doorbell cameras and motion detectors. More than 88% of burglaries happen in residential areas. When possible, it’s best to use work laptops instead of personal equipment, which may not have adequate antivirus software and monitoring systems in place. Workers should adhere to corporate-approved protocols, hardware and software, from firewalls to VPNs. Keep data on corporate systems and channels, whether it’s over email or in the cloud. The cyber-protections that employees depended on in the office might not carry over to an at-home work environment. Schedule more video conferences to keep communication flowing in a controlled, private environment. Avoid public WiFi networks, which are not secure and run the risk of remote eavesdropping and hacking by third parties. In addition to work-from-home strategies, companies should consider ways to ensure business cyber-resilience and continuity, says Tim Rawlins, Director and Senior Adviser for risk mitigation firm NCC Group. “Given that cyber-resilience always relies on people, process and technology, you really need to consider these three elements,” he says. “And your plan will need to be adaptable as the situation can change very quickly.” Employees and their employers Self-isolation and enforced quarantine can impact both office staff and business travelers Self-isolation and enforced quarantine can impact both office staff and business travelers, and the situation can change rapidly as the virus spreads, says Rawlins. Employees should be cautious about being overseen or overheard outside of work environments when working on sensitive matters. The physical security of a laptop or other equipment is paramount. “It’s also important to look at how material is going to be backed up if it’s not connected to the office network while working offline,” says Rawlins. It’s also a good time to test the internal contact plan or “call tree” to ensure messages get through to everyone at the right time, he adds.
HID Global is introducing a new “flagship” line of access control readers as successors to the iCLASS line. The new HID Signo readers will support 15 different credentialing formats and communicate using the latest NFC (near field communication), BLE (Bluetooth Low Energy) and OSDP (Open Supervised Device Protocol) standards. HID Global says the new readers will simplify integration to more secure and mobile credentials. HID Global has invested in a “future-proof” approach that both accommodates a variety of current market needs and can adapt to embrace new technologies as they come onto the market. The new line incorporates “all the hardware you need,” combining the capabilities of older generations of readers into a single product. Simplifying the choice of readers The new reader line seeks to simplify the choice of readers in a time when a variety of trends is complicating the access control market, from cloud systems to mobile access to identity management. “We are simplifying the way we bring our products to market, and baking it all into our readers,” says Harm Radstaak, HID Global Vice President and Managing Director. “If an installer takes a reader out of the box and mounts it on the wall, it just works.” We are simplifying the way we bring our products to market" In designing the product, HID sought feedback from channel partners, installers, consultants and end users on how the new readers would function. In addition, the company sought advice from architects on the design of the product. Aesthetics and industrial design elements were a priority because they ideally reflect the quality and “promise” of how the product will perform. Cybersecurity Cybersecurity is another emphasis. The readers store cryptographic keys and process cryptographic operations on certified EAL6+ secure element hardware, and custom authentication keys can be used for organizations who prefer that level of control. EAL6+ certification is a designation of the Evaluation Assurance Level of an IT product or system (the highest score is EAL7). Signo also includes a velocity checking feature designed to mitigate and thwart brute force attacks. “The new Signo line is a continuation of the journey we have been on,” says Radstaak. “It is the natural succession of what we have been doing for years, and it underlines our position in the market.” By natively supporting mobile credentials, the new product line reinforces HID’s commitment to mobile systems, which the company first brought to market in 2014. Signo readers also include Enhanced Contactless polling to support mobile credentials in Apple Wallet. Addressing standards Embracing the OSDP standard, which was created in 2008, also addresses the growing customer need for bi-directional, secure communications. There is built-in support for OSDP Secure Channel as well as legacy Wiegand communication for organizations seeking to transition. Signo incorporates support for most credential technologies globally, including Seos, credentials with HID’s Secure Identity Object, and a variety of 125kHz legacy technologies such as Indala and Prox. The flexibility and openness of Signo is a response to the acceleration of new technologies entering the access control market. “If you look at new technologies in general, our market has been slow in adopting them,” says Radstaak. “However, with new entrants in the market, new technologies, new device manufacturers and artificial intelligence (AI), I believe the market is adopting new technologies much faster than before. Users are much savvier.” The consumer Administrators will be able to remotely configure and diagnose readers Radstaak says he expects market adoption of the new readers will be fast. “Customers have been waiting for this platform,” he says. “This has been a tremendous investment for HID Global, and it underlines our position in the market with its open platform, simplicity and future-proofing. We are prepared for whatever comes next technology-wise.” With Signo readers, administrators will be able to remotely configure and diagnose readers as well as monitor status through a centrally managed and connected reader ecosystem. As a member of the FiRA Consortium, HID Global has advocated bringing new technology to market based on the “fine ranging” capabilities of ultra-wideband (UWB) technology, which has applications in detection of the precise location or presence of a connected device or object. It’s the kind of technology that Signo platform’s “future-proofing” approach is geared to accommodate. “As the capability unfolds, we will be there to adapt,” says Radstaak.
As technology continues to catapult forward at a significant pace in the 21st century, banks are increasingly facing new security challenges to safeguard their buildings, staff, customers, and financial operations. Because of this, it is critical that banks invest in security systems that meet the complex and unique requirements of the financial environment. Vanderbilt’s SPC provides this solution through advanced, dedicated intruder detection features and products for banking applications. SPC offers versatile operation and comprehensive alarm management functionality. With the support of cloud services, end-user apps, and a dedicated software suite, this puts SPC at the forefront of modern intrusion detection. Credito Cooperativo Consortium Italy’s Credito Cooperativo (BCC) consortium of banks are found throughout the length and breadth of the country and have served local communities for the past 134 years. There are 317 mutual not-for-profit organisations comprising over 4,300 branches, all of which work together to guarantee a range of products in keeping with the values and identity of a cooperative. Vanderbilt’s SPC is a true hybrid intrusion detection system that meets EN 50131 standards and has unmatched flexibility and scalability Headquartered in Cesena, Banca di Cesena e Banca di GATTEO Credito Cooperativo S.Coop is the first member of the BCC to initiate a new security infrastructure. The bank wanted a system that offered integrated between access control and intrusion detection as well as being reliable, easy to install and future proof. Hybrid Intrusion Detection Vanderbilt’s SPC is a true hybrid intrusion detection system that meets EN 50131 standards and has unmatched flexibility and scalability. SPC5000 and SPC6000 control panels are being installed at each branch, with the former able to be expanded per specific customers and project needs with up to 128 zones, 128 outputs, 16 system keypads, 16 doors and eight verification zones. SPC6000 expands upon this functionality with up to 512 zones, 512 outputs, 32 system keypads, 64 doors and 16 verification zones. SPC Connect offers the ability to customize how data is viewed by setting up a feature that allows Smart Security to manage and control access rights to individual panels and groups of panels. This means that tasks such as configuration management, troubleshooting, and regular maintenance can be carried out remotely, saving massive amounts of time and money, and enabling a swift resolution to any issues. SPC Connect Integration The control panels are being fully integrated with Vanderbilt’s pioneering SPC Connect system – a cloud-based solution that allows Smart Security to monitor, manage and control the SPC control panels remotely from any location. Personal security devices, such as the SPC Wireless Personal Alarm, increase the confidence and security of bank employees, while SPC also offers a set of specifically defined ‘Financial’ area types for ATM and vault environments with pre-defined times and enhanced security functions. Here’s how it works. Users can define the period during which an ATM or vault remains unset. Once that period expires, the ATM or vault automatically sets to an interlock group, thus denying further access to other ATMs or vaults if any area within a group is unset. The dual PIN feature is another measured safeguard, requiring two PINs to be entered within 30 seconds to set or unset an ATM or vault. Meanwhile, the All Okay feature requires users to confirm ‘All Okay’ on entry, otherwise an alarm is generated. Monitoring Safety Central Monitoring Stations (CMS) working with SPC quickly and correctly identify the source of any alarms. As a direct consequence, the number of needless callouts due to false alarms can be significantly reduced. For example, if the bank manager arrives early, he uses his card to gain access to the branch office and PIN to disarm the alarm. His code disarms the office and secure area but the ATMs, vaults, and safe deposit boxes remain armed. A Central Monitoring Station is alerted to the early entry. They need to know whether the entry is routine or under duress. The monitoring station views the manager in live video as he executes a predetermined security procedure and until he hits an “All Okay” button. If there is a problem the manager sends a silent duress alarm rather than the “All Okay” button. The monitoring station can listen in and if necessary call the police. Banks wish to operate in an open and friendly layout while safeguarding their customers, staff, and assets Multiple Layers This is just one layer of automated security that Vanderbilt provides to protect banks and other financial institutions. For instance, SiPass® integrated (a product made by Siemens AG) offers protection against cyber threats and intellectual property espionage. Personal security devices, such as the SPC Wireless Personal Alarm, increase the confidence and security of bank employeesSiPass meets current IT security requirements for data protection and delivers the highest data security through encrypted data transmission throughout the network. SiPass is one Vanderbilt solution used at Bank Pekao, a Polish financial institution considered to be one of the safest banks at the pan-European level. Seismic detectors are designed for monitoring of ATMs, 24/7. They have been developed for false alarm immunity and even the subtlest attacks can be detected at a very early stage, repeatedly triggering an alarm that gives ample time for intervention. Importance Of Security In Banking Security in banking is an essential issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability – flagship traits of the Vanderbilt brand. Banks wish to operate in an open and friendly layout while ultimately safeguarding their customers, staff, and assets. Vanderbilt’s solutions respond to these expectations and enable effective safeguarding foundations to be laid.
Financial institutions of all sizes demand simple, reliable solutions to protect against fraud, theft, and accidents in the workplace. Advancements in camera resolution and storage capabilities have put pressure on banks and credit unions to upgrade their video surveillance systems. Upgrading to a modern, economical NVR server will greatly increase system performance and scalability for small-budget projects with benefits seen across both loss prevention and business insights. Reliable High Performance However, not all banks have the same security budget as large institutions. This makes high-power, custom-built solutions seem unrealistic; however, small projects featuring bandwidth limitations need to retain the ability to scale up depending on future surveillance demands. Before any system expansion can occur, reliable high-performance must be established. White-box solutions compromise quality and underperform when exposed to the tough requirements of the financial security market. Fortunately, custom-built, video-optimized solutions are not exclusive to large multinational financial institutions. Network Architecture When upgrading an ineffective digital security system, a new network architecture needs to be created. Usually, this means switching from DVR to NVR servers. As a result, network switches attach to the camera allowing for easier future system expansion. Along with the newly gained scalability, throughput performance on servers can achieve significantly higher levels.BCDVideo offers servers, networking and workstations that provide enterprise-quality performance for all financial projects, regardless of size Implementing a complete video solution with high-performance servers, modern networking protocols and powerful workstations in financial institutions is now possible, even for small projects. BCDVideo offers servers, networking and workstations that provide enterprise-quality performance for all financial projects, regardless of size. The Benchmark Magazine 2016 Infrastructure award winner Aurora Server Series earns its name by marking the dawn of a new era in DVR replacement. Small-budget projects that have previously succumbed to the pressure of sacrificing quality for short-term savings now have access to servers with redundant power, 12Gbps RAID controller with 2GB of Flash Based Write Cache, hot-pluggable helium hard drive, and 10,000 PassMark rated CPUs. These big project features fit price-conscious budgets while maintaining the high-performance found in enterprise surveillance. BCDVideo Titan Networking The Titan Networking Series is priced well below standard to ensure project size and scope does not prevent an integrator from deploying a complete networking solution. Without the added cost of a networking engineer, savings reach into the thousands. Additionally, by using cutting-edge technology like Shortest Path Bridging, Titan switches, backed by a five-year, on-site warranty, will run at a high-level for years. The Gamma Series workstations fill the void in commercial and enterprise environments. Ideal for access control and IP video surveillance, they are powerful enough to render high-quality megapixel images for applications running 24/7. Optimized for advanced graphics and video capabilities, smaller projects can use the Gamma Series as both a video recorder and viewer.
To the lay person they appear to be simple LED light spots going back to the original style of illumination of the old 1800s palace (1876) that currently houses the Italian Ministry of Economy and Finance, and that historically represents the first great building of the newly reborn Roman capital, as commissioned by the former Minister Quintino Sella. Hidden In Plain Sight The carefully hidden technology, however, transforms each of the 20 light points (appropriately designated “Roma lights”) decorating the external perimeter into a state-of-the-art tool to guarantee the security of the public in the area around the Ministry. The transformation is executed thanks to the internal installation of IP cameras produced and distributed world-wide by the German company MOBOTIX, equipped with software for recording and processing the images. Notwithstanding the innovation of the performance, the new lighting systems are perfectly integrated, from an aesthetic point of view, with the historic palace where they are installed: A very advanced system, therefore, in terms of technology, but completely hidden inside a design in perfect harmony with the place where the light spot is installed, as envisioned and implemented by Dr. Massimo Belli, Appointed Administrator of the Ministry of Economy and Finance, Dr. Umberto Dall’Aglio, Director of the VI Office of the IV Department of the Ministry and by Architect Gianluca Canofeni, Director of the Works and Technical Administrator of the IV Department. High Efficiency At A Low Cost The transformation is executed thanks to the internal installation of IP cameras produced and distributed by MOBOTIX “The motivation for the project was multifaceted: On the one hand to realize a control system based upon state-of-the-art video surveillance tools, and on the other hand implementing a new lighting project to substantially reduce electricity consumption – within the scope of energy efficiency –, guaranteeing at the same time a much longer useful life, and as a result a substantial reduction of maintenance costs”, said Lieutenant Colonel Saverio La Monaca, chief of the Central Security Organization of the Ministry. As per the costs, the analysis carried out by the Ghisamestieri teams, obviously as a function of the actual system utilization give a clear picture: It is foreseen that the initial investment will be recouped within only 4 or 5 years and economic savings of even 50% between the fifth and fifteenth year of useful life of the system. With respect to energy savings, MOBOTIX’ video cameras provide a further guarantee, since their energy consumption is extremely low in comparison with other technologies present on the market: about 4 to 6 watts per hour. MOBOTIX DualDome Cameras The project, comprises today 20 wall light spots installed in strategic positions throughout the Ministry. Each shelf hides inside 2 MOBOTIX DualDome cameras with 180 degrees field of view, for an overall total of 40 high-resolution IP security cameras. The images can be recorded inside the cameras 24/7 (color, and black and white) to be viewed at the control center located inside the Ministry building. The security personnel belonging to the military branch of the Financial Guard manage the complete video surveillance apparatus and constantly monitor the images of the cameras in real time. 10 wireless routers manufactured by the young Italian company 3WLan, are installed inside a similar number of wall brackets and are capable of guaranteeing the bi-directional Wi-Fi link between the control center and the patrols active outside the palace. This is possible thanks to an authentication on a RADIUS server that identifies the access permissions of the router on a list of authorized equipment. Exchange Data And Images In Real Time The new wireless system guarantees much more reduced operating expenses against a much more intensive use profile" “Especially in case of demonstrations, which is actually very common, our security operators are involved in the so-called pacification operations outside the palace for the purpose of first of all protecting the ministerial magistrates. These are carried out both on foot and inside our patrols – which implies the need to rapidly cross-check the owner of a particular vehicle or verifying the personal data on passports and identification documents. "Before installing the new intelligent light spots we relied on a GSM system that was, however, very expensive. The new wireless system guarantees much more reduced operating expenses against a much more intensive use profile”, added Giancarlo Varvo, who is responsible for security. The video surveillance technology available on the patrol vehicles, which are also equipped with tools to read license plates, or palmtop operating systems (also known as explorers) supplied to foot patrols, once within the radius of coverage of the poles equipped with Wi-Fi antennas, have the option of exchanging data and images with the operations center inside the Ministry by means of a recognition system. Furthermore, by connecting to a specific IP address, external patrols have the possibility to view the images recorded by a specific video camera in real time. Remote Day/Night Illumination Management Each support is also equipped with a remote switch that allows managing the illumination and video surveillance functions completely autonomously and independently from each other. While the light source turns on at dusk and switches off at sunrise, the cameras continue functioning 24/7, according to the specific settings they may record both in continuous mode or trigger upon an event, such as the movement of a pedestrian, or a sound. The cameras placed close to the entrances of the Ministry are capable of sending alerts in real time to the operations center, or activating a bollard along the perimeter thanks to an automatic vehicle license plate reading system. In fact, the operations room located inside the Ministry remotely controls the recording of more than 1,600 cameras" Nothing to object about the support of the engineers of Ghisamestieri, that proved to beat all times available and collaborative in answering the requirements of the Ministry. Also, no complaints about Genius, a unique world-wide illumination solution, capable of offering high level design and advanced technology in a single solution. No objections about the technology made in Germany of MOBOTIX. Securing The Facility With Additional Cameras “In addition to the project implemented with Ghisamestieri, we employed the technology of MOBOTIX also for other types of requirements, still obviously related to the security of the Ministry: 36 AllroundMono security cameras have already been installed on the roof of the palace to check potential attacks for instance through the air vent conduits to the so-called Tempest room, a completely aseptic environment for the protection of communications inside the Ministry. "In fact, the operations room located inside the Ministry remotely controls the recording of more than 1,600 cameras installed in various facilities connected to the department”, underscores Varvo. The light spots installed in Rome find their place in a wider project, where any illumination support can potentially serve as a technology node. Named “Genius” by their creators, regardless of the design or aesthetic form, any light spot is potentially capable of becoming a true security center, perfectly integrated from the aesthetic and urban points of view into city decor. Equipped with microphones and speakers, MOBOTIX’ cameras can put the citizens in touch with the operations centers of the police or ambulances by means of special buttons placed at the base of the pole or through the implementation of an RFID or magnetic strip identification system. “With respect to traditional poles with well-visible cameras installed outdoors, Genius represents a true video security system, not just a simple crime deterrent”, concluded Varvo.
PVcomBank, one of Vietnam’s fastest growing and most progressive banks, has acquired a cutting-edge March Networks video surveillance system. Established in 2013 through a merger of PetroVietnam Finance Corporation and WesternBank, the Hanoi-based financial institution is a joint stock commercial bank with 115 branches throughout the country. Shareholders include Petro Vietnam with a 52 percent stake and Morgan Stanley with a 6.7 percent strategic interest. Prior to selecting the March Networks technology, PVcomBank had a variety of different video surveillance systems installed throughout its branch network. The bank wanted to upgrade to a high-performance solution it could eventually standardize on for all of its retail branches, ATMs and corporate offices, and centrally manage from its headquarters in Hanoi. “The March Networks system gives us the central management capability that we didn’t have before. It’s also reliable, user friendly and provides us with excellent quality video.” Enterprise-Class Video Surveillance The enterprise-class March Networks system PVcomBank is now deploying consists of 8000 Series Hybrid NVRs, Command Enterprise video management software and hundreds of March Networks IP cameras, including MegaPX WDR MiniDomes Zs and MegaPX Indoor IR Domes.More than 450 banks and credit unions worldwide rely on March Networks’ intelligent IP video solutions to keep their customers and employees safe PVcomBank relied on the advice of Intelligent Building Solutions (IBS), a security systems integrator and March Networks certified partner with offices in Hanoi, Ho Chi Minh City, Singapore and Phnom Penh. “We wanted to upgrade to a high quality, enterprise system with central management and health monitoring,” said Nguyen Manh Hai, PVcomBank. “IBS recommended March Networks because of its track record as a global leader in the delivery of video surveillance solutions to the financial sector.” More than 450 banks and credit unions worldwide rely on March Networks’ intelligent IP video solutions to keep their customers and employees safe, and help reduce losses due to fraud, theft and liability claims. IBS, a supplier of security and building automation products, including video surveillance, access control and intrusion detection systems, began rolling out the March Networks system across PVcomBank’s branch network in June 2015 and expects to complete the deployment by the end of 2016. Hybrid Capability Results In Lower Costs The hybrid capability of the March Networks 8000 Series NVRs is ideal because, in addition to approximately 250 new March Networks IP cameras, PVcomBank opted to continue using analog cameras from its previous video surveillance systems. Continuing to use its existing cameras with the March Networks system kept costs down and resulted in noticeably improved video quality from the analog cameras. Access to video is restricted to the bank’s security staff and used to obtain evidence of burglaries, fraud and other reported incidents. Eight and 16-channel NVRs are equipped with 6 and 8 TB of onboard storage, respectively — sufficient for approximately 60 days of video retention. The 8000 Series recorders are available in 4, 8, 16 and 32 channel models and can accommodate two simultaneous recording streams — one lower resolution stream for viewing online, and another full resolution, full frame rate version for investigation purposes. Built for maximum reliability, they feature a secure Linux operating system to better protect against viruses and malware, and an internal battery backup for systematic shutdown in the event of power loss.The 8000 Series recorders can accommodate two simultaneous recording streams The 8000 Series recorders are also designed for easy maintenance with docking station architecture that keeps all cables securely connected to the back of the unit for faster, more convenient installation and servicing. Technicians can also take advantage of March Networks’ industry-first GURU Smartphone Application to scan the QR code on any 8000 Series NVR to quickly find the recorder’s serial number and warranty status, speed troubleshooting, link to video tutorials and use an installation audit feature to run automated reports on the video system’s configuration complete with camera field-of-views. Simplifying Day-To-Day System Administration The Command Enterprise video management software used by PVcomBank simplifies day-to-day system administration with centralized management and mass configuration tools, and provides real-time health monitoring that alerts administrators to performance issues. A customisable user interface with motion histogram and thumbnail images allows investigators to quickly zero in on video evidence. “We are very pleased with our March Networks video surveillance system,” said Nguyen Manh Hai. “We worked closely with IBS, our security systems integrator, to select a system that would meet all of our needs. The March Networks system gives us the central management capability that we didn’t have before. It’s also reliable, user friendly and provides us with excellent quality video.”
Customer: The Absa Group Limited is one of South Africa’s largest financial services groups, offering a complete range of banking and wealth management products and services. Absa Bank's business is primarily in South Africa, and the group has equity holdings in banks in Mozambique and Tanzania. Absa is a subsidiary of Barclays Bank, a major global financial services provider with an extensive international presence in Europe, the United States, Africa and Asia. Challenge: Absa Bank’s objective was to streamline its processes and reduce costs while maintaining a clear focus on the individual customer’s experience. Their decision to deploy megapixel network cameras in a proof-of-concept video surveillance installation was based on leveraging the greater system efficiencies, functionality and superior image quality of megapixel technology. Megapixel Solution: The new security surveillance system at Absa Bank was installed by AV Enforce Electronics (AVEE) of South Africa. The system employs Arecont Vision's 2.0 and 3.0 Megapixel Cameras positioned behind teller stations to closely monitor transactions between bank employees and clients. In addition, Arecont Vision's 8 Megapixel 180-degree and 360-degree Panoramic Cameras (AV8185 and AV8365) watch over customer queues, automated teller machines (ATMs) and the general banking hall with extreme image detail. Each Arecont Vision megapixel camera at the Absa Bank installation is connected to a power-over-Ethernet network switch that serves as the network video connection and also as the power source to the camera. Cameras are recorded on Luxriot network video recorders. The system is monitored locally by authorized management personnel. Arecont Vision's AV3105 3-Megapixel Camera uses a ½ inch CMOS sensor to provide 2048x1536-pixel progressive scan images at up to 15 frames per second (fps). The camera is built with Arecont Vision's massively-parallel MegaVideo technology, providing image processing at billions of operations per second. It can output multiple image formats of larger areas to allow simultaneous viewing of the full resolution field of view and regions of interest. The Arecont Vision AV2105 2-Megapixel Camera provides 1600x1200-pixel video at up to 24 fps, with light sensitivity of 0.1 lux at F1.4. Features include forensic zooming on archived video, region-of-interest views, as well as image cropping and motion detection. The panoramic view cameras used at the Absa Bank proof-of-concept installation are the 180-degree Arecont Vision AV8185 and 360-degree Arecont Vision AV8365 8-Megapixel Cameras. Both models employ four 2-megapixel sensors enclosed in 6-inch IP66-rated domes and provide up to 6400x1200-pixel images at 5.5 fps. The cameras can be set for lower resolutions at higher frame speeds, such as 1600x1200-pixel images at 22 fps or 800x600-pixel images at 88 fps. The cameras also use Arecont Vision MegaVideo video processing at billions of operations per second. Light sensitivity is 0.2 lux at F2.0, and the cameras provide image cropping and up to four regions-of-interest. “Arecont Vision outperforms all the current competitors,” said Alex De Barros of AV Enforce. “The price compared to analog cameras is better considering the fact that you gain so much. We were able to capture images for the bank that were never achieved before.” Megapixel Benefit: The proof-of-concept system atAbsa Bank has demonstratedthat megapixel cameras aresuitable for applications inthe banking environment andrepresent a significant upgradein system functionality comparedto standard-resolution cameras Arecont Vision megapixel network cameras use H.264 compression to minimize bandwidth and storage needs and are available at costs comparable to standard-resolution alternatives. Megapixel images provide much more detail in playback mode for forensic investigations. Operators can zoom in for up-close views on stored images. They can view specific parts of a larger image, such as a person's face. A benefit for Absa Bank is creation of a database of suspected criminals to allow operators to identify them easily. The use of megapixel video enables a larger area to be covered with fewer cameras, which reduces overall system cost which make it easier to realize ROI. Higher-resolution images boost the functionality of systems, enabling pristine image quality at industry-leading high frame rates, while minimizing bandwidth usage with H.264 video compression. The proof-of-concept system at Absa Bank has demonstrated that megapixel cameras are suitable for applications in the banking environment and represent a significant upgrade in system functionality compared to standard-resolution cameras. In addition to lower bandwidth and storage requirements, megapixel cameras can dramatically decrease costs related to other elements of a system, such as fewer software licenses, less cabling, fewer lenses, and a decrease in man-hours needed to bring it all together. “There is a lot at stake in the banking environment, and megapixel imaging can vastly improve the performance of the video surveillance systems in this important market,” said Ethan Maxon, Middle East and Africa Regional Sales Manager of Arecont Vision. “We continue to spread the word about the unparalleled image quality and resolution of Arecont Vision's megapixel IP video cameras. It's good to know that Absa Bank has experienced those benefits first-hand.”
Founded in 1877, Banco de Costa Rica (BCR) is the second-largest state-owned bank in Costa Rica. Today, BCR provides a broad range of financial services, including retail banking.Looking to protect its staff, buildings and financial assets, BCR has set upon a major project that will see its 4,500 employees, in 278 offices across Costa Rica, protected by an integrated hybrid CCTV and alarm system. The fundamental characteristic of the project is its implementation over unshielded twisted-pair (UTP) structured cabling networks, which will allow the use of legacy equipment to be integrated into a scheme that paves the way for migration to security solutions based entirely on this transmission media.Network Video Technologies (NVT) UTP CCTV video transmission equipment plays a fundamental role in the hybrid solution, enabling both legacy and new systems to be combined, delivering high-quality real-time video over large distances; to help ensure a measured and rapid response by the bank to any alarm scenario.One of the most important government financial institutions in Costa Rica, BCR was previously protected by a CCTV system based on coax cable and using monochrome cameras. Consequently, one of the aims of the bank's directors in implementing the new solution was to unify all of its systems to operate over UTP networks.Protection on multiple frontsThe new solution will encompass the bank's 278 branches, public offices and administrative buildings across Costa Rica, 450 buildings in total. Randall Ruiz Parajeles, the Bank's Director of Electronic Security explains about the project roll out: "At the moment 80% of the bank's buildings are covered, thanks to the installation of NVT video transmission equipment. Our aim was to improve video signal quality, eliminate interference noise, and most importantly, using NVT technology we will be greatly extending the video transmission distances without suffering video quality losses, which is what happens with coax."From coaxial to hybrid systemsBanco de Costa Rica has always had a surveillance system, the purpose of which was to protect the security of visitors to each of the bank's offices, as well as their money. These consisted of analog recording systems and standard-resolution monochrome cameras, with transmission via coaxial cables. Analogue recording systems as well as standard resolution monochrome cameras were included in the solution from NVT "For the system-wide renewal, the number of cameras has been increased, but many of them were re-used," explains Parajeles. "There are currently more than 4,500 NVT UTP transmission links installed that transmit the camera video over twisted pairs, using high-resolution day/night and low-light equipment. As for the recording systems, we are using digital equipment that works over the IP network.""It should be noted that NVT equipment was installed right from the start of the renewal programme. NVT allowed us to retain existing equipment as an infrastructure and adapt it to work with the newer devices, making this match between the two without having to discard units that might still give us some useful working life. We were able to integrate these units with the new ones in a manner entirely transparent to the monitoring personnel, who are now able to have everything integrated seamlessly on a single platform."The current configuration of the security system, installed by Seguridad y Protección de Centro América, has a threefold purpose: it is intended to be dissuasive, but also persuasive, and to allow verification of the events reported by the alarms. In this sense, it can be said that it is designed for both supervision and recording.But a major component of the system is the automation programme. This means that the CCTV system is complemented by the alarm system, which, when an event occurs, generates pop-up windows in the control center. There is also a link to the lighting systems, so that when an alarm is given, the lights in a particular area are switched on.The cameras and PTZ domes installed in the system are all Pelco models. Recording is carried out by Honeywell Rapid Eye units. In total, around 450 recording units have been installed. NVT technology allows extending the video transmission distances without suffering video quality losses A fundamental decision: hybrid instead of IPHowever, a review of the characteristics of this system immediately prompts a question. If the system was designed to run over UTP based structured networks, why implement a hybrid model instead of installing end-to-end IP.Parajeles explains that the use of UTP and NVT devices allows the linking of analog and digital equipment on a given IP network helps businesses to start down the road towards a single-stage system, because they are designed to work over structured cabling. "For us, it was rather difficult to install IP cameras because of bandwidth considerations, the quantity of IP addresses needed and the infrastructure that would require us to have individual physical connections for each camera in each branch. After looking into the matter, we could not find an IP camera that would, on its own, allow us to transmit over the network without adversely affecting the establishment's bandwidth."High-satisfaction technologyWhen a large institution implements such an important project, it is looking to simplify its operation and enhance its ability to respond when that operation finds itself put to the test. From this point of view, it can be declared that Banco de Costa Rica has fully met its target, in terms of guarantees, ease of installation and professional achievements; NVT has become an important ally.Summarising the entire process, Parajeles concludes: "This is an investment that will pay for itself over time. And because the quality of the NVT equipment is so good, visits to the sites of the various installations have also been reduced."
Round table discussion
Video is widely embraced as an essential element of physical security systems. However, surveillance footage is often recorded without sound, even though many cameras are capable of capturing audio as well as video. Beyond the capabilities of cameras, there is a range of other audio products on the market that can improve system performance and/or expand capabilities (e.g., gunshot detection.) We asked this week’s Expert Panel Roundtable: How does audio enhance the performance of security and/or video systems?
When a fire or other emergency occurs in a building or facility, first responders depend on every available resource to ensure a safe and orderly evacuation and response. One element in any response plan is the facility’s physical security systems, including access control, video surveillance and intrusion detection. How can these systems contribute to an orderly response to a chaotic situation? We asked this week’s Expert Panel Roundtable: What is the role of security systems in the event of a fire or other emergency evacuation?
We live in an era of Big Data. Surrounded by a flood of information, more companies are looking for ways to analyze that information (data) and systematically extract intelligence that can help them operate more efficiently and profitably. The data obsession has extended to the physical security industry, too, where large amounts of data have historically been a little-used byproduct of our access control and even video systems. But the picture is changing. We asked this week's Expert Panel Roundtable: What impact are data analytics having on the security market?
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals