Dahua Technology, a renowned, video-centric provider of smart IoT solutions, announced a major rebranding to reflect the company’s growth and evolution within the North American video surveillance market. WizSense (pronounced “Wise Sense”), Simplified Analytics for Accurate Results, and WizMind (pronounced “Wise Mind”), Advanced Analytics for Ultimate Performance, will be sub-categories under Dahua’s Analytics+ umbrella. Each line encompasses existing product...
LexisNexis® Risk Solutions releases its biannual Cybercrime Report, which tracks global cybercrime activity from January 2020 through June 2020. The report dives deep into how the COVID-19 pandemic has impacted the global digital economy, regional economies, industries, businesses and consumer behavior. The period has seen strong transaction volume growth compared to 2019 but an overall decline in global attack volume. This is likely linked to growth in genuine customer activity due to chan...
Allied Universal®, a security and facility services company in North America, announced the acquisition of New Jersey-based Service Works Inc. (SWI) – a security and IT infrastructure integrator in the tri-state area offering turnkey and custom solutions to clients nationwide. The terms of the deal were not disclosed. “The acquisition of SWI will help us expand our advanced technology services in the greater New York city market and nationally,” said Steve Jones, Chairman...
Dahua Technology, a globally renowned video-centric smart IoT solution and service provider, made new breakthroughs in the field of AI technology recently. Various indicators of its Gait Recognition Technology have once again broken the record of CASIA-B gait dataset: the average accuracy of Rank1 for NM (normal walking), BG (with a bag) and CL (in a coat) reached 97.4%, 94.0%, and 87.0% respectively, hitting another historical heights and maintaining its pioneering position. Gait recognit...
Calculating video storage can be a challenge, especially with the widespread use of higher megapixel cameras, which can quickly consume storage space while bandwidth constraints can impact video clarity. Because of this, it’s important to consider a few factors when determining video storage needs. First, the number of cameras that will be part of the system and the resolution of each camera. Second, the amount of archived video the customer will store and the duration. Some end-users nee...
The massive explosion that shook Beirut on August 4th had a devastating impact on Lebanon and its citizens, killing at least 180 people and injuring thousands. At the same time, tens of thousands of the city’s residents were left homeless after the blast destroyed their houses and properties. International organizations and peacekeepers from all over the world have reached out to send daily necessities and medical supplies to the region and assist in the reconstruction of the affected area...
sync., a UK money management app innovating the Open Banking space and aiming to make money management beautiful, simple and accessible to everyone, has officially announced their partnership with ComplyAdvantage. Growth across FinTech sector Growth across the FinTech (Financial Technology) sector has led to increased competition and innovation in financial services, resulting in a rise of disruptive companies, such as, sync. leading the way in Open Banking. sync. is an exciting new Open Banking service that combines a host of financial services into one beautifully designed app. The all-in-one hub allows customers to open a sync. account in minutes and link all their existing bank accounts and cards in a clear dashboard, giving consumers a much clearer picture of their finances. Next-gen financial security features sync.’s multi-currency functionality means cardholders can exchange currencies without incurring foreign exchange fees Next-generation security features, including generating new CVC numbers via the app, a hidden magnetic strip on the card, and advanced in-app controls make sync. one of the most secure debit cards on the market. sync.’s multi-currency functionality means cardholders can exchange currencies without incurring costly foreign exchange transaction fees, every time they make a purchase and use their sync. X card all around the world. Innovative AML solution provider To support their growth ambitions, sync. was on the lookout for a partner that was a trusted, innovative AML solution provider, offering rich technology to tackle financial crime with a real-time database. ComplyAdvantage’s solution is recognized by UK regulators, which has helped sync. through their journey to obtain regulatory licensing with robust programs that protect their business and clients. Flawless monitoring system The partnership provides sync. with a flawless monitoring system that allows them to be fully compliant with anti-money laundering and anti-fraud obligations. The front-end configurability of the ComplyAdvantage tool allows sync.'s compliance and risk management to perform more effectively. “ComplyAdvantage’s vision is to take on and neutralize the risk of money laundering, terrorist financing, corruption and all other global financial crimes,” said Charles Delingpole, Founder & CEO of ComplyAdvantage, adding “We are always excited to partner with other innovative products and provide our scalable solutions to sync., as they expand.” Adding enhanced security options Ricky Lee, Founder of sync., said, “Security is incredibly important to us at sync., whether that is adding enhanced security options to our product, like our cards without printed CVC numbers or ensuring we are completely AML and CTF compliant.” “We’re proud to have a partner that is as fast-moving as ComplyAdvantage. Their real-time updates and new innovative features mean that our AML and CTF monitoring is always the best it can be.”
Interface Security Systems, a service provider delivering business security, managed network, and business intelligence solutions to distributed enterprises, announces it is expanding its Interactive Remote Video Monitoring services with a new highly-affordable Virtual Security Guard Monitoring package designed specifically for small and mid-sized businesses (SMBs) and enterprises with moderate security challenges. With installation costs starting at just $2,500, companies are now able to protect their employees, customers, and assets with the help of trained security professionals monitoring their premises with live video and two-way audio. Trained intervention specialists With Virtual Security Guard, businesses such as retailers, restaurants, banks, hotels, and more, will be able to rely on Interface’s advanced technology and trained Intervention Specialists to immediately intervene in the event of shoplifting, robberies, customer arguments, and any other emergency or potentially volatile situation. “We are seeing increased demand from SMBs and enterprises across a range of verticals for advanced security solutions as they embrace new business models and face heightened security concerns,” said Brent Duncan, Chief Revenue Officer at Interface Security Systems. “With our Virtual Security Guard solution, businesses can ensure employee and customer safety, reduce shrink, and lower insurance and guard costs.” Intrusion alarm monitoring The low-cost Virtual Security Guard package gives customers the flexibility to rapidly roll out a security solution Available immediately, the new low-cost Virtual Security Guard package includes intrusion alarm monitoring, interactive live video and two-way audio monitoring, up to eight video cameras, and one audio zone. Every alarm will be verified with live audio and video to reduce false alarms. Businesses have the option to leverage their existing security cameras and network connectivity infrastructure to make the solution even more cost-effective and easy to implement. The low-cost Virtual Security Guard package gives customers the flexibility to rapidly roll out a security solution and then graduate to a more advanced version of the service based on threat levels or to accommodate business expansion. Video monitoring solutions Enhanced services include remote guard tours, scheduled announcements, and operational compliance audits. Customers can also upgrade to a full suite of interactive video monitoring solutions that come with extensive video camera coverage, multiple audio zones, on-demand security escorts, and smart personal safety devices. Businesses interested in exploring the Virtual Security Guard service can take advantage of a complimentary security risk assessment that includes a free site survey for a limited time.
IP audio and control innovator Barix is bringing its IP paging and intercom expertise to large broadcast and emergency response networks with RackBox, a universal cloud-based, any-to-all platform for widespread delivery of critical messages. Initially custom-developed for a large national US TV broadcaster, Barix has now productized RackBox to serve a broader set of paging and intercom needs inside and outside the broadcast industry. In addition to TV and radio networks, RackBox is ideal for professional alarm and notification applications over military, emergency response and business networks that serve many locations. RackBox’s single-button user interface enables immediate delivery of important messages to all stations over local and wide-area networks — “push to talk” in its purest form. Transmitter and receiver RackBox systems are infinitely scalable, with each device programmable as a transmitter, receiver, or both. Using independent, ultra-reliable Barix AudioSpread devices, the system replicates the live stream globally to receivers anywhere without depending on multicast or complicated configurations. An optional management portal supports real-time monitoring and central configuration. RackBox’s robust hardware ensures constant availability, assisted by redundant power connections, and the system layout can be set up using dual-network paths while seamlessly integrating with an organization’s central IT infrastructure. Its limited bandwidth requirements, low latency, and standards compliance make the RackBox system ideal for use on existing IT infrastructure. Remote monitoring and cloud “RackBox represents our latest advances in cloud-based replication and remote monitoring technology to serve a broad variety of universal communication requirements,” said Johannes Rietschel, CTO and Founder, Barix. “As one of the first vendors to innovate paging and intercom solutions for use on IP networks nearly 20 years ago, Barix brings reliable emergency communications over the network to a global scale with RackBox, along with the cost-savings that come from transitioning to IP from satellite for widespread communications.” The transition from satellite-based communications has been especially appealing to broadcasters who have been using similar satellite-based systems for decades. RackBox allows broadcasters to quickly communicate critical information, breaking news, and operational info across its complete network of stations, using available, low-cost IP networks. Critical Communication RackBox provides the same value and benefits for emergency messaging over fire and police networks, and also allows communicating critical messages across enterprise networks. Rietschel cites banking networks that want to quickly communicate important financial and stock market updates as one application of interest within the enterprise business community. The 19-inch 1U RackBox integrates Barix’s IPAM400 IP Audio module at its core, with support for multiple audio formats, interfaces, and IP-based streaming and control. The Linux-based programmable module adopts the latest standards, allowing users to comfortably operate RackBox on standard IP networks as well as the public Internet.
Bold report their new Gemini CCTV monitoring platform release includes new integrations and features to enhance the monitoring control room user experience and in response to the latest technology. These include the addition of three new CCTV system interfaces and a number of feature enhancements. March Networks, which operates in government, retail, education and banking sectors, amongst others, joins Mirasys VMS and Hanwha Techwin, formerly Samsung, along with many existing CCTV integrations. Gemini can be deployed in the cloud or on local servers as required. New features in the latest release include - direct camera import to save having to add cameras manually and rekeying descriptions, camera views and alarm zones integration, Hikvision DeepinMind object identifier, site polling, batch contacts editing, SMS dynamic messaging and broadcasts, and intelligent alarm signaling processing to dramatically reduce duplicate and false alarms.
In the era of the smartphone, Bluetooth Low Energy (BLE) is transforming the future of access control. This removes the need for a physical card or tag and replaces it with a secure Bluetooth credential that communicates with the reader to grant or deny access. As a fast follower of this technology, Vanderbilt will be introducing: A range of BLE readers A contactless door release button in the same look & feel as the Bluetooth readers Virtual credentials available through ACTpro Software license, including 1 FREE demo credential FREE end-user app for Android and iOS The BLE readers and accessories work exclusively with the new release of ACTpro Software V2.10. Bluetooth Card Readers BLE hardware with Vanderbilt software Vanderbilt virtual credentials purchased via a software license Wiegand & RS485 interface options Compatible with MIFARE Classic & MIFARE DESFire EV1, EV2 Compatible systems: ACT Enterprise (ACTpro Software) Bluetooth virtual credentials Smooth Migration: Reduce the total cost of ownership by extending the life of existing ACTpro system controller and hardware, while allowing a smooth migration to cellphone credentials. Save Time & Money: Cellphone credentials are time and cost-effective alternatives to managing physical credentials. Easy Management: Creating, deploying, and the management of access rights can be carried out by the administrator directly in ACTpro Software for easy management. Customer Convenience: Bluetooth removes the need for a physical credential and replaces it with a virtual credential for smartphone devices that provides customers with a smooth user experience. Secure: Data encryption with 128bit AES encryption and randomization. This encryption is the same grade used by banks and hospitals. Future-proof investment: The Bluetooth readers also act as a traditional card reader. This means users can continue using MIFARE cards and slowly migrate to the Bluetooth virtual credentials at their own pace. The total cost of ownership: In comparison to other brands in this area, Vanderbilt is offering a one-off license purchase as opposed to a subscription-based model that would include annual charges per virtual credential. Instead, the company's approach means the users will have no hidden or extra costs and make big savings in the long-term. Distribute virtual credentials A Bluetooth reader and the ACTpro software are used to add and distribute virtual credentials, much in the same way as a traditional physical card or tag is allocated to an employee or visitor. How it works? The end-user downloads the Vanderbilt Bluetooth app, and registers for a credential with the system administrator (i.e., receptionist, facilities manager, etc.). Authorization can be granted both offline and online. The system administrator reviews and processes the request. This, in turn, sends the end-user a QR code that they save to their smartphone and link to their app to generate their credential. The end-user then uses the credential (via the app) when approaching doors with Vanderbilt BLE readers to gain access. Unique user experience with 2 identification modes for easy management: “Shake to Go” or “Show to Go”. IP65 water-resistant with waterproof electronics. Easy to install and use with enrollment software in ACTpro.
Globally renowned video surveillance and technology solutions firm, IDIS is targeting video projects in resilient Middle East market sectors, including banking, grocery retail, and education, as it looks to build on recent successes, delivering compliance-driven solutions. Despite continuing disruption and uncertainty in the world economy, the company says the outlook is positive in the region as it supports its systems integration partners to focus on both resilient sectors and markets showing continued growth. Video tech projects in the education sector The Korean video technology solutions provider, which is known for its end-to-end solutions, highlights opportunities for video tech projects in the education sector, where it already has successful deployments in the Middle East countries of Kingdom of Saudi Arabia and Kuwait. The education sector continues to expand through investment from private equity firms and government funding" “The education sector continues to expand through investment from private equity firms and government infrastructure funding, as well as international higher education institutes expanding their presence in the Middle East and North Africa regions,” said Jamil Al Asfar, Senior Sales Manager, IDIS Middle East & Africa. IDIS video technology in banking sector In the banking sector, major investments in more robust video surveillance infrastructure, over the last three years, have been largely driven by compliance pressure, as more and more banks look to meet ever more stringent government standards. IDIS video technology has already been deployed to protect more than 3,000 bank branches and ATMs for the National Commercial Bank in the Kingdom of Saudi Arabia and was chosen to secure the Central Bank of Jordan. Both projects demonstrated the benefits of robust, cyber-secure technology and proved how compliance can be delivered at good pace, even on a challenging scale in difficult environments. Video technology expansion in financial and retail sectors With IDIS video solutions fully compliant with requirements in the financial sector, including the gold-standard Saudi Arabia Monetary Authority (SAMA) regulations, upgraded projects are driving strong activity for the company and its integration partners in the Kingdom of Saudi Arabia (KSA), Jordan, Egypt, Morocco, and Pakistan. In the grocery and retail sector, Carrefour’s recently reported expansion across the Middle East, and its choice of IDIS video tech, has paved the way for further opportunities, including for projects in hypermarkets. In-depth experience in retail sector Alongside our integration partners, IDIS has in-depth experience of retail applications globally" IDIS Middle East & Africa, Senior Sales Manager, Al Asfar stated, “Alongside our integration partners, IDIS has in-depth experience of retail applications globally and we are focusing on continuing demand for not just affordable video, but for scalable solutions that offer advanced analytics and deep learning tools. These will help stores compete in the current tough trading conditions and into the future too.” SIRA certification for IDIS cameras and NVRs Al Asfar adds, “In addition, Security Industry Regulatory Agency (SIRA) certification for the latest range of IDIS cameras and NVRs also means we are gaining momentum in commercial, residential and government sectors across the UAE. In Dubai, we have seen construction and re-development rapidly bounce back, and all these new facilities need compliant, cyber-secure and resilient video tech to ensure public safety and security.” “Despite the undoubted economic challenges in some sectors, we are still seeing strong demand for video solutions that combine low total cost of ownership (TCO), high performance, and robust cyber security standards, and that meet compliance needs,” said, Ahmad Shanawani, Managing Director, Ametrad Technology Services. Ahmad adds, “We are now seeing how much IDIS end-to-end solutions and the company’s collaborative approach are suited to the growth projects we are working on.”
The explosive expansion of IT infrastructure has led to the identity and access management market gaining substantial momentum. As the onslaught of information technology continues, organizations are able to offer users quick and easy access to systems and information from any place, at any time. However the ease of access is inherently associated with the risk of security breach. Organizations have to find a balance between fulfilling user demands and doing so in a manner that is safe enough so that cybercriminals cannot take advantage of the system, thus strengthening identity and access management market trends. The prominence of IAM solutions in the BFSI sector In 2016, the world was shocked by the news of the Bangladesh bank heist in which cybercriminals were successful in conducting unauthorized money transfer from Bangladesh Central Bank to banks in Philippines, Sri Lanka and other parts of Asia. In the heist, criminals used Society for Worldwide Interbank Financial Telecommunication (SWIFT) credentials of Bangladesh Bank's employees to carry out more than three dozen fraudulent transactions and extracted $81 million from Bangladesh Central Bank. More than three dozen fraudulent transactions and extracted $81 million from Bangladesh Central Bank. More recently in 2018, hackers were able to siphon nearly $20 million from Mexican banks. Analysts point out that targeted bank systems had security holes that made access to internal servers much easier. Also lack of strong access controls was used by hackers to use credentials of compromised employee to gain considerable mileage in the siphoning. Identity and access management industry has therefore registered a lot of interest through the financial sector and banks as financial institutions need to prove themselves reliable of customers’ trust. Banks and other financial institutions are rapidly adopting identity and access management solutions which are capable of providing strong security starting at authentication level and extending all the way to application and data layers. IAM solutions make it possible for financial institutions to integrate new applications and deploy to cloud with greater ease and rapidity. With versatile hybrid deployment model provided by leading IAM solutions, connectivity to SaaS applications as well as legacy enterprise web applications happens more quickly as well as securely. IAM solutions make it possible for financial institutions to integrate new applications and deploy to cloud The significance of cloud and its impact on IAM market outlook Just as the banking sector is facing the challenge of identity authentication as customers around the world are demanding any time access, the proliferation of IoT and cloud technologies is changing the very texture of the society in multiple ways. With advancement in IoT technologies, the advent of smart cities has gathered considerable traction. While sensors have been installed in New York that can detect gunshots and alert police, the city of Boston has developed a mobile app helps citizens to report civic problems like burnt out streetlights and potholes. Cities like Paris, Oslo and Hong Kong have large internet- connected statues that are filled with moss to absorb air pollution and notify operators about malfunctions. The network of connected devices continues to expand and the rise of 5G connectivity is anticipated to be connecting traffic signals, air quality sensors, police patrol cars, etc., over the coming years. Reportedly there would be billions of connected devices around the world by 2020 which will naturally create immense opportunities for identity and access management industry players. This is because new security threats will continue to surface, as without proper security all connected devices are at the risk of being hacked. The evolution of the smart era – how will it impact IAM market dynamics? Connected devices that constitute the very fabric of smart cities are essentially IoT devices that would be in the field for the next ten fifteen years and therefore identity and access management must be built into the system from the beginning. As identities, keys and tokens have to be managed every time new devices are added, or old ones are removed and the cloud ecosystem is updated, the security components within devices have to be managed well to extend their lifecycle. Identity and access management must be built into the system from the beginning Not only cities but factories are also getting smarter. The term Industry 4.0 came to be first used when the German government used it to define the country’s strategy towards increased digitization in manufacturing. As technologies like IoT and cloud computing continued to expand, they came to be included in the term, and Industry 4.0 came to represent the ecosystem of Internet-connected machines with streamlined and automated workforce and reduced production costs. As the ecosystem continued to expand, trust and identity became important issues in order to ensure the integrity of a smart factory. Healthcare is rapidly becoming a fully digital environment IAM solutions – Influencing the coveted medical domain Other fields like healthcare have also not been impervious to the effects of technological transition. Healthcare is rapidly becoming a fully digital environment that has reaped the benefits of sophisticated IT tools in delivery of care. This has however exposed sensitive healthcare data to cybercriminals who had attempted to hold critical systems and patient records of hospitals to ransom. Healthcare is rapidly becoming a fully digital environment In recent years more than 80% of healthcare institutions have reported that they registered some degree of cyberattacks. Providers and users are increasingly operating from multiple locations, many of which are outside the hospital premises. With users demanding to access systems through a variety of devices, identity and access management has come to witness greater traction from healthcare providers. Over the coming years, the world will be rapidly adopting 5G networks. Though 5G promises much more speedy services for users and business ecosystems, the technology is also expected to impose greater responsibilities on confidentiality of user data and integrity of applications. Identity and access management industry players had been investing in expansive R&D as cyber threats continue to evolve and introduction of new technologies and advent of IoT drastically changes the relationship that users have with their devices. Identity and access management is expected to be useful when much more than personal information is at stake. When cyber criminals have the power to hold hospitals or traffic signals to ransom and disrupt daily lives, health and safety become a priority for authorities and security measures have to be tightened. For instance, after the bank heists in Mexico, the Mexican bank authorities have come to recognize the inevitability for the need of greater control and security of banking networks. Mexican banks have invested heavily over the last year in strengthening their defenses. As such measures against cyberattacks become the norm, identity and access management market is expected to register massive gains over the ensuing years.
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organizations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains. User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anything like the 5.4 billion user IDs on haveibeenpwned.com, their login has already been compromised. If it's not listed, it could be soon. Recent estimates state that 8 million more credentials are compromised every day. Ensuring Safe Access Data breaches, ransomware and phishing campaigns are increasingly easy to pull off. Cyber criminals can easily find the tools they need on Google with little to no technical knowledge. Breached passwords are readily available to cyber criminals on the internet. Those that haven’t been breached can also be guessed, phished or cracked using one of the many “brute-force” tools available on the internet. It's becoming clear that login credentials are no longer enough to secure your users' accounts. Meanwhile, organizations have a responsibility and an ever-stricter legal obligation to protect their users’ sensitive data. This makes ensuring safe access to the services they need challenging, particularly when trying to provide a user experience that won’t cause frustration – or worse, lose your customers’ interest. After GDPR was implemented across the European Union, organizations could face a fine of up to €20 million, or 4% annual global turnover Importance Of Data Protection So how can businesses ensure their users can safely and simply access the services they need while keeping intruders out, and why is it so important to strike that balance? After GDPR was implemented across the European Union, organizations could face a fine of up to €20 million, or 4% annual global turnover – whichever is higher, should they seriously fail to comply with their data protection obligations. This alone was enough to prompt many organizations to get serious about their user’s security. Still, not every business followed suit. Cloud Security Risks Breaches were most commonly identified in organizations using cloud computing or where staff use personal devices According to a recent survey conducted at Infosecurity Europe, more than a quarter of organizations did not feel ready to comply with GDPR in August 2018 – three months after the compliance deadline. Meanwhile, according to the UK Government’s 2018 Cyber Security Breaches survey, 45% of businesses reported breaches or attacks in the last 12 months. According to the report, logins are less secure when accessing services in the cloud where they aren't protected by enterprise firewalls and security systems. Moreover, breaches were most commonly identified in organizations using cloud computing or where staff use personal devices (known as BYOD). According to the survey, 61% of UK organizations use cloud-based services. The figure is higher in banking and finance (74%), IT and communications (81%) and education (75%). Additionally, 45% of businesses have BYOD. This indicates a precarious situation. The majority of businesses hold personal data on users electronically and may be placing users at risk if their IT environments are not adequately protected. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine Hacking Methodology In a recent exposé on LifeHacker, Internet standards expert John Pozadzides revealed multiple methods hackers use to bypass even the most secure passwords. According to John’s revelations, 20% of passwords are simple enough to guess using easily accessible information. But that doesn’t leave the remaining 80% safe. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine. Brute force attacks are one of the easiest methods, but criminals also use increasingly sophisticated phishing campaigns to fool users into handing over their passwords. Users expect organizations to protect their passwords and keep intruders out of their accounts Once a threat actor has access to one password, they can easily gain access to multiple accounts. This is because, according to Mashable, 87% of users aged 18-30 and 81% of users aged 31+ reuse the same passwords across multiple accounts. It’s becoming clear that passwords are no longer enough to keep online accounts secure. Securing Data With Simplicity Users expect organizations to protect their passwords and keep intruders out of their accounts. As a result of a data breach, companies will of course suffer financial losses through fines and remediation costs. Beyond the immediate financial repercussions, however, the reputational damage can be seriously costly. A recent Gemalto study showed that 44% of consumers would leave their bank in the event of a security breach, and 38% would switch to a competitor offering a better service. Simplicity is equally important, however. For example, if it’s not delivered in ecommerce, one in three customers will abandon their purchase – as a recent report by Magnetic North revealed. If a login process is confusing, staff may be tempted to help themselves access the information they need by slipping out of secure habits. They may write their passwords down, share them with other members of staff, and may be more susceptible to social engineering attacks. So how do organizations strike the right balance? For many, Identity and Access Management solutions help to deliver secure access across the entire estate. It’s important though that these enable simplicity for the organization, as well as users. Organizations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so Flexible IAM While IAM is highly recommended, organizations should seek solutions that offer the flexibility to define their own balance between a seamless end-user journey and the need for a high level of identity assurance. organizations’ identity management requirements will change over time. So too will their IT environments. organizations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so. Importantly, the best solutions will be those that enable this flexibility without spending significant time and resource each time adaptations need to be made. Those that do will provide the best return on investment for organizations looking to keep intruders at bay, while enabling users to log in safely and simply.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban On Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes A Splash With Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact Of Data-Driven Smart Cities On Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyze data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing The Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends For 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How To Prevent ATM Jackpotting With Physical And Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need To Look Beyond Technology For Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organization. 10. The Evolution Of Facial Recognition From Body-Cams To Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilizing the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualization and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
Most customers interface with their financial institutions using automated teller machines (ATMs), which have security issues. However, there are solutions available to combat all current security threats, and the cost of protection is coming down. The ATM industry is therefore in a position to minimize losses, while ensuring consumers continue to get the vital cash they need to lead their daily lives. It is important for the ATM industry to constantly innovate to meet new security challenges. So what innovations are we going to see in the next five years? Contactless Technology Contactless technology will be a great help against ATM skimming, in which criminals steal personal information at ATM machines. Contactless is already being used in some European countries, and the number is increasing. Not having to insert a card into the ATM removes the opportunity to trap cards and also gets around the problem of “foreign” devices installed to read cards. So contactless technology, which some saw as the end of cash, can help make ATMs and cash more secure. Biometrics are certain to be used increasingly to bolster ATM security. Finger, palm, vein, iris and facial recognition all have potential in this respect. Any of these may in the future be used with or without cards, PINs and one-time codes. Speed of operation in relation to biometrics could ultimately govern their use at ATMs. There may also be privacy issues that need to be addressed. The ATM vestibule environment must add security with proper security and surveillance equipment. ATM vestibules, or lobbies, are installed for many good reasons. For one, more convenient, 24/7 locations equals better customer retention for a bank, offering comfort and convenience. 24/7 access to ATMs, night drops, coin counters, online banking kiosks, and other self-service solutions are very much in demand. Second, ATM vestibules protect customers from inclement weather and provide a more comfortable banking environment (however, vagrancy can be an issue; therefore ATM vestibules should require card access). Security and surveillance solutions can’t just be for show. ATMs And Crime A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and the United States. Rough estimates place the total amount of global losses at up to $60 million. The Protection Of ATMs ATMs in supermarkets and pharmacies tend to be targeted because they may not be as well-protected, and store personnel likely would not know who is authorized to work on the ATM. In contrast, anyone approaching an ATM at a bank location would be more likely to be challenged. ATM jackpotting originated back in 2010 when Barnaby Jack, a New Zealand hacker and computer expert, demonstrated how he could exploit two ATMs and make them dispense cash on the stage at the Black Hat computer security conference in Las Vegas. Since then, malware has been created and made available on the “Dark Web” that can instruct an ATM to dispense all its cash on demand. ATM Jackpotting ATM jackpotting is a combination of a physical crime and a cyberattack. Typically, a criminal with a fake ID enters a grocery shop or pharmacy posing as an ATM technician, then uses a crowbar to open the top of the ATM – the “top hat” – to gain access to the personal computer that operates the machine. Once he or she has access to the PC, they remove the hard drive, disable any anti-virus software, install a malware program, replace the hard drive and then reboot the computer. The whole operation takes about 30 seconds. The malware then enables the thief to remotely control the ATM and direct it to dispense all its cash on command. If a legitimate customer approaches the machine in the meantime, it can operate as usual until activated otherwise by the malware.
In the banking world, the threat of unwanted intrusions into premises leading to loss of property and even risk to life is always present. Small wonder then that banking institutions take so much care over their security systems and also over their choice of suppliers for those products. In the retail banking sector, requirements for intrusion detection and related security measures are necessarily more stringent and more specialized than in most other areas of business and commerce. The banks clearly need to work with suppliers whose integrity is beyond question. They should also be looking for organizations that can offer expert advice. Systems need specialist installer partners in order to provide a seamless solution. Systems need specialist installer partners in order to provide a seamless solution The Special Requirements Of The Banking Sector These supplier organizations must also fully understand the special requirements of the banking sector and, ideally, should be able to demonstrate proven experience in that sector. They must also be willing and able to work with the bank as a partner, to find better ways of addressing old threats and to develop effective measures to counter new ones. Video is a big component of providing security, and variable lighting conditions pose a persistent challenge in video surveillance applications such as large banks and financial institutions. A contrasting lack of windows at teller stations can result in dim lighting, equally damaging video image quality, in critical surveillance areas where clear, detailed images are needed the most. Stark contrasts between white and black levels in video images can obliterate faces and finer details of a subject when in a darker area. Particularly, this happens when a person is amid dark internal lighting, with his/her back to the sun. Network Architecture When upgrading a bank’s digital security system, a network architecture needs to be created. Usually, this means switching from DVRs to NVR servers. As a result, network switches attach to the camera allowing for easier future system expansion. Along with the newly gained scalability, throughput performance on servers can achieve significantly higher levels. Servers, networking and workstations provide enterprise-quality performance for all financial projects, regardless of size. Implementing a complete video solution with high-performance servers and modern networking protocols is possible in financial institutions, even for small projects. Servers, networking and workstations provide enterprise-quality performance for all financial projects, regardless of size. Software is also part of the solution. A software platform helps banks and credit unions simplify, modernize, and automate security, surveillance and fraud investigations. The platform simplifies and reduces the time to access live and recorded video through an intuitive interface, empowering users to quickly find the data needed to eliminate risks while increasing productivity. With an enhanced user experience, investigators can reduce training time, align investigation workflow, streamline video sharing, and focus on more critical tasks. The fraud and security challenges banks contend with can be overwhelming, but prompt action is necessary to limit the damage that can greatly affect customers, employees, and the brand. When an incident occurs, investigators must turn to innovative security tools to be able to swiftly locate and analyze data. But these solutions are typically complex to use and manage. Changing Work Environments The changing work environment of financial institutions is impacting security needs. A credit union in Australia operates an innovative, modern working environment that utilizes flexible workspaces in place of traditional desks. Staff are not allocated a specific desk but instead choose where they wish to sit each day. To facilitate the operation of the flexible work environment and provide employees with storage for their personal effects (work-related material is stored elsewhere), the credit union uses banks of brightly colored lockers that are managed by electronic access control. Using Gallagher’s smartcard, multi-technology T20 and T10 readers on each locker bank, staff badge their access card to open their allocated locker. With the readers communicating with Gallagher’s Command Center software management platform, the credit union has a simple-to-operate, customizable system that enables staff to carry just one card.
Malwarebytes, a provider of advanced endpoint protection and remediation solutions, announced that it was selected by NatWest Group to deliver premium cybersecurity security solutions to the bank’s consumer and business banking customers worldwide. NatWest Group customers will now be able get a free license to install Malwarebytes Premium to protect their digital experiences from within their Online Banking portal. “Keeping our customers safe and secure is of paramount importance to us,” said Alasdair MacFarlane, Head of Fraud Prevention NatWest. “We are the only UK bank to offer premium virus protection to our customers for free and are working with Malwarebytes to deliver this.” Increase awareness among customers New customer offering is experiencing positive adoption rates, quickly reaching the initial target of NatWest Group The new customer offering is experiencing positive adoption rates, quickly reaching the initial target of NatWest Group. The program has over 100,000 customer downloads to date and further efforts are planned to increase awareness amongst their customer base. “Providing digital protection, productivity, and peace of mind to customers is increasingly critical for companies and consumers as the threat landscape continues to rapidly evolve,” said Marcin Kleczynski, CEO of Malwarebytes. “Malwarebytes has been a champion of security since our inception and we’re thrilled to be able to partner with innovative, socially responsible organizations like NatWest Group who are going above and beyond to ensure the safety of their customers.” Malwarebytes for NatWest Group is available for personal customers on up to ten devices and for business customers on up to thirty devices. Users can download Malwarebytes from their online banking portal after logging in. This offering is available for customers of NatWest, Royal Bank of Scotland, Isle of Man Bank, NatWest International and Ulster Bank.
Installation company Nessence recently integrated Vanderbilt’s ACT365 cloud-based access control and video management system with Mobile BankID in Sweden. Mobile BankID is a citizen identification solution that allows companies, banks, and government agencies to authenticate and conclude agreements with individuals over the internet. The integration with ACT365 comes together to solve a brief put forward by the supermarket chain, ICA Sweden. Web API for integration Tobias Olofsson, Project Sales Manager at Vanderbilt, explains that ICA Sweden is a retailer with a focus on food and health, and they wanted to be open earlier in the morning and later in the evening. “It would be too expensive to hire staff to stay open during these times in smaller locations. This is because the number of customers shopping early in the morning or late at night is minimal. But the store wants to be able to provide its customers with this value-added service,” says Olofsson. ACT365 was the perfect solution for this project due to its easy deployment, easy operation To solve this, the supermarket wanted to open unmanned and needed a solution to allow customers to enter the store in a functioning and approved manner by the insurance company. In Olofsson’s opinion, ACT365 was the perfect solution for this project due to its easy deployment, easy operation, and a smooth web API for integration. Increased accessibility and convenience “The success of this project means it is now possible for shoppers to open the supermarket’s entrance door by digitally signing into the Mobile BankID on their phone and presenting it to the ACT365 reader located on the outside of the door,” states Olofsson. Moreover, good accessibility is maintained as all customers do not need to have specific cards or tags for the access system to be able to enter the supermarket. “A new modern solution has been developed to facilitate trade for private individuals, especially in smaller towns where food stores do not tend to stay open for as long as in the big cities. This project has resulted in increased profits for the supermarket, as well as increased accessibility and convenience for its customers,” concludes Olofsson.
Custom Consoles announces the completion and delivery of Steelbase Lite desks and a MediaWall video monitor display mounting system for the Agricultural Development Bank of Ghana (ADB). Commissioned by Virtual InfoSec Africa, the new installation is situated at ADB's headquarters in Ghana's capital city, Accra. "We were looking for a production partner with a good understanding of video technology, able to produce robustly built and ergonomically efficient control room furniture," says Bondzie Acquah, VP Operations at Virtual Infosec Africa. “With its long experience of the security business and proven ability to meet the demands of heavy industry, Custom Consoles was the logical choice both for the desks and the display mounts. Based on SteelBase Lite and MediaWall, we were able to integrate a complete system into a compact 8 by 5-meter room while at the same time ensuring that all staff could function safely and effectively. Computer equipment is housed in ventilated desk frames with easy front and rear access via black-finished lockable doors for routine technical maintenance." Video display screens Largest of the two desks is a 5.1-meter wide by a 1-meter front-to-back four-bay in-line unit designed for simultaneous use Largest of the two desks is a 5.1-meter wide by a 1-meter front-to-back four-bay in-line unit designed for simultaneous use by up to four operators. Two 24-inch video display screens are mounted in front of each work position on individually adjustable support arms. The desk is located 70 centimeters forward of a 5.2-meter wide MediaWall giving a clear view of eight 55-inch Samsung video display screens mounted in a four wide by two high configuration. Front to back depth of the MediaWall is just 50 centimeters. The second desk is a single-bay dual-screen unit measuring 1.5 meters wide by 1-meter front-to-back. This is configured for use by a supervisor. Both desks are finished in rust-colored Marmoleum with black PVC edging and silver anodized aluminum legs. The supervisor's desk faces a 76-centimeter high printer support unit with a 60 by 60-centimeter top surface, height-adjustable shelf and integral cable tray. Control room consoles "SteelBase, SteelBase Lite and MediaWall continue to be in strong demand for a very wide range of process control, security and corporate applications," says Custom Consoles' Sales Manager Gary Fuller. "We are very pleased to have worked with Virtual InfoSec Africa on this project and look forward to partnering with them in the future." A variant of Custom Consoles' long-established SteelBase series, SteelBase-Lite is a compact structured desking system which can be configured from 1.2-meter wide powder-coated modules and Marmoleum finished work surfaces, providing a self-assembly hard-wearing ergonomic solution for control room consoles. Panels and ventilation SteelBase Lite comes complete with two VESA mounts per module, mounted on height adjustable beams SteelBase Lite comes complete with two VESA mounts per module, mounted on height adjustable beams. Additional design features of the SteelBase Lite range include hinged removable access doors, 19-inch equipment racking, heavy cable management, power distribution panels and variable-speed ventilation fans. Worktops can be configured to suit individual client requirements. All elements of SteelBase and SteelBase Lite are guaranteed against component failure for five years of normal use. SteelBase-Lite is designed to conform to ISO 9241 part 5, ISO 11064 Part 4 and EN 527 Parts 1, 2 and 3. MediaWall monitor displays First announced in 2006, Custom Consoles' MediaWall allows flat-screen monitor displays of practically any width to be constructed from standard horizontal and vertical support elements. MediaWall can be used as a fully self-supporting structure or coupled directly to the studio wall. Individual screens can be positioned so that the edges meet exactly to form a continuous horizontal display limited only by the boundary of the monitor panel. All wiring is fully concealed and can enter or leave the structure at any desired point. MediaWall is available in any required element widths.
Shoppers in England are being told they need to cover up and wear a face covering when shopping from the 24th July, or they could face a fine of up to £100. But in many ways the responsibility to enforce this and keep the public safe is once again falling on battle wearied retailers, facilities managers, and operators of public spaces. Videcon is a British-based developer, designer, and provider of security solutions for businesses across the UK and the company has jumped to repurpose its deep learning, artificially intelligent software solutions in direct response to the Government’s announcement on Monday 13th July. Body temperature screening camera Thermi-screen, Videcon’s mass body temperature screening camera, can already pinpoint individuals in a shopping queue, or public space, containing up to 40 people, who may have an elevated temperature with ±0.3°C accuracy, but now it can also identify anyone not wearing a face covering. When triggered, the system automatically sends an alert to any designated controller or person in authority. Says Videcon’s managing director, Matt Rushall, “The message that members of the public must wear face coverings is out there but retailers and managers of public spaces are now finding, as an added burden, that they are being asked by the police and authorities to support them in upholding the law. Retailers have a duty to protect their customers and with Police, resources stretched to the limit at the moment, any technology that helps to manage enforcing the law and can make life easier and safer for all, is to be welcomed.” Crowd control camera systems Videcon is a pioneer in its field and the company already uses facial recognition and mask detection software Videcon is a pioneer in its field and the company already uses facial recognition and mask detection software in its Thermi-scan door access control panels but this is the first time deep learning AI technology has been embedded in crowd control camera systems of this type. Matt Rushall continued, “Our technology has been used by banks, airports, pharma companies and major retailers around the world and I am very excited at this new development. Thermi-Screen is an effective solution to help identify those with potentials symptoms, and our new capability for mask detection will be hugely beneficial to retailers and for the safety of staff and shoppers.” In addition to the new face coverings and mask detection feature, Videcon enhanced the system’s privacy settings which can now pixelate individuals and replace exact temperature readings with simple normal/elevated temperature messaging. Deep learning technologies This advanced privacy setting secures compliance with GDPR and ensures the maximum level of individual’s protection of information. The system comprises of a camera, a network video recorder, and a temperature calibrator. Using two camera lenses simultaneously, the system takes temperature readings from the forehead and upper region of the eye orbit. Algorithms and deep learning technologies then compare readings with other environmental factors like room temperature and direct sunlight. The accuracy of Thermi-Screen eliminates any false readings, such as a person carrying and sipping a hot drink and its fast response time reduces the need for single file detection accelerating the movement of people through a designated screening area or providing screening in public open spaces. Thermi-Screen is an effective solution to help identify those with potentials symptoms, and the new capability for mask detection will be hugely beneficial to retailers and for the safety of staff and shoppers.
In 2014, when Siete24 began working with the bank, it was operating 800 branches, 27 offices and 3200 ATMs, all requiring round-the-clock protection. Their security infrastructure included more than 90,000 sensors, 15,000 surveillance cameras, 3,000 DVRs and 1,500 access points. To manage this expansive enterprise the bank was operating five independent systems, using legacy software and was heavily reliant on the knowledge of its operators. Julio highlights the scale of the challenge: “In 2014 the bank was receiving two-million alerts per month, which was far more than it could effectively handle.” With the bank planning major expansion, they needed a solution that would not only deliver immediate benefits but have the ability to scale significantly. The solution that met this need was the enterprise incident management system - Qognify Situator from Qognify. Reduction in false alarms The fact that Situator was already tried, tested and proven in the banking sector was an important consideration in selecting the system. Having been in use by Millennium BCP in Portugal since 2011, Situator was able to reduce false alarms from more than 20,000 to 1,200 per annum. Since Siete24 began its work with the bank six years ago, the scope of the project has grown. The number of sites being monitored has doubled and the volume of sensors has increased by 50%. “Today, Situator is handling up to 18 million alerts per month, of which 71,200 are verified and 109 confirmed as incident, each managed using best practice procedures we have defined in the system,” explains Julio. “Despite this dramatic increase in the size of the project, our average response time to critical events has fallen from five minutes in 2016 to just 50-seconds in 2020. We have found that the more alerts we process the more efficient and effective we become.” Qognify Situator has created a positive impact on operational performance, that the bank has recently extended its contract with Siete24 for a further three-years. Julio concludes: “The bank requires that we have 99.9% availability, and we are financially accountable for any losses. Situator has enabled us to not only meet our service level obligations, but has given the bank far more than it anticipated.”
Installation company Nessence recently integrated Vanderbilt’s ACT365 cloud-based access control and video management system with Mobile BankID in Sweden. This is a citizen identification solution that allows companies, banks, and government agencies to authenticate and conclude agreements with individuals over the internet. This integration comes together to solve a brief put forward by the supermarket chain, ICA Sweden. Tobias Olofsson, Project Sales Manager at Vanderbilt, explains that ICA Sweden is a retailer with a focus on food and health, and they wanted to be open earlier in the morning and later in the evening. “It would be too expensive to hire staff to stay open during these times in smaller locations. This is because the number of customers shopping early in the morning or late at night is minimal. But the store wants to be able to provide its customers with this value-added service,” says Olofsson. Unmanned solution To solve this, the supermarket wanted to open unmanned and needed a solution to allow customers to enter the store in a functioning and approved manner by the insurance company. In Olofsson’s opinion, ACT365 was the perfect solution for this project due to its easy deployment, easy operation, and a smooth web API for integration. “The success of this project means it is now possible for shoppers to open the supermarket’s entrance door by digitally signing into the Mobile BankID on their phone and presenting it to the ACT365 reader located on the outside of the door,” states Olofsson. Supermarket access system Moreover, good accessibility is maintained as all customers do not need to have specific cards or tags for the access system to be able to enter the supermarket. “A new modern solution has been developed to facilitate trade for private individuals, especially in smaller towns where food stores do not tend to stay open for as long as in the big cities. This project has resulted in increased profits for the supermarket, as well as increased accessibility and convenience for its customers,” concludes Olofsson.
Round table discussion
The role of video surveillance is expanding, driven by all the new ways that video – and data culled from video – can impact a business. As a growing population of video cameras expands into new fields of view, we asked this week’s Expert Panel Roundtable: What is the most unusual application of surveillance cameras you have seen recently?
Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?