Remote monitoring security applications
Being isolated on the edge of wilderness means there’s a need for a video system that is both reliable and flexible. For that reason, the team at Jackson Hole Airport (JAC), since 2009, has relied on video management software (VMS) from Milestone Systems, to enhance security, safety, and efficiency at the airport. Milestone XProtect VMS installed At the edge of the frontier, Jackson Hole Airport has experienced considerable growth over the years. Significant capital investments in expan...
Dahua Technology is a globally renowned video-centric smart IoT solutions and services provider. Based on technological innovations, Dahua Technology offers end-to-end security solutions, systems, and services, in order to create value for city operations, corporate management, and consumers. Dahua Technology has designed a video surveillance and control solution for a popular Panamanian Food Company - Empresa Panamena de Alimentos (EPA). Dahua’s Security solution Empresa Panamena de Al...
Aerocharter is a provider of technical, operational, and commercial services to support aviation. Its main activities are cargo services, including handling, storage and supervision of cargo, in parking apron and warehouse. In addition to ramp operations with loading and unloading options, Aerocharter also provides services in aircraft movement, cargo insurance, and security, line maintenance, among others. Video security with AI technology To strengthen its state-of-the-art services, Aerocha...
Roselle Catholic High School is a co-ed private high school founded 61 years ago in Roselle, New Jersey. Home to more than 400 students, Roselle Catholic is part of the Roman Catholic Archdiocese of Newark. In its community, Roselle Catholic is known for its core values promoting academic excellence, service, and tolerance. Like many high schools across the country, Roselle Catholic High School relied on outdated technology to communicate between the front office and classrooms. Outdated inter...
In a surveillance monitoring context, video metadata refers to the structured details that the user can extract from given video footage. It is data that provides information about other data – a “data about data” in short. Human-based video metadata, as its name suggests, are data derived from human targets in the monitored scene. It can be utilized based on users’ requirements to significantly enhance the management and operation of various application scenarios, while...
ASSA ABLOY’s Code Handle door entry solution is a simple solution for keeping private rooms very private, in order to allow access only to those who require it and authorized personnel. Code Handle door entry solution The PIN code setting of the Code Handle access control solution allows users to keep control of who has access, particularly important when they want to keep items away from children. In primary schools, Code Handle protects each and every room that staff and security don&...
Scenario: One needs to install a camera in the lobby of a building to capture the entrance area. Problem: The area has a lot of windows which overexposes the image, making it difficult to capture the people coming in and out of the premises. Solution: A security camera with a good Wide Dynamic Range (WDR). What WDR does? Dynamic range refers to the ratio between the largest and smallest measurable quantities of something. In the case of video surveillance, the dynamic range measures the ratio between the lightest and darkest elements of the image. WDR technology is great for high contrast scenes, balancing the brightness and shaded areas simultaneously so an image neither appears blown out or too dark. IHS defines WDR at 60 dB or greater, though it’s not uncommon to see WDR cameras with capabilities of 120 dB or more Decibels (dB) are the value with which dynamic range is measured. IHS defines WDR at 60 dB or greater, though it’s not uncommon to see WDR cameras with capabilities of 120 dB or more. However, keep in mind that each manufacturer has its own method of determining a camera’s dB. Therefore, when comparing product datasheets, it is possible that a camera with a lower ratio outperforms a competitor with a higher dB ratio. How WDR works? Security cameras with WDR technology (e.g. Dahua HDCVI 6.0 PLUS) are using either Digital WDR (DWDR) or True WDR. True WDR uses image sensors and a Digital Signal Processor (DSP) to provide even illumination to all areas of an image. A True WDR-enabled video surveillance camera has sensors that take two scans of each video frame. The first, at low speed (to capture more light), shows the image in normal light conditions. The second scan is taken at high speed to capture less light overall and get an image with strong light in the background. The DSP combines the two scans to form a single, balanced, well-illuminated image. DWDR uses algorithms instead of sensors to digitally brighten too-dark areas and dim too-bright areas. DWDR relies on the DSP chip instead of the image sensor to provide WDR. It adjusts each individual pixel of the image and calculates exposure accordingly. This technique has some limitations: the intense manipulation of pixels leads to the overall image being grainier. On the other hand, DWDR doesn’t need costly image sensors, so DWDR can be a more economical option when WDR is a necessity. When one doesn’t have WDR? Backlight Compensation (BLC) brightens the image so one can see darker details better There are two options for improving the exposure of an image without using WDR. In a high-contrast scene with heavy, broad, backlighting, the camera will adjust to the average illumination, which will darken the image. If no WDR is available, Backlight Compensation (BLC) brightens the image so one can see darker details better. BLC is a legacy technique that uses DSPs to increase the level of exposure for the entire image. Rather than balancing brightness on overexposed and underexposed areas of an image like WDR does, it brightens the entire image. Highlight Compensation (HLC) is a technology where image sensors detect strong light within the image and reduce exposure on those areas to enhance the overall image quality. In a dimly lit scene with bright lighting caused by hot spots (e.g. headlights, street lights), the overall image may become too dark. If no WDR is available, use HLC. The camera automatically suppresses bright light sources, allowing proper exposure of adjacent areas. Conclusion Regardless of the dB value specified, image results will vary depending on the complexity and amount of movement in a scene. To determine the best camera for an application, it is always best to test that it meets the needs and expectations of the customer.
A time attendance system can help to keep a close eye on an employee’s working hours, prevent time theft by accurately tracking and recording employees’ time and attendance. A biometric time attendance system allows employees to clock in quickly and easier compare to the standard system and eliminate “buddy punching” in advance to the traditional time card system. A complete biometric time attendance system includes both hardware and software. Include the electronic divide that scans an employee’s fingerprint or iris and software that stores all the data about time and shifts. Hardware and software can be purchased separately, but it’s best to find a vendor that provides both of them as a complete package. Price of the biometric software Small companies can purchase a basic system that includes hardware and software for about $1,000 to $1,500 Biometric time and attendance systems aren’t as expensive as one might think. Small companies can purchase a basic system that includes hardware and software for about $1,000 to $1,500. Some companies' solution, which works for companies with up to 50 employees, retails for $995 to $1,300. The price includes one fingerprint scanner and software that tracks arrivals and departures, calculates hours for payroll, and tracks vacation time and sick days. Large corporations with many hundreds or thousands of employees should expect to spend at least $10,000 on a biometric time and attendance system. For a complex system serving thousands of employees and multiple locations, the cost could rise as high as $100,000. In addition to a basic software and hardware package, one may need to purchase additional features, services, or accessories. Additional biometric scanners begin at about $1,000 to $1,300 each. Training begins at about $300 to $500 for smaller businesses and can run thousands for larger companies. Accessories like scanner covers, which protect the equipment when it is not in use, begin at about $30 to $50 each. CrossChex Cloud CrossChex Cloud's features include face recognition attendance, temperature, and mask identification Because there are so many options, it helps to talk to vendors about the products they provide. Some will charge an upfront fee for a set number of traditional software licenses; others will charge a monthly fee for web-hosted software. Although the market and advanced technology decrease the price of time and attendance system, some small companies or workshops still can’t afford extra spend besides salaries. Anviz introduces a new solution for those business owners - CrossChex Cloud. One can set up a new account and get only one hardware connected to be a lifetime free subscriber of CrossChex Cloud. Start at $500 only, one can get hardware that is suitable for CrossChex Cloud with advanced features includes: face recognition attendance, temperature, and mask identification, and get records of almost everything one wants to take control of.
From asphalt to apps, Bosch has implemented a connected security solution for the Frechen truck stop near the A1 to protect people and freight from assaults. The modern parking area near Cologne now has around 40 parking spaces that meet the high-security standards of the Transported Asset Protection Association’s (TAPA) according to the Level 2 certificate and are therefore particularly secured. From now on, forwarding companies can book these via the Bosch Secure Truck Parking app. The fully connected solution ensures maximum security: more than 20 security cameras with intelligent video analytics by Bosch monitor the four-gated entrances and exits as well as the parking area. In addition, a pedestrian interlock ensures that only authorized persons can enter the area. The reason for this solution is a shortage of some 400.000 secured truck parking spaces in Europe. This has serious consequences for the safety of drivers, goods manufacturers, freight forwarders as well as other road users, as trucks often have to park in an unsafe manner contrary to traffic regulations. Secure truck parking "The truck parking shortage along German roads is, unfortunately, a daily occurrence. Everyone has seen the lines of unsafely parked trucks along the highways. The fact that thieves, in particular, take advantage of the precarious situation is felt by companies like us that transport goods throughout Europe," explains Rein de Vries, Senior Manager Security from Samsung SDS. In close coordination with Samsung SDS, Bosch has developed the solution that has now been implemented. "Secured truck parking lots, just like the one in Frechen, are important for our transport of goods. That's why we were happy to contribute with our know-how and experience to this project." A loss of 8.2 billion a year With AI-based video analytics, the security cameras immediately detect risks, unwanted movements, and sound A recent study by TAPA illustrates the urgency of the situation: The organization estimates the financial damage caused by stolen freight across Europe at around 8.2 billion euros annually. Alongside the United Kingdom, Germany is one of the countries most affected by cargo theft. Thieves usually take advantage of the situation at night, when the truck is parked unprotected and the driver is asleep. Consumer goods or car parts are among the most sought-after goods, as are jewelry, precious metals, or food products. Bundled know-how "On behalf of the site operator, we acted as general contractor to implement a certified complete solution for the Frechen truck stop that protects drivers and freight alike," explains Uwe B. Herrmann, project manager at Bosch Building Technologies. "The parking lot is now securely enclosed, gated, illuminated in a way that saves energy and equipped with intelligent technology." AI ensures safety and comfort With the help of AI-based video analytics, the security cameras immediately detect risks and unwanted movements and sound the alarm at the Bosch video control center. Audio technology built-in video cameras allow control center staff to immediately contact people on the premises and notify security forces or police if necessary. Regular virtual guard tours round off the security concept. Booking parking spaces also work efficiently and digitally: Parking spaces can be booked via the Bosch Secure Truck Parking web portal or app. Truck drivers can pass through the barrier and drive onto the premises with digital license plate recognition.
Cyberint has launched the next-generation Digital Risk Protection platform, Argos Edge, a fully SaaS-based solution, to provide real-time responses to cyber threats coming from beyond the traditional security perimeters. All-in-one DRP platform Unlike other solutions, Cyberint's holistic and integrated approach combines external Attack Surface Monitoring (ASM), advanced threat intelligence, extensive phishing detection as well as social media and brand abuse monitoring. The different modules work together to infuse and enrich the Argos Edge platform, identifying and remediating weaknesses that other solutions cannot detect seamlessly and continuously. This unique capability makes Argos Edge the most comprehensive and effective all-in-one digital-risk-protection (DRP) platform on the market to date. Monitoring threat intelligence Argos Edge redefines the digital risk protection space by constantly collecting, analyzing, and classifying threat intelligence from the widest variety of sources, tracking cybercriminals in the dark and deep web, criminal forums, market places, social media platforms, instant messaging, file sharing repositories and more. External Attack Surface Mapping Argos Edge reduces false positives by 99%, providing a combination of External Attack Surface Mapping Pin-pointed targeted alerts such as those provided by Argos Edge are known to reduce false positives by 99%, providing the optimum combination of External Attack Surface Mapping of Digital assets, including cloud assets and threat intelligence. Argos Edge focuses on generating proactive and targeted alerts allowing organizations to take immediate steps to mitigate those incoming threats which pose the greatest potential risk while also receiving up-to-date proactive information about global, regional, and vertical threats that may cause a potential breach. Alert integration Argos Edge includes one of the most extensive leaked credentials databases, which is comprised of: fusing breached databases, analysis of phishing kits, and highly effective InfoStealers malware's C&C, helping to reduce the risk from this most common attack vector. The leaked credentials database is also highly effective to B2C organizations helping to reduce account takeover of their customers. The new platform also enables users, via a state-of-the-art user interface, to immediately use the pin-pointed alerts as well as integrate them into SIEM, SOAR, and ticketing systems like IBM QRadar and Palo Alto's Cortex XSoar and others for swift dissemination and remediation. Forensic canvas Argos Edge's unique built-in investigation tool, Forensic Canvas can uncover the relationships between disparate data points, pivot on any IoC, and leverage the massive data lake that Cyberint collects 24/7 to build a quick and up-to-date picture of any threat. "Only by constant analysis of hundreds of millions of data points of threat intelligence and an ongoing monitoring of their external attack surface can organizations counter the threat actors' constantly evolving threat landscape," says Cyberint CEO Yochai Corem. Perimeter security features The Argos Edge platform protects companies from more than 75 different business risks lurking beyond the perimeter The Argos Edge platform also comprises numerous additional features that enable users to extend their security perimeters to include phishing, social media and fake application takedown support, external source code monitoring, and fraud detection capabilities. With this launch, organizations have the capabilities to protect themselves from more than seventy-five different business risks lurking beyond the perimeter, such as fraud, phishing, malware, data leakage, vulnerabilities, brand, social media risks, and more. Users now also have modular options allowing for full flexibility in licensing the platform. Cyber investigations Organizations can benefit from Cyberint's deep expertise in specialized services such as Virtual Humint, deep cyber investigations, and interaction with threat actors to identify possible weaknesses. "With Argos Edge, I have a level of assurance and trust that they are always there for me. The feeling that they always have my back is invaluable has given me the confidence that we have enough visibility and can be proactive in dealing with different cyberthreats," says Mark Frogoso, CISO at GCash.
Systems integrators who want to offer new and exciting services to their end-user customers can now deploy physical asset management location and tracking through the award-winning Connect ONE® cloud-hosted service. Designed for keys, laptops, tablets, electronics, and a wide array of other capital goods including equipment and tools, it’s easy to track assets to locations and users through the Connect ONE Asset Management Module. Asset management module Available as a standalone feature or combined with intrusion detection, access control, and video, the Asset Management Module presents a streamlined way to track equipment and goods to locations and/or users. Once an asset has been designated to a user, it automatically sends a customized authorization template via email for the person to approve and sign. The completed form is converted to a pdf and recorded with their user account in Connect ONE for the archive. An asset that is not returned by the specified date will generate a notification to the user via email when overdue An asset that is not returned by the specified date will generate a notification to the assigned user via email when overdue. Asset tracking “While keys represent a common application, there are many other assets which can be tracked,” said Mike Simon, Managing Partner, Connected Technologies. “Users can eliminate time lost searching for equipment and other items, which are easily checked out and logged back seamlessly via the interface and tracked to their current location.” The Asset Management Module streamlines the return process with a template sign-off option generated to the user. Users can manage equipment in the field and track the asset for a quick check of their location. Assets are auto-populated into the Connect ONE interface from a CSV spreadsheet for a simple setup.
Videoloft’s cloud video surveillance platform provides users with a powerful yet highly cost-effective remote recording solution while providing resellers with a new potential revenue stream to add to their offering portfolio. For large surveillance system users, Videoloft’s cloud video surveillance solution provides affordable secure offsite video backup. For SMBs (small and medium businesses), Videoloft’s ability to record up to 8MP direct to the cloud provides a powerful remote standalone storage solution. Budget solution Both applications provide system integrators and resellers with a versatile VSaaS (video software as a solution) for virtually any size system or vertical application. A key benefit of VSaaS solutions is that they can be positioned as an operating expense (OPEX) versus a capital expense (CAPEX), making it easier for users to budget the solution as an ongoing expense for operations rather than a large single one-time investment. Versatile and cost-efficient Cloud video surveillance platform provides users and resellers alike with versatility and cost-efficiency “Our cloud video surveillance platform provides users and resellers alike with the ideal combination of features, versatility, and cost-efficiency,” said Joanna Santander, Director of Sales & Business Development, Videoloft. “As the need and demand for VSaaS cloud solutions with remote access capabilities continue to increase globally, the benefits across different vertical applications continue to become more evident.” Videoloft Use Cases Quick service restaurants (QSR) and retail chains are benefitting from Videoloft’s innovative cloud video surveillance platform as a secure, centralized, and long-term video storage solution. It allows them to easily consolidate video from multiple sites and add cloud storage, eliminating the risk of lost footage due to theft or tampering of onsite recorders. Videoloft also provides QSR and retail chains with a way to store video for up to 3+ years, much longer than is possible on conventional NVRs, to protect them from liabilities associated with injury and insurance claims, and shrinkage. Battery or solar-powered solution For locations that lack power and wired internet infrastructure, such as construction sites, vacant properties, and agricultural locations, traditional video surveillance often isn’t feasible, and guards are needed to ensure security. Videoloft provides an alternative solution that can be battery or solar-powered and connected via a 4G wireless router. Videoloft’s software constantly monitors the network conditions and deploys dynamic frame rate, bit rate, and resolution adjustment when necessary to ensure that footage is sent and recorded even in poor network conditions. Remote management The Videoloft solution provides site managers with the versatility to remotely manage employees, deliveries, and health and safety protocols. Videoloft’s timelapse feature makes it easy to track development over days, weeks, and months Videoloft's video analytics technology enables highly specific alerting options and smart video search, making it fast and easy to locate specific events. Videoloft’s timelapse feature also makes it easy to track development over days, weeks, and months, and to share this progress with customers. Audio and alarm features Videoloft is a great solution for education campuses. The platform provides campus security teams with the ability to easily monitor sites even when they are split across multiple locations. With features such as PTZ control, 2-way-audio, and alarm triggering there are many ways to detect, track and address unwanted visitors. Real-time monitoring Cannabis farms and dispensaries can leverage Videoloft’s cloud video surveillance solution to ensure they comply with regulatory requirements. In many states, it is mandatory to record 24/7 video both locally and offsite. Videoloft’s live camera health monitoring functionality ensures problems are spotted in real-time so they can be rapidly diagnosed and resolved, eliminating the possibility of lost video. User-friendly software solution Videoloft is also providing integrators and dealers with a new potential source of RMR. Videoloft’s simple setup, affordable cloud plans, and user-friendly software allow integrators to offer SMBs and the high-end residential market a highly cost-competitive product, even when compared to DIY solutions that typically employ Wi-Fi cameras that are inherently less secure. Users can set alerting and recording schedules and easily playback and download video through the Videoloft app, and assign multiple users with read-only or full admin access to all or specific cameras, depending on their requirements.
Metal theft is nothing new, but the impact of the pandemic has left many in financial uncertainty, couple this with the rising price of metal, and one result is an increase in the level of acquisitive crime. It seems there is no limit to the types of materials stolen. Just recently, lead stolen from church roofs has caught the media’s attention again, but this type of theft reaches to more commonplace materials too, including steel, cast iron, and aluminum, and even items like street signs and fencing panels. As such, publically accessible infrastructure could be left vulnerable if measures aren’t taken to properly protect them. Perimeter fencing solution Begin this process by thoroughly checking and assessing the perimeter fencing of the site. Here, you’re looking for any signs of tampering or wear and tear, and checking if the fencing is still robust. If the fixings in fencing systems can be removed easily, the entire perimeter fencing solution risks being compromised with little effort. Both the fixings themselves, and the metal fence panels they secure can be targets for theft, and if stolen would significantly reduce the security on and around the site. The connectors, fittings, and fixings are arguably the most integral part of any security fencing installation The connectors, fittings, and fixings are arguably the most integral part of any security fencing installation. They’re responsible for holding the fencing and gates together and keeping them in place. Remember, fencing solutions will only be as robust as the components used to hold them together, if these have inherent flaws, the fencing and gates in question will be more vulnerable to attack. Equal level of protection This is because poor quality fixings can often be easily broken or removed by their design or placement, so it’s best to steer clear. Further, while fencing labelled as ‘quick and easy installation’ may sound cost effective, if it takes no time to install, it’s likely it will also be quick to take down, defeating the purpose of perimeter fencing. There’s a multitude of varying types of fixings available on the market, and it’s important to remember that not all fencing and gates provide an equal level of protection. Below we take a closer look at fixings that should be avoided where possible. Standard head screws Standard head screws and bolts. This can be extended to anything that looks like it can be easily removed with a screwdriver or drill. Security Torx or ‘Star’ screws. These were once an effective tamper-proof fixing, however, in more recent times the driver bits have become more readily available in most DIY toolkits, and as such these fixings are now far from secure. Installing screws on the outside of the fence line. Leaving the fixings accessible from the outside of the fence ultimately means you’re exposing them to anyone and everyone, authorized or not. This enables them to attempt to remove the fixings without the added deterrent of having to climb the fence and risking being caught. Low quality fixings. All fixings should be galvanized or stainless steel to ensure they don’t rust away. Tamper-Proof fixings Vertical bar fencing and metal railings have concealed bolts and screws So now we know what not to specify, let’s take this one step further and discuss some of the most effective design components found in fencing systems. Look for security fencing with ‘tamper-proof fixings’. We believe this is so essential, that all Jacksons metal fencing is produced using these in one form or another. Vertical bar fencing and metal railings have concealed bolts and screws, while the welded mesh panels have tamper-proof screws with unique heads that can’t be loosened or fastened with normal tools. Be wary when specifying fencing types such as steel palisade fencing; not only does this type of fencing hinder surveillance and provide an unattractive aesthetic, but the bolts and rivets are also very easily accessible meaning it isn’t very secure. Twin wire panels V mesh and twin wire panels can be attached to posts in different ways. Most commonly this will be via the use of clips. These vary in the level of security they provide, for example, generic mesh clips secured with generic Torx screws can be easily removed using a standard toolkit. However, there are other products on the market which make use of anti-vandal connectors and tamper-proof fixings. Once tightened, the hexagonal part of the nut breaks off, leaving a smooth dome These fixings can only be accessed from the secure side of the fence, significantly improving the level of security. Shear nuts are arguably one of the most secure fixings which should ideally be used on gate hinges. They are a type of breakaway nut which are almost impossible to remove once installed. Once tightened, the hexagonal part of the nut breaks off, leaving a smooth dome that is hard to grip with normal tools. Knit mesh fencing With tightly knit mesh fencing such as 358 mesh, panels can be fixed to the posts in different ways, but again not all ways are secure. Some manufacturers use smaller clips and screws/bolts, however, the clips are susceptible to damage – being so small, and it also leaves the edge of the panels exposed to tools that could prise the panel away from the posts. Close-knit mesh panels with clamp bars and tamper proof bolts are highly secure. Concealed panel to post connectors and tamper proof bolts help to further enhance the security of the fencing, these are commonly used in vertical bar and metal railings. Highly secure finish Here rails are sleeved onto the pales and welded for a seamless, highly secure finish. There are no bolts or rivets that could be removed to enable swing pales to be set aside and gain access. The role that fixings and connectors play is absolutely crucial to the level of security of the perimeter fencing. This article touches on the myriad of different options available on the market, but if in doubt, don’t hesitate to consult an expert on what type of components should be used when specifying fencing and gate solutions for your specific project.
More than a year and a half after the COVID-19 pandemic began, countless workers are still doing their jobs remotely rather than from their offices. While there are many positives to working from home, there can also be some negatives at play like nefarious actors taking advantage of the tools and connections that employees use in work from home environments. Insider threats, a security risk that comes from within the organization, are posing a major security problem for businesses. This is partially due to the widespread use of social media, encrypted communication platforms, and other tools. Now more than ever insider threats need to be identified, thwarted, and prevented. Social distancing policies When social distancing policies and mandates began keeping people apart, many turned to social media to stay connected. While social networking tools have provided a positive outlet and a way for people to feel more connected, these platforms have also become a hotspot for insider targeting because they provide a way to propagate disinformation and target individuals likely to be receptive to it. The ideal mark for an insider threat is someone who is active on social media Even more so, they have provided a means to develop relationships with organizational insiders and socialize with them. The ideal mark for an insider threat is someone who is active on social media, has sufficient access to sensitive information, lacks supervision in their day-to-day work, and works remotely. As the relationship develops, through the process of grooming, an employee can become more likely to disregard company policies and commitments. Disregarding company policies One reason insiders might act against their own organization involves monetary gain. The pressures of the pandemic have led to record levels of unemployment and financial strain for millions of Americans. Financial issues can include struggling to pay for childcare, supporting family obligations, paying rent and more. Those who find themselves in a financial bind might not just act against their own company but could also more easily fall victim to a threat. Another reason that insiders act is that they may be disgruntled. Insiders may hold a grudge because they were passed over for promotion, were given an unsatisfactory performance rating, or they may be facing termination. While just one of these factors may not be a trigger to involve the company’s security team, any combination of these factors along with a change in the employee’s demeanor or behavior should serve as a red flag to pay closer attention to the situation. Potentially malicious insiders Sending confidential information to an unsecured location in the cloud exposes the organization to risk Another challenge employers face directly relates to the somewhat limited supervision of employees who work remotely. In this situation, identifying potentially malicious insiders is more difficult, largely because face-to-face interactions are limited. When the pandemic began, many companies shifted their primary areas of focus to keeping the business viable, which is understandable. However, with this shift of focus, less attention may have been paid to security issues. The proactive company will have ensured their employees are aware of the following: Steps they should take to ensure their devices -- both company-issued and personal -- are secured at all times. Sending confidential information to an unsecured location in the cloud exposes the organization to risk. Breaking security policies to simplify tasks is prohibited. Ensuring their devices are updated with the latest security patches. A failure in any of these areas can produce an environment ripe for malicious insider activity. Cyber security teams This multidisciplinary group can lead the initiatives that are paramount to keeping the company secure The insider threat is an organizational threat and so it is most effectively addressed from a holistic perspective. Stakeholders from different parts of the organization need to be at the table to understand and address such threats. An effective team includes personnel from the legal, human resources, communications, and physical and cyber security teams. This multidisciplinary group can lead the initiatives that are paramount to keeping the company and its employees secure. Conduct a risk assessment of the company’s security processes or a threat assessment to the company’s people or assets. No organization is without some level of vulnerability, so identify the most critical assets, information, and systems; identify those who have access to these critical assets; and build controls around them to provide extra security. Delivering refresher training Build a training program to help employees and management identify concerning behaviors. Educate staff about insider threat indicators and provide instructions for how to report concerns. Require employees to complete training and deliver refresher training and updates throughout the year. Training on this matter is not a one-and-done situation. Ensure there is an impartial and confidential process in place for employees to report possible insider threats. Employees need to trust that if they report concerns about behaviors or actions on the part of a fellow employee, their information will be handled discreetly and if warranted, acted upon. Write a communications strategy clearly defining the process for relaying insider threat incidents. An effective plan lays out what information and when this information should be shared with specific individuals and to the broader community, who has authority to communicate sensitive information, and how the information should be disseminated. Remote working challenges Establish a check-in process for managers and their direct reports to enable a means for employees to share concerns and for managers to identify challenges or opportunities to assist employees working in the virtual environment. Make an EAP (employee assistance program) readily available to employees. Ensure they understand how to access their EAP and assure them that contacting the EAP will not have a negative impact on their career or growth potential. Providing venues for employees to share their concerns and talk with trained staff can greatly help organizations navigate insider threats and general remote working challenges. Security risk environment The virtual workplace has created a serious security risk environment for companies in which employees who would not normally engage in insider threats become more vulnerable to them. Through new technologies and possibly due to new financial hardships, those looking to harm an organization are out there, searching for opportunities to strike. It is leadership’s responsibility to take proactive action to ensure their employees are aware of the possibility of insider threats, the seriousness with which management views them, and the resources available should someone fall victim. It is everyone’s responsibility to remain vigilant.
It’s been almost exactly a decade since HID Global launched the world's first university pilot of smartphones carrying secure mobile IDs. A lot has changed in the following 10 years. Today’s technology has matured, advanced, and proliferated across a variety of high-value use cases. To catch up on the latest developments in mobile access, we contacted Luc Merredew, Product Marketing Director, Physical Access Control, at HID Global. Q: What has changed since the first pilot implementation of smartphones used for secure mobile identification? Merredew: One of the biggest milestones several years ago was when mobile access solutions achieved certification to the ISO 27001:2013 Information Security Management System (ISMS) standard. With increasing awareness of cloud-based security threats and resulting high expectations from a solution, today’s system owners, operators, and users insist on companies being able to demonstrate that they have had their services vetted by independent laboratories and/or agencies. When adopting mobile access solutions that maximize convenience and efficiency, and deliver dramatically improved user experiences, it is neither necessary nor acceptable to compromise security in either the physical or digital domains. Q: Do universities continue to be the biggest users? Mobile IDs on devices eliminate person-to-person credentials when accessing secured areas Merredew: The use cases have grown dramatically, spread evenly across all types of organizations in locations ranging from high-rise buildings to multi-campus global enterprises. But yes, universities continue to be big adopters, and they were among those most eager to leverage the technology so they could bring people back to campus in person during the pandemic. In this environment, mobile IDs on smartphones and other devices eliminate person-to-person credential (e.g., badge or ID card) issuance or revocation, as well as the need to physically touch cards, readers, or keypads when accessing secured areas. Q: How were mobile IDs employed by your customers as they brought people back to physical locations after the pandemic shutdown? Merredew: One example is Vanderbilt University, where the challenges of COVID-19 brought renewed attention to the importance of a modern system for identity management and access control that was compatible with Near Field Communication (NFC) and Bluetooth technologies. Members of the campus community could more conveniently access buildings and services with their mobile devices, and the university could efficiently provision and de-provision credentials remotely without person-to-person contact. More recently, Vanderbilt leveraged HID Mobile Access® to deploy campus IDs on iPhone and Apple Watch through Apple Wallet. Q: Is there another example outside the university vertical? Merredew: Another example is the iconic tower Arcos Bosques Torre 1 in Mexico City, where the owners and tenants enjoy the simplicity of using their trusted mobile devices to seamlessly access their spaces. As with the Vanderbilt deployment, the drive for operational efficiency and convenience in the tower was combined with a desire to minimize the need for users to come in physical contact with the system. Having a solution like HID Mobile Access that delivers touchless entry and increased safety and security is important. Q: What have been the biggest mobile access advancements? The mobile credential provides contactless, seamless access to a wide range of devices and services Merredew: One of the most important advancements was simplifying upgrade paths to mobile access. In the Vanderbilt example, our HID Reader Manager was used to upgrade the firmware on the university’s physical access control readers and extend support for NFC-based credentials in Apple Wallet. The university uses the HID Origo™ Mobile Identities API integrated with CS Gold®, a higher education transaction system from CBORD, for credential lifecycle management. Another significant enhancement has been the expanded range of uses cases for the mobile credential, going beyond simply opening doors to include providing contactless, seamless access to a wide range of devices and services such as time-and-attendance terminals, cashless vending machines, printers, computers, workstations, and many other applications. Q: Wearables are also having an impact. Merredew: Contactless mobile experiences are also delivered through wearable wristbands. One example is the Nymi band which, once authenticated, continuously authenticates the identity of the user until it’s removed from the wrist. This delivers zero-trust security principles and access control using convenient fingerprint and heartbeat biometrics to users seeking touchless authentication. Q: What is the impact of the cloud? Merredew: The move to a cloud-based system to issue and manage mobile identity credentials has unified, automated, and simplified identity issuance at a single facility or across any number of distributed office or remote work locations. Q: What should end users look for in a mobile access solution? Look for solutions that use a secure element in the reader as well as cloud certificates, to ensure security and data privacy Merredew: Solutions should support the largest possible number of popular mobile devices – in HID’s case, this includes more than 250. Look for solutions that use a secure element in the reader, and a secure key management process, as well as cloud certificates, to ensure both security and data privacy. Make sure the solution supports Bluetooth Low Energy (BLE), Near Field Communication (NFC), and both iOS and Android operating systems. Solutions that provide Application Programming Interface (API) and Software Development Kit (SDK) support offer direct access to the solution’s access control hardware, speeding deployment while enabling integration partners to continue innovating products that deliver even better user experiences. Q: Wonder what this market will look like in 10 more years. What’s next for mobile access? Merredew: Future innovations are on the horizon with technologies such as Ultra-Wideband (UWB) wireless connectivity, which HID expects will become ubiquitous on mobile devices. It provides unprecedented accuracy and security when measuring the distance or determining the relative position of a target. It is not HID’s expectation that UWB will replace Near Field Communication (NFC) or Bluetooth, but rather supplement Bluetooth and other technologies to provide the assurance, reliability, and granularity of device position that enables truly seamless experiences.
The trend of video customers moving to the cloud has reached a tipping point. At the same time, artificial intelligence (AI) is being adopted on a massive scale. Combining the two trends adds a higher level of value than either component individually. Merging the power of AI and the cloud is a driving force behind cloud surveillance company Eagle Eye Networks’ acquisition of Uncanny Vision, an AI and video analytics company headquartered in Bangalore, India. Expensive AI resources Cloud systems empower customers to leverage AI without having to install and program complicated and expensive hardware, in effect stripping away the barriers to entry that customers face when seeking to embrace AI. The cloud also enables customers to share expensive AI resources. One of the key components is ease of deployment – click, click and turn on the AI for any camera" Simplicity of implementation is crucial to the combined value proposition of Eagle Eye Networks and Uncanny Vision. “One of the key components is ease of deployment – click, click and turn on the AI for any camera (in a cloud system),” says Dean Drako, Eagle Eye Networks CEO. There is also a benefit of having AI systems networked, enabling 25 banks to perform facial recognition of customers from a single cloud-based system, he adds. A transition is also under way in the perception of AI. Video surveillance applications While previously it was seen as an add-on to surveillance systems, now it is seen as a very desirable feature on any system. “Centralized management of the cloud benefits the AI database,” says Drako. “In a project built around license plate recognition (LPR), for example, all the data goes up to the cloud into a single database, and the customer can get a mobile view of everything going on across the world. You can’t do that without the cloud. And AI for LPR is more accurate.” Uncanny Vision’s targeted focus on AI for video surveillance applications was one factor that attracted Eagle Eye Networks to make the acquisition, says Drako. In contrast, some other companies have embraced broader applications of video AI. Uncanny Vision also has more customers using their system in real-world applications than competitors. Finally, the acquisition will help to expand Eagle Eye Networks’ presence in the LPR market, where Uncanny Vision is especially strong. Improving business operations The 60 employees at Uncanny Vision are mostly engineers and programmers Uncanny Vision’s deep learning algorithms enable recognition, identification, and prediction, improving business operations, customer service, and site safety. Applications include smart parking, retail, smart cities, ATM monitoring, worker safety and perimeter security. The 60 employees at Uncanny Vision are mostly engineers and programmers. “These guys understand how to translate AI algorithms to run very efficiently on various types of hardware,” says Drako. “They optimize how they get the code to run so we can implement in the cloud cost-effectively. They do it at a modest cost to make it more accessible. They understand how to deploy software for high performance on low-cost hardware.” For Uncanny Vision, the new ownership provides more reach. “We have a huge channel and a huge brand,” says Drako. “They are strong technical guys who need a sales and solution channel.” Video analytics solutions Even in light of the acquisition, Eagle Eye Networks will continue to provide a selection of third-party AI and video analytics solutions to customers. Use of AI and video analytics is specific to the application and business needs of each customer. Use of AI and video analytics is specific to the application and business needs of each customer In addition to AI functionality, systems need a ‘business logic’ component that drives how that capability is integrated into a system. System needs vary widely by vertical market, and many third-party vendors are focused on a specific vertical and how AI can benefit that market. Recurring monthly revenue “Third parties can provide analytics and the business logic, which is different for a factory, an office building or for a drive-thru restaurant,” says Drako. “The market is looking for many solutions, and one company couldn’t own a majority of them.” To ensure flexibility, Eagle Eye Networks will accommodate third party solutions, deploy their own analytics, or leverage analytics embedded in cameras. For Eagle Eye Networks’ dealer and integrator customers, the expansion into AI presents a new opportunity for recurring monthly revenue (RMR) and provides greater value to customers. Drako says the impact of the acquisition will be global as AI applications grow in popularity worldwide.
Video is an enormous wellspring of unstructured data in the enterprise environment. Finding new ways to use video data requires easy access for analysis. Gone are the days when video was recorded just to be played back later. New computer capabilities can analyze video to provide business intelligence and trends, all of which requires that a lot of unstructured data be captured, stored and kept immediately accessible. It's a driving force for companies specializing in video storage such as Quantum, which is focused on storing and managing unstructured data, including video, photos, music and sound. Managing various analytics “Unstructured data is driving the massive growth in storage today, and video surveillance fits right in there,” says Jamie Lerner, CEO and President, Quantum. As data multiplies in business, matters of storing and accessing the data take on a larger profile. Especially challenging is meeting the need to store and access expanding amounts of unstructured data, such as video. Video is also part of a changing end-to-end architecture in the enterpriseWhereas 10 years ago, video surveillance was all about recording and playback, now the emphasis is much more on an end-to-end approach. In addition to capturing and playing back video, systems have to manage various analytics, archival and data retention aspects as well as recording. Video is also part of a changing end-to-end architecture in the enterprise, including hybrid, cloud and on-premise storage. Video surveillance industry Historically, structured data, such as financial information, was stored to allow future analytics. The same trend extends to unstructured data, such as video analytics. Quantum has expanded its video storage capabilities with acquisition this year of the video surveillance business of Pivot3, provider of a hyperconverged system that provides recording, analysis and seamlessly archives data on a converged platform that is less expensive and easier to manage. In acquiring Pivot3, Quantum is refocusing the smaller company on the video surveillance industry. “We are now focused 100% on surveillance and having the highest quality while being very cost-effective,” says Lerner. “The industry is ready for an IT-forward solution that is totally focused on surveillance. You can’t make a platform all things to all people.” Traditional security customers There is overlap in large stadiums and theme parks, where Lerner sees even more opportunity to expand Pivot3 will also help to expand Quantum’s customer base. The larger company has a history of serving customers in entertainment, movies, television and sports production. The addition of Pivot3’s 500 new customers in large surveillance, transportation and critical infrastructure markets will expand the mix. There is overlap in large stadiums and theme parks, where Lerner sees even more opportunity to expand. Pivot3 also helps to bridge the gap between traditional security customers and the information technology (IT) department. “Pivot3 has a reputation as simple to use,” says Lerner. “My belief is that physical security can run separately [from IT] until you reach a certain size, then IT has to be involved. Pivot3 gives IT people in the security space a product that is well formed and fits into an IT strategy. They are not undertaking a piece of equipment that will be a burden.” Physical security presence Customers expect their infrastructure vendors to provide systems that allow them to “Set it and forget it,” says Lerner. It’s one of the big advantages of cloud computing and also central to Quantum’s approach with their traditional products. “At the end of the day, you want to run a hospital, for example, so you want your systems to be easy to use,” says Lerner. The Pivot3 acquisition will also allow Quantum to expand their physical security presence more broadly and globally. Previously, the geographic reach of Pivot3 was limited by the high cost of placing personnel in diverse locations. Under Quantum, which has been serving global companies for 40 years, the problem disappears. “Quantum has global support on all continents and in more countries,” says Lerner. “It’s a higher level of support, given size and legacy of our organization.”
Patient falls in nursing homes are a serious problem. In the United States, for example, around 1,800 elderly people, living in nursing facilities, die each year from injuries related to falls, according to the Nursing Home Abuse Center. Those patients who survive their injuries often have a reduced quality of life and suffer some form of permanent disability. Rise in nursing home patient falls Figures show that between 50% and 75% of nursing home residents suffer falls each year, twice the chances of falling when compared to seniors who live in a regular residential community. It has been a prevalent challenge to detect falls quickly and effectively, especially when these occur in residents’ bedrooms. In the United Kingdom, the Care Quality Commission has recognized that the use of CCTV may be one of the best ways to ensure safety and quality of care. However, using video surveillance also brings into question other security issues, such as privacy and data protection. Dahua’s WizMind technologies WizMind embraces human-based AI (Artificial Intelligence), for a whole host of applications across verticals This is where Dahua Technology’s WizMind technologies come into play. WizMind embraces human-based AI (Artificial Intelligence), for a whole host of applications across verticals, such as retail, energy, finance, transportation, and of course, health and social care. Specific to the health and social care sector are deep-learning algorithms, to protect the privacy of the face and body in real-time, and stereo analysis, which combines dual-lens cameras with three-dimensional scene analysis, in order to detect sudden physical movement, such as falls. Stereo video analysis The growth of AI applications has enabled the greater availability of 3D scene analysis solutions, thereby enabling objects and people to be analyzed in three dimensions. Dahua Technology’s stereo analysis uses two lenses, in order to capture separate images of the same scene. It then computes the ‘optical parallax’ of spatial points in the two images, providing 3D information of the scene. The stereo vision mimics the depth of view that comes from humans having two eyes, known as binocular vision. Combined with deep-learning algorithm Combined with a deep-learning algorithm, stereo analysis can recognize event patterns, such as falls and other movement-based behaviors, such as people approaching, the detection of an abnormal number of people in an area, and violent behavior. In nursing and care homes, stereo analysis cameras can help staff monitor residents, in case of emergency and respond to residents’ problems, such as tripping and falls. The cameras can view all three dimensions of subjects and together with its deep-learning algorithm, can immediately alert staff to any unusual or sudden movement, such as would be evident in a fall. Cameras in communal areas and bedrooms With cameras situated both in communal areas and in bedrooms, the staff is able to respond quickly to incidents With cameras situated both in communal areas and in bedrooms, the staff is able to respond quickly to incidents, which may otherwise stay undiscovered for hours. An example of such a scenario is a nursing home in Singapore, which has a capacity of around 400 beds and is divided into 14 separate living environments, with each designed to be a home-like living area. Dahua cameras with intelligent fall detection technology Dahua cameras, such as IPC-HDW8341X-BV-3D with intelligent fall detection technology were installed, including the provision of 167 stereo analysis cameras inside each bedroom. These trigger an alarm, in the case of incidents, such as a fall, allowing immediate response by staff. Not only does this enhance the well-being and safety of residents, but it also can reduce the nursing home’s labor costs. In addition, Stereo Analysis can also be applied in other application scenarios. An underground unmanned bicycle parking garage in Amsterdam, for instance, has installed Dahua Technology’s behavior analysis cameras, to detect abnormal events and prevent accidents, such as people tripping and falling, or suspicious individuals wandering around the area. Privacy Protection 2.0 technology While monitoring their situation inside the nursing home, Dahua also adopts Privacy Protection 2.0 technology that features masking of human face and body, to protect the residents’ privacy. It involves the restriction of what can be seen in video images and applies equally to live, and recorded images. Digital masking takes place on the front-end device (e.g. network camera). Dahua’s Privacy Protection 2.0 provides real-time occlusion of the body and face and enables users to access recorded videos, without having to overlay faces with mosaic masks. It also offers additional occlusion options, such as irregular polygons, mosaics, and colored blocks, and allows code exporting based on specified targets, ensuring the privacy of subjects. Privacy and security in evidence collection Stereo video analysis and privacy protection come into their own in a nursing home and healthcare facilities Benefits offered include non-pixelated human targets, allowing for privacy and security in evidence collection. The technology also allows for face and human attributes analysis, without breaching people’s privacy, making it ideal for nursing homes. Stereo video analysis and privacy protection come into their own in a nursing home and healthcare facilities. It allows the close monitoring of residents or patients to help ensure their well-being and safety, while at the same time protecting the privacy of often vulnerable individuals. Dahua TechMonth As part of the Dahua TechMonth, this blog highlights how Dahua’s stereo analysis technology, combined with privacy protection, can provide a valuable tool to help staff respond to incidents quickly and efficiently, including falls, without infringing on people’s data protection rights. In the next blog, Dahua Technology will be discussing the WizMind application of human metadata, enabling users to maximize situational awareness and analysis of events.
Xenon Fire & Security recently completed an integration between Vanderbilt’s ACT access control and KONE, a globally renowned company in the lift and escalator industry. The project was carried out on behalf of a Dublin City-based client, in one of their flagship properties - a 7-story, multi-tenancy office blocks, located in the heart of the city quays in Dublin, Ireland. The building includes 6 upper floors and a basement area. The reason behind the integration was to attain greater efficiency in accommodating the large footfall in the office building, during peak times. This included reducing waiting times at lifts. ACT access control - KONE integration As Xenon Fire & Security had previously carried out this same integration work between both ACT and KONE in another building, located in Dublin city, they were more than confident that ACT would perfectly meet the client's standards and expectations. The installation and integration of ACT and KONE is much more straightforward The installation and integration of ACT and KONE is much more straightforward. Unlike with a traditional hardwired elevator control, there is no cabling required, as the ACT software talks directly to the KONE server, via the KONE API. Integration offers multiple benefits Commenting on the project, Dermot Ryan, the Contracts Manager at Xenon Fire & Security, said “The system works as intended. It makes access and egress of the building more user friendly and reduces congestion, and queues. Vanderbilt was there to help and advice at all times, throughout the installation process.” Michael Moyna is the Senior Product Manager at Vanderbilt and is responsible for the development of ACTpro. He said, “The ACTpro integration with KONE has many benefits, such as efficient transportation of people to their destination, especially during peak times. Rules can be customized to individual needs, for example, janitor may require a large elevator car.” No cabling required in installation Michael Moyna adds, “Installation and integration of KONE and ACTpro is now much more straightforward, because there is no cabling required, as with traditional hardwired elevator control, since the ACTpro software talks directly to the KONE server, via the KONE API.”
The cloud-based access control and video management system was recently installed at the city’s marina where it has integrated with their booking system, Harba. Harba booking system There are 750 members with boats in the Vejle marina, and through the Harba booking system; they are issued a 6-digit personal PIN code or a tag. With this PIN code, they can then access and use the facilities of the marina, such as the toilets, showers, laundry rooms, and kitchen. The PIN is inputted into the ACT365 reader at each entry point of the marina facilities. All services are then automatically billed every month via the Harba booking system. This access control booking strategy ensures that the marina’s facilities are kept free for member use only. Access control readers ACT365 has a modern and user-friendly design and a limitless number of users ACT365’s readers were well-suited to this installation because they are made of a robust polycarbonate housing and are suitable for both indoor and outdoor mounting. The reader controls a single door and uses a voltage-free relay contact. ACT365 has a modern and user-friendly design and a limitless number of users. Both RFID tags and smartphone access availability. Self-service terminal For non-member boaters who are visiting the Vejle marina, a self-service terminal, the Harba Kiosk, is also available to use. This self-service terminal allows non-members to use their credit cards to pay for the use of the marina facilities. Similar to the Harba app for members, non-members will receive a PIN code from the Harba kiosk via email or SMS which they can then input into the ACT365 readers.
The Abu Dhabi Global Market Square (ADGMS), located on Al Maryah Island, in the United Arab Emirates capital, Abu Dhabi, is a high-profile, architecturally compelling business and hospitality hub. Many of the most globally prestigious companies inhabit the buildings, in the award-winning financial center. Abu Dhabi Global Market Square ADGMS also hosts frequent international dignitaries and large-scale public events, including the Abu Dhabi national New Year’s fireworks display. Abu Dhabi Global Market Square was the first project in the UAE, to achieve LEED Core and Shell (LEED-CS) Gold pre-certification, by the US Green Building Council (USGBC). The Abu Dhabi Global Market Square (ADGMS) consists of: 450,000 sq. m of office space, a lavish retail section and luxury business hotel offerings, 4 Grade-A commercial office towers with 30 floors each, 4 km waterfront promenade, Over 2,000 cameras, and Over 1,000 doors. Unconnected security systems and situational awareness gaps Because of its iconic status, the Abu Dhabi Global Market Square faces many unique challenges to security, including: Political pressure - Because of ADGMS’s status and frequent high-profile international visitors, any disruption to operations - be it natural disaster, activism, terror or other critical events, could cause issues on a national scale. Protection for VIPs - Regular visits from prestigious VIPs, such as sheikhs, the royal family, and global business leaders, elevates security risks and the need for executive protection. Unobtrusive security - ADGMS is a public space with tenanted offices, meaning that security must be robust, but unobtrusive and follow all global data, and privacy regulations. Physical location - Being situated on an island is an extra security risk, complicating the ability to enter and exit the space, during planned and unplanned critical events or emergencies. Architecture - The buildings in ADGMS are mostly glass, with many levels, making it difficult to secure. Previously, a number of systems were deployed to help with security and life safety, such as CCTV, access control, fire detection, and building management. However, these were not connected and left gaps in situational awareness, which ADGMS found unacceptable. In light of the above challenges, ADGMS building managers felt it essential to harden security, across the market square, within these buildings and in connecting areas. Risk intelligence & integrated control of physical assets Martin Grigg, Principal Consultant and Project Lead for PTS Middle East was selected to design and oversee the project Abu Dhabi Global Market Square approached PTS Middle East (PTS Consulting Group Ltd.), a multi-national security and digital transformation consultancy, which carried out the threat, risk and vulnerability assessment, designed the mitigation measures, and provided oversight of the installation and commissioning of the entire system. They were also tasked with ensuring that the system met the operational requirements and was fit for purpose, and proportional to the risks, faced by ADGMS. Martin Grigg, Principal Consultant and Project Lead for PTS Middle East was selected to design and oversee the project, right from concept to completion. Everbridge Control Center deployed Following the assessment, G4S, a British multi-national risk consultancy company, headquartered in the United Kingdom, was selected to deliver the project, based on its experience in helping secure many of the region’s most prestigious locations. G4S is also a global partner with Everbridge, and together, they have secured people, assets and infrastructure for numerous organizations. G4S selected Everbridge Control Center to integrate and manage all the technology, which is coming into their Security Command Centre (SCC). Everbridge Risk Center was also deployed to provide real-time threat intelligence to ADGMS. Critical issues solved by Everbridge technology: Consolidation of four control rooms into one, reducing the office space needed for security - This premium space is now free and able to be re-purposed as rentable office space, Reduction of man guarding costs, as fewer resources are needed to secure the facility, Real-time situational awareness allows for reduced risk, accelerated response times and keeps stakeholders informed, Everbridge Control Center provides event driven, unified interface and automated SOP presentation, Everbridge technology provides flexibility to adapt, as requirements change, Reduction in time taken to identify a security incident and resolve it, Intelligence from the facial recognition systems is proactively used to welcome friends and identify known criminals, Risk intelligence to identify events, such as sandstorms, allows ADGMS to act faster, enabling them to reduce the risk to people and operations, and Automated reporting capabilities save huge amounts of time and resources - A report that took 20 minutes can now be automated in seconds.
Dahua Technology, a globally renowned video-centric smart IoT solutions and service provider, will hold its 2nd online Dahua Technology Partner Day, from October 13 - 14, 2021, with the theme - ‘Building a digital future’. Dahua Technology Partner Day Adhering to its strategy of open cooperation, Dahua Technology is committed to creating a win-win ecosystem, with major technology partners around the world. This year, Dahua Technology will join hands with its 22 global partners, in order to discuss interoperability, share industry trends and explore the future of digitalization and intelligence together. “We are excited to host our second virtual technology partner day. Technologies have evolved fast in the past year and the needs of digitization, and diversified challenges facing different industries today, are driving the integration of security companies,” said Mr. Jiaqi Gao, Overseas Marketing Director at Dahua Technology. Jiaqi Gao adds, “It is a great opportunity to show how we can build a digital future together with our partners and through which, we can jointly provide the right solution for our customers.” Smart solutions for IoT and security on show A number of Dahua regional experts will showcase the latest Dahua innovations and products, in 6 different hubs During the 2-day event, Dahua Technology and its partners, including Vanderbilt, AxxonSoft, Immix and Optex, will unveil how their smart solutions benefit the field of security and IoT (Internet of Things). It will focus on Artificial Intelligence (AI), cloud solutions and alarm monitoring, as well as specific vertical markets, such as retail, smart building & facilities, critical infrastructure, transportation, etc. This year’s event will also include a section that demonstrates outstanding Dahua products and their compatibility with third-party solutions. A number of Dahua regional experts will showcase the latest Dahua innovations and products, in 6 different hubs, including cyber security & privacy protection, full-color 2.0 and TiOC 2.0, WizMind portfolio, and more. Attendees can register free of charge, connect with presenters and get product information. Behavior analytics in Artificial Intelligence (AI) “The Dahua Partner Day event offers a great platform for AxxonSoft, to present our solutions. We successfully exhibited on last year’s Traffic & Parking session and are excited to share more information about behavior analytics in the AI hub, this year,” said Alan Ataev, AxxonSoft’s Chief Executive Officer (CEO), adding “Together with Dahua, we are enthusiastic about creating joint solutions that grow our value proposition for both our partners and clients.” With its mission of ‘Enabling a safer society and smarter living’, Dahua Technology will continue to focus on ‘Innovation, Quality and Service’, so as to serve its partners and customers around the world.
Reiknistofa Bankanna (RB) is a provider of mission-critical IT systems for Icelandic financial institutions, responsible for the country’s central clearance and settlement system and several multi-tenant core banking solutions. It also operates an e-invoicing and e-payment system for corporates and consumers. It is jointly owned by the three main Icelandic banks, two saving banks, the Icelandic Savings Bank Association, and the three main payment card processors in Iceland. RB’s clients are these banks, the Central Bank of Iceland, and other financial institutions as well as the government and public entities. With solutions operated in multiple data centers and a shared multi-bank environment, RB sought a flexible technology partner that could ensure the highest levels of operational security, cost efficiency, and resilience. The challenge RB had traditionally protected its data centers and offices via disparate video and access control systems. These siloed technologies must be operated and maintained separately, creating a convoluted and inefficient user experience. They were also very old, and maintenance was becoming both a financial and an operational issue. They were also very old, and maintenance was becoming both a financial and an operational issue Sourcing reliable technical support and compatible hardware when something went wrong were becoming increasingly difficult, with replacement parts often taking at least two weeks to arrive. Something needed to change to prevent the corresponding disruptions to security and operations. Upon inheriting responsibility for the security infrastructure Geir Sæmundsson, Datacentre Manager at RB set out a clear vision for the requirements across all of RB’s facilities. “I wanted a unified all-in-one system that wouldn’t restrict my hardware choices going forward. The system needed to deliver long-term value so I wasn’t prepared to limit RB’s options to just one manufacturer of security cameras or door readers.” A unified interface RB required a modern, reliable system that brought video and access control into a single solution, all displayed easily for operators to understand what was happening, when; to provide business-wide value. Mr. Sæmundsson, therefore, approached Hafliði Jónsson, a security consultant he had worked with for many years, to advise on the enabling technologies that could best support these ambitions. Upon consultation, it quickly became apparent that a Genetec solution, driven by Security Center was the optimal choice. As an open platform, with native video and access control capabilities, it could simplify daily security operations and allowed for further integration with other tools such as RB’s heating and cooling systems. Furthermore, it would enable RB to undertake a phased evolution of its infrastructure, relieving budget pressures without delaying implementation timelines. For example, RB initially retained all of its existing security cameras and is upgrading to newer more sophisticated Mobotix devices over 3 years. Generating ROI with customized alerts RB provides operators with customized dashboards that quickly alert them to matters requiring their attention “From day one we wanted a unified system which could help our teams understand the situation, quickly; alerting them if anything required their attention. The Genetec solution does just this, and is allowing us to build in customized alerts so we gain business intelligence – providing us with better ROI,” said Geir Sæmundsson, Datacentre Manager at RB. Since bringing its security solutions under one system, RB has been able to provide operators with customized dashboards that quickly alert them to matters requiring their attention. For example, an unauthorized access attempt or sudden rise in temperature inside the data center generates a notification within Security Center for an employee in the monitoring room to respond to and investigate. The ease of the transition and the ease of use of the solution means that RB is planning to install the Genetec solution into its offices soon also, as the business is keen to have one solution across all of its buildings yet are compatible with a range of integrated technologies. Direct communication fueling a brighter future The solution has been immensely successful, and RB is looking ahead to a bright future with Genetec. The process of implementation and configuration was shorter than anticipated and as a fully cloud-based system, the process of adding new devices or facilities to the network has proved very straightforward. One year into its operation RB is running its system autonomously with little need to call in external support. One of the key reasons for this is the ability of RB and its system integrator Hafnes Ehf to communicate directly with Genetec rather than having to go through a third party – as was the case with its previous security platform. Plug and play solution Added to the fact it’s easy to install and get lots back from the system, it’s been a worthwhile investment “Given the high-security requirements of RB’s data centers, I was keen to cut out any middlemen to ensure any integration issues could be more quickly and easily resolved,” commented system integrator Hafliði Jónsson. “RB has saved a lot of time and money as this direct relationship gives RB much more control.” Geir Sæmundsson, Datacentre Manager at RB, commented, “The time savings delivered by Genetec has been immense. The fact it’s plug and play, and therefore up and running in a matter of hours is fantastic. Added to the fact it’s easy to install and we get lots back from the system, it’s been a worthwhile investment, especially as it can evolve with us, and allows us to move at our chosen speed.” Appetite for more With the initial requirements met, RB is exploring ways to extract further value from its unified platform. Next on the roadmap is the introduction of Genetec ClearID that will streamline the process of managing facility access requests and automate the creation of monthly client access reports. Making use of the access control infrastructure already in use throughout the facility, Genetec ClearID allows authorized visitors to easily request and be granted appropriate access in line with RB’s security and compliance policies and the individual’s access rights. With the roll-out of the unified Genetec platform also expected to extend to future datacentres and RB’s offices, it seems the partnership is set to go from strength to strength. “RB is the backbone of Icelandic Financial Services. We can’t afford to have security breaches or downtime, as it’s not just us that will be affected. We needed a failsafe solution, and so far, Security Center and Genetec have enabled this. Considering its ease of use, deep integration, and leading analytics, we look forward to continuing the partnership over years to come,” concluded Sæmundsson.
Round table discussion
Diversity in a company’s workforce is arguably more important now than ever. Societal awareness of the importance of diversity has grown, and many people see diversity as an important factor that reflects positively (or negatively) on a company’s culture and image in the marketplace. We asked this week’s Expert Panel Roundtable: What should the security industry do to promote workplace diversity?
The death of Michael Brown at the hands of police in Ferguson, Missouri, in August 2014, highlighted to the public, the importance of body-worn cameras. There was no bodycam footage of the Ferguson tragedy. Arguably, it would have shed additional light on the shooting. Since then, body cameras have become a tangible legacy of Ferguson, Missouri. Bodycam footage is seen as providing greater accountability and ensuring an impartial record that can support, or debunk, any claims of police misconduct. Body-worn cameras are also finding their way into broader usage, even including customer service applications. We asked this week’s Expert Panel Roundtable: How important will body-worn cameras be moving forward?
Many of the threats facing the energy and utility sector are related to cybersecurity, as recent incidents have confirmed. Another problem is that operating systems for utilities tend to be outdated, which presents extra challenges in a connected world. There are also physical security demands, not to mention regulatory and social issues. We asked this week’s Expert Panel Roundtable: What are the security trends in energy and utilities?
14 Success Stories About How Video Technology Is Improving City LifeDownload
Empowering Cameras With AIDownload
The Rise of Ethical Facial RecognitionDownload
Providing Frictionless Cloud Video Storage as a Service (VSaaS)Download