In the AIoT era, the world is getting smarter. Everything is going to have an online “ID” and then connected into a vast net of IoT devices, like a laptop computer, a cellphone phone, a connected thermostat, or a network security camera. Cybersecurity in the AIoT era According to a Markets and Markets report, IoT is extensively used by smart cars to smart manufacturing and connected homes and building automation solutions. However, currently, there are no unified global technical s...
ASSA ABLOY Group brands Corbin Russwin and SARGENT announce the release of their highly anticipated premium bored lock that is certified to surpass ANSI/BHMA Grade 1 requirements, making it ideal for use in some of the most challenging environments. Marketed as the Corbin Russwin CLX3300 Series and SARGENT 10X Line, the lock offers superior vandalism resistance as evidenced when it successfully maintained egress in the face of more than 3,100 in-lb. locked lever t...
ReliaQuest, a global company in cybersecurity, announced the appointment of Kara Wilson to its Board of Directors and Alex Bender as its Chief Marketing Officer. “Providing world-class cybersecurity capabilities requires a world-class team, working together with the common goal of building trust and confidence for businesses of all sizes and sectors,” said Brian Murphy, ReliaQuest CEO and co-founder. “It is a great honor for me to bring both Kara and Alex on board during...
Device Authority, a global front-runner in Identity and Access Management (IAM) for the Internet of Things (IoT), announced KeyScaler for Azure Sphere in the Microsoft Azure Marketplace, an online store providing applications and services for use on Azure. Azure Sphere brings together Microsoft’s expertise in cloud, software, and silicon to provide a security foundation and connectivity to create intelligent secure products and accelerate the adoption of IoT at scale. Device Authority&rs...
Alarm.com is connecting your car and home through its integrated security platform to help people stay informed about their vehicle’s status and unlock more home automation capabilities. Alarm.com Connected Car, developed in collaboration with vehicle telematics solutions pioneer CalAmp, offers all the benefits of a vehicle monitoring solution plus the unique benefit of deep integration with the Alarm.com smart home security system. Vehicle insights, notifications, and home automation feat...
Exabeam, the security analytics and automation company, announced a partnership with Snowflake, the Data Cloud company, to augment Snowflake data lakes with Exabeam security analytics and automation. The partnership enables organizations to identify risks and respond swiftly to incidents across their entire business ecosystem. The COVID-19 pandemic has accelerated digital transformation, expediting the move to the cloud and increasing demand for improved productivity and efficacy through automa...
Security personnel must be able to quickly detect unauthorized vehicles and individuals at critical infrastructure sites. Without intrusion detection, entities like electrical substations can be subject to physical attacks. 88 percent of substations experience at least one break-in every year and 10 percent see more than 20 intrusions in the same time frame, according to CIGRE, a global electricity industry organization. To safeguard remote substations from external threats, electric utilities are relying on durable thermal cameras for superior monitoring and protection. Remote substation security The failure of a key substation caused by a security breach would have a debilitating effect on homeowners, businesses, and mission-critical infrastructure. While physical security is a top priority for utilities, designing, installing, and operating a perimeter system requires skill. Remote location, limited network connectivity, minimal lighting, internal security audits, and compliance with North American Electric Reliability Corporation are some of the challenges that both substation security directors and system integrators face. Perimeter Intrusion Detection System (PIDS) Since its arrival on the mainstream security scene a few decades ago, thermal security cameras have quickly become the optimal solution for remote substation perimeter security, due to their ability to monitor perimeters day and night in adverse weather conditions as well as in harsh environments.Thermal cameras measure the minute differences in heat signatures emitted by objects and people to produce high-contrast images and reliable intrusion detection. They enable security personnel to detect an intruder before they ever reach the perimeter for early intervention. Sensor quality FLIR's perimeter cameras offer the widest selection of lenses and detection ranges, adaptable to both large and small deployments As the industry front-runner in advanced thermal technology, FLIR provides the best sensor quality available. FLIR’s total security solution featuring a diverse suite of perimeter cameras offers the widest selection of lenses and detection ranges, adaptable to both large and small deployments. FLIR’s track record of success is just one of the reasons why utilities choose FLIR cameras time and again. Design recommendations When deploying thermal cameras at substations, there are several factors to consider to optimise performance. Here are some tips from the FLIR experts.Identify What One Needs to Protect: Assess the substation’s unique needs, define one's threats, and determine which area one needs to monitor. For rural or small substations miles away from the nearest city, position one's cameras so one has a solid view of the outside perimeter. If anyone approaches, one wants to have ample warning. For substations in urban areas that are next to public lands and walkways, it may not be cost-effective to look out as pedestrians can easily generate nuisance alerts. In these scenarios, thermal cameras that survey the interior of the substation may be the better option. Make the Most of Existing Infrastructure: Thermal cameras must be mounted at a minimum of 12-15 feet above the ground. However, some substation fences are only 6-8 feet tall. In this case, consider mounting cameras on telephone poles or tower structures. Utilizing these existing structures instead of digging new trenches can save one both time and money. Select the Right Camera for your Application: For small substations that are less than an acre, deploying a couple of FLIR Elara™ FC-Series ID cameras, which feature onboard analytics, along the fence line will often do the trick. For short to mid-range needs, the FLIR Elara FB-Series is a great, economical option. Install a visible camera or a camera that provides both thermal and optical imagers, like FLIR Saros™ DH-390 Dome at the gate, to monitor general traffic. For larger substations (around two acres) that are high-value sites, consider deploying a mix of FLIR FC-Series ID cameras with the FLIR Saros™ DM-Series to cover the fence line. Additionally, mount a pan-tilt camera with both visible and thermal streams, such as the FLIR Elara™ DX-Series or FLIR Triton™ PT-Series, to look around the perimeter for superior monitoring and threat assessment. Choose the accurate software As a final consideration, choose the right software to streamline management, operations, and functionality. For large applications where customers need to manage surveillance, access control, radar, and other disparate systems on one platform, consider command and control software. For enterprise-level surveillance operations, a video management system is optimal and for small applications using just a few cameras, a network video recorder is sufficient. Regardless of the size of the project, partner with an expert team that can help assess, design, installs, and program the right system for one's application.
Acuant, a foremost global provider of identity verification solutions, announced that the Federal Risk and Authorization Management Program (FedRAMP) has prioritized the AssureID™ Connect SaaS, Ozone® eMRTD Authentication SaaS, and Facial Recognition System, FaceID Government SaaS including Passive Liveness (COFRS) for a Moderate Provisional Authority to Operate (P-ATO) by the Joint Authorization Board (JAB). AI-powered identity platform Acuant's AI-powered Trusted Identity Platform provides best-in-class identity verification and AML/KYC compliance via one API. Based on Acuant's high level of federal government demand for identity proofing services and the quality of its business case, Acuant's COFRS was prioritized for assessment based on a decision made by the JAB Technical Representatives and approved by the General Services Administration's (GSA) Office of General Counsel. Joint Authorization Board (JAB) The JAB is the primary governance and decision-making body for FedRAMP and is comprised of the Chief Information Officers (CIOs) from the Department of Homeland Security (DHS), the GSA, and the Department of Defense (DOD). Identity proofing services The demand was driven primarily by Acuant's work with GSA and its Login.gov customers providing the core identity proofing services that are offered by Login.gov to its customer agencies, including Document Authentication, ePassport Passive Authentication, and Facial Recognition Matching (FRM) with Presentation Attack Detection. This achievement exemplifies the level of excellence that Acuant strives for in all we do" Data protection and security operations The solution meets the Office of Management and Budget (OMB) mandated requirements for data protection and security operations of cloud services, a critical requirement for every Federal agency that wants to employ hosted cloud services. The FedRAMP authorization establishes that the Cloud Service Provider (CSP) has implemented the security controls required to mitigate the security risks that are inherent in the use of cloud services, to the degree necessary for the management of the risk associated with the system accessing the service. Achievement "This achievement exemplifies the level of excellence that Acuant strives for in all we do," said Acuant President and CEO Yossi Zekri. "We have been working in the government sector for many years, it was ideal for us to pursue this very prestigious level of certification and we look forward to completing the process."
BCD International released its Harmonize Conductor iDRAC plugin, which integrates with the core Genetec Security Center platform. Built on the Genetec SDK platform, the BCD Conductor leverages many advantages that are found within Security Center such as the creation of entities, event-to-actions, and role fail-over. BCD Conductor enhances the user experience by introducing virtual machine management while staying true to the Genetec platform. BCD’s Harmonize Conductor iDRAC allows all organizations easier visibility to monitor, maintain, and react to their critical server infrastructure. As server uptime is vital to success in all vertical markets, the Harmonize iDRAC plug-in provides operators the agility to make rapid response decisions with real-time notifications and data. Integration into Genetec Security Center Among the features and benefits unique to this integration are real-time server telemetry, remote server management, server analytics, seamless integration into the Genetec Security Center platform, and a reduction in the number of systems users need to manage. The Harmonize Conductor iDRAC plug-in comes standard on all BCD-manufactured Streamvault appliances that support Dell Technologies’ iDRAC health monitoring package, which is designed to secure local and remote server management. The installer is launched via the desktop with two licenses, part number GSC-1SDK-BCD-Harmonize, and can be purchased directly through Genetec.
Traka Automotive, one of UK’s renowned electronic key management solution provider for automotive dealers, has expanded its product portfolio by launching TrakaMEC, a mechanical key management range. TrakaMEC is an affordable new addition to Traka Automotive’s extensive range of solutions, designed to meet the needs of dealerships and services centers that are not yet requiring fully networked and integrated electronic key management systems. Presenting a highly secure mechanical key management solution, TrakaMEC is available in two systems; TrakaMEC Supreme as tested to rigiorous LPS1175 and EN14450 standards, and TrakaMEC Lite for a simpler and more low cost solution. Electronic key management Says Paul Smith, Director Traka Automative: “Latest statistics show nearly a third of Brits are now looking to prepare to return to regular commuting, purchasing a car to limit their exposure to other members of the public and avoid public transport where possible. Dealerships, large and small across the UK, need to be up and running as efficiently as possible to meet demands.” “TrakaMEC has been launched as a cost effective solution to help those aspiring to move to an electronic system as they grow in this new working environment. Traka Automotive is already the market-leading electronic key management solution provider amongst larger franchise and prestige dealerships brands. With the launch into mechanical, we’re making the upgrade path very easy and attractively-priced for dealerships to advance at their own pace.” Key management solution Each Supreme cabinet comes with a modern electronic Code Handle which can be programmed with nine user codes Each TrakaMEC Supreme cabinet is built with the highest quality Union ASSA ABLOY components including force resistant, anti-drill, anti-pick and anti-saw BS 5-lever mortice deadlocks for extra peace of mind and security. Additionally, each Supreme cabinet comes with a modern electronic Code Handle which can be programmed with nine different user codes to improve security. TrakaMEC Lite is a low cost and effective key management solution, designed to meet the needs of dealerships with less stringent security specification demands than TrakaMEC Supreme provides. TrakaMEC Lite cabinets are available with 50, 100 or 150 key capacity. Individual dealership requirements Paul concluded: “TrakaMEC customers can be assured at an uncertain time of getting the best of many worlds. They will receive a solution designed, made and supported by Traka; the global leader in access solutions dedicated to satisfying end user needs for security, safety and convenience. At the same time benefit from a highly cost-effective, outstanding quality mechanical product designed specifically for automotive customers that can be scalable to suit individual dealership requirements.”
UVeye has developed contact-free, emergency-vehicle inspection systems equipped with thermal sensors that not only can detect critical vehicle-safety problems, but also can identify drivers and passengers with fevers through vehicle windshields. UVeye is offering to equip health-related fleet operators with vehicle-inspection equipment on a not-for-profit basis during the current COVID-19 crisis. Ambulance and police fleets, as well as delivery services for food and medical equipment, all would be eligible for assistance. Maintaining vehicles in operating condition “Our technology can help fleet operators maintain their vehicles in safe operating condition without the need for hands-on testing or inspection,” said Amir Hever, UVeye’s Co-Founder and CEO. “As crisis conditions ease, we also will be able to assist car dealers, independent garages, and vehicle rental agencies in setting up inspection lanes that can ensure that their mechanics are not exposed to individuals that still might be infected with the virus.” Hever added that UVeye hoped its vehicle-inspection technology could assist federal, state, and local government officials who are attempting to speed up the process of identifying people infected by the COVID-19 virus. IR thermal-imaging technology UVeye's vehicle-inspection system help health-care professionals identify individuals who require COVID-19 tests or treatmentEquipped with infrared thermal-imaging technology to detect body temperatures from a distance of several meters or more, a UVeye vehicle-inspection system could help health-care professionals rapidly identify individuals who might require additional COVID-19 testing or treatment. Vehicle-inspection systems equipped with thermal sensors, for example, could be installed at emergency drive-through lanes set up at hospitals, health care facilities, and other community locations to test for potential coronavirus victims. Contactless inspection system Hever said that his company is prepared to help equip drive-through checkpoints in critical locations throughout the United States within the next week, adding that UVeye already has orders for the installation of contactless inspection systems with thermal sensor technology at several locations in both the UK and the U.S. Recognition UVeye is known throughout the world for the development of artificial intelligence systems to identify threats at security checkpoints and border crossings (UVIS), as well as to detect vehicle quality issues at dealerships and on new-car assembly lines. Headquarters and range With headquarters in Stamford, Connecticut, and Tel Aviv, UVeye currently is working with six major carmakers to install vehicle-inspection systems on assembly lines and at dealerships around the world. The UVeye executive noted that the company’s inspection equipment also can identify a wide variety of need-to-know mechanical problems and safety-related issues for vehicle owners. Artemis system and UVIS UVeye’s Helios (UVIS) underbody-inspection cameras can identify a wide range of safety issues The company’s Artemis system, for example, automatically checks tire quality. And UVeye’s Helios (UVIS) underbody-inspection cameras can identify a wide range of safety issues (UVIS), including brake line problems and potentially dangerous oil leaks. Atlas and Helios technology The company’s Atlas and Helios vehicle-inspection technology was shown for the first time in North America earlier this year at CES 2020 in Las Vegas. In addition to its own exhibit, UVeye’s technology also was featured in Honda’s CES display as part of the car company’s Xcelerator program designed to encourage new and transformative technology. Deep learning Originally developed for the security industry to detect weapons, explosives, illegal drugs, and other contraband, UVeye’s deep-learning technology is deployed globally at hundreds of high-security locations.
Palo Alto Networks, the global cybersecurity company, introduced Cortex™ XSOAR, an extended security orchestration, automation and response platform that empowers security leaders with instant capabilities against threats across their entire enterprise. Cortex XSOAR is an evolution of the Demisto® platform, which was acquired by Palo Alto Networks in March 2019. Threat intel data Palo Alto Networks is redefining the security orchestration, automation and response category by making threat intelligence management a core component. By tightly integrating threat intelligence management with SOAR capabilities — such as unified case management, automation and real-time collaboration — customers are now able to fully operationalize threat feeds. Bringing threat intel data into Cortex XSOAR means security orchestration just got simpler for the customer" “Customers are facing an overwhelming volume of alerts, threat intel sources, and security tasks,” says Lee Klarich, chief product officer for Palo Alto Networks. “Both SOAR and threat intelligence management have developed over recent years as tools to help them, but existing product silos have led to even more manual work. Bringing threat intel data into Cortex XSOAR means security orchestration just got simpler for the customer. It makes no sense to have SOAR without native threat intel.” Threat management into security orchestration “The integration of threat management into security orchestration and automation is an inevitable evolution for improving security operations,” notes Jon Oltsik, senior principal analyst and fellow at the Enterprise Strategy Group (ESG). “Cortex XSOAR brings the right pieces together. Until now, operationalizing vital threat intelligence data has been difficult or even impossible as it requires time, experience, and resources that are beyond the capabilities of many organizations. A platform like Cortex XSOAR acts as a security operations and analytics platform architecture, or SOAPA, for analyzing and operationalizing cyber threat intelligence. The benefit? Bringing the value of threat intel to the masses.” Cortex XSOAR With Cortex XSOAR, customers are able to: Standardize and automate processes for any security use case: Easily automate hundreds of security use cases with playbooks that orchestrate response actions across more than 350 third-party products. Adapt to any alert with security-focused case management: Accelerate incident response by unifying alerts, incidents and indicators from any source within a single case management framework. Boost SecOps efficiency with real-time collaboration: Facilitate investigations across teams via a virtual War Room with built-in ChatOps and command line interface to execute commands across the entire product stack in real time. Take action on threat intelligence with confidence and speed: Take full control of threat data by aggregating disparate sources, customizing and scoring feeds, and matching indicators against a customer’s specific environment, as well as leveraging playbook automation to drive instant action. Extending existing platform capabilities SOAR applied to threat intelligence can help fully integrate it into your incident response program""Threat intelligence without context is just threat data. In order for threat intelligence to be of use, the original context of the threat intel has to be applied appropriately and mapped to internal incidents and policies," says Michael Poddo, director, Cyber Threat Analysis & Response, Emerson. "However, doing this at scale and speed to keep pace with real-time threat feeds is tough without automation. SOAR applied to threat intelligence can help fully integrate it into all aspects of your incident response program." Cortex XSOAR will replace Demisto by Palo Alto Networks, subsuming and extending existing platform capabilities. Demisto customers will be migrated to Cortex XSOAR upon general availability, expected in March 2020, with an option to evaluate the new Threat Intel Management module at no additional cost.
Artificial Intelligence. You’ve heard the words in just about every facet of our lives, just two words, and they’re quite possibly the most moving, life-changing words employed in everyday conversations. So what exactly is AI, who currently uses it and should be using it? What Is AI? AI is a powerful way of collecting, qualifying and quantifying data toward a meaningful conclusion to help us reach decisions more quickly or automate processes which could be considered mundane or repetitive. AI in its previous state was known as “machine learning” or “machine processing” which has evolved into “deep learning” or, here in the present, Artificial Intelligence. AI as it applies to the security and surveillance industry provides us the ability to discover and process meaningful information more quickly than at any other time in modern history. Flashback - VCR tapes, blurred images, fast-forward, rewind and repeat. This process became digital, though continued to be very time-consuming. Today’s surveillance video management systems have automated many of these processes with features like “museum search” seeking an object removed from a camera view or “motion detection” to create alerts when objects move through a selected viewpoint. These features are often confused with AI, and are really supportive analytics of the Artificial Intelligence, not AI themselves. Machine Learning Fully appreciating AI means employment of a machine or series of machines to collect, process and produce information obtained from basic video features or analytics. What the machines learn depends on what is asked of them. The truth is, the only way the AI can become meaningful is if there is enough information learned to provide the results desired. If there isn’t enough info, then we must dig deeper for information or learn more, properly described as “deep-learning” AI. Translated, this means that we need to learn more on a deeper level in order to obtain the collaborative combined information necessary to produce the desired result. Deep Learning AI Deep learning AI can afford us the ability to understand more about person characteristic traits & behaviors. Applying this information can then further be applied to understand how to interpret patterns of behavior with the end goal of predictable behavior. This prediction requires some degree of human interpretation so that we are able to position ourselves to disrupt patterns of negative behavior or simply look for persons of interest based on these patterns of behavior. These same patterns evolve into intelligence which over time increases the machine’s ability to more accurately predict patterns that could allow for actions to be taken as a result. This intelligence which is now actionable could translate to life safety such as stopping a production manufacturing process, if a person were to move into an area where they shouldn’t be which might put them in danger. Useful Applications Of Intelligence Informative knowledge or intelligence gathered could be useful in retail applications as well by simply collecting traffic patterns as patrons enter a showroom. This is often displayed in the form of heat mapping of the most commonly traveled paths or determining choke points that detract from a shopper’s experience within the retail establishment. It could also mean relocating signage to more heavily traveled foot-paths to gain the highest possible exposure to communicating a sale or similar notice, perhaps lending itself to driving higher interest to a sale or product capability. Some of this signage or direction could even translate to increased revenues by realigning the customer engagement and purchasing points. Actionable Intelligence From a surveillance perspective, AI could be retranslated to actionable intelligence by providing behavioral data to allow law enforcement to engage individuals with malicious intent earlier, thus preventing crimes in whole or in part based on previously learned data. The data collection points now begin to depart from a more benign, passive role into an actionable role. As a result, new questions are being asked regarding the cameras intended purpose or role of its viewpoint such as detection, observation, recognition or identification. Detecting Human Presence By way of example, a camera or data collector may need to detect human presence, as well as positively identify who the person is. So the analytic trip line is crossed or motion box activated or counter-flow is detected which then creates an alert for a guard or observer to take action. Further up the food chain, a supervisor is also notified and the facial characteristics are captured. These remain camera analytics, but now we feed this collected facial information to a graphic processing unit (GPU) which could be employed to compare captured characteristics with pre-loaded facial characteristics. When the two sources are compared and a match produced, an alert could be generated which results in an intervention or other similar action with the effort of preventing a further action. This process- detect, disrupt, deter or detain could be considered life-saving by predictably displaying possible outcomes in advance of the intended actions. The next level is deep-learning AI which employs the same characteristics to determine where else within the CCTV ecosystem the individual may have been previously by comparatively analyzing other collected video data. This becomes deep-learning AI when the GPU machine is able to learn from user-tagged positive identification, which the machine learns and begins to further reprocess its own data to further understand where else the person of interest (POI) may have existed on the ecosystem and more correctly improve its own predictive capabilities, thus becoming faster at displaying alerts and better at the discovery of previously archived video data. The Future In conclusion, the future of these “predictables” wholly rests in the hands of the purchasing end-user. Our job is to help everyone understand the capabilities and theirs is to continue to make the investment so that the research perpetuates upon itself. Just think where we’d be if purchasers didn’t invest in the smartphone?
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change program, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programs continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessaccess to valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasize the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programs. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programs.
The way we purchase services and products is changing. The traditional concept of buying and owning a product is giving way to the idea that it is possible to purchase the services it offers instead. This approach has come from the consumer realisation that it is the outcome that is important rather than the tools to achieve it. For example, this approach is evident with the rise of music streaming services as opposed to downloads or physical products. With the physical security industry becoming ever more integrated – and truly open systems now a reality – there is every reason to assume this service-lead trend will come to dominate the way our industry interacts with its clients as well. Interest In Service-Based Security There is a significant change of mindset that the security industry needs to embrace before a large-scale move to Security as a Service can take place. Like many technology sectors in the past, security providers have focussed on ‘shifting boxes’ as their definitive sales model. This approach was especially prevalent when proprietary systems were the mainstay of the security industry. Essentially, if the customer wanted more services they simply bought a new product. This was a straightforward and economic sales approach for manufacturers and installers alike.The security industry needs to embrace a change of mindset before a move to SaaS can take place The flexibility of integrated and open technology has changed the way consumers view their purchase, so it shouldn’t be any surprise that there is increased interest in a service-based approach. Customer choice equates to a change of focus and interest, with physical products being eclipsed by the benefits of the overall solution. We have already seen these changes in other technology areas, notably with smart devices and general IT systems. Cloud-based services put the onus on the result rather than which device the user chooses. This approach is even starting to manifest in areas that couldn’t have been predicted in the past, such as the car industry for example. Consumers are focusing more on the overall costs and convenience of buying a car over the specific specification of the vehicle. Equally, urban dwellers don’t necessarily want the hassle and expense of owning and parking their own vehicle anymore. If you don’t use it every day, it can make more sense to rent a vehicle only when you travel beyond public transport. For these consumers the car has become a service item for a specific journey. Benefits For End Users At the heart of this approach is the simple equation that consumers have a need and suppliers need to provide the most cost-effective, and easiest, solution. At the same time, the security operator may not necessarily want to know (or care) what specification the system has, they just want it to perform the task as required. By discussing with consumers, we can ensure we work even more closely with them to provide the expert support they need and deserve Most security buyers will identify the specific business needs and their budget to achieve this. This is where a service approach really comes into its own. Customers need expert advice on a solution for their requirements which takes away the stress of finding the right products/systems. In the past there was always a risk of purchasing an unsuitable solution, which could potentially be disastrous. The other issue was having to budget for a big capital expenditure for a large installation and then having to find further resources once an upgrade was due when systems went end of life. Most businesses find it far easier to pay a sensible monthly or annual fee that is predictable and can easily be budgeted for. A service model makes this far easier to achieve. Great Opportunities As well as the benefits for end users, there are considerable benefits for security providers too. Rather than simply ‘shifting boxes’ and enduring the inevitable sales peaks and toughs this creates; a service sales model allows manufacturers and installers to enjoy a more stable business model. You don’t have to win new business with every product, but rather sell ongoing services for a set period. Its highly likely that the whole security industry will start to take this approach over the next few years. Manufacturers are already well aware of this shift in customer expectations and are changing their approach to meet demands.There are major opportunities on offer in return for a change of perspective in the security industry With the service and leasing approach already firmly entrenched in other industries, this is well proven in a consumer market. The airline industry is a great example. Manufacturers understand that airlines need flexibility to upscale and downscale operations and therefore whole aircraft and even individual key components (such as engines or seating) can be leased as required. Using this approach, airlines can concentrate on what customers demand and not worry about the logistics of doing this. Manufacturers and leasing businesses provide assurances and guarantees of service time for aircraft and engines, taking care of the servicing and maintenance to ensure this delivery. This approach is just as well suited for the provision of security systems. Servicing The Future Security Market Undoubtedly there are major opportunities on offer in return for a change of perspective in the security industry. However, this will involve substantial changes in some quarters to ensure the business model is aligned with the market. Overall, the security industry needs to not only develop the right systems for the market, but also to deliver them in the right way as well. This will ensure we work even more closely with customers to provide the expert support they need and deserve.
The cloud is here to stay. Its resilience and ability to connect the world during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at our articles in 2020 about the growing popularity of cloud solutions for physical security, with links to the original content. Product offering While most people agree on the definition of “cloud,” there are several points about the terminology that may require clarification. Private cloud or public cloud? VSaaS or unlimited storage for video? Beyond the basics, the terms become foggy, reflecting a variety of notions about how cloud services fit into the broader physical security marketplace. As cloud usage becomes more popular, it’s important that marketers be precise in their terminology, and that integrators and end users be diligent in understanding the specifics of available product offerings. Different meanings “The cloud has many different possible connotations, depending on the context,” says Yu Hao Lin of Rasilient Systems, one of our Expert Roundtable panelists. For example, corporate CIOs will more likely understand the cloud to be a private cloud platform. As such, the public cloud is a ubiquitous term while the private cloud is more specified. Cloud system security Security of cloud systems is an ongoing discussion in the industry, especially how cloud system cybersecurity compares to that of on-premise systems. Our Expert Panel Roundtable weighed in on this question. “While both kinds of security systems serve their purpose, it can be argued that the streamlined updates that are commonplace with cloud-based solutions may put them at more of an advantage when it comes to data security,” says panelist Eric Widlitz of Vanderbilt Industries. “Also, most reputable cloud-based solutions are running in secured data centers by companies such as Google, Microsoft, or Amazon, so you also get to take advantage of all the security layers they have protecting your data.” Hybrid cloud video security solution A growing list of cloud players reinforces the importance of the cloud in the future of physical security There are several relatively new companies pushing cloud in a big way. Verkada is fast-growing company currently currently focusing to deliver an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. The growing list of cloud players reinforces the importance of the cloud in the future of physical security. Combining AI and cloud video One company investing in the cloud is Eagle Eye Networks, which has raised $40 million of Series E funding from venture capital firm Accel to finance the realization of their vision to combine AI and cloud video. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end-users,” says Ken Francis, President. Eagle Eye offers an application programming interface (API) to enable the integration of best-in-breed third-party AI and analytics systems to leverage the video. Eagle Eye is also investing in its own AI development and hiring additional development and customer service personnel. Hirsch Velocity Cirrus and MobilisID Identiv introduced the Hirsch Velocity Cirrus cloud-based Access Control as a Service (ACaaS) solution and MobilisID smart mobile physical access control solution. Hirsch Velocity Cirrus is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. Advantages and disadvantages Advantages of cloud-based physical security technologies are many, when supporting staffThe advantages of cloud-based physical security technologies are many, and have wide-ranging applications for all areas of the transport sector; across stations, transport hubs, and vehicles. When used to support staff and complement existing processes, such systems can prove invaluable for transport professionals in helping to create a safer working environment, promoting confidence among personnel and passengers, and assuring passengers who are fearful about the current pandemic that all possible precautions are being taken during their journey. 5G supporting cloud-based applications 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Increasing use of IoT Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate.
The global pandemic caused by the novel coronavirus is changing work environments to an unprecedented degree. More employees than ever are being asked to work remotely from home. Along with the new work practices comes a variety of security challenges. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Covid-19 concerns Concerns about the coronavirus have increased the business world’s dependence on teleworking. According to Cisco Systems, WebEx meeting traffic connecting Chinese users to global workplaces has increased by a factor of 22 since the outbreak began. Traffic in other countries is up 400% or more, and specialist video conferencing businesses have seen a near doubling in share value (as the rest of the stock market shrinks). Basic email security has remained unchanged for 30 years Email is a core element of business communications, yet basic email security has remained unchanged for 30 years. Many smaller businesses are likely to still be using outdated Simple Mail Transfer Protocol (SMTP) when sending and receiving email. “The default state of all email services is unencrypted, unsecure and open to attack, putting crucial information at risk,” says Paul Holland, CEO of secure email systems provider Beyond Encryption. “With remote working a likely outcome for many of us in the coming weeks, the security and reliability of our electronic communication will be a high priority,” says Holland. The company’s Mailock system allows employees to work from any device at home or in the office without concerns about data compromise or cybersecurity issues. Acting quickly and effectively As the virus spreads, businesses and organizations will need to act quickly to establish relevant communication with their employees, partners and customers surrounding key coronavirus messages, says Heinan Landa, CEO and Founder of IT services firm Optimal Networks. Employers should also enact proper security training to make sure everyone is up to speed with what’s happening and can report any suspicious online activity. Reviewing and updating telework policies to allow people to work from home will also provide flexibility for medical care for employees and their families as needed. Scammers, phishing, and fraud An additional factor in the confusing environment created by the coronavirus is growth in phishing emails and creation of domains for fraud. Phishing is an attempt to fraudulently obtain sensitive information such as passwords or credit card information by disguising oneself as a trusted entity. Landa says homebound workers should understand that phishing can come from a text, a phone call, or an email. “Be wary of any form of communication that requires you to click on a link, download an attachment, or provide any kind of personal information,” says Landa. Homebound workers should understand that phishing can come from a text, a phone call, or an email Email scammers often try to elicit a sense of fear and urgency in their victims – emotions that are more common in the climate of a global pandemic. Attackers may disseminate malicious links and PDFs that claim to contain information on how to protect oneself from the spread of the disease, says Landa. Ron Culler, Senior Director of Technology and Solutions at ADT Cybersecurity, offers some cyber and home security tips for remote workers and their employers: When working from home, workers should treat their home security just as they would if working from the office. This includes arming their home security system and leveraging smart home devices such as outdoor and doorbell cameras and motion detectors. More than 88% of burglaries happen in residential areas. When possible, it’s best to use work laptops instead of personal equipment, which may not have adequate antivirus software and monitoring systems in place. Workers should adhere to corporate-approved protocols, hardware and software, from firewalls to VPNs. Keep data on corporate systems and channels, whether it’s over email or in the cloud. The cyber-protections that employees depended on in the office might not carry over to an at-home work environment. Schedule more video conferences to keep communication flowing in a controlled, private environment. Avoid public WiFi networks, which are not secure and run the risk of remote eavesdropping and hacking by third parties. In addition to work-from-home strategies, companies should consider ways to ensure business cyber-resilience and continuity, says Tim Rawlins, Director and Senior Adviser for risk mitigation firm NCC Group. “Given that cyber-resilience always relies on people, process and technology, you really need to consider these three elements,” he says. “And your plan will need to be adaptable as the situation can change very quickly.” Employees and their employers Self-isolation and enforced quarantine can impact both office staff and business travelers Self-isolation and enforced quarantine can impact both office staff and business travelers, and the situation can change rapidly as the virus spreads, says Rawlins. Employees should be cautious about being overseen or overheard outside of work environments when working on sensitive matters. The physical security of a laptop or other equipment is paramount. “It’s also important to look at how material is going to be backed up if it’s not connected to the office network while working offline,” says Rawlins. It’s also a good time to test the internal contact plan or “call tree” to ensure messages get through to everyone at the right time, he adds.
A Japan based technological enterprise is working towards the formation of a technology corporate group. The company’s technologically advanced products include a diverse range of products that are used on land, sea, air and even space. The company offers a range of environmental and recycling plants, industrial plants to automobile and infrastructure equipment. And at every step, Kawasaki pays the utmost attention to humankind and the environment. This century old company has been able to establish a firm foundation as a technological enterprise. The company’s automobile division, which makes it one of the pioneer automobile companies, is spread on a global scale. Crystal Clear Images They also wanted to monitor how the employees interacted with customers, cleanliness of the premises The company having franchise stores operated by respective owners in India was concerned about the consistency in branding and customer service across these stores. They wanted a solution that could enable them to view the stores from a central location, specially the front end where their premium vehicles were displayed. They also wanted to monitor how the employees interacted with customers, cleanliness of the premises, whether the products were displayed in the right order, branding in the store and other process compliances. But at the same time, they did not want to invest in recorders as the numbers of cameras at individual locations were very limited. Matrix installed high resolution IP cameras at each store. These cameras provided crystal clear images of every corner of the store. This enabled the company to monitor every aspect of brand management such as order of vehicles, customer service, cleanliness, behavior of employees, etc. Geographically Separated Locations A Matrix NVR was placed at the central location, and all the cameras from different locations were connected to itCameras were installed at each location based on the requirement and connected to a network switch with the help of CAT6 cables. Since there was a private connectivity between all the geographically separated locations of the company, all cameras at various locations were configured locally with VPN functionality (same class of IP address), and were viewed at a central location without port forwarding. A Matrix NVR was placed at the central location, and all the cameras from different locations were connected to it. This allowed streams from all twelve locations to be viewed on a single screen. In this way, Matrix helped the automobile giant maintain process compliance in its stores throughout the country. Centralized Control Better Brand Management Elimination of Compliance Check Costs Enhanced Security Employee Discipline Matrix products used: SATATYA CIBR13FL40CW: 1.3MP IP BULLET CAMERA SATATYA CIDR13FL40CW: 1.3MP IP DOME CAMERA SATATYA NVR24P: 24-CHANNEL NETWORK VIDEO RECORDER WITH 6TB STORAGE SUPPORT
The 9th BRICS Summit was successfully held in Xiamen, China from September 3rd-5th, 2017, where leaders of the five member-countries were in attendance. Building on its success in providing a comprehensive security solution for the G20 Hangzhou Summit in 2016, the 9th BRICS Summit was yet another accomplishment for Dahua. The 2017 BRICS Xiamen Summit demanded high-level protection for national leaders from Brazil, Russia, India, China, and South Africa. As Xiamen’s city center is located on an island, the security system required comprehensive surveillance of all roads leading into the area, also known as the “Four Bridges and One Tunnel” network.Dahua provided 1723 bullet cameras, 379 PTZ cameras, 226 vehicle checkpoint cameras, 116 Face Recognition cameras, 10 mobile 4G PTZ cameras Protection Through Dahua Technology In addition to roads leading into the city, routes to and from the airport, hotels, and the Xiamen International Conference & Exhibition Center needed to be protected as well. A solution of this proportion would also require an advanced, automated, and centralized system to ensure efficient, coordinated responses. With its cutting-edge IP camera, video cloud, network storage, and transmission technologies, Dahua was up to the task of securing Xiamen and the BRICS venues. In total, Dahua provided 1723 bullet cameras, 379 PTZ cameras, 226 vehicle checkpoint cameras, 116 Face Recognition cameras, 10 mobile 4G PTZ cameras, and many other advanced Dahua products and services used in various areas of the city. The BRICS security command center, administered by the Public Security Department of the Xiamen, was fitted with a Dahua visual emergency dispatch and command system. The center’s large display wall was stitched together with Dahua edgeless HD LED panels, enabling a complete picture of all units under command center control during the meeting, greatly simplifying control and responses. The security system surrounding the Xiamen International Conference & Exhibition Center as well as the visual emergency dispatch and command system in the security command center both adopted a full range of Dahua video surveillance and display solutions. Dahua employed advanced technologies such as intelligent analysis and big data, to increase the efficiency of emergency command and management capabilities Live Video Security On The Road A customized Dahua Mobile Solution with GPS positioning and in-vehicle wireless image transmission system was installed on 228 patrol cars and 72 special cars from the Xiamen Public Security Bureau, which was used to clear the way for Summit leaders. This provided the command center with a continuous live overview of all areas while providing support for the handling of various emergencies. Dahua contributed to the security of other key areas including the Xiamen Airport, train station, ferry piers, and police checkpoints In order to secure “Four Bridges and One Tunnel” access points, Dahua employed advanced technologies such as intelligent analysis, big data, and video analytics to significantly increase the efficiency of emergency command and information technology management capabilities, providing uninterrupted HD video surveillance and smart road event monitoring on bridges and tunnels. In addition, Dahua also contributed to the security of other key areas including the Xiamen Airport, train station, ferry piers, and police checkpoints. In surrounding Haicang and Jimei districts, Dahua constructed video surveillance on routes and sites which held key activities in the city, achieving full coverage of places such as guarded routes, main roads, key sites, as well as surrounding areas and regions of elevated risk. Dahua Securing Public Safety Dahua also played a role in safeguarding conference-related affairs such as catering, accommodation, and travel. The hotels in which leaders stayed in and surrounding areas were upgraded to HD systems in a short amount of time, making sure the leaders were secure while they rested during the Summit. The mobile law enforcement surveillance system assisted the Xiamen Market Supervision Commission in guaranteeing the provision of safe food during the Summit. The three day BRICS Summit concluded without a hitch. National leaders and their delegations were able to smoothly move about the city and attend the conference while Dahua products prevented threats through a vast network of smart video technologies. In addition, the large-scale project significantly upgraded Xiamen’s city surveillance system and provided a long-term foundation for not only public security-related operations, but also broader public projects such as the Xiamen Wireless Image Transmission System.
The Sinan Erdem Dome is the largest multi-purpose indoor venue in Turkey. Located in Istanbul, the dome has a seating capacity of up to 22,500, and hosts a number of events, including concerts, tennis matches, and basketball games. Strengthening Stadium Security Upon being chosen to host a number of games during the European Basketball Championships 2017, the chief European men’s international basketball competition held biannually, the Sinan Erdem Dome looked to strengthen their security system. The dome’s large-scale presented high-surveillance requirements such as support for 64 split-screens, hundreds of cameras, and a back-end storage and management infrastructure that could support the entire system. Dahua provided the dome with a complete, high-end monitoring system that included a total of over 600 IP, speed dome, and ANPR cameras on the front-end, and NVRs, video walls, video matrix devices, and related control accessories on the back-end. Smart Detection Technologies The dome’s surveillance system was constructed with the latest cutting-edge technology To better protect the stadium from a variety of threats, the solution employed a number of smart detection technologies such as intelligent analysis, which includes motion detection, tripwire, intrusion, and smart-tracking functionality. ANPR was also utilised, which recognises license plates numbers and checks them against a central whitelist and blacklist. Plate records are also stored on NVR devices and can be searched through by security officers. In less than a week, the local team completed installation, testing, and customer training, and the dome was fully ready to securely host international sporting events. Protecting All Corners In under a week, the dome’s surveillance system was constructed with the latest cutting-edge technology, increasing its appeal to international events seeking venues. Dahua smart technologies automated a great number of surveillance operations, such as automatic car-barrier operation enabled by ANPR camera integration, thus greatly reducing the strain on security workers. Every corner of the stadium was covered by Dahua cameras providing high definition video, ensuring zero blind spots and optimal detail collection. In addition, Dahua showcased its customer-centric philosophy through supplying high-quality customization, technical support, operation training, and after-sales service, which guaranteed the expertise of system operators as well as long-term reliability and quick issue resolution.
The Salzburg Festival is considered the world’s finest drama and classical music festival. Siemens has equipped the specially built opera houses with state-of-the-art technology with advanced systems to ensure the perfect balance of comfort, safety and security. Founded in 1920 by theater director and producer Max Reinhardt, the Salzburg Festival has grown into a cultural event of international stature. Today nearly 260,000 visitors attend the 14 performance venues where over 200 events take place each year. Cutting-edge technology ensures utmost comfort, maximum safety and security, as well as first-class acoustics. The facilities are equipped with building automation, sound systems, stage management consoles, fire detection technology, access control and evacuation systems. Advanced Fire Safety And Access Control The fire detection system delivers maximum safety. Over 1,800 detectors monitor the many different areas throughout the festival halls. Linear detectors, flame detectors and smoke extraction systems offer high level protection of the audience and stage areas. Festival managers also have the advantage of central control and an integrated guard tour system. In an emergency, everyone on site is given clear instructions via a voice alarm system on how to exit the building safely and securely. A Siport access control system ensures that only authorized personnel gain access to the secure areas of the festival halls. Approximately 7,000 photo ID cards are issued across the site every summer across the workforce to personnel such as performers, stage technicians and administrative staff. The photo ID cards cannot be counterfeited as a special security overlay with holographic printing prevents tampering. The same card is also used for time and attendance and cashless vending in the cafeteria. Cameras enable the stage manager to monitor the stage area and other key locations Monitoring And Managing Safety And Security The stage manager is in charge of the overall coordination at the festival. This includes a wide range of procedures such as monitoring the action on stage, alerting performers in their dressing room and issuing light signals. During the performance, all the threads converge on a specially designed stage manager console, complete with touch screen for maximum ease of use. Cameras enable the stage manager to monitor the stage area and other key locations. In an emergency, the stage manager can contact the relevant services and first responders as well as organize safe evacuation over the public-address system. More than 300 loudspeaker circuits were installed for these tasks in the Mozart House and the Felsenreitschule alone. The Great Festival Hall is still being modernized, however once the work is finalized, approximately 400 loudspeaker circuits will ensure smooth operations in this one venue. Digital Sound System Network A digital network was set up to improve the acoustics in the festival halls. The sound systems and all the required components for the stage and audience arena were also provided by Siemens. Fiber-optic cables transmit all the audio data and control information digitally to the three venues. The system uses a digital time division multiplex process. Each one of the base units used has an audio data bus with 256 time slots, which carry 256 signals simultaneously. Computer-controlled loudspeakers and equalizers ensure that every audience member hears the sound not only at the same time but at the same quality. The system is self-diagnostic and as soon as a malfunction occurs, it sends relevant information to the appropriate personnel. All stakeholders benefit from the new technology; the management team, employees, performers, and audiences Climate Control System Precise control of the interior temperature and humidity is particularly important in a festival hall, so that both audiences and artists can experience the performance in comfort. To achieve this objective, Siemens designed a sophisticated climate control system using natural resources. The Alm River flows under the city of Salzburg and cold water is rerouted underneath the Great Festival Hall and used for air conditioning to maintain a temperature of 23 degrees Celsius and a humidity of 55 per cent in the concert hall. This automation system also controls ventilation and delivers fresh air to the concert halls continuously and quietly. A management station monitors more than 6,000 data points and will report the slightest disruption or deviation from the specified values to ensure continuity. Integrated Technology Solutions With a unique, integrated solution that monitors room temperature, humidity, acoustics, stage manager systems, fire detection and access control, Siemens has added considerably to the safety, security and comfort of the internationally renowned Salzburg Festival. The cutting-edge technology guarantees the best acoustics, optimal room temperature and climate, reliable fire safety, controlled access and state-of-the-art evacuation. All stakeholders benefit from the new technology; the management team, employees, performers, and audiences.
The gates that give access to the campus are equipped with Nedap long range vehicle identification readersHindustan Unilever Limited (HUL), the largest Fast Moving Consumer Goods Company in India, has chosen Nedap's security management system AEOS to secure its new corporate office in Mumbai.The Indian subsidiary of Unilever recently moved its corporate office within the city of Mumbai to a new ultramodern campus, which is spread over 12.5 acres of land and will house over 1600 employees. The campus offers various facilities to employees including convenience stores, a library, a food court, an occupational health centre, a gym and a day care centre. The idea behind the move was to integrate various business processes under ‘One HUL Campus' and to concentrate the divisions of the organization in one place.Considering that a state-of-the-art campus needs a state-of-the-art security solution, HUL decided to choose Nedap AEOS as the company's security management system. To make sure that the company's intelligence is well protected, approximately 120 doors are secured with AEOS, whereas the gates that give access to the campus are equipped with Nedap long range vehicle identification readers. Furthermore, AEOS visitor management has been implemented including the pre-registration of visitors by HUL employees. The AEOS system was implemented by Nedap's business partner in Mumbai.Nancy Wanders, Business Development Manager Asia/Pacific at Nedap, says: "This project perfectly shows the extensive possibilities of the AEOS system. Thanks to its open architecture, the functionality of AEOS is freely configurable, creating a very flexible system that can be easily adjusted to changing security needs."
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Six Things To Look For When Adding AI Cameras To Your OperationDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload