Video Surveillance Storage System / HDD(565)
Hanwha’s new PNM-9085RQZ multi-sensor / multi-directional camera features motorized varifocal lenses for precise control of focal length, angle of view and zoom for each direction. Each sensor supports remote PTRZ (pan, tilt, rotate, zoom) control for efficient installation and easy adjustment. The 20MP (5MP x 4) PNM-9085RQZ features built-in IR illumination for each sensor. The PNM-9085RQZ allows users to quickly change the camera to 180/270/360 degree configuration as well as custom presets, merging an element of multi-imagers and PTZ presets.
The FUJINON SX800 camera system marks FUJIFILM's successful entry into the surveillance systems market. FUJIFILM presents the new long-range camera module FUJINON SX800 to the surveillance systems market. With a full HD camera and an optically stabilized, 40x zoom lens from FUJINON, two high-performance components are integrated into one system. This innovation is the result of years of experience in digital cameras and a dedication to the highest optical quality. Thanks to its powerful 1/1.8" image sensor, the long focal length range of 20 mm to 800 mm and state-of-the-art image processing technology, the FUJINON SX800 is ideally suited for aerial surveillance. In modern society, the security needs of citizens are constantly increasing. Surveillance cameras with long focal lengths are not only used to address sensitive issues such as border security but are increasingly being incorporated into public infrastructure such as airports, seaports and motorways. Long range surveillance systems must cope with special challenges. For optics with long focal lengths, the smallest vibrations are sufficient to compromise the image information. Heat haze or fog in the air also impair image quality. And, a focus drive that is too slow leads to safety-relevant information loss. However, with the development of the new FUJINON SX800, FUJIFILM has found a way to minimize the impact of these challenges. Instead of developing a surveillance camera and a separate matching lens, the concept of a fully integrated system consisting of camera and lens has been realized. In addition to the high-quality zoom optics, the FUJINON SX800 has a powerful combined optical and electronic image stabilization mechanism that provides angle correction of up to ±0.22 degrees. The integrated high-speed autofocus provides a sharply focused image in less than a second, while a fog filter and heat haze reduction technology helps prevent weather interference. The system provides consistently sharp images – even of objects several kilometers away. In addition, the integrated design of the new FUJINON SX800 reduces the high adjustment effort normally required for camera installation. As of Q3 2019, the FUJINON SX800 will be available as both a mobile stand-alone device and as a system that can be integrated into a pan-tilt head.
Experience 4K video surveillance with the simplicity of reusing existing coaxial infrastructure. The 4K HDCVI camera adopts a powerful Dahua ISP and advanced 1/2" image sensor, which provides superior high quality images. It also supports Starlight and 120dB true WDR for a clear image in poor lighting conditions. In addition, the camera features broadcastquality audio to provide enhanced supplementary evidence collection. Ultra--high definition and a complete set of features makes the 4K HDCVI camera an ideal choice for mid to large-size businesses and projects where both highly reliable surveillance and construction flexibility are demanded. Functions 4 Signals over 1 Coaxial CableHDCVI technology supports 4 signals to be transmitted over 1 coaxial cable simultaneously, i.e. video, audio*, data and power. Dual-way data transmission allows the HDCVI camera to interact with the HCVR, such as sending control signal or triggering alarm. Moreover, HDCVI technology supports PoC for construction flexibility. * Audio input is available for some models of HDCVI cameras. Long Distance TransmissionHDCVI technology guarantees real-time transmission at long distance without any loss. It supports up to 700m transmission for 4K and 4MP HD video via coaxial cable, and up to 300m via UTP cable.* *Actual results verified by real-scene testing in Dahua's test laboratory. SimplicityHDCVI technology inherits the born feature of simplicity from traditional analog surveillance system, making itself a best choice for investment protection. HDCVI system can seamlessly upgrade the traditional analog system without replacing existing coaxial cabling. The plug and play approach enables full HD video surveillance without the hassle of configuring a network. StarlightWith the adoption of large sized high performance sensor, the camera is able to provide incomparable performance even under extreme lowlight environment. The starlight feature allows more details to be captured and accurate color to be recognized at night or in scenes with limited illumination. Broadcast-quality AudioAudio information is used as supplementary evidence in video surveillance applications. The HDCVI camera supports audio signal transmission over coaxial cable. In addition, it adopts unique audio processing and transmission technology that best restores source audio and eliminates noise, guaranteeing the quality and effectiveness of collected audio information. Multiple-formatsThe camera supports multiple video formats including HDCVI, CVBS, and other two common HD analog formats in the market. A DIP switch located on the cable allows you to quickly toggle formats, further simplifying installation and debugging. This feature makes the camera compatible with not only XVRs, but also most existing HD/SD DVRs. Wide Dynamic RangeEmbedded with industry leading wide dynamic range (WDR) technology, vivid pictures are achieved even in the most intense contrast lighting conditions. True WDR (120dB) optimizes both the bright and dark areas of ascene at the same time to provide usable video. Advanced 3DNR3DNR is noise reduction technology that detects and eliminates random noises by comparing two sequential frames. Dahua’s advanced 3DNR technology allows remarkable noise reduction with little impact to sharpness, especially under limited lighting condition. Besides, the advanced 3DNR effectively decreases the band width and saves the storage space. ProtectionThe camera's outstanding reliability is unsurpassed due to its rugged design. The camera is protected against water and dust with IP67 ranking, making it suitable for indoor or outdoor environments. Supporting ±30% input voltage tolerance, this camera suits even the most unstable power supply conditions. Its 4KV lightning rating provides protection against the camera and its structure from the effects of lightning.
Hikvision announces the launch of a new generation of its signature AcuSense products, with significant updates. “Hikvision AcuSense products were introduced in 2018, with the idea of making intelligent alarms and services available to small businesses and residential customers for the first time,” says Frank Zhang, President of International Product and Solution Center at Hikvision. “In a nutshell, AcuSense technology enables security personnel to focus on human and vehicle events rather than insignificant objects, so they can act more efficiently which helps save time and costs, while end users can get full control of their security system anytime, from anywhere.” Improved alarm accuracy The latest Hikvision AcuSense devices are engineered with an upgraded deep learning algorithm, which analyzes live video streams and labels them as “human,” “vehicle,” or “other events.” Those labeled as human and vehicle will trigger alarms for security staff, while other events such as rain drops, animals, or the movement of foliage, for example, will be drastically disregarded. The result is a striking reduction in false alarms – now with an accuracy approaching 98%. In this way, security personnel can focus on genuine security issues and take action. Additionally, related videos are automatically sorted by categories for easier search. Enhanced motion detection with human / vehicle classification Customers familiar with Motion Detection will appreciate the capabilities of AcuSense technology as well. Taking users’ habits into full consideration, Hikvision designed AcuSense products to integrate human and vehicle classifications with motion detection. More specifically, when motion is detected, the system analyzes whether or not it is associated with a human or a vehicle, and whether an alarm should be triggered. So, when users enable the motion detection function, they can enjoy the same level of alarm accuracy afforded by Hikvision’s AcuSense technology. Flashing light and two-way voice conversation When real-time deterrence is needed, Hikvision also offers camera models with a flashing light and auditory warning. As soon as an alarm is triggered, the built-in light flashes. Simultaneously, security personnel can communicate with the person who triggered the alarm to confirm their authorization, thanks to the built-in speaker and microphone in the camera. Of note, the latest AcuSense cameras even support customized audio tracks, which can be pre-recorded to suit various environments. Better performance in low-light environments The latest AcuSense camera lenses are equipped with an aperture reaching up to F1.4. This technology allows more light to enter the lens, for optimized image brightness, and better performance in low-light environments. Larger detection area Compared with previous AcuSense cameras, this new generation extends target classification distances from 10, 15, or 22 meters to 20, 25, or 30 meters, depending on the model. Customers can choose from 2 MP, 4 MP, or 4K resolutions, as well as dome, turret and bullet housings to suit their specific installation requirements. For more information about the latest generation of Hikvision AcuSense products, visit https://www.hikvision.com/en/products/IP-Products/Network-Cameras/Pro-Series-EasyIP-/
System Overview Pro AI series contains Face Detection, Perimeter Protection and People Counting functions.Powered by deep-learning Artificial Intelligence algorithms, significantly improved accuracy. Meanwhile, the series features starlight technology. This series fully protected from dust and water, certified to IP67 and vandal resistant to IK10 standard. Functions Face DetectionFace Detection is a software application that automatically captures faces from within a digital image or a video frame from a video source. Dahua cameras use advanced deep learning algorithms and are trained by a large number of face data sources, enabling the camera to locate faces quickly and accurately from the video source and capture facial images. Perimeter ProtectionDahua’s Perimeter Protection functions significantly improved accuracy. Perimeter Protection reduces false alarms and decreases pixel count requirements for object detection. Perimeter Protection features custom tripwires based on object type for automation in limited access areas such as pedestrian or vehicle-only zones. This combination of advanced AI analytics and real-time alerts to a desktop or to a mobile client reduces system requirements and resources resulting in greater surveillance system efficiency. People CountingPeople Counting function uses advanced image processing technology to capture depth information from within images. The camera pairs this information with deep learning algorithms to analyze and detect human bodies and track target objects in real time. The camera provides statistics for separate individuals’ entrance and exit with up to 95% counting accuracy. ePoE technologyThe ePoE technology of Dahua, designed internally, adopts advanced 2D-PAM3 coding modulation from physical layer, and realizes full duplex transmission over 800 meters at the speed of 10Mbps, or 300 meters at the speed of 100Mbps via Cat 5 or coaxial cable media. Besides, it supports PoE and PoC power supply technology which has greatly simplified construction and wiring. Dahua ePoE technology offer a new way to accomplish long distance transmission between IP camera and network switch. It allows more flexible surveillance system design, improves reliability and saves construction and wiring cost. Protection(IP67, IK10, wide voltage)The camera allows for ±30% input voltage tolerance, suitable for the most unstable conditions for outdoor applications. Its 6KV lightning rating provides effective protection for both the camera and its structure against lightning. Subjected and certified to rigorous dust and immersion tests (IP67) and impact tests (IK10), the camera is the choice for installation in even the most unforgiving environments. Full-color StarlightThe camera adopts F1.0 large aperture lens and 1/1.8" high performance sensor. With higher amount of absorbed light and advanced image processing algorithm, the camera presents an impressive low light performance with an exceptional balance between noise reduction and the blur of moving object.
VIVOTEK FD9187-HT is indoor dome network camera equipped with a full HD sensor enabling resolution of 2560 x 1944 at 30 fps. And FD9187-HT also supports standard 1920x1080 resolution at 60 frames per second. Featuring VIVOTEK SNV and WDR Pro technology, FD9187-HT is capable of capturing high quality image whether in high contrast or low light environment. The FD9187-HT offers remote focus lens for different user scenario. IR illuminators are equipped with 50 meter effective range for better night visibility. For indoor applications, PIR sensor is built-in to detect unexpected events. Employing VIVOTEK's Smart Stream III technology and H.265 codec support, the FD9187-HT reduces bandwidth up to 90%* while keeping great image quality. Additionally, powered by VIVOTEK Smart Motion Detection technology, the FE9187-HT can learn how to differentiate between the motion of people and objects, which make it enable to reduce the false alarms and have higher accuracy.
The ConteraCMR® NVR Appliance is designed to offer powerful IP recording in an affordable, compact chassis. It is equipped with an on-board 8 or 16 channel PoE switch, with a recording capacity of up to 24 channels, allowing for Plug and Play connection with Arecont Vision and ONVIF cameras or RTSP video streams. With full integration to ConteraWS® (Web Services), the NVR Appliance offers centralized user management, single sign-on convenience, mobile apps and a web client that allows for easy remote connection to your recorders. Network setup is fast and easy using ConteraWS and eliminates the need for port forwarding or DDNS. The ConteraCMR NVR Appliance runs on a secure Linux® OS and comes preloaded with ConteraVMS® Server software as a turn-key solution.
System OverviewExperience 4MP full HD color video and the simplicity of reusing existing coaxial infrastructure with HDCVI. The full-color starlight HDCVI camera presents a high quality color image with rich details even in total darkness conditions. It offers various fixed lens models with a multi-language OSD and HD/SD switchable output. It adopts two powerful warm white LED illuminators, covering an effective range up to 40 m (131.23 ft). The LEDs switch on automatically in darkness to capture detail-packed fullcolor images 24/7, ensuring anthentic identificaiton of objects. It is an ideal choice for applications such as schools, retail centers and parking lots. Functions Full-color StarlightThe camera adopts F1.2 large aperture lens and 1/2.7" high performance sensor. With higher amount of absorbed light and advanced image processing algorithm, the camera presents an impressive lowlight performance with an exceptional balance between noise reduction and the blur of moving object. Warm Supplemental lightsWith two warm supplemental LED lights, the camera is able to provide a colorful and vivid image even in total dark. By default, the camera is set to smart light mode, in which the camera can automatically adjust the exposure time and light sensitivity simultaneously to avoid overexposureing of the objects in the image center. Also, the sensitivity and intensity of the LED lights can be remotely controlled by OSD menu. Broadcast-quality Audio*Audio information is used as supplementary evidence in video surveillance applications. The HDCVI camera supports audio signal transmission over coaxial cable. In addition, it adopts unique audio processing and transmission technology that best restores source audio and eliminates noise, guaranteeing the quality and effectiveness of collected audio information. 4 Signals over 1 Coaxial CableHDCVI technology supports 4 signals to be transmitted over 1 coaxial cable simultaneously, i.e. video, audio*, data and power. Dual-way data transmission allows the HDCVI camera to interact with the HCVR, such as sending control signal or triggering alarm.*Audio input is available for some models of HDCVI cameras. Long Distance TransmissionHDCVI technology guarantees long-distance and real-time transmission without any loss. It supports up to 700 m for 4MP HD video via coaxial cable, and up to 300 m via UTP cable.**Actual results verified by real-scene testing in Dahua's test laboratory. SimplicityHDCVI technology inherits the born feature of simplicity from traditional analog surveillance system, making itself a best choice for investment protection. HDCVI system can seamlessly upgrade the traditional analog system without replacing existing coaxial cabling. The plug and play approach enables full HD video surveillance without the hassle of configuring a network. Multiple-formatsThe camera supports multiple video formats including HDCVI, CVBS and other two common HD analog formats in the market. The four formats can be switched over through OSD menu or by PFM820(UTC controller). This feature makes the camera to be compatible with most end users’ existing HD/SD DVRs. ProtectionThe camera's outstanding reliability is unsurpassed due to its rugged design. The camera is protected against water and dust with IP67 ranking, making it suitable for indoor or outdoor environments. With working temperature range of -40 °C to +60 °C (-40 °F to +140 °F), the camera is designed for extreme temperature environments. Supporting ±30% input voltage tolerance, this camera suits even the mostunstable power supply conditions. Its 4KV lightning rating provides protection against the camera and its structure from the effects of lightning.
Increase safety and reduce risk on board your transit vehicles with March Networks® RideSafe MT Series IP Recorders. These all-IP units deliver highly-reliable video surveillance recording and management in a compact, rugged design that is ideal for mid-sized vehicles – like student and patient shuttles and paratransit buses. Available in 4-channel and 6-channel models, the RideSafe MT Series solution enables operators to capture everything that’s happening on the bus, inside and out. Whether you have one or a thousand vehicles, this plug-and-play recorder can operate as a standalone unit programmable through embedded software, or be remotely managed and monitored daily using March Networks Command™ for Transit video management software. Video from the recorder can also be integrated with existing CAD and AVL systems and mobile routers. Key RideSafe MT Series features include: Front panel LEDs for easy recorder diagnostics, including operational, recording and video export status Embedded Linux OS, to ensure reliable and secure video recording Real-time health monitoring, alerting operators to camera, recorder and network issues before they affect performance Vehicle metadata integration from CAD/AVL systems and accelerometers for accurate re-enactments, driver monitoring and investigations Configurable recording policies based on schedule, motion, incident/event and other user-definable variables Powerful video management software, providing the advanced tools and features needed to manage entire fleets Automated video and data extraction over WiFi or 4G networks Extended thermal range (ETR) models available
The Evolution Stainless Steel cameras, part of Oncam’s Specialist Camera Range, are unique to the 360-degree video surveillance market as they are the only ones certified for tough environments, indoor and outdoor. The 05MP and 12MP versions have been specifically designed to meet the needs of customers operating in demanding environments such as Food Processing, Industrial, Maritime and Ports and Safe City applications. The cameras’ resilient Stainless Steel 316 housing is manufactured for enhanced corrosion resistance. The IP66, IP67, IP68, IP69K, and NEMA 4X and 6P ratings make the enclosure fit for harsh environments, while its IK10+ rating makes it resistant to impacts of 40 joules. The NSF certification and HCV EU mark make the camera range unique, guaranteeing compliance with standards for commercial food equipment in both North America as well as Europe. The only 360-degree fisheye camera in a stainless steel housing, Oncam’s new and improved camera range is available for surface and pendant mount installations. A matching stainless steel arm allows for wall, corner and pole mounting. Evolution 05 Stainless Steel: EVO-05-SS2 Evolution 12 Stainless Steel: EVO-12-SS2
The Evolution 180 Outdoor Camera is built upon Oncam’s expertise and heritage on 360-degree technology. It is specifically designed for applications that require a dewarped panoramic view of an outdoor scene, without blind spots, from a single sensor camera. The 12MP high-resolution sensor and the built-in 3D dewarped panoramic video provides industry leading Panoramic+ views. The true day/night functionality allows images to be produced in all lighting conditions, including additional IR lighting. The camera is IP66, IP67, IP68, IP69K and IK10+ rated, making it a robust design. Its versatile enclosure enables wall and pendant mounting, while the integrated adjustable mounting allows for an angling of up to 45°. When angled, Oncam’s Angle Compensation Technology (ACT) corrects the view, straightening vertical lines in the scene.
System OverviewWith upgraded H.265 encoding technology, Dahua Lite series network camera has efficient video encoding capacity, which saves bandwidth and storage space. This camera adopts the latest starlight technology and displays better color image in the condition of low illumination. It supports SD card storage, dust-proof function, waterproof function and vandal-proof function, complying to the standards of IP67 and IK10 (Supported by some select models). Functions Smart CodecWith advanced scene-adaptive rate control algorithm, Dahua smart encoding technology realizes the higher encoding efficiency than H.265 and H.264, provides high-quality video, and reduces the cost of storage and transmission. WDRWith advanced Wide Dynamic Range (WDR) technology, Dahua network camera provides clear details in the environment of strong brightness contrast. The bright and dark area can get clear video even in high brightness environment or with backlight shadow. StarlightDahua Starlight technology mainly applies to the environment of low illuminance, and it can provide clear colorful video. Even in the environment of ultra-low illuminance, the technology can guarantee the good image effect. IVSWith advanced video algorithm, Dahua IVS technology supports intelligent functions, such as tripwire and intrusion. Protection (IP67, IK10, wide voltage)IP67: The camera passes a series of strict test on dust and soak. It has dust-proof function, and the enclosure can works normal after soaking in 1 m deep water for 30 minutes.IK10: The enclosure can stand the punch more than 5 times from a 5 kg hammer falling from a height of 40 cm (Impact energy is 20J).Wide voltage: The camera allows ±30% input voltage tolerance (wide voltage range), and it is widely applied to outdoor environment with instable voltage.
Hanwha Techwin’s Wisenet PNM-9000VD multi-sensor/multi-directional camera provides quality images and modular lens configuration at an affordable price. This camera supports 30fps image capture and true 120 dB WDR without compromising frame rate for each of its two 5MP sensors. Each sensor has its own Wisenet 5 chip, providing a full suite of built-in video analytics including loitering, directional detection, fog detection, tampering, motion detection and objects entering or exiting an area.
VIVOTEK’s VAST 2 is an easy to use IP video management software (VMS). To meet the real-world needs of users, it comes with exciting advancements such as easy operation on single or multiple monitors, custom layout to accommodate both corridor and panorama orientations, rapid export of multi-channel video and the acquisition of VCA analytics & cybersecurity attack events from VIVOTEK cameras and substations (such as NVRs) in a hierarchical system structure. In the new version update of VIVOTEK’s video management software VAST 2, several advanced user-centered functionalities will be unveiled. The new features include the Deep-Learning Technology Smart Search II, Cybersecurity Management Solution, and License Plate Recognition Integration. With this update, users can enjoy the intuitive interface of VAST 2 while achieving a higher level of management efficiency. Three new user-oriented benefits will be highlighted in VAST 2： Smart Search II Building on Deep-Learning Video Content Analytics, the Smart Search II of VAST 2 allows users to quickly search for specific objects and people in the specified region. While enabling People Detection feature, only people-based activities will serve as event triggers. The security operator no longer needs to search through extensive footage for critical videos, thus improving both efficiency and effectiveness. Cybersecurity Management Solution Offering the complete end-to-end cybersecurity protection, the new VAST 2 is fully integrated with VIVOTEK cameras and NVRs and becomes a powerful cybersecurity central management site. The protection includes Instant Alert Notifications, allowing users to receive notifications automatically, and the Cyber Risk Dashboard to visually identify common types of cyber-attacks. In addition, users can filter attack logs according to a range of criteria, making it quicker to find abnormal events and take necessary actions to minimize risks. License Plate Recognition Integration Now, the new VAST 2 is fully integrated with VIVOTEK’s LPR/ Automatic Number-Plate Recognition (ANPR) camera, IB9387-LPR. Users can see the live images with selected information, such as confidence level or black list status, which can in turn become a trigger source in Alarm Management, making it easy to intelligently manage license plate data.
IDIS has extended its award-winning DirectIP® camera range with the introduction of a new flagship 2MP 36x Lightmaster IR PTZ outdoor-ready camera for fast and precise pan/tilt/zoom performance.The new DC-S6283HRX Lightmaster builds on the specification of IDIS’s successful PTZ models, with a high-grade lens combined with advanced sensor technology and finely tuned, client-side image processing, allowing the capture of vivid, true color video in extremely low light conditions. Excellent performance at long distances, with minimum motion blur, makes the DC-S6283HRX ideal for perimeters, shopping centers, stadia, outdoor spaces and public area applications.The camera benefits from IDIS’ signature true plug-and-play, one-click configuration and features 36x optical zoom, IR up to 350 metres, true wide dynamic range (WDR), digital image stabilization (DIS), a built-in heater and a vandal proof casing.“Designed for 24/7 accurate pan/tilt/zoom operation this new Lightmaster PTZ camera delivers unparalleled performance and exceptional detail when zooming. The camera is equipped with a variety of intelligent features and can move between pre-set positions and zoom in automatically in response to detected events. The result is maximum protection for a wide range of applications,” said James Min, Managing Director, IDIS Europe.The user experience is enhanced with IDIS Smart UX Controls, which is an award-winning, advanced and simple to use interface featuring intuitive slingshot and rubber-band style controls. Operators can smoothly and seamlessly follow moving objects in real-time with ground-breaking accuracy by panning images at different speeds and in different directions - literally without lifting a finger - by using a CTRL button and mouse combination.The camera uses H.264 and H.265 combined with IDIS Intelligent Codec to deliver significant bandwidth and storage savings and benefits from low Power over Ethernet (PoE) energy consumption.The risk of gaps in footage is eliminated with IDIS Smart Failover. In the event of network instability, the camera automatically records to an integral 256GB SD card and transfers data to the network video recorder (NVR) once connection is restored, which avoids the need for engineer call outs to retrieve footage.“We are listening and responding to customer demand with our new 2MP PTZ Lightmaster camera, providing an easy to deploy, low-storage and bandwidth solution for wide area coverage and perimeter detection,” said James Min, Managing Director of IDIS Europe. “It’s particularly suited to town center and city surveillance, stadia, outdoor retail parks, manufacturing and logistics sites and high-security perimeter applications where outstanding performance and ease-of-use combined with a low total cost of ownership are becoming essential.”
Browse Video Surveillance Storage System / HDD
Storage products updated recently
The past decade has seen unprecedented growth in data creation and management. The products and services that consumers use every day – and the systems businesses, large and small, rely on – all revolve around data. The increasing frequency of high-profile data breaches and hacks should be alarming to anyone, and there’s a danger data security could worsen in the coming years. According to DataAge 2025, a report by IDC and Seagate, by 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half of it will actually be secured. Nuanced Approach To Data Security Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its securityThe rapid proliferation of embedded systems, IoT, real-time data and AI-powered cognitive systems – as well as new legislation like the European Union’s GDPR – means that data security has to be a priority for businesses like never before. With data used, stored and analyzed at both the hardware and software level, we need a new and more nuanced approach to data security. Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its security. What this means in practice is renewed focus on areas of hardware and software protection that have previously not been top of mind or received large amounts of investment from businesses, with security at the drive level being a prime example. The Importance Of Data-At-Rest Encryption In a world where data is everywhere, businesses need always-on protection. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways A recent report from Thales Data Threat found that data-at-rest security tools can be a great way to help protect your data. However, it’s important to note that this must be used in conjunction with other security measures to ensure that those that fraudulently gain access to your key management system can’t access your data. Ensuring Drives To Be Common Criteria Compliant One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliantDespite the clear benefits, this kind of encryption lags behind other areas, such as network and endpoint security, in terms of the investment it currently receives. The same Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security. One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliant. Common Criteria is an international standard for computer security certification, and drives that meet this standard have a foundational level of protection which users can build on. Providing An Additional Layer Of Security The retail industry has seen a spate of security breaches recently, with several major US brands suffering attacks over the busy Easter weekend this year. As frequent handlers of consumer card information, retailers are particularly vulnerable to attack. Data-at-rest encryption could enhance security in these instances, providing an additional layer of security between customer records and the attacker The advanced threats retailers face can often evade security defences without detection. Such a breach could grant attackers unrestricted access to sensitive information for possibly months – some breaches are known to have been detected only after consumer payment details appeared on the dark web. These types of undetected attacks are highly dangerous for retailers, which are relatively helpless to protect consumer information once their defences have been compromised. Data-at-rest encryption could significantly enhance security in these instances, providing an additional layer of security between customer records and the attacker which has the potential to make the stolen data valueless to cyber criminals. Industries In Need Of Data-At-Rest Encryption Healthcare organizations, which hold highly sensitive customer and patient information, have a strong use case for data-at-rest encryption. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack. Recent research from the American Medical Association and Accenture revealed that 74% of physicians are concerned over future attacks that may compromise patient records. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack The financial sector would also benefit from further investment in data-at-rest encryption, given 78% of financial services firms globally are planning on increasing their spending on critical data, according to Thales’ Data Threat Report. It’s helpful to view security as a circle in which every piece of hardware and software handling the data plays its partSMEs and enterprises are not immune to security threats either – with growing numbers of people traveling for work or working remotely, the risk of sensitive business data becoming exposed via device theft is heightened. Usernames and passwords have little use if thieves can simply remove unencrypted hard drives and copy data across. Securing Every Hardware And Software Technology vendors often focus on aspects of hardware and application security that are within their control. This is understandable, but it risks proliferating a siloed approach to data security. There is no single line for data security -- rather, it’s helpful to view it as a circle in which every piece of hardware and software handling the data plays its part. There’s a clear need for more industry dialog and collaboration to ensure data security is effectively deployed and connected throughout the security circle and across the value chain.
The use of facial recognition has become a highly debated topic recently, and has increasingly and misleadingly been criticized by some for being an unethical tool used to spy on the public. The reason for such criticism is however largely due to lack of information and regulation around the technology. Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future – from street crime to airport security, all the way through to helping those battling addiction, the technology can take security and operations to new heights. These systems can memorize the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes The Rise In Knife Crime Knife crime has dominated the headlines in the UK throughout the year. Recent statistics show the number of people being admitted to emergency care due to attacks by a sharp object to be up by nearly 40 per cent from two years ago, while the number of children under the age of 18 being admitted to hospitals with stab wounds is up by 86 per cent in only four years. This recent surge in knife crime has put police forces under immense pressure, and the intelligent use of facial recognition has a role to play in enabling more informed stop & search interventions. Currently UK police can stop and search an individual they suspect to be carrying drugs or weapons or both, or they can stop and search a person in a location where there have been or are considered likely to be “incidents involving serious violence.” In both cases they must do so with access to limited information, leaving themselves open to accusations of bias or discrimination. Knife crime dominated the headlines in the UK throughout 2018 Police Systems Benefiting Crime Investigations This is where facial recognition can offer up additional intelligence. These systems can memorize the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes. Furthermore, these systems don’t need prior personal engagement to recognize an individual and see only data, not gender, age or race. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. The technology doesn’t take the decision away from the human police officer. However, it does bring greater transparency and context to the decision-making process of whether a stop and search intervention is justified. Similarly, the advanced technology can recognize and match an individual seen on a CCTV camera at a crime scene to someone the police encounters on the streets some time later, justifying a stop and search on that individual. Its ability to check in real time if a person is on a criminal watchlist adds an extra layer to the decision-making process prior to conducting a stop and search, lowering the likelihood of discrimination. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. Gambling Addiction And How Facial Recognition Can Help There are an estimated 593,000 people in the UK currently battling a gambling problem, making it a serious public health issue in the country. Having understood the gravity of the issue, the UK gambling commission have set limits and advice in place to help those suffering this addiction; yet as with all addictions, gambling is a tough habit to beat. In order to put effective limitations in place and make a real difference, the gambling commission needs the right technology to protect those most vulnerable in the industry. Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers to a higher degree. Monitoring those entering and moving around gambling areas is an extremely difficult task for human staff to do alone, especially in large crowded areas such as casinos. Facial recognition technology installed around the premises would be able to help the company and the staff to identify people who have registered as gambling addicts, and keep record of their day’s play in order to inform staff if and when it was time for them to stop. It would also be able to ensure effective self-exclusion procedures, by identifying a self-excluded individual via CCTV as soon as they entered the venue to then allow security staff to respectfully escort them out. Utilizing Facial Recognition At Airport Security Facial recognition has by now become a normal sight at many airports around the world. Several people today hold a so-called biometric passport, which allows them to skip the normally longer queues and instead walk through an automated ePassport control to proceed to the gate faster without having to deal with control officers. Facial recognition used in this way has managed to significantly cut waiting times at the passport control, but it also has the ability to enhance security in and around airports. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces Earlier this year, facial recognition technology managed to catch an imposter trying to enter the US at the Washington Dulles Airport. The false passport may have been uncaught by the human eye, yet due to the accuracy of the facial recognition technology it managed to help officers catch the imposter and bring him to justice. Facial recognition thus allows officers to identify an individual faster and more accurately than the human eye. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces, which have been collected from visas, passports and other sources. Facial recognition allows officers to identify an individual faster and more accurately than the human eye At airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-inWhile some critics may worry about issues of privacy related to the technology, at airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in and, in the future, even boarding proceedings. If used correctly and proportionately, facial recognition can help safeguard the public and improve national security on several fronts. While the many benefits of facial recognition are evident, the lack of regulation and understanding of the technology has led to misconception around how it works and what it is used for. Facial recognition technology can match faces in crowded public places against criminal watch lists, and register faces that match with those on criminal watch lists – while ignoring everyone else.
Terry Gold of D6 Research has been giving “cyber in physical security” presentations at a variety of conferences, including ISC West and the Cyber:Secured Forum. We caught up with him for some insights about the intersection of cybersecurity and physical security. Q: Tell us a little bit about your background, specifically in the context of its relevance to cyber security in physical access. Gold: I started out in information security and then got involved in physical security along the way. I started really focusing on physical from a cyber standpoint about 10 years ago. I got into ethical hacking about 8 years ago, and then worked on putting it all together. There wasn’t a roadmap, so I had to build a methodology which I now share with other hackers, end users and law enforcement. I spend all my time either in the lab building success models, methods, and testing them out in some of the largest customers or agencies in the world for validation and improvement. Also, a chunk of my time is spent re-engineering security assessment and controls for end users or validating vendors on their behalf from a unique viewpoint that’s not (yet) typical in the industry. Q: How well prepared is physical security overall against cyber threats? Gold: Not well at all. While security is imperfect anywhere, much of the practices and designs have critical defects and overlook either best practice or fundamental application security principles. I’d say that the industry is very wide open for exploitation that doesn’t take much sophistication to execute. Breach disclosure laws are focused on mandatory reporting for personally identifiable information (PII) Q: What things stand out to you along your journey regarding the changes that you are seeing on this topic? Gold: Culture. Over the years, the industry (and most end users) have been dismissive of my findings. Industry culture hasn’t been aligned to embrace the topic and make requisite improvements that are needed to achieve “good security.” However, I’m finally starting to see that change – quickly and at scale. It doesn’t mean that we’re close to “good,” but rather reached the inflection point of change – and I’m rather pleased about it. Breach disclosure laws has resulted in IT getting a lot of media attention in comparison to hacks made against physical security Q: D6 does a lot of research in this area. What is the analysis behind the recent push for cyber security in physical security? Gold: First, it must be recognized that the threat isn’t new, but rather that the industry is only now coming to the table on it. Industry sentiment has been that breaches in physical security don’t happen or that there’s little impact. It must be recognised that the threat isn’t new, but rather that the industry is only now coming to the table on itBoth are false. Mainly, IT gets all the media attention with breaches for two reasons; 1) breach disclosure laws are focused on mandatory reporting for personally identifiable information (PII), and 2) there is really poor detection (mostly non-existent) against hacks in physical security, so they go unrecognized. On the other side, as physical security systems increasingly resemble an IT architecture, so does their risk profile. As it expands to mobile, cloud, IOT and intelligence - InfoSec and auditors are taking a look and are alarmed at what they’re seeing. Before you know it, the scrutiny is cutting pretty deep, pressure for alignment becomes intense, and vendors feel the pinch on the sales cycles. It’s not a comfortable position for anyone. Q: What will be the projected impact? Are practitioners seeing the whole picture? Gold: No, and this area is probably the most important takeaway of this interview. The industry is where InfoSec was about 15 years ago in their journey, except we have an additional headwind to deal with – culture change. This industry tends to rely more on trusted relationships than validating the recommendations are being provided. There are too many prevailing misconceptions, that unless remediated, investments won’t be as effective as expected. Q: What do you believe are the top misconceptions? Gold: Well, this is a longer topic, but here’s a sampling that cuts across different areas. Regarding hackers: A misconception is that they’re generally not interested. Hackers are increasingly very interested. When I teach a workshop at a hacker conference, it’s usually the quickest to fill up and go to wait list (within a couple hours). Regarding attacks: A misconception is that attacks are executed directly against the target system. Example, their goal is to get into VMS and attack it directly. The reality is that they’re more commonly dynamic where physical is part of a larger attack and its role is an easier gateway to another system (or vice versa, with many hops). Regarding protective measures. The most prevalent mistake that the industry is currently making is too much focus and reliance on air-gapping networks or locking ports. This is only a slice of the attack surface and there are various ways to get around it. There’s a heavy price to pay for those that that rely too much on this strategy since its often accompanied by few mechanisms to deal with actors once they do get in (and they definitely will). Regarding the value of exploiting physical security. Too often perceived as low value. In our white paper we review many of the things that hackers can do, what they gain, and how it can impact the overall organization. It’s far broader and deeper than most. Q: What are the top things that need to change in the industry? Gold: First, culture. This can be answered by adopting the same principles as InfoSec. From an execution standpoint, the industry needs to change how they perform risk assessments. At D6, we’ve developed a stepwise methodology from ground up and it’s a huge differenceIndustry practices, including certifications, are significantly outdated and don’t reflect a methodology that accurately considers cybersecurity, actors, methods, and proactive remedy. At D6, we’ve developed a stepwise methodology from ground up and it’s a huge difference. End users that don’t re-engineer their practice, will be very limited for meaningful cybersecurity improvement. One of the changes needed in the industry includes how risk assessments are performed Q: Generally, what advice do you give to clients on steps to move their cyber security to the next level? Gold: Don’t operate like a silo anymore. Transition from industry “common practices” to best practices that can be validated. Rely less on previous relationships and more toward domain competence. Collaborate with the CISO to a principled, goal-oriented and metrics-based approach. Embed an InfoSec person on the physical team. Present priorities and risks jointly to the board within an overall risk portfolio. Invite scrutiny from auditors. Get a red team performed once a year. Until you do the last step, you don’t really know where you stand (but don’t do it until the other things are done). Last, set the bar higher with vendors to support these improvements or their products will just end up being weak link. Q: What type of challenges do you see and any advice on how end user and integrators can overcome them? Lessons learned? Gold: There are too many specific domains across cybersecurity – it’s not just a network security resourceFeedback I get from integrators is that they’re struggling to figure out how to deliver expertise to their clients in their area. They’re somewhat overwhelmed with the complexity, becoming an expert or how expensive it is to hire and maintain those skilled resources. My best advice is not to do either. There are too many specific domains across cybersecurity – it’s not just a network security resource. Not even the large integrators have the right bench, and unfortunately, they’re just further down a doomed path than smaller integrators. Form a partnership with boutique cybersecurity firms that have multiple specialists. Negotiate rates, margins, scope, and call on them when needed. It won’t come out of your bottom line, the results will be better, and the risk will be extremely low. You’ll learn along the way too. Q: Anything notable that your research is uncovering in this area that might not be on people’s radar yet? Gold: Yes, quite a bit. Our Annual Industry Assessment Report goes through every segment. We’re making pretty bold statements about the future and impact, but we’re confident. One thing that stands out is how intelligence (and the swath of subsets) will impose stringent demands on physical security due to attribute and data collection (for analysis) which will absolutely require privacy compliance, integrity, and controls. It will even shape organizations that might not care about cybersecurity but are prioritizing function. Q: Where can readers learn more about your perspectives on this topic? Gold: Blogs on the D6research.com website. Our annual report. Val Thomas of Securicon and D6 have collaborated on a three-part cybersecurity in physical white paper series. It goes into all of this in detail, as well as remedy.
3 Reasons To Migrate To A New Access Control SystemDownload
Schooling the Market on Education SecurityDownload
Lawrence, Massachusetts Deploys FLIR Video System For SafetyDownload
- Dahua AI Helps Haier Create Intelligent Industrial Park In Russia
- IDIS Video Technology Prepares Netherlands’ Circuit Zandvoort For 2020 Formula 1 Grand Prix
- MOBOTIX Secures Bolloré Logistics, New Zealand With Hemispheric And Dual D15 Cameras
- BCDVideo Enhances Bank Security With Its IP Video Surveillance Systems