Remote monitoring security applications
A used car lot owner had re-occurring issues with intruders cutting holes in the perimeter fence during night-time hours and vandalizing or burglarizing the area. The intruders would not enter the small office building, so the security system was never triggered. The customer did own a video surveillance system and it would record criminal activity but it did not prevent or deter crime. Integrating motion detectors Using the existing intrusion alarm panel (Interlogix NX8-v2 panel) and the exis...
The New Athos Cave (also known as Novoafonskaya, Novy Afon Cave, and New Afon Cave) is a karst cave in the Iverian Mountain located in Abkhazia, Georgia. It is one of the largest caves in the world with the volume of its void of about 1,000,000 m³. As a well-known tourist attraction, one of the most important factors that keep tourists from visiting this cave is its security. To achieve this, the management of the cave deployed a surveillance solution from Dahua Technology to provide visit...
Haier Group, China’s renowned home appliance manufacturer, has built a new industrial park in Russia to cope with the growing demand in Europe. Covering a total area of about 124.9 hectares, the new site is located in Naberezhnye Chelny, an important industrial city in Tatarstan, Russia. Intelligent system With the gradual completion of its factories in the industrial park, Haier is looking for an intelligent system to realize multiple tasks within the whole industrial park. Firstly, the...
Around 7,000 people pass through the Luminy faculty’s suburban campus every day. As part of a major project to modernise two buildings, university managers sought a retrofit-ready access control solution to upgrade security. Aperio locks University administrators selected Aperio locks to secure doors in the new buildings. With Aperio, facilities, the staff can deal with lost keys more efficiently. The laborious process of changing locks and reissuing keys — part of the daily worklo...
There are many matters that must be taken into account when organizing a casino. A top priority is the security of the entire workforce and clientele. An access control system that is reliable and easy to operate provides the basis for that. Casino Baden-Baden is open 358 days a year. In addition to various different pay scale groups and work-time models, a variety of bonuses need to be assigned. Pay may therefore be partly exempt of tax or liable to tax, with holiday bonuses and weekend pay....
Each day, over 55,000 electrical substations in the United States funnel massive amounts of energy to homes and businesses across the country. An array of specialized equipment allows these facilities to keep up with demand, and each component must run smoothly to adequately transfer and distribute energy. Housing mission-critical assets vital to the community means that substations must track everything—from condition monitoring to intrusion and sabotage threats. Thermal imaging cameras,...
Dahua Technology, with its award winning deep learning algorithms, proudly releases WizMind – a portfolio of solutions composed of project-oriented products including IPC, NVR, PTZ, XVR, thermal and software platforms, delivering precise, reliable and comprehensive AI solutions to verticals including government, retail, energy, finance and transportation. WizMind's human-oriented solutions Powered by AI and deep learning algorithms, WizMind provides comprehensive human-oriented solutions including facial recognition, privacy protection, human video metadata, people counting and stereo analysis, enabling rapid and precise reaction. In addition, it provides more precise and effective AI search to locate targets, generating various human data for business analysis. According to IHS, the total market value of professional video surveillance equipment will grow to $27.2 million by 2023 To protect portrait data, WizMind provides outstanding privacy protection. Based on deep learning algorithms, WizMind supports real-time mosaic masking of the human face or body detected in the monitoring area, which is needed in courtroom scenarios and may be valuable to retailers which can optimize their business through intelligent analysis of customer flow, recorded without violating privacy or GDPR. WizMind based on vehicles WizMind boasts multiple vehicle-based AI solutions, such as ANPR and vehicle metadata, illegal parking which provide more attributes of vehicles for easy control, quick search and business analysis. It is widely used in urban areas, residential community entrances, parking lots and toll stations. By extracting and comparing plate numbers with databases, ANPR helps managers of parking lots and city roads improve vehicle management efficiency with functions like Blacklist Alarm and VIP Recognition. ANPR also supports vehicle tracking, which helps police efficiently locate vehicles according to the crosschecking result. ANPR is able to recognize plate numbers in over 58 countries. WizMind with thermal technology WizMind combines deep learning algorithms with thermal imaging technology to help users achieve ultra-long-distance monitoring in harsh environments, non-contact temperature monitoring and early fire prevention. The Dahua WizMind series is compatible with mainstream third party technology partners With an accuracy of 0.3 degrees Celcius and a speed that monitors three people per second, Dahua’s High Accuracy Body Temperature Monitoring Solution has been widely and successfully applied within transportation hubs, financial institutions, commercial complexes, schools and other places all over the world, joining the global efforts in pandemic prevention and control. WizMind Ecosystem Initiating openness and collaboration, the Dahua WizMind series is compatible with mainstream third party technology partners, such as Milestone, AxxonSoft, ISS and others. Furthermore, WizMind Ecosystem provides the DHOP and sufficient API for our technology partners, enabling them to combine real AI joint solutions to our common customers, and a series of marketing activities will be engaged with our ecosystem partners. Dahua WizMind, a high-end AI series, aims to serve demanding scenarios in many vertical industries. With the mission of “enabling a safer society and smarter living”, Dahua Technology will continue to focus on “innovation, quality and service” to serve its partners and customers around the world.
Due to the escalating coronavirus pandemic (COVID-19), Messe Frankfurt New Era Business Media Ltd and ABEC Exhibitions and Conferences P Ltd, have decided that Secutech India will not take place in 2020. The decision is the result of travel restrictions and strict social distancing guidelines currently in place across India, and a lack of availability at the fair’s venue – the Bombay Exhibition Centre – during an appropriate time later this year. The fair will take place at the same location in Mumbai in May 2021. Stemming the spread of COVID-19 The Indian Government has taken extensive measures to stem the spread of COVID-19. Beginning from March 25, a 21-day nationwide lockdown was announced, effective until April 14. This has since been extended for another 19 days, effective until May 3. Strict social distancing regulations have been imposed, and all incoming and outgoing international and domestic flights have been suspended. With uncertainty and tight travel restrictions in place not only in India, but around the globe, pre-fair planning and preparations for Secutech India, originally scheduled from May 7 – 9, 2020, were severely hindered for the fair’s exhibitors and visitors. The decision to defer to 2021 Commenting on the cancellation, Ms Regina Tsai, General Manager of Messe Frankfurt New Era Business Media Ltd, said: “The evolving situation, including local and international travel restrictions as well as constantly changing public health guidelines made it impossible for the fair to be held as scheduled. Despite our best efforts, we have been unable to find a new available time slot at the fair’s venue to adequately serve the interests of our exhibitors in 2020. Because of this, we have taken the difficult decision to defer the fair until 2021.” Mr Manish Gandhi, COO, ABEC Exhibitions & Conferences P Ltd, further commented: “As members of an industry that prioritises safety and security, we are confident that the industry is in full support of our decision. We remain committed to supporting the business of our stakeholders wherever possible, and we look forward to welcoming the full fraternity for another productive few days of trade in 2021."
Motorola Solutions has agreed to acquire IndigoVision, a U.K.-based provider of end-to-end video security solutions. The boards of Motorola Solutions, its holding company and IndigoVision have reached an agreement on the terms of a recommended cash acquisition for approximately $37.2 million, representing a premium of approximately 116 percent based on the average share price over the most recent 12-month period. The acquisition will be funded by existing cash resources of Motorola Solutions and become final in May 2020. Motorola Solutions has a strong presence in the large and expanding area of video security since acquiring Avigilon in March 2018. Their product offerings include high-definition cameras, advanced video analytics, network video management hardware and software and access control solutions. IndigoVision is a developer of complete, end-to-end video security solutions from cameras to video recorders to body worn cameras to security management software. Motorola Solutions says the IndigoVision range of products, global presence and customer base are "highly complementary" to Motorola Solutions' existing presence in video security. Among the benefits is enhanced geographical reach across a wider customer base. "The access we will now have to Motorola Solutions' range of innovative technologies will create new opportunities for IndigoVision and enable us to bring an exciting proposition to the market that allows us to further deliver on our goal of delivering safety, security and business intelligence," says Pedro Vasco Simoes, Chief Executive Officer of IndigoVision. "We share IndigoVision's commitment to providing next-generation, end-to-end video security solutions that enhance safety, security and efficiency," says John Kedzierski, Senior Vice President, Video Security Solutions, Motorola Solutions.
With just days left until the planned industry trade show, Reed Exhibitions has canceled ISC West over concerns about the COVID-19 coronavirus. Here is the statement on the decision: 'We at ISC West want to express our concern for everyone impacted by the COVID-19 coronavirus. Based on our close monitoring of ongoing developments with the virus, recent reports from public health officials and extensive consultation with our partners in the global security community, ISC West, scheduled to be held March 17-20, will now occur in July at the Sands Expo Center in Las Vegas. We take pride in offering vital business opportunities to our customers, including networking, education and access to new products and technologies, and commit ourselves to making July’s ISC West 2020 event live up to high standards. Over the coming weeks, along with ISC West’s Premier Sponsor SIA - we will continue to serve the industry, creating ways to connect, collaborate and keep our world moving during this difficult period.'
With growing concerns over the COVID-19 coronavirus, Motorola Solutions and its Avigilon brand have released a statement on their decision to pull out of this year's ISC West. The trade show, one of the biggest in the security industry, hosts over 30,000 security professionals and over 1000 exhibitors each year. The company states: "After careful consideration, we have withdrawn from this year’s ISC West trade show due to the widespread impact of the coronavirus." Official sources of updates "While ISC West is one important opportunity to demonstrate the power of Motorola Solutions' video security and analytics portfolio, the safety and well-being of our employees, customers and partners is our top priority. We are grateful to the ISC West organizers for their understanding and look forward to attending and supporting future ISC West events." ISC West will occur as scheduled March 17th through 20th, 2020, says Reed Exhibitions, despite the concerns. A statement from the show organizers is as follows: "While we regret that some companies have made the decision not to take part in ISC West 2020, we are focused on making ISC West 2020 a successful, safe, and enjoyable event for all attendees and exhibitors."
ISC West will occur as scheduled March 17th through 20th, 2020, says Reed Exhibitions. Following is a statement from show organizers: We take pride in offering vital business opportunities to our customers, including networking, education and access to new products and technologies and are working diligently to ensure ISC West 2020 and our other events live up to our high standards. While we regret that some companies have made the decision not to take part in ISC West 2020, we are focused on making ISC West 2020 a successful, safe, and enjoyable event for all attendees and exhibitors. Close Monitoring Over the last few weeks, Reed Exhibitions and our partners in ISC West have been closely monitoring the COVID-19 virus and its impact on members of the global security community. We are collaborating closely with the Sands Expo Center and local public health authorities and following local, state and federal public health guidelines, including those issued by the CDC. We have additional precautionary measures in place, including enhanced cleaning and sanitization across all public areas and customer touchpoints in the show and we are constantly reviewing our health protection activities, public health messaging, hygiene and medical control measures with the aim of strengthening our COVID-19 response further in line with up to date public health advice and guidance, including that of the CDC. Health and Safety We will continue to provide updates on our website as we get closer to ISC West. The health and safety of our team members and guests is our utmost priority. Our policies and best practices are in close collaboration with our venue partner, Sands Expo Center. The Sands Emergency Management Team works closely with local officials and are taking appropriate steps to protect team members and guests as outlined by the Centers for Disease Control and Prevention (CDC) and the Southern Nevada Health District (SNHD). Sands is prepared to follow any additional protocols or guidance, as they are made available by the CDC or SNHD.
In recent years, multinational corporations such as Cathay Pacific, Facebook, Uber and numerous others have been heavily fined due to security and data protection violations. This period has seen data protection laws increase as more and more information is gathered and shared online. As such, it becomes crucial to account for security capabilities when choosing an embedded device that touches potentially sensitive data. RFID readers very much belong to the ecosystem wherein personal or user identification data is transmitted either to a host system such as a PC or to an endpoint such as a Human Machine Interface (HMI). A passive RFID transponder, soft credential such as a mobile phone app using BLE/NFC or smart cards and other contact-based credentials all can carry sensitive data or personal information. In the case of smart card or contact-based credentials, the storage of personal information such as name, address or date of birth is more prevalent compared to contactless credential where an identification number may be used. Security as a concept RFID media may directly lead to a compromise in your intended application’s security In general, security as a concept is always related to the entire system that includes RFID media (contact/contactless credentials), RFID reader, the host system and any database or cloud server. While accounting for security across a system is needed it is more important to consider the application or use case that is in question. One should carefully evaluate the consequences of any security breaches and if there is any sensitive information being exchanged from the RFID media to the host. As an example, the simple choice of RFID media may directly lead to a compromise in your intended application’s security. There are numerous references on security vulnerabilities related to Low Frequency (125KHz) contactless transponder types. The references focus on using interceptors to access unprotected static card information. The adversaries may then clone this credential that may be used for triggering action such as granting access to a facility or unlocking a computer. Some references also highlight vulnerabilities in the Wiegand interface about intercepting the data signals to capture card value. Therefore, some older RFID transponders and communication interfaces that may be based on the aforementioned technology or have been subject to vulnerability hacks are now considered fundamentally compromised. As mentioned previously, the overall security depends on every component of the system that includes the RFID reader. This article will mainly focus on some of the basic security considerations that need to be accounted for when choosing an RFID reader but also whether or not your application requires these abilities. Some of the key security considerations are as follows: Does your application require encryption capabilities? If so, does the reader have the capability to execute cryptographic algorithms? In every application where RFID technologies are involved, there is a need to first assess whether encryption is required and if so, determine the exact channel where this needs to be enforced. It could be that the host interface requires the exchange of encrypted data or the air interface needs to transfer protected data. Once the requirements are established, one may then evaluate the strength of this security. Furthermore, many types of contactless transponders can store data within their memory segments and encrypt or lock these segments with cryptographic keys. An apt card reader is one that can not only decrypt the memory segments and access the data but also provides an easy means for the end-user to carry out this operation. In many instances, the end-users have their own customized cryptographic keys for their credentials and are unwilling to share these keys with the card reader provider. Therefore, having the capability to load custom keys by someone other than the card reader manufacturer becomes essential. This can be facilitated in multiple ways, such as implementing high-level APIs and allowing the user to write applications for the card reader, or it could be enabling the customer with agraphical user interface to enter keys used to access data sectors. Many types of contactless transponders can store data within their memory segments Do you require encrypted data exchange? If so, where and can the card reader support this? In a typical scenario, the card reader behaves as a medium to facilitate data collection and transfer between the contactless or contact-based transponder and the host system. The host system can either be an endpoint that locally validates the credential presented to it or it can be a microcontroller that sends data over the network to the cloud or a database for validation and authentication. As mentioned previously, assessing whether the need for encryption is between the RFID media and the reader or from the reader to the host is important. If the former, the appropriate credentials are required. Depending on this factor you may then consider choosing an appropriate RFID reader. There are use cases wherein personal information such as name, address, date of birth or biometric data can be stored within the credential, eg: smart cards or passports as credentials. Therefore, encrypting the exchange of such data both between the credential and the reader as well as the reader and the host becomes critical. Moreover, encryption algorithm engines such as AES, DES, 3DES, or the capability to implement custom algorithms, need to be present on the card reader as this enables ease of integration. In cases where smartcards or contact-based credentials are used, the host system typically drives the communication in its entirety. So, the card reader must also have: Software capabilities such as Personal Computer Smart Card (PCSC) or Chip Card Interface Device (CCID) mode of communication. The availability of drivers to facilitate communication with the host also enables easy software integration. Hardware support for communication standards such as ISO7816 and the presence of Secure Access Modules(SAM) slots and other contact-based interfaces. Does your application require MUTUAL authentication with Secure Access Modules (SAM) and RFID media? If so, does the reader support This? A Secure Access Module is a type of smart card that follows a contact-based communication standard to interact with a card reader. These modules ensure the protection of security keys as well as facilitate cryptographic operations. Typically, SAMs are used to generate application keys based on a specific master key or to generate session keys. They also enable secure messaging between the RFID media, the reader and the host system. Many contactless credentials hold memory segments/applications that are encrypted with cryptographic keys. These keys are often stored in SAMs and supplied to card reader manufacturers. This not only ensures the security of the keys but adds a step in the authentication process. The card reader in this case should first perform authentication operations with the SAM and then carry out a series of cryptographic and bit manipulation operations between the contactless card and the SAM. This can be further secured by adding a key diversification step. The card reader must be able to support such a scenario both in the hardware as well as in the software. Many end-users require the card reader to natively support such a scenario and have the ability to provide high-level API’s to help in their implementation. In addition to this, high-security applications demand the transfer of data in an encrypted format. One can ensure end-to-end encryption/security with the help of SAMs. In such an architecture, the reader facilitates mutual authentication with the RFID media and the SAM, thus transferring protected data over a Radio-Link and also ensuring the security of encryption keys. The reader can also transfer data encrypted by the SAM to the host system maintaining a high level of security across the system. Appropriate precautions are to be put in place to improve the overall security Note that the safety of distributing SAMs as well as administering the installation process within the reader should be treated as a separate issue and tackled accordingly. There is also an issue of the readers being stolen or the SAM modules being dismounted from the reader. The security considerations here do not indulge in these topics and appropriate precautions are to be put in place to improve the overall security of the system. Does the card reader have communication interfaces other than Wiegand such as RS485 or RS232? The Wiegand card as well as the Wiegand interface for data transmission is a 40-year old technology that originates from the Wiegand effect discovered by John R. Wiegand in the early 1970s. While the Wiegand cards are still in production, they have been largely replaced by newer and cheaper forms of access cards. However, these cards are still based on the Wiegand data format that is susceptible to interception as the data are available in plain text. Also, the Wiegand interface introduced in the 1980s remains prevalent across the logical access as well as the physical access control industry despite various security vulnerabilities. This technology no longer conforms to the current security standards. It is therefore important for integrators to choose a communication interface that can offer higher security from interception and support encrypted data exchange. Do you require tamper detection technologies? If so, can the reader meet this requirement? The need for tamper detection largely varies from one application to another so it is more important to consider whether this level of security is suitable for your respective use case. As an example, card readers attached to multi-function printers (MFPs) for releasing print jobs in an enterprise environment can be considered less critical since tampering with the reader can ultimately lead to the downtime of the printers but will not compromise the safety of your documents. Typically, in such scenarios, the card reader works hand in hand with the MFP and a print management solution that ensures the release of print jobs. Therefore, if the card reader is sabotaged or tampered with, the MFP or the solution simply prevents the release of any information. On the other hand, high-security environments such as data centers certainly need greater protection. One must thoroughly evaluate the consequences of any attempts directed towards compromising the device integrity or the data associated with the device. These topics need to be considered separately and are outside the scope of this article. In conclusion, depending on the application, the credentials involved as well as the data that is being exchanged with the card reader and eventually the host, tamper detection technologies can improve the security of the device. There are several technologies in the market such as mechanical and optical tamper detectors that can be embedded directly on the card reader for superior protection against threats. Do you require the reader's ronfiguration or firmware to be securely shared or loaded on the card reader? If so, can the reader meet this requirement? We are all aware of system and application software updates as at some point our phones have received security patches or app upgrades over the network. In the case of card readers, the process is quite similar except here the software or configuration updates might require encryption based on your use case. For example, if an end customer is reading static card numbers from an RFID media or isn’t using data protected by encryption keys this does not require the firmware or the configuration to be encryption for a simple reason that these files do not carry any sensitive information. The need to encrypt configuration/firmware files arises if the data that is being read by the reader contains any personal information or is part of a proprietary corporate format that is confidential, or should a customer wish to move to a higher security credential encrypted with keys. This means that either their existing card readers or new card readers must have a configuration that holds these keys. Configuration or firmware must also be encrypted since it holds sensitive information In such a scenario, the configuration or firmware must also be encrypted since it holds sensitive information. If the configuration or the firmware is encrypted, the file will no longer pose a security risk and can be shared with customers to perform updates to the existing readers or with the card reader manufacturers to load new readers with the configuration of firmware updates. This not only secures the sharing process but also the update process since the reader is now receiving an already encrypted file. After all, it is essential to choose a card reader that can carry out the aforementioned security considerations but more importantly the security features that are chosen need to be appropriate to the requirement of the customer. Any integrator first and foremost should thoroughly evaluate the respective application. They should work with subject matter experts in the field and establish requirements and objectives. After developing the concept, system architecture, data flow as well as various secure channels, only then can one begin to account for the security features needed. This process not only helps cement the end system’s overall security view but also elucidates the exact security requirements that correspond to the resulting application. In conclusion, choosing an RFID product that not only has the above security features but also has a flexible system design capable of accommodating future adaptions will prove to be the right choice for OEM’s and system integrators.
As the media often reports, the world of cybersecurity can be seen like the ‘Wild West’. There’s now a wide range of Internet of Things (IoT) devices connected to the web, making this a hot topic. Among these devices are security cameras. IoT devices are computers that use software that makes them vulnerable. As the famous cybersecurity evangelist Mikko Hypponen says, "If a device is smart, it's vulnerable!" Hypponen is right. On a daily basis, new vulnerabilities are found in software, regardless of the manufacturer. In 2019, more than 12,000 vulnerabilities worldwide were made public and reported as a CVE (Common Vulnerability and Exposure) in the National Vulnerability Database (NVD). Unfortunately, vulnerabilities are a given. What really matters is how a company deals with and resolves vulnerabilities. Cybersecurity vulnerabilities Awareness of cybersecurity vulnerabilities is vitally important Awareness of cybersecurity vulnerabilities is vitally important to protect you, your business and the Internet, but it’s also important to understand that a vulnerability is not synonymous with “backdoor”, and is not necessarily indicative of “cheap quality.” But there are companies out there that are embedding safeguards into their development processes to reduce the risks. You could see them as ‘Sheriffs’, taking steps to make this Wild West a little safer. Why Hikvision chooses ‘Secure-by-Design’ Security cameras, like all other IoT devices, are vulnerable to cyberattacks. Fortunately, manufacturers of IoT devices can significantly reduce these vulnerabilities during the production of devices, using a process called ‘Secure-by-Design’. Implementation of Secure-by-Design requires a commitment on the part of the manufacturer’s management team and a serious investment in resources and technology, which can result in a longer production process and a higher cost of the IoT device. Cost is often the reason why some IoT device manufacturers do not use Secure-by-Design (and are indeed cheaper). Hikvision is a producer of IoT devices that takes security and privacy very seriously and has implemented Secure-by-Design in its production process. Management supports this process and has even set up a dedicated internal cybersecurity structure charged with product cybersecurity. This group is also the central point of contact for all other cybersecurity matters. The Hikvision Security Development Life Cycle (HSDLC) is an essential part of Hikvision's cybersecurity program. Cybersecurity checks take place at every stage of product development — from concept to delivery. Cybersecurity checks take place at every stage of product development For example, product testing takes place during the verification phase, the company also regularly invites well-known security companies and public testing platforms to conduct penetrating testing. Does this mean that all Hikvision products are immune to hacking? No, that guarantee cannot be given, but the HSDLC is a testament to a manufacturer that makes every effort to produce products that are as cyber secure as possible. Source code transparcency center In addition to the Secure-by-Design process, Hikvision opened a Source Code Transparency Center (SCTC) lab in California in 2018, being the industry’s first-of-its-kind lab to open such a center. At this center, U.S., Canadian government and law enforcement agencies can view and evaluate the source code of Hikvision IoT devices (IP cameras and network video recorders). It’s important to emphasize that no product is 100 percent secure. Hikvision has a Vulnerability Management Program in place when a vulnerability is discovered in a product. To date, vulnerabilities that have been reported to Hikvision and/or made publicly known, have been patched in the latest Hikvision firmware, and are readily available on the Hikvision website. In addition, Hikvision is a CVE CNA, and has committed to continuing to work with third-party white-hat hackers and security researchers, to find, patch and publicly release updates to products in a timely manner. These vulnerabilities are collected in the National Vulnerability Database (NVD) and are public. Hikvision recommends that customers who are interested in purchasing security cameras inquire about a manufacturer’s cybersecurity practices and if they have an established Vulnerability Management Program. Cybersecurity questions to consider The cybersecurity of IoT devices is a topic that needs to be addressed in a serious way and it should play an essential role in the product development process, beginning at the concept phase of an IoT product. This requires time, investment and knowledge. Consider the following questions: Do I trust the manufacturer of a low-cost security camera? Does this manufacturer have a dedicated cybersecurity organization? How does this manufacturer handle vulnerabilities? These are the questions that everyone should ask themselves when making a purchase, be it a camera or any other IoT product. There is no absolute 100% guarantee of security, but Hikvision has industry-leading practices to ensure the cybersecurity for its cameras. Cooperation, with its customers, installers, distributers and partners, and full transparency are key elements to successfully secure IoT devices. When you read cybersecurity news, we invite you to look beyond the headlines, and really get to know the companies that produce the IoT devices. Before you buy a security camera or any IoT device, check out the manufacturer’s cybersecurity practices, look for a company with a robust vulnerability management program, a company that aligns itself with Secure-by-Design and Privacy-by-Design and a company that employs cybersecurity professionals who are ready and eager to answer your questions. Remember, there are Sheriffs out there, as well as bandits.
Security experts have discussed the demise of the passwords for years. As early as 2004, Bill Gates told the RSA Security Conference that passwords “just don’t meet the challenge for anything you really want to secure.” Change has been slow, but the sudden increase in remote working and the need for enterprises to become touchless as they try to encourage teams back to the office is increasing traction. Here we look at the future of passwordless authentication - using the example of trusted digital identities - and share tips on choosing a solution that works for your organisation. The move away from passwords was beginning to gain momentum pre-pandemic. Gartner reported an increase in clients asking for information on ‘passwordless’ solutions in 2019. Now Gartner predicts that 60% of large and global enterprises, and 90% of midsize enterprises, will put in place passwordless methods by 2022. This is up from 5% in 2018. The many limitations of passwords are well-documented, but the cost of data breaches may be the reason behind this sharp upswing. Stolen credentials – usually passwords – and phishing are the top two causes of data breaches according to the 2019 Verizon Data Breach Incident Report. Each breach costs businesses an average of anywhere between £4M to £8M depending on which studies you read. A catalyst for change As in so many other areas, the pandemic has been a catalyst for change. Newly remote workers using BYOD devices and home networks, sharing devices with other family members, and writing down passwords at home all make breaches more likely. And seasoned home workers represent a risk too. It also means that enterprises are developing new procedures to mitigate the spread of disease. This includes a thorough examination of any activity that requires workers to touch surfaces. Entering passwords on shared keyboards or touchscreens falls squarely in this area of risk. As does handling physical smart cards or key fobs. Enterprises are expanding their searches from “passwordless” to “passwordless and touchless,” looking to replace physical authenticators. In the quest to go touchless these are items that can be easily eliminated. The future of passwordless authentication Using fingerprint or facial recognition often only provides a new front-end way to activate passwords Common alternatives to passwords are biometrics. But, using fingerprint or facial recognition often only provides a new front-end way to activate passwords. Passwords are still required for authentication after the biometric scan and these live in a central repository vulnerable to hackers. With one successful hack of the central repository, cyber-criminals can swipe thousands of details. In other words, biometrics on their own are not an improvement in security, only a better user experience. They need to be combined with a different approach that adds another layer of security. A more secure option is to move away from the centralised credential repository to a decentralised model. For example, one based on trusted digital identities. This is where digital certificates are stored on users’ phones. Think of encrypted digital certificates as virtual passports or ID cards that live on a worker’s device. Because they are stored on many separate phones, you are able to build a highly secure decentralised credential infrastructure. A solution that uses people’s phones is also compatible with touchless authentication systems. You can replace smart cards and key fobs with a phone-based security model and reduce the number of surfaces and items that people touch. This is especially beneficial for workplaces where people have to visit different sites, or for example in healthcare facilities. Replacing smartcards with a phone in a pocket reduces the number of items that clinicians need to take out and use a smartcard between and in different areas, which may have different contamination levels or disease control procedures. How do trusted digital identities work? Workers unlock their mobile devices and access their trusted identity using fingerprint or facial recognition Here’s an example installation. You install a unique digital certificate on each user’s mobile device — this is their personal virtual ID card. Authorised users register themselves on their phones using automated onboarding tools. Workers unlock their mobile devices and access their trusted identity using fingerprint or facial recognition. Once they are authenticated, their device connects to their work computer via Bluetooth and automatically gives them access to the network and their applications with single sign on (SSO). This continues while their phone is in Bluetooth range of their workstation, a distance set by IT. When they leave their desk with their phone, they go out of range and they are automatically logged out of everything. Five tips on choosing a passwordless solution More automation means less disruption Consider how you can predict and eliminate unnecessary changeover disruptions. The task of onboarding large or widely dispersed employee populations can be a serious roadblock for many enterprises. Look for a solution that automates this process as much as possible. Scalability and your digital roadmap Will you maintain remote working? Having a high proportion of your team working remotely means that passwordless solutions will become more of a necessity. Are you expecting to grow or to add new cloud apps and broader connectivity with outside ecosystems? If so, you need password authentication that will scale easily. Encryption needs and regulatory requirements If your workers are accessing or sharing highly sensitive information or conducting high-value transactions, check that a solution meets all necessary regulatory requirements. The most secure passwordless platforms are from vendors whose solutions are approved for use by government authorities and are FIDO2-compliant. Prioritise decentralization Common hacker strategies like credential stuffing and exploitation of re-used credentials rely on stealing centralised repositories of password and log-in data. If you decentralise your credentials, then these strategies aren’t viable. Make sure that your passwordless solution goes beyond the front-end, or the initial user log-in and gets rid of your central password repository entirely. Make it about productivity too Look for a solution that offers single sign on to streamline login processes and simplify omnichannel workflows. For workers, this means less friction, for the enterprise, it means optimal productivity. Security improvements, productivity gains and user goodwill all combine to form a compelling case for going passwordless. The additional consideration of mitigating disease transmission and bringing peace of mind to employees only strengthens the passwordless argument. The new end goal is to do more than simply replace the passwords with another authenticator. Ideally, enterprises should aspire to touchless workplace experiences that create a safer, more secure and productive workforce.
Facial recognition is becoming more popular in newer systems for access control — a shift that began before the pandemic and has intensified with a market shift toward “touchless” systems. A new facial recognition platform is emerging that responds to the access control industry’s increased interest in facial recognition by expanding the concept with a new higher level of technology. At the core of the new system is high-performance, true-3D sensing with facial depth map processing at low power consumption, which enriches the capabilities of small-footprint access control devices. New proficiencies include anti-spoofing (preventing the use of a 2D photo of an authorized user to gain entry) and anti-tailgating (preventing an unauthorized person from gaining entry by following an authorized user) in real time and in challenging lighting conditions. The system uses “true 3D sensing,” which incorporates single-camera structured-light 3D sensing—as opposed to dual-camera depth sensing or IR video imaging-based approaches. AI vision processing and 3D sensing technologies The new “Janus reference design” incorporates AI vision processing, 3D sensing technologies, and RGB-IR CMOS image sensor technologies from Ambarella, Lumentum and ON Semiconductor. Specifically, Lumentum’s high-reliability, high-density VCSEL projector for 3D sensing combines with ON Semiconductor’s RGB-IR CMOS image sensor and Ambarella’s powerful AI vision system on chip (SoC). The Ambarella, Lumentum, and ON Semiconductor engineering teams worked together to incorporate their complementary technologies into the reference design. A reference design offers OEM product and engineering teams a fully functional engineering reference implementation that they can use as the basis for their own product. Teams will often customize a reference design with their choice of various third-party hardware components to fit their product specifications and positioning. They might also integrate their own software, algorithms, and back-end system integrations. The advantage to this approach is that the manufacturer can get to market quickly with a next-generation product that emphasises their core strengths. 3D depth information for facial recognition Generally, it takes between nine months and a year for a manufacturer to get to market using a fully functional reference design, such as the one developed jointly by Ambarella, Lumentum and ON Semiconductor. The Janus platform leverages 3D depth information generated via structured light for facial recognition with a >99% recognition accuracy rate. Traditional 2D-based solutions are prone to false acceptance and presentation attacks, whereas 3D sensing delivers advanced security—just as mobile phones use true-depth cameras for facial recognition. 3D facial recognition also significantly reduces the gender and ethnic biases demonstrated by some 2D facial recognition solutions. The Janus reference design is also aimed at future smart locks for enterprise and residential use: its unique single-camera 3D sensing solution will help OEMs overcome cost and manufacturability barriers, while the ultra-low power edge AI capability can effectively extend the battery life, which in turn reduces maintenance cost. Video security and access control Ambarella sees touchless access control, as well as the convergence of video security and access control, as the mega-trends driving industry innovation and growth—using video, computer vision, and 3D sensing to not only address safety and security, but also to improve the user experience and public health, says William Xu, director of marketing for Ambarella. The convergence of video security cameras and access control readers has been widely discussed by leading access control OEMs. In many cases, they already integrate video security cameras, readers, door controllers, cloud-access, and the like. In most enterprise installations, one would typically find security cameras installed where there are access control readers. Combining the two devices significantly reduces the maintenance cost and system complexity. “In comparison to fingerprint or other contact-based approaches, Janus-based access control is touchless—requiring no physical contact with authentication hardware such as fingerprint sensors or keypads—reducing infection risk while enabling a seamless experience,” says Mr. Xu. “The Janus platform provides true 3D depth information to prevent unauthorized individuals from mimicking legitimate users, and the advanced embedded AI processor enables tracking and anti-tailgating algorithms. Janus-based devices perform well in challenging lighting conditions and they are capable of authenticating multiple users simultaneously, with imperceptible latency.” Access Control and public health What was once purely a security challenge—namely, how to prevent unauthorized entry into a restricted area—has evolved into a public health challenge as well. Many traditional access control methods, from number pads to fingerprint readers, require touch in order to function, and if the current global pandemic has made one thing evident, it’s that minimizing physical contact between users and surfaces is vital to community well-being. Janus was originally designed to facilitate the next generation of facial-recognition-based access control readers—enabling 3D sensing and high recognition speed for seamless authentication. COVID-19 has accelerated industry-wide research, development, and timelines for Janus-based solutions, says Mr. Xu. Deep learning and artificial intelligence drive all the new capabilities offered in Janus—capabilities that are only possible due to the platform’s high computational horsepower. The core deep learning and AI capabilities of Janus enable a wide range of advanced features only possible with an embedded vision SoC, says Mr. Xu. All are performed in real time, even when multiple users are being processed simultaneously. These include the extraction and comparison of facial depth maps with those registered in the system; 3D liveness detection, ensuring that the system can distinguish between real users and photo or video playback attacks; anti-tailgating, which relies on computer vision algorithms to detect and track when an unauthorized person follows a legitimate user inside; face mask detection; and people counting. VCSEL technology According to Ken Huang, Director of Product Line Management, 3D Sensing, Lumentum: “Lumentum’s VCSEL technology is one of the Janus design’s core strengths and differentiators. The process begins when Lumentum’s high-resolution dot projector projects thousands of dots onto the scene to create a unique 3D depth pattern of a user’s face. Most traditional biometric facial security systems rely on 2D images of users—simple photographs—which reduces authentication accuracy. In contrast, the 3D depth map generated by Lumentum’s technology provides the foundation of a more accurate, more secure, and more intelligent system overall. In addition, Lumentum’s VCSEL solutions incorporate a Class 1, eye-safe laser with zero field failures to date.” Adds Paige Peng, Product Marketing Manager, Commercial Sensing Division, ON Semiconductor: “If we think of Ambarella’s CV25 as the brain of the Janus design, the AR0237IR from ON Semiconductor is the eye. The AR0237IR image sensor captures the information, and the CV25 processes it. Other face recognition systems use two “eyes” – one to recognize RGB patterns to generate the viewing image stream, and another IR module to detect liveliness in motion. The Janus solution leverages a single “eye”—the AR0237IR—to obtain both visible and infrared images for depth sensing and advanced algorithms such as anti-spoofing and 3D recognition. AR0237IR also provides good sensitivity in various lighting conditions and supports high-dynamic-range (HDR) functions.” The single-camera 3D sensing solution for access control operates in three seamless steps: Step 1: Lumentum’s high-resolution dot projector creates a unique 3D depth map of a user’s face; Step 2: ON Semiconductor’s RGB-IR image sensor captures the high-resolution images from Step 1, even in low-light or high dynamic range conditions; Step 3: Ambarella’s advanced vision SoC takes the high-resolution images captured in Step 2 and uses deep neural networks (DNNs) for depth processing, facial recognition, anti-tailgating, and anti-spoofing while video encoding and network software run simultaneously.
If one employee stands less than six feet away from another employee, a fob attached to a lanyard around his or her neck emits an auditory beep – an immediate reminder to observe social distancing. If an employee were to be diagnosed with COVID-19, a cloud-based database provides a record of who at the company the sick employee had contact with. These capabilities of HID Location Services ensure social distancing and provide contact tracing to enable companies to return to work safely. They have been deployed in a pilot program at HID Global’s Corporate Headquarters in Austin, Texas. Social distancing using a BLE beacon To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. The building area covered by each reader constitutes a “zone,” and the system records when two beacons are signaling from the same zone, which indicates contact between employees. In effect, the system records – historically and forensically – who was near whom (and for how long) using the zone-based approach. “In the workplace, we provide organizations with visibility into the location of their workforce,” says Mark Robinton, Vice President, IoT Services Business Unit at HID Global. Pilot program spans variety of environments By documenting where a sick individual moved in the building, the system also can guide any need to close off a certain area for deep cleaning. Instead of quarantining a whole building, a company could quarantine a small subset of employees who were likely exposed. Importantly, the system only reports data, while management makes the actual decisions about how to respond. The site of the pilot program is the 250,000-square-foot HID Global facility in Austin, which includes a variety of environments, including manufacturing areas, an executive suite, cubicles, a training area, a cafeteria, and lobbies. This spectrum of use cases enables the pilot program to evaluate how the system works in various scenarios. The building in Austin has two floors, plenty of natural lighting and emphasises sustainability in its design. HID Location Services ensure social distancing and provide contact tracing Pilot starts small and expands For the pilot program, 80 readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. The fobs emit an audible beep, which employees have overwhelmingly said they prefer. Observers overseeing the pilot program have documented employee reaction and comments. It emits a blinking LED light, which can be seen by the offending co-worker There were challenges in setting up the pilot program remotely to ensure fewer employees were on site during the pandemic. The equipment was provisioned in Florida and then shipped to the Austin location. Fine-tuning was required to adjust the signal strength of the BLE beacons. The badges were initially more powerful, but the strength was dialed back to be comparable to the fobs and within the six-foot social distancing range. Signal strength is also a variable in diverse environments – the 2.4 Ghz signal tends to reflect easily off metal, so adjustments in signal strength are needed in a factory setting, for example, versus a collection of cubicles. “This facility is large enough and diverse enough that it provides great test results and quality data to analyze,” says Dean Young, Physical Security Manager at HID Global. “Our employees are eager to be part of the pilot to demonstrate that we use the technologies we provide to our customers, and they want to help us stay in compliance with social distancing and contact tracing.” Ensuring privacy while protecting employees HID Global’s headquarters had approximately 425 employees before the coronavirus pandemic lowered the number drastically to include only essential workers. As more people return to work, additional fobs and badges are being issued to expand the scope of the pilot program. The program is also incorporating contact tracing of suppliers and others who visit the facility. Except when triggered by contact among employees, locations are not recorded. Each employee’s location is always available in real-time (e.g. in case of an emergency), but they are not “tracked.” Through BluFi placement and geofence capabilities, the system closes off private areas where location should not be monitored, such as a rest room. Geofencing also identifies when employees enter and/or exit the area covered by the pilot program. Although each beacon is associated with an employee, the employee’s identity is not part of the data stored in the cloud, so there are no privacy concerns. Data is completely anonymized, and no personally identifiable information (PII) is stored in Bluzone. Other computer systems in a company, such as a human resources (HR) program, can privately and securely store the identities associated with each beacon. Other applications for HID location services In addition to social distancing and contact tracing applications, HID Location Services offer other use cases ranging from asset tracking and employee safety/security to location analytics. For example, the system can analyze room usage for better building management and operational efficiency. It can also quickly find people in emergency situations. These use cases ensure continued value for a system even after concerns about social distancing and contact tracing have faded. The system can analyze room usage for better building management and operational efficiency Another big selling point is the ability of a company to be better prepared in case of a future pandemic, or a second wave of this one, says Robinton. The HID Location Services social distancing and contact tracing applications will be available at the end of Q3 and will be rolled out through HID Global’s existing integrator channel. Vertical markets likely to embrace the technology include healthcare, where hospitals need to track patients as they come in and to know which other patients or staff they may have been exposed to. The financial sector is another likely market, as is manufacturing, which is looking to avoid the prospect of shutting down an entire plant. It’s better to address the three or four people who were near a sick employee than to shut down the plant. In the hospitality industry, fobs can be used to signal duress by the housekeeping staff.
Within days, a rule will take effect that bans from U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and Dahua. The Federal Acquisition Regulation (FAR) rule implements the “blacklist” (or “Part B”) provision of the National Defense Authorization Act (NDAA), which is understood in the security industry as prohibiting dealers and integrators that do business with the federal government from selling Chinese-made video products to any of their customers (even for non-government projects). The rule, which is officially still interim, states: “On or after August 13, 2020, [federal] agencies are prohibited from entering into a contract, or extending or renewing a contract, with an entity that uses any equipment, system, or service that uses covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system.” Federal rules Within days, a rule will take effect that bans U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and DahuaFederal agencies issuing the rule are the Department of Defense (DoD), the General Services Administration (GSA) and the National Aeronautics and Space Administration (NASA). GSA provides centralized procurement for the federal government. Because the COVID-13 crisis delayed issuance of the rule, the usual 60 days will not be allowed for public comment before the rule is implemented. However, public comments are welcome and will be addressed in subsequent rulemaking. “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giants. The rule also specifies that it applies to “certain video surveillance products or telecommunications equipment and services produced or provided by Hytera Communications Corp., Hangzhou Hikvision Digital Technology Company, or Dahua Technology Company (or any subsidiary or affiliate of those entities).” Hytera is a Chinese manufacturer of radio systems. Hikvision and Dahua are major international manufacturers of video surveillance equipment. Limits and prohibitions The rule states: “This prohibition applies to the use of … equipment or services, regardless of whether that use is in performance of work under a Federal contract.” In the industry, this clause is taken to mean that integrators that “use” any of the covered equipment are prohibited from selling to the government. “Use” presumably covers an integrator deploying the equipment in their own facilities and/or selling it to other customers. The rule also prohibits “service … related to item maintenance,” which in the case of a security integrator would include providing service contracts on previously installed systems. Security Industry Association (SIA) The Security Industry Association (SIA) comments: “Due to applicability [of the rule] to uses by entities with federal contracts even unrelated to their federal work, this broad interpretation is expected to have widespread impact on the contracting community across many sectors, as covered video surveillance equipment is some of the most commonly used in the commercial sector in the United States.” Security integrators that do business with the federal government have largely anticipated the new rule and already switched their Chinese camera lines for NDAA-compliant competitors. However, as SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. Easing compliance burdens The interim rule adopts a “reasonable inquiry” standard when an offeror (government contractor) represents whether it uses covered equipment. “A reasonable As SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. inquiry is an inquiry designed to uncover any information in the entity’s possession about the identity of the producer or provider of covered telecommunications equipment or services used by the entity. A reasonable inquiry need not include an internal or third-party audit.” SIA notes that this provision may be aimed at easing the compliance burden by suggesting that contractors only need to inquire based on what information they already possess. The 'blacklist' The new rule covers Paragraph (a)(1)(B), which has informally been referred to as the “blacklist” provision of the NDAA, the John S. McCain National Defense Authorization Act for fiscal year 2019. However, the “Chinese ban” provision [Paragraph (a)(1)(A)] already went into effect a year after the law was signed by President Trump (August 13, 2018). “Part A” covers use of Chinese-made products in fulfilling government contracts. A growing threat Seeking to justify the new restrictions, the FAR rule states: “Foreign intelligence actors are employing innovative combinations of traditional spying, economic espionage, and supply chain and cyber operations to gain access to critical infrastructure and steal sensitive information and industrial secrets. The exploitation of “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giantskey supply chains by foreign adversaries represents a complex and growing threat to strategically important U.S. economic sectors and critical infrastructure.” SIA has urged a delay in implementing the “Part B” provision, stating: “The federal government estimates that it will cost contractors well over $80 billion to fully implement this prohibition on the use of certain Chinese telecommunications and video surveillance equipment, yet endless delays in publishing the rule now mean that federal suppliers have just weeks to understand and comply with the new rule, which raises as many questions as it answers.” SIA continues: “Federal suppliers across a wide range of industries have increasingly concluded that Part B is unworkable without clarification of the scope and meaning of key terms in the provision, which the rule does not do enough to define. For example, Part B bans agencies from contracting with a provider that “uses” any covered equipment or service. This term is not clearly defined in law or regulation, yet contractors must certify compliance beginning Aug. 13, 2020.” The Part B rule, which only applies to prime contractors, enables agency heads to grant a one-time waiver on a case-by-case basis, expiring before Aug. 13, 2022.
In the aging trend of 21th century with rapid aging population and high healthcare costs are creating a growing demand for care at home, especially for seniors with long-term health conditions. Home care is moving towards tele-health monitoring and telemedicine, including video conferencing and remote monitoring technology to help increase caregiver efficiency while still providing constant convenience to the patients. Living independently and aging gracefully are the ideals that every individual seeks to pursue, and the challenge is to ensure that all people can age with dignity and security. Climax’s GX Cubic Smart Care Medical Alarm is an all-in-one wellness, and personal safety medical alarm solution, designed to help the elderly to manage their long-term health conditions, bridging medical health monitoring information to care providers/hospitals and create points of care to keep them safe in their own homes. GX Cubic medical alarm GX Cubic can be flexibly connected with third-party Bluetooth (BLE) healthcare sensors GX Cubic can be flexibly connected with third-party Bluetooth (BLE) healthcare sensors, like blood glucose monitor, pulse oximeter, blood pressure monitor, or weight for tracking health data and providing customized alerts to meet individual needs. The measurements can be automatically sent to a health professional who can review the results and continuously keep an eye on the patient’s health needs and provide early treatment as necessary. In addition to medical health monitoring, GX Cubic is also compatible with Pivotell Advance Automatic Pill Dispenser to keep secure of all pills, and remind the user to take the correct medicine at the pre-set time. The solution allows health professionals to monitor pill taking timely results and keep an eye on the patients’ treatment as needed. For situation when remote monitoring care given is insufficient and the user requires onsite assistance, GX Cubic can raise an emergency alarm to inform the caregiver or medical personnel for immediate action. Seniors can be assured that they are always being taken care of, and provide their family members with a peace of mind. Voice recognition solution Voice recognition has innovated over time and continues to advance, allowing products to become even more intuitive and easier to use. GX Cubic has built-in voice recognition and can activate an emergency call to care provider or central monitoring center by preset vocal commands or keywords. This allows seniors to receive emergency attention even in situations where they are immobilized or cannot manually reach the panic button. Working with the leading voice ecosystems Amazon Alexa and Google Home via cloud, GX Cubic also features voice control to activate home electronic devices, complete daily tasks, and seek help during emergencies. Voice over Internet Protocol With the VoIP (Voice over Internet Protocol) feature, GX Cubic users can also initiate two-way voice callsWith the VoIP (Voice over Internet Protocol) feature, GX Cubic users can also initiate two-way voice calls to contact their caregivers or family members at any time. With the additional add-on of DECT, GX Cubic can pair with voice extenders, talking pendants, call points, and voice extenders placed strategically around the home to create a safety net. Smart Home Automation Comprehensive elderly-friendly health care should also have a focus on preventive action to maintain a healthy ageing process. To realize independent living in a smart way, GX Cubic pairs with Zigbee or Z-Wave sensors to enable the whole-home control with various protocol-of-choice. GX Cubic can be programmed to turn on the hallway lights automatically when a sensor reports a senior’s movement in the middle of the night, to reduce a chance of falling; or automatically adjusting air conditioning when there is a sudden temperature-drop. The scenarios are unlimited to fit individual requirements, ensuring a safest living experience for the senior users. GX Cubic can also integrate IP security cameras and camera PIR motion sensors to deliver real-time visual monitoring and verification. When an emergency occurs, alerts are immediately sent to family members, and Monitoring Center to verify the event and sending immediate assistance as needed. Lastly, GX Cubic can support wireless sensor devices, allowing users to add in smoke detectors, water leakage sensors, and gas sensors to monitor environmental emergencies; and motion sensors, door contacts, sensor pad transmitters for inactivity monitoring, to build a healthier, safer independent living.
Allianz Parque has become one of the most modern multi-purpose arenas in Latin America since it was built in 2014 by WTorre Properties. The stadium is located at the same place of the old Palestra Itália Stadium with a capacity of more than forty thousand spectators. The stadium not just meets FIFA standards but was also awarded various prizes including the Master Award in the 11th edition of the Grand Prize for Corporate Architecture, the Accessibility Seal, delivered by the Permanent Accessibility Commission (CPA), and the "Environmental Management of the Surroundings of the Work" award, at the 3rd Health and Safety at Work Seconci Award. Intelligent video surveillance cameras With an eye on the market, the management of Allianz Parque constantly invests in advanced technology and new solutions to keep the project in line with the most current standards of innovation in the world. The latest are the intelligent video surveillance cameras from Dahua Technology, globally renowned video-centric smart IoT solutions and service provider. The cameras with embedded artificial intelligence systems could help the security team of the arena The cameras with embedded artificial intelligence systems could help the security team of the arena work more efficiently and productively, so that the stadium is capable of dealing with different kinds of scenarios, such as large-scale concerts, major celebrations and, especially, football matches at Sociedade Esportiva Palmeiras. Installation The installation of the entire system took around 90 days. According to the General Manager of Allianz Parque, the biggest challenge is to implement the new system with the arena in operation. "We have to carry out the replacement without any impact to the security team. But with the support of the Dahua Technology team, we are able to do the job quietly without any major changes in our initial planning,” explained Rigotto. In the project, devices with latest generation embedded artificial intelligence technologies were used. Many of their functions go beyond an image captured by an ordinary camera. Here are the camera models and technologies used: DH-IPC-PF83230-A180 - panoramic camera with four 8 Megapixel CMOS sensors, which generates a single 180-degree image of 32MP using H.265 compression technique; SD6CE245UN-HNI - PTZ-style positioning camera with various technologies, such as Starlight, which allows viewing of images in very light colors (less than 0.005lux). It has a 45x zoom system, plus an infrared illumination that can reach 250 meters away; MPT310 portable recorder, used with lapel cameras, making recording and transmission of high-definition audio and video online from the point of view of the agent close to the events; DH-IPC-HFW8242EN-Z4FD-IRA-LED - special network camera that captures human faces through AI algorithm, embedded in a chip with Deep Learning Technology. It gives the facial detection server a good deal of processing work, since the camera itself locates the faces of the video image and analyses attributes such as gender, age, facial expressions and whether it has glasses; Network camera recorder and face database manager, DHI-IVSS7016DR-4T - It works in conjunction with the CMS DSS PRO that makes the recording of the videos in the network, in addition to managing and analyzing the faces pre-registered in the database of employees and service providers of Allianz Parque. User can also set a black list and the recorder will alert once unauthorized persons detected in a certain sector. The server can, in real time, work by processing the input stream at the gate opening, being able to recognize up to 40 faces per second in the Arena, detecting the faces and comparing them with the database prepared to issue field safety alerts in up to a few seconds; Video Wall, with 6 46-inch LCD screens (DHL460UCM-ES), forms a 2x3 matrix and a Dahua controller (NVD0905DH-4I-4K), which can display 4K, live images, advertisements and bulletins in a professional manner. Facial recognition system Allianz Parque now has a state-of-the-art facial recognition system, which has artificial intelligence and data analysis" "We are very proud to have this partnership with Dahua Technology. Through it, today, Allianz Parque now has a state-of-the-art facial recognition system, which has artificial intelligence and data analysis, and can be integrated into the public safety team system,” emphasized Eduardo Rigotto, General Manager of Allianz Parque. Rigotto pointed out that there are always possibilities for modernization. "The market has changed in five years and in order to keep us in the lead as an inspiration for other spaces, we need to continue investing in new technologies," he said. In addition to providing advanced security technology, Dahua Technology also became the sponsor of Allianz Parque, as well as Prevent Senior, Banco Pine and the Allianz Seguros brand. With this, the Arena Control Center will be called CCO by Dahua Technology and there are more than 150 information boards present by Dahua Technology in the stadium to remind and protect everyone. Dahua LED panels In 2018, Dahua Technology has successfully delivered the largest RingLed 360º in Latin America, which totals 580 meters of panels for all bars in the arena. The innovative design with LED panels from Dahua Technology was developed by Digital Arena, a pioneer in the field of digital media for stadiums. "Our philosophy is to deliver large projects that make a difference not only to the customer but also to the people who will use their space," said Fabio Lopes, Channel Sales Director of Dahua Technology Brazil. Moreover, he added, "Allianz Parque is an entertainment venue where spectators aim to watch a great show with total safety and comfort. This project aims to demonstrate that Allianz Parque is one of the safest arenas in Latin America.” Stadium security Located in the city of São Paulo, Allianz Parque imposes itself between the districts of Água Branca, Pompeia, Perdizes and Barra Funda, an area of easy access, highlighted by event organizers and club fans. The space has the capacity to receive 43,700 people on game days, 55,000 for shows and 12,000 for events in the amphitheater.
As prominent in Belfast’s history as its cranes are on the city’s skyline, it’s hard to imagine Belfast without Harland and Wolff. Once the world’s greatest shipbuilder, Harland and Wolff today has evolved into a company that provides over 150 years of engineering excellence to the maritime, offshore, and renewable energy sectors. The Harland and Wolff facilities on Queen’s Island are now used to maintain some of the world’s largest ocean-going vessels, ranging from offshore platforms and cruise liners to offshore wind farms. The company is spread over two sites in Belfast and covers over 200 acres. Its main facility has a public-facing perimeter of no less than 1.5 kilometers. With safety as a primary consideration in the execution of projects, the company goes to great lengths to protect its investments from unwanted visitors, intruders, and vandalism. FLIR VMS Solution For over 15 years, Harland and Wolff has been using FLIR’s United VMS to manage a wide variety of security cameras For over 15 years, Harland and Wolff has been using FLIR’s United Video Management System (VMS) to manage a wide variety of security cameras. As technology innovations and features were being added onto the United VMS over the years, Harland and Wolff has always remained loyal to the FLIR brand. But with the increasing development of Queen's Island as an industrial, commercial, and tourist area came a greater public presence and an increased safety and security threat. That is why in recent years Harland and Wolff has been continuously investing in the latest security camera technology from FLIR, including enterprise security cameras, PTZ cameras, intelligent thermal cameras, and mobile and wearable cameras. Optical And Thermal Cameras “Today, over 140 FLIR cameras on-site and along the site’s perimeter make sure that we can detect any irregularity,” said Chris Neill, security operations manager at Harland and Wolff. “Whenever one of our cameras picks up an incident – an intruder for example – an alarm is generated and sent to our security control room, who can then follow up the incident. This ensures us that our investment and that of our customers is safe and secure at all times.” Due to the high impact and risk associated to a possible incident on site, the company’s security department follows a proactive approach for possible intruders. Even in complete darkness, in perimeter areas where there is no additional lighting, thermal analytic cameras can pick up the presence of intruders, animals, or vehicles automatically based on their heat signatures. Intruder Detection While thermal camera footage does not allow actual identification of intruders, it can still be used as evidence for insurance companies or law enforcers, especially when an intrusion pattern can be seen over different cameras. United VMS is FLIR’s enterprise-level software solution for video surveillance operations United VMS is FLIR’s enterprise-level software solution for video surveillance operations. The software is currently used at Harland and Wolff by four control room operators and eight managers, all of which have dedicated user rights. One of the strengths of the United VMS system is that it can connect with nearly any security camera on the market and that video streams and detection alerts can be presented on any screen, be it on a video wall, a PC, or a smartphone. United VMS But Harland and Wolff has been using United VMS for far more applications. “We also use the United VMS platform to monitor alarms coming from fire sensors on oil rigs, for example,” said Neill. “Another example is the detection of failed pumps on one of our drydocks. This information also comes in on United VMS, where we generate alarms and notify key staff in real time.” Harland and Wolff has indeed managed to make use of United VMS's flexibility and deploy it for much more than security applications only. "We are not in a static business," said Neill. "At Harland and Wolff, we are always taking on new challenges and solving new problems; FLIR’s United VMS platform helps us do that.” TruWITNESS Mobile Sensor Technology Harland and Wolff will also make use of TruWITNESS, the latest mobile and wearable sensor technology from FLIR. TruWITNESS will allow guards on patrol to stream video directly to the control room in real time and from anywhere on the Harland and Wolff sites. Harland and Wolff needs to comply with a minimum security level imposed by the UK Department of Transport" Guards will be able to bookmark events so that incidents or irregularities can be reported and can be followed up more efficiently. In case of incidents, camera footage from the TruWITNESS wearable devices can be used as evidence. In addition, control room operators will be able to track members of staff via the United VMS and display their location on a map. Security Technology Advancements “Our yellow gantry cranes have become a national icon,” said Neill. “Unfortunately, this also means that they are an attractive target for political messages or, as in the past, terrorism. As a port facility, Harland and Wolff needs to comply with a minimum security level imposed by the UK Department of Transport. But in reality, we always exceed these requirements. We owe this to our continuous investments in security technology, which we also consider as a commitment to our customers.” Maybe this is what connects Harland and Wolff with FLIR. “As committed as we are to our customers, we expect the same from our suppliers as well,” said Neill. “As someone with a technical background, I have always been convinced of the quality of FLIR security products. But there will always be a time when you need to rely on technical support, and that’s where FLIR really makes a difference.”
Pengsheng Industrial Park is the first investment project by a Chinese private enterprise in Uzbekistan that has been acknowledged and ratified by the governments of the two countries. Located in Uzbekistan's Sirdaryo state, the Pengsheng Industrial Park is the biggest non-energy cooperation project between China and the Central Asian country. At present, there are over 10 workshops covering various fields with a total number of more than 1,500 employees. As a model project of China-Uzbekistan cooperation, it has contributed to a large number of job opportunities and high output value for local economic development. High-End monitoring system The expansion of the production scale of the park brought inconvenience to management and the current simple front-end camera plus back-end storage video surveillance system cannot meet the growing production management and modern monitoring needs any more. Dahua provided the park with a complete, high-end monitoring system that contain over 500 HD cameras, 100 IP camerasDahua provided the park with a customized complete, high-end monitoring system that contain over 500 HD cameras, 100 IP cameras, central management, central storage, third-party contact as well as display and control system all around factory, fence, outdoor and indoor areas to protect the whole park. To better secure the access between the network of video surveillance system, the data is gathered from front-end devices by PON transmission to establish looped network for video surveillance and to ensure reliability. Advanced technology solutions This project is the first general contracted project with great significance in Uzbekistan. Dahua is not only the supplier of the equipment, but also responsible for the whole project life cycle including construction, delivery, system documentation, technical support, operation training and long-term maintenance. The solutions have effectively reduced the difficulty during production process, which greatly improved the management efficiency for customers. In the future, Dahua will continue to provide more advanced technology solutions such as face recognition, personnel and vehicle management IT systems, industrial machine vision, etc. for the Peng Sheng industrial Park.
Access control has become a central component for the safety and security strategies of today's schools, and due to the complicated threats and challenges these facilities face, a school's access control technology must be innovative and intelligent enough to ensure comprehensive protection. The education sector is a gateway to the future for young people all over the world. But to assure this passage, schools must guarantee their students safety as well as their education. One such example of Vanderbilt solutions at work in the education sector is at a Study Abroad University in London that hosts students from the USA. Enabling Campus Security Live and recorded footage can be viewed remotely, and footage can be used in evidence The university wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. Vanderbilt’s ACT365 keeps audit trails of who is in the student accommodation by monitoring and recording fob activity. Additionally, the system produces diagnostic reports on door status and can investigate situations such as door forced, door ajar and break glass activation either locally or remotely. If an incident arises in the student accommodation, ACT365 can link events at doors through video footage so campus security can quickly identify and react. Live and recorded footage can be viewed remotely, and footage can be used in evidence. Real-Time List In further protecting students’ safety, campus security can provide pin codes, access fobs, and cards to students. These credentials can be remotely enabled or disabled if required. This can be managed on desktops, laptops tablet, or smartphone device. In the event of a fire or other emergency, ACT365 automatically unlocks all doors allowing students to reach safety. The ACT365 muster report gives security campus a real-time list of all students in the campus The ACT365 muster report gives security campus a real-time list of all students in the campus accommodation building. When students exit their accommodation and swipe out, the muster report automatically updates. If someone is missing, campus security can check cameras and call them directly by clicking on their name in the dashboard. Safeguarding Foundations Security in education is a crucial issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability moving forward – flagship traits of the Vanderbilt brand. Students want to attain a higher education in a safe and secure environment while enjoying their first step into varied careers. Vanderbilt’s solutions respond to these expectations and enable active safeguarding foundations to be laid.
Your Homes Newcastle (YHN), which manages more than 26,000 properties on behalf of Newcastle City Council, is taking an innovative approach to fire safety with a pilot project utilizing thermal imaging cameras in tower blocks. The ALMO has installed the thermal imaging cameras in three of its 45 multi-story blocks across the city in a trial partnership with OpenView Security Solutions, with the project attracting praise from Tyne and Wear Fire and Rescue Service. Mobotix M16 Thermal Cameras The trial of the Mobotix M16 Thermal Camera sees the cameras installed in bin chute rooms The trial of the Mobotix M16 Thermal Camera sees the cameras installed in bin chute rooms. The cameras detect minute increases in temperature, triggering an alarm in YHN’s central enquiry center before any fire has had a chance to take hold, meaning within seconds of a possible fire starting the alarm is raised with the fire service. The camera continually monitors the temperature in the room, with information relayed back to the fire service, enabling them to better prepare for responding to the fire. David Langhorne, YHN’s Assets and Development Director, said: “The tragic events at Grenfell Tower have undoubtedly put fire safety in multi-story blocks under a microscope, but we have been trialing new measures in our multi-story properties for some time. Faster Fire Detection “We pride ourselves on being innovative, so it was an easy decision for us to test something that had not yet been adopted elsewhere. The early detection system provided by the camera has many benefits, but, most importantly, the faster response time from the fire service means the potential impact on residents and their properties is minimized and they and their homes are far safer as a result.” “This trial system is one of many fire safety measures currently in place in the blocks we manage across the city, where we also have wet and dry risers, central alarm systems, smoke alarm activated bin chute fire dampers, and bin room sprinklers.” Reducing False Fire Alarms Alan Robson, Assistant Chief Officer at Tyne and Wear Fire and Rescue Service said “It’s great that YHN is innovating in this way. Using technology to support the monitoring of storage areas such as this helps improve the information we receive about incidents. This technology can reduce false alarm calls and improve our response to confirmed fires.” The standard CCTV lens provides a live feed for further verification of events OpenView Security Solutions is the UK’S largest privately-owned independent security company and a leading national supplier of fire, electrical and mechanical services to the public and private housing sectors. Thermal Imaging The Mobotix M16 Thermal camera’s lens is triggered when an unexpected heat pattern occurs and automatically sends an alert to the central control room. Images from the thermal lens are automatically presented to operators enabling the exact location of hotspots, such as smouldering fires, to be pinpointed. The standard CCTV lens provides a live feed for further verification of events. YHN’s existing infrastructure, which uses Openview installed equipment in the blocks to link alarms through to its enquiry center via Jontek, meant the new approach could be easily implemented without any disruption to residents. Innovative Fire Protection Solutions Andy Ward, Sales Director of OpenView Security Solutions, added “This innovative fire protection solution enables housing providers to ensure a safer environment for residents and minimize the incidence of false alarms. It now forms part of our expanding portfolio of fire and life safety solutions, one of the fastest growing areas of our business, and consolidates our leading position in the public and private housing sector.” Commenting on the partnership with YHN and OpenView, Frank Graham, Mobotix Regional Sales Manager, said: “We are very happy to be working so closely with both YHN and Openview in the development and provision of an innovative solution for such a serious issue. Mobotix cameras have inbuilt intelligence to meet all the requirements of integrator and end users alike and we look forward to a longstanding and fruitful partnership with both organizations moving forward.”
Round table discussion
Serving customer needs is the goal of most commerce in the physical security market. Understanding those needs requires communication and nuance, and there are sometimes surprises along the way. But in every surprising revelation – and in every customer interaction – there is opportunity to learn something valuable that can help to serve the next customer’s needs more effectively. We asked this week’s Expert Panel Roundtable: What was the best lesson you ever learned from a security end user customer?
New software developments have dominated technology innovation in the physical security industry for years, making more things possible to the benefit of integrators and end users. However, hardware is another important piece of the puzzle. No matter how great your software, the system doesn’t perform unless the hardware works too. In our enthusiasm over software developments, let’s not overlook the latest in the hardware world. We asked this week’s Expert Panel Roundtable: How do hardware improvements drive better physical security?
Dark video images contain little or no information about the subject being surveilled. Absence of light can make it difficult to see a face, or to distinguish the color of clothing or of an automobile. Adding light to a scene is one solution, but there are also new technologies that empower modern video cameras to see better in any light. We asked this week’s Expert Panel Roundtable: What impact does lighting have on the performance of video systems?