For customers who service banks, Digital Monitoring Products, Inc. (DMP) offers an affordable way to bring ATM vestibule access control to their facilities. Digital Monitoring Products’ new 734B Bin Code Access Control Module installs just like any of the company’s access control modules. And like all DMP access control solutions, it's designed with customized functionality and added flexibility. 734B Bin Code Access Module 734B allows banks to restrict access into their ATM vestib...
ACI Worldwide, a globally renowned provider of real-time electronic payment and banking solutions, has announced the launch of its new ‘Incremental Learning’ technology – an innovative industry-first approach to machine learning that will enhance fraud protection for merchants and financial institutions and their customers. ‘Incremental Learning’ technology ACI has filed a patent application for its ‘Incremental Learning’ technology, which is being imp...
Qognify - trusted advisor for physical security and enterprise incident management, will showcase its new VisionHub VMS+ during ISC West 2020. The enterprise-class security management solution is taking video management systems (VMS) to a new level by going beyond the pure management of video streams to include superior workflow support, situational awareness and system management capabilities. The first version of VisionHub was launched in 2016 to much industry acclaim, being awarded the Secur...
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with...
As security requirements expand to smaller buildings and lobbies, architects and specifiers are looking for compact optical turnstiles that provide a high level of security in the limited space available. With this problem in mind, Alvarado has introduced its most compact barrier optical turnstile to date, the SU4500. Designed for high-end facilities where space is at a premium, the new SU4500 has a compact 38” cabinet length but doesn’t compromise on security, throughput performanc...
Cellphone device and app security provider Trustonic announces that its Trusted Execution Environment (TEE) solution is the first hardware-backed TEE to complete the EMVCo Software-Based Cellphone Payments security evaluation process. EMVCo is the global technical body that facilitates the worldwide interoperability and acceptance of secure payment transactions. As such, this evaluation process confirms that the Trustonic TEE provides a robust security foundation that meets the requirements of s...
Intersec 2020, a popular security, safety, and fire protection trade show, held under the patronage of HH Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum, opened its doors to the latest security safety solutions and three days of agenda-setting discussion, as global industry sources tip the Middle East security sector for 10% annual growth over the next two years. With more than 1,100 exhibitors from 56 countries, Intersec was officially inaugurated by Major General Expert Rashid Thani Al Matrooshi, Director General of Dubai Civil Defense; Major General Abdullah Ali Al Ghaithi, Director of the General Department of Organizations Protective Security & Emergency at Dubai Police, and Major General Khalifa Ibrahim Al Sulais, CEO of the Security Industry Regulatory Agency (SIRA). Automated security solutions As the region’s premier show for commercial security, Intersec plays a crucial role in shaping the the industry" The delegation met top-level dignitaries and representatives from Dubai Police; Came, a provider of automated security solutions; Netherlands-based Nedap, a specialist in systems for long-range identification, smart parking and vehicle access control; Chinese technology giant Huawei, and Axis Communications, a Swedish manufacturer of network cameras for physical security and video surveillance industries. “As the region’s premier show for commercial security, fire protection and safety, Intersec plays a crucial role in shaping the future of these industries,” said HH Sheikh Mansoor. “Protecting our people and assets is a principal responsibility for the UAE and with the Expo 2020 fast-approaching, the implementation of new best practices and technology will solidify the UAE’s position as a leader in security.” Artificial intelligence and machine learning Andreas Rex, Show Director at Messe Frankfurt Middle East, which organises Intersec, added: “No sector is exempt from technological advancement. The emergence of automation, biometrics, artificial intelligence and machine learning is transforming the face of the security sector and helping to address growing concerns surrounding unmanned aerial, cyber and identity fraud risks. As security risks become more complex, so too must the solutions designed to combat them.” As Intersec 2020 welcomed the global security industry to Dubai, the bullish security sector growth forecast was issued by Business France, the French government organization charged with fostering French exports and promoting inward investment into the country. France, one of 15 international country pavilions at the three-day show at Dubai World Trade Center, is debuting the most advanced technology emerging across seven broad product sectors: commercial security, smart home, cybersecurity, fire and rescue, safety and health, homeland security and policing, as well as perimeter and physical security. Access control systems The Czech Republic pavilion is hosting a similar contingent of companies including COMINFO “The Middle East region represents a particularly attractive market for the safety and security sector, which is expected to grow around 10% per year to 2022,” said Frederic Szabo, Managing Director, Business France Middle East, which is hosting 15 French companies at Intersec – 11 of which specialize in fire and rescue. “Increasing the capabilities of infrastructure, securing power plants and oil complexes, protecting sites and people for major events to come are all excellent reasons for French experts to extend their presence in the region,” added Szabo. The Czech Republic pavilion is hosting a similar contingent of companies including COMINFO, a manufacturer of turnstiles, gates and access control systems, which is leveraging Intersec to launch EasyGate Superb – the world’s slimmest, fully-equipped speed gate for access control. Next-generation security risks COMINFO’s regional launch of EasyGate Superb is one in hundreds of major transformative technology breakthroughs at the fair, where the scale of next-generation security risks and the intelligent technology required to prevent and defend against security threats are being explored by local, regional and global industry leaders at Intersec’s comprehensive conference program. The four-pronged program, which includes the Intersec Arena, the Future Security Summit and Intersec Fire Conference, and the Security Industry Regulatory Agency (SIRA) forum, has drawn experts from more than 50 countries to Dubai. During a keynote address at the Intersec Arena on Sunday, Eng. Khalid Al Hammadi, Chairman of the Security Professionals Association (SPA), the first association for security professionals in the Middle East, announced the launch of SPA for SIRA, the Dubai agency tasked with ensuring the highest standards of security and safety in the emirate. AI and machine learning applications The event showcases the latest innovations and technologies in one of the most important years for the UAE SPA is a platform that allows security professionals to share and enhance their knowledge of industry best practices. “The industry is advancing towards technologies such as AI and machine learning applications, which will be used as part of the security protocols of Expo 2020,” said Eng Al Hammadi. “This is sure to create an array of job opportunities for individuals within the security sector, and SPA for SIRA will be there to act as a platform that bridges the gap between security professionals and regulators, as well as fostering a platform for knowledge exchange and development.” “Participating in Intersec enables our members to interact with a global network of security experts and learn about the latest security applications and trends within the industry. This event showcases the latest cutting-edge innovations and technologies in one of the most important years for the UAE, which will support the safe and secure logistics of Expo 2020 Dubai,” noted Al Hammadi. Digital and physical security At the conference, representatives from 35 governments, trade associations and non-profit institutions spanning the hydrocarbon, banking and finance, municipality, police, customs and healthcare sectors in the Middle East, Europe and the USA will map out the future security agenda over coming days. Digital security challenges, AI implementation, biometric innovations security loopholes in business ecosystems and the integration of digital and physical security to address critical threats are all key topics under the microscope. Held under the patronage of His Highness Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum, Intersec is supported by Dubai Police, Dubai Police Academy, Dubai Civil Defense, SIRA and Dubai Municipality. Intersec is a trade exhibition and conference open to trade professionals only. The show is open from 10am – 6pm on 20 and 21 January and is held in Halls 2-8, Trade Center Arena and Sheikh Saeed Halls 1-3 at Dubai World Trade Center.
Global security company Hanwha Techwin recently took part in Intersec 2020, the security exhibition in the Middle East. Held in Dubai (UAE), the trade show provided the perfect opportunity for Hanwha Techwin to showcase its products, including Middle East-optimized devices and cutting-edge AI solutions, on a truly global stage. Intersec is an annual trade fair for the security and safety sectors, where all the latest trends and technologies can be found under one roof. At this year’s event, over 1,100 global security companies from 50 countries gathered to share their cutting-edge security solutions with the world. Hanwha Techwin to highlighted its “Expansion of Secure Life” theme by showcasing some significant technological breakthroughs, including the latest Wisenet AI lineup and up-to-date security solutions tailored to local demands of a diverse range of market sectors. At the company’s booth, attendees were given the opportunity to gain first-hand experience with Hanwha Techwin’s products, solutions and technologies that span across multiple sectors. Wisenet AI NVR Wisenet’s AI cameras are designed to accurately capture the unique attributes of objects With “AI technology” establishing an indispensable role in the video surveillance industry, Hanwha Techwin demonstrated its latest state-of-the-art AI solutions. Equipped with a powerful artificial intelligence (AI) engine that detects and classifies people and vehicles in real time, Wisenet’s AI cameras are designed to accurately capture the unique attributes of objects such as faces and license plates, while reducing false alarms caused by waving trees, video noise, and even shadows. The Wisenet AI NVR lineup is the first Wisenet NVR to feature AI. This provides real-time monitoring and video backup up to 8K resolution and further enhances user convenience through the new intuitive GUI. Hanwha Techwin also touched on its optimized solutions across numerous different vertical sectors including retail, transportation, plant and banking. The company’s retail and transportation smart security offerings, in particular, grabbed the keen attention of attendees thanks to its experiential booths. Wisenet P series AI cameras Wisenet Retail Insight v2.0 was one of them, providing business intelligence with age and gender-based people counting, heatmap and queue management features which are supported by Wisenet P series AI cameras. Meanwhile, the innovative Wisenet Transportation appliance (TAW-4000H16) is equipped with TMS (Transportation monitoring system) for the efficient operation and management of larger sites. It is crucial that video surveillance systems used in such facilities pose zero risk of exploding In addition, the company introduced a broad range of Middle East-specialized solutions, one being the 16CH NVR(XRN-1610G), which boasts a built-in modem that permits seamless video and status transfer to a control center using 3G or 4G, allowing operators to remotely monitor multiple devices across long distances in real time. Moreover, since heavy industrial facilities such as gas pipelines, petrochemical plants, and oil refineries are potentially explosive, it is crucial that video surveillance systems used in such facilities pose zero risk of exploding, while capturing high-quality footage at the same time. Wisenet explosion-proof cameras more than meet these requirements, via powerful networks and a protective stainless-steel housing enclosure. Pentabrid DVR It was the perfect setting for Hanwha Techwin to present its new multi-directional camera (PNM-9085RQZ), hybrid recording solution (Pentabrid DVR), and 8K resolution camera (TNB-9000) which are ideal for monitoring large spaces such as stadiums or airports, while the company also emphasized the significance of building trust through cybersecurity policies. The company’s global network was also highlighted, reiterating the importance of its R&D center and production based at the company’s South Korean headquarters as it expands its worldwide network to over 16,000 partners across 100 countries. “This year’s Intersec marked the beginning of not only a new year, but a new decade, too. We’re very proud to begin this new era by presenting to the world Hanwha Techwin’s state-of-the-art technologies that have been carefully developed to match the constantly evolving security and surveillance landscapes,” said a Hanwha Techwin representative. “Based on our firm belief that trust remains an essential aspect of the industry, we will continue to improve our world-renowned core technologies while simultaneously introducing new revolutionary AI solutions and reinforcing our cybersecurity.”
ONVU Technologies, the provider of empathy-led solutions in the surveillance, learning and retail industries, announced that Simon Pearson has joined the Group as VP Commercial. In this role, Pearson will have revenue responsibility for the Group businesses, Oncam, ONVU Learning and ONVU Retail. He will bring cohesion, direction and overall strategic vision to the sales and marketing activities across the group to help propel the Group into its next stage of growth. Pearson is an experienced technologist and commercial leader, with more than 20 years of experience in the strategic growth of entrepreneurial technology companies, creating, selling and deploying enterprise software solutions to customers in the government, healthcare, retail, banking, telecoms and education sectors. Strategic partnership “I’m delighted to be joining the ONVU Tech team at what I believe is a very exciting time in the company’s development. Its market-leading technologies deliver a compelling offering to our target industries, and the passionate leadership team is well-positioned to execute on this significant opportunity,” said Pearson. “We truly believe in delivering significant value through our strategic partnerships, ensuring that our platforms remain leaders in the marketplace and number one choice for end users.” “We are absolutely thrilled to have Simon as part of the management team,” said Scott Brothers, COO, ONVU Technologies. “His role is a first for our business and we're excited by what an integrated commercial team can bring in terms of growth, focus, go-to-market strategy and collaboration. Simon’s acumen puts him in the perfect position to bring vision to the commercial functions and play a key part in contributing to ONVU Tech’s mission, which is building empathy-led products, created by industry experts to solve real-world problems.”
New ways to identify fake security devices on banknotes, passports and other secured documents will be at the heart of the Optical Document Security conference for central banks, ID issuers and authorities, banknote and ID printers / integrators and secure document component suppliers. The Optical Document Security conference, which takes place in San Francisco, California (January 29 – 31, 2020), will provide insight and guidance for everyone involved in improving the specification, design, production and examination of security documents. Optical document security features The 2020 event will focus on the latest innovations in optical document security features. Among the topics will be caustic optics, asymmetric microstructures and plasmonic technologies from international industry leaders. This well-established and respected conference takes place as the transition from the physical to the digital world gathers pace, so it brings together the best aspects of each being used to secure personally sensitive and financial information. Only people with a legitimate interest in the topic will be accepted for it The Short Course which precedes the conference has forensic examiners from Interpol and the US Department of Homeland Security explaining how they set about examining documents and detection and the trends they are seeing in fraudulent optical features. Given the sensitive nature of this course, only people with a legitimate interest in the topic will be accepted for it. Anti-counterfeiting strategies Sessions will examine human factors and design in optical document security, novel materials, production methods and the rapid adoption of smartphone technology in anti-counterfeiting strategies. The conference, organized by Reconnaissance International, an authoritative source on secured documents, is for people in the public and private sectors involved with the design, production or examination of government issued security documents including financial, tax and ID documents. An essential part of the conference is the exhibition of novel optical security features which takes place during the conference dinner. This allows participants to examine and learn more about items covered in the conference papers. Smartphone recognition The conference comes as a timely opportunity to engage in the debate and examine the most pressing issues" Conference director Dr Mark Deakes, of Reconnaissance International, said, “We are living through a watershed period in how we manage what must be secure documents and secure information. So, the conference comes as a timely opportunity to engage in the debate and examine the most pressing issues, particularly as the co-existence between the physical and the digital worlds gathers pace.” There will be papers from SICPA on caustic optics, OVD Kinegram on asymmetric microstructures and SURYS on its latest plasmonic features. Plasmonics also features in papers from OpSec and Shanghai Jiao Tong University, a newcomer to ODS. Conference newcomers PulseTech Security, Demax and Polytechnique Montreal will present on reflection holograms with QR codes for smartphone recognition, plasmonic color control for smartphone verification, and electrochromic materials respectively. Central banks are also on the agenda - a paper from the European Central Bank will focus on analyzing fake Euro holograms while the Bank of Canada will report on its work on perception studies.
IDIS is poised to extend its deep learning capabilities, and to lead the sector with more advanced projects in the Middle East, with the launch a powerful line-up of Edge VA bullet and fixed domes featuring essential on-board analytics, to be showcased at Intersec (19-21 January in Dubai) on stand SA-A28. Crucially, the new camera range will allow users to leverage the power of IDIS Instant Meta Filtering, with the ability to access and search video data, stored on IDIS NVRs, through the totally cost- and license-free IDIS Center VMS. This makes it easy to search by color and type of object (for example, people, cars, and bicycles) and number, to deliver significant labor efficiencies and reduce investigations from days and hours to just minutes. At the same time, a new mapping tool will allow users to select a specific camera on an intuitive layout plan, and live view or playback video in the corner of the screen to further improve control room and operator efficiency. IDIS Deep Learning Analytics (IDLA) technology IDLA is proving to be the industry’s most accurate AI solution for security and life safety applications The biggest draw for visitors to the IDIS stand is sure to be the latest iteration of IDIS Deep Learning Analytics (IDLA) technology that is available as a modular IDIS Solution Suite VMS service, or via the cost-effective AI in the Box appliance for smaller applications. IDLA is proving to be the industry’s most accurate AI solution for security and life safety applications, with a tested 98% accuracy rate. IDLA enables a higher level of protection for people, facilities and assets, by significantly reducing false alarms and ensuring critical incidents are never missed. For example, IDLA can recognize an intrusion, loitering, trespassing or a person falling over, all in real-time, and trigger a notification. In practice this means that critical events need never go undetected, and control room operators can initiate the most rapid, appropriate responses to incidents. DC-C4212RX 2MP micro dome camera Offering even more choice for retail applications, IDIS will be showcasing an extended line up of analytics appliances and specialist cameras, which now includes new 12MP and 5MP Super Fisheyes, giving complete situational awareness from a single camera, while the new DC-C4212RX 2MP micro dome camera will also make its Middle East debut. Available in a wide choice of colors, the micro dome enables less noticeable surveillance, blending discretely with the aesthetics of high-end locations such as jewelery stores and designer boutiques, as well as up-market restaurants and luxury hotels. IDIS will highlight a compliant end-to-end offering for financial institutes New reporting capabilities will also be unveiled within the popular retail plug-and-play, VA in the Box analytics appliance, which gives retail managers the ability to compile and access business intelligence reports for multiple stores and branches all from the convenience of a web browser. IDIS Critical Failover In addition, following its significant success in the Middle East banking sector, IDIS will highlight a compliant end-to-end offering for financial institutes that includes convert modular cameras perfect for ATMs, ruggedized mobile cameras and NVRs featuring a durable, anti-shock and anti-vibration design for cash-in-transit vehicles, together with the powerful range of 8400 NVRs that come with server-crushing 370Mbps throughput, IDIS Intelligent Codec H.265/H.264 performance, RAID support and the multi-layered protection of IDIS Critical Failover. Other camerasecur debuts ideal for banking and other critical infrastructure sectors will include a range of thermal options and an explosion-proof camera designed for robust perimeter protection. “Middle East buyers today are clearly focused on solutions that give them tangible benefits, including ease of installation combined with reliable, high-performance technology that is cybersecure and backed by industry-leading warranties from a manufacturer they can trust, and that is exactly what IDIS is offering,” says Harry Kwon, General Manager, IDIS Middle East and Africa (MEA). “And with our end-to-end video solutions and advanced analytics tools, we are delivering immediate advantage and long-term value for security integrators, consultants and end-users.”
Security companies provide a type of service that tends to go unnoticed except when it’s missed. Businesses, banks, stores, event organizers and VIPs are their main clients. Their demand is increasing, mostly due to the expansion that Southern California has experienced in the latest years. Small cities and towns are increasingly growing every day, mostly due to internal migration and the high prices of rent in Los Angeles County. Veteran Los Angeles security company HillQuest Security knows about this growth and the demand for services like the ones they provide. That’s why they’ve decided to expand their already wide range of services (which included more than 60 cities by 2018) to the entirety of Orange and Riverside counties. Security options for businesses HillQuest Security has started to provide security guard services in Orange County and Riverside since early 2019. What was initially a test venture that turned out to be really successful for the company became a full-service activity. Now, HillQuest has started to offer its full range of security options for businesses and individuals in those areas. Our trained, licensed expert security officers can handle any and all of your security needs" Businesses and other entities in the OC and Riverside can now hire HillQuest Security mobile patrols, bodyguards, security systems, loss prevention, and other security services for banks, construction areas, health care facilities, hotels, apartment complexes, movie sets, parking lots, schools and event venues. Security services “We provide security services that are perfectly tailored for you,” says John Bouzy, HillQuest Security owner. "Our trained, licensed expert security officers can handle any and all of your security needs. Moreover, we can do that any time of day as well." According to its website, the company is insured with a $5 million dollar policy and all officers “meet the standards set by the Bureau of Security and Investigative Services".
The explosive expansion of IT infrastructure has led to the identity and access management market gaining substantial momentum. As the onslaught of information technology continues, organizations are able to offer users quick and easy access to systems and information from any place, at any time. However the ease of access is inherently associated with the risk of security breach. Organizations have to find a balance between fulfilling user demands and doing so in a manner that is safe enough so that cybercriminals cannot take advantage of the system, thus strengthening identity and access management market trends. The prominence of IAM solutions in the BFSI sector In 2016, the world was shocked by the news of the Bangladesh bank heist in which cybercriminals were successful in conducting unauthorized money transfer from Bangladesh Central Bank to banks in Philippines, Sri Lanka and other parts of Asia. In the heist, criminals used Society for Worldwide Interbank Financial Telecommunication (SWIFT) credentials of Bangladesh Bank's employees to carry out more than three dozen fraudulent transactions and extracted $81 million from Bangladesh Central Bank. More than three dozen fraudulent transactions and extracted $81 million from Bangladesh Central Bank. More recently in 2018, hackers were able to siphon nearly $20 million from Mexican banks. Analysts point out that targeted bank systems had security holes that made access to internal servers much easier. Also lack of strong access controls was used by hackers to use credentials of compromised employee to gain considerable mileage in the siphoning. Identity and access management industry has therefore registered a lot of interest through the financial sector and banks as financial institutions need to prove themselves reliable of customers’ trust. Banks and other financial institutions are rapidly adopting identity and access management solutions which are capable of providing strong security starting at authentication level and extending all the way to application and data layers. IAM solutions make it possible for financial institutions to integrate new applications and deploy to cloud with greater ease and rapidity. With versatile hybrid deployment model provided by leading IAM solutions, connectivity to SaaS applications as well as legacy enterprise web applications happens more quickly as well as securely. IAM solutions make it possible for financial institutions to integrate new applications and deploy to cloud The significance of cloud and its impact on IAM market outlook Just as the banking sector is facing the challenge of identity authentication as customers around the world are demanding any time access, the proliferation of IoT and cloud technologies is changing the very texture of the society in multiple ways. With advancement in IoT technologies, the advent of smart cities has gathered considerable traction. While sensors have been installed in New York that can detect gunshots and alert police, the city of Boston has developed a mobile app helps citizens to report civic problems like burnt out streetlights and potholes. Cities like Paris, Oslo and Hong Kong have large internet- connected statues that are filled with moss to absorb air pollution and notify operators about malfunctions. The network of connected devices continues to expand and the rise of 5G connectivity is anticipated to be connecting traffic signals, air quality sensors, police patrol cars, etc., over the coming years. Reportedly there would be billions of connected devices around the world by 2020 which will naturally create immense opportunities for identity and access management industry players. This is because new security threats will continue to surface, as without proper security all connected devices are at the risk of being hacked. The evolution of the smart era – how will it impact IAM market dynamics? Connected devices that constitute the very fabric of smart cities are essentially IoT devices that would be in the field for the next ten fifteen years and therefore identity and access management must be built into the system from the beginning. As identities, keys and tokens have to be managed every time new devices are added, or old ones are removed and the cloud ecosystem is updated, the security components within devices have to be managed well to extend their lifecycle. Identity and access management must be built into the system from the beginning Not only cities but factories are also getting smarter. The term Industry 4.0 came to be first used when the German government used it to define the country’s strategy towards increased digitization in manufacturing. As technologies like IoT and cloud computing continued to expand, they came to be included in the term, and Industry 4.0 came to represent the ecosystem of Internet-connected machines with streamlined and automated workforce and reduced production costs. As the ecosystem continued to expand, trust and identity became important issues in order to ensure the integrity of a smart factory. Healthcare is rapidly becoming a fully digital environment IAM solutions – Influencing the coveted medical domain Other fields like healthcare have also not been impervious to the effects of technological transition. Healthcare is rapidly becoming a fully digital environment that has reaped the benefits of sophisticated IT tools in delivery of care. This has however exposed sensitive healthcare data to cybercriminals who had attempted to hold critical systems and patient records of hospitals to ransom. Healthcare is rapidly becoming a fully digital environment In recent years more than 80% of healthcare institutions have reported that they registered some degree of cyberattacks. Providers and users are increasingly operating from multiple locations, many of which are outside the hospital premises. With users demanding to access systems through a variety of devices, identity and access management has come to witness greater traction from healthcare providers. Over the coming years, the world will be rapidly adopting 5G networks. Though 5G promises much more speedy services for users and business ecosystems, the technology is also expected to impose greater responsibilities on confidentiality of user data and integrity of applications. Identity and access management industry players had been investing in expansive R&D as cyber threats continue to evolve and introduction of new technologies and advent of IoT drastically changes the relationship that users have with their devices. Identity and access management is expected to be useful when much more than personal information is at stake. When cyber criminals have the power to hold hospitals or traffic signals to ransom and disrupt daily lives, health and safety become a priority for authorities and security measures have to be tightened. For instance, after the bank heists in Mexico, the Mexican bank authorities have come to recognize the inevitability for the need of greater control and security of banking networks. Mexican banks have invested heavily over the last year in strengthening their defenses. As such measures against cyberattacks become the norm, identity and access management market is expected to register massive gains over the ensuing years.
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organizations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains. User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anything like the 5.4 billion user IDs on haveibeenpwned.com, their login has already been compromised. If it's not listed, it could be soon. Recent estimates state that 8 million more credentials are compromised every day. Ensuring Safe Access Data breaches, ransomware and phishing campaigns are increasingly easy to pull off. Cyber criminals can easily find the tools they need on Google with little to no technical knowledge. Breached passwords are readily available to cyber criminals on the internet. Those that haven’t been breached can also be guessed, phished or cracked using one of the many “brute-force” tools available on the internet. It's becoming clear that login credentials are no longer enough to secure your users' accounts. Meanwhile, organizations have a responsibility and an ever-stricter legal obligation to protect their users’ sensitive data. This makes ensuring safe access to the services they need challenging, particularly when trying to provide a user experience that won’t cause frustration – or worse, lose your customers’ interest. After GDPR was implemented across the European Union, organizations could face a fine of up to €20 million, or 4% annual global turnover Importance Of Data Protection So how can businesses ensure their users can safely and simply access the services they need while keeping intruders out, and why is it so important to strike that balance? After GDPR was implemented across the European Union, organizations could face a fine of up to €20 million, or 4% annual global turnover – whichever is higher, should they seriously fail to comply with their data protection obligations. This alone was enough to prompt many organizations to get serious about their user’s security. Still, not every business followed suit. Cloud Security Risks Breaches were most commonly identified in organizations using cloud computing or where staff use personal devices According to a recent survey conducted at Infosecurity Europe, more than a quarter of organizations did not feel ready to comply with GDPR in August 2018 – three months after the compliance deadline. Meanwhile, according to the UK Government’s 2018 Cyber Security Breaches survey, 45% of businesses reported breaches or attacks in the last 12 months. According to the report, logins are less secure when accessing services in the cloud where they aren't protected by enterprise firewalls and security systems. Moreover, breaches were most commonly identified in organizations using cloud computing or where staff use personal devices (known as BYOD). According to the survey, 61% of UK organizations use cloud-based services. The figure is higher in banking and finance (74%), IT and communications (81%) and education (75%). Additionally, 45% of businesses have BYOD. This indicates a precarious situation. The majority of businesses hold personal data on users electronically and may be placing users at risk if their IT environments are not adequately protected. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine Hacking Methodology In a recent exposé on LifeHacker, Internet standards expert John Pozadzides revealed multiple methods hackers use to bypass even the most secure passwords. According to John’s revelations, 20% of passwords are simple enough to guess using easily accessible information. But that doesn’t leave the remaining 80% safe. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine. Brute force attacks are one of the easiest methods, but criminals also use increasingly sophisticated phishing campaigns to fool users into handing over their passwords. Users expect organizations to protect their passwords and keep intruders out of their accounts Once a threat actor has access to one password, they can easily gain access to multiple accounts. This is because, according to Mashable, 87% of users aged 18-30 and 81% of users aged 31+ reuse the same passwords across multiple accounts. It’s becoming clear that passwords are no longer enough to keep online accounts secure. Securing Data With Simplicity Users expect organizations to protect their passwords and keep intruders out of their accounts. As a result of a data breach, companies will of course suffer financial losses through fines and remediation costs. Beyond the immediate financial repercussions, however, the reputational damage can be seriously costly. A recent Gemalto study showed that 44% of consumers would leave their bank in the event of a security breach, and 38% would switch to a competitor offering a better service. Simplicity is equally important, however. For example, if it’s not delivered in ecommerce, one in three customers will abandon their purchase – as a recent report by Magnetic North revealed. If a login process is confusing, staff may be tempted to help themselves access the information they need by slipping out of secure habits. They may write their passwords down, share them with other members of staff, and may be more susceptible to social engineering attacks. So how do organizations strike the right balance? For many, Identity and Access Management solutions help to deliver secure access across the entire estate. It’s important though that these enable simplicity for the organization, as well as users. Organizations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so Flexible IAM While IAM is highly recommended, organizations should seek solutions that offer the flexibility to define their own balance between a seamless end-user journey and the need for a high level of identity assurance. organizations’ identity management requirements will change over time. So too will their IT environments. organizations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so. Importantly, the best solutions will be those that enable this flexibility without spending significant time and resource each time adaptations need to be made. Those that do will provide the best return on investment for organizations looking to keep intruders at bay, while enabling users to log in safely and simply.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban On Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes A Splash With Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact Of Data-Driven Smart Cities On Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyze data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing The Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends For 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How To Prevent ATM Jackpotting With Physical And Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need To Look Beyond Technology For Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organization. 10. The Evolution Of Facial Recognition From Body-Cams To Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
Most customers interface with their financial institutions using automated teller machines (ATMs), which have security issues. However, there are solutions available to combat all current security threats, and the cost of protection is coming down. The ATM industry is therefore in a position to minimize losses, while ensuring consumers continue to get the vital cash they need to lead their daily lives. It is important for the ATM industry to constantly innovate to meet new security challenges. So what innovations are we going to see in the next five years? Contactless technology Contactless technology will be a great help against ATM skimming, in which criminals steal personal information at ATM machines. Contactless is already being used in some European countries, and the number is increasing. Not having to insert a card into the ATM removes the opportunity to trap cards and also gets around the problem of “foreign” devices installed to read cards. So contactless technology, which some saw as the end of cash, can help make ATMs and cash more secure. Data capture form to appear here! Not having to insert a card into the ATM removes the opportunity to trap cards Biometrics are certain to be used increasingly to bolster ATM security. Finger, palm, vein, iris and facial recognition all have potential in this respect. Any of these may in the future be used with or without cards, PINs and one-time codes. Speed of operation in relation to biometrics could ultimately govern their use at ATMs. There may also be privacy issues that need to be addressed. The ATM vestibule environment must add security with proper security and surveillance equipment. ATM vestibules, or lobbies, are installed for many good reasons. For one, more convenient, 24/7 locations equals better customer retention for a bank, offering comfort and convenience. 24/7 access to ATMs, night drops, coin counters, online banking kiosks, and other self-service solutions are very much in demand. Second, ATM vestibules protect customers from inclement weather and provide a more comfortable banking environment (however, vagrancy can be an issue; therefore ATM vestibules should require card access). Security and surveillance solutions can’t just be for show. ATMs and crime A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and the United States. Rough estimates place the total amount of global losses at up to $60 million. The protection of ATMs ATMs in supermarkets and pharmacies tend to be targeted because they may not be as well-protected, and store personnel likely would not know who is authorized to work on the ATM. In contrast, anyone approaching an ATM at a bank location would be more likely to be challenged. ATM jackpotting originated back in 2010 when Barnaby Jack, a New Zealand hacker and computer expert, demonstrated how he could exploit two ATMs and make them dispense cash on the stage at the Black Hat computer security conference in Las Vegas. Since then, malware has been created and made available on the “Dark Web” that can instruct an ATM to dispense all its cash on demand. ATM jackpotting ATM jackpotting is a combination of a physical crime and a cyberattack ATM jackpotting is a combination of a physical crime and a cyberattack. Typically, a criminal with a fake ID enters a grocery shop or pharmacy posing as an ATM technician, then uses a crowbar to open the top of the ATM – the “top hat” – to gain access to the personal computer that operates the machine. Once he or she has access to the PC, they remove the hard drive, disable any anti-virus software, install a malware program, replace the hard drive and then reboot the computer. The whole operation takes about 30 seconds. The malware then enables the thief to remotely control the ATM and direct it to dispense all its cash on command. If a legitimate customer approaches the machine in the meantime, it can operate as usual until activated otherwise by the malware. Catch up on part one and part two of our banking security mini series.
In the banking world, the threat of unwanted intrusions into premises leading to loss of property and even risk to life is always present. Small wonder then that banking institutions take so much care over their security systems and also over their choice of suppliers for those products. In the retail banking sector, requirements for intrusion detection and related security measures are necessarily more stringent and more specialized than in most other areas of business and commerce. Data capture form to appear here! The banks clearly need to work with suppliers whose integrity is beyond question. They should also be looking for organizations that can offer expert advice, gained through their knowledge of design and manufacturing security products. Systems need specialist installer partners in order to provide a seamless solution. Systems need specialist installer partners in order to provide a seamless solution The special requirements of the banking sector These supplier organizations must also fully understand the special requirements of the banking sector and, ideally, should be able to demonstrate proven experience in that sector. They must also be willing and able to work with the bank as a partner, to find better ways of addressing old threats and to develop effective measures to counter new ones. Video is a big component of providing security, and variable lighting conditions pose a persistent challenge in video surveillance applications such as large banks and financial institutions. Typically, these venues include an abundance of windows. The resulting excessive light can damage video image quality, by flooding the image plane of the surveillance camera. Dramatic differences between light and dark areas complicate the ability of video cameras to view someone standing in the shadows. A contrasting lack of windows at teller stations can result in dim lighting, equally damaging video image quality, in critical surveillance areas where clear, detailed images are needed the most. Stark contrasts between white and black levels in video images can obliterate faces and finer details of a subject when in a darker area. Particularly, this happens when a person is amid dark internal lighting, with his/her back to the sun. Data capture form to appear here! A new network architecture When upgrading a bank’s digital security system, a new network architecture needs to be created. Usually, this means switching from DVRs to NVR servers. As a result, network switches attach to the camera allowing for easier future system expansion. Along with the newly gained scalability, throughput performance on servers can achieve significantly higher levels. Servers, networking and workstations provide enterprise-quality performance for all financial projects, regardless of size. Servers, networking and workstations provide enterprise-quality performance for all financial projects Implementing a complete video solution with high-performance servers, modern networking protocols and powerful workstations is now possible in financial institutions, even for small projects. Servers, networking and workstations provide enterprise-quality performance for all financial projects, regardless of size. Software is also part of the solution. A new software platform helps banks and credit unions simplify, modernize, and automate security, surveillance and fraud investigations across their enterprise. The platform eases the daily challenges security investigators face. It simplifies and reduces the time to access live and recorded video through an intuitive interface, empowering users to quickly find the data needed to eliminate risks while increasing productivity. With an enhanced user experience, investigators can reduce training time, align investigation workflow, streamline video sharing, and focus on more critical tasks. The fraud and security challenges banks contend with can be overwhelming, but prompt action is necessary to limit the damage that can greatly affect customers, employees, and the brand. When an incident occurs, investigators must turn to innovative security tools to be able to swiftly locate and analyze data. But these solutions are typically complex to use and manage. Investigators must turn to innovative security tools to be able to swiftly locate and analyze data Changing work environments The changing work environment of financial institutions is impacting security needs. A credit union in Australia operates an innovative, modern working environment that utilizes flexible workspaces in place of traditional desks. Staff are not allocated a specific desk but instead choose where they wish to sit each day. To facilitate the operation of the flexible work environment and provide employees with storage for their personal effects (work-related material is stored elsewhere), the credit union uses banks of brightly colored lockers that are managed by electronic access control. Using Gallagher’s smartcard, multi-technology T20 and T10 readers on each locker bank, staff badge their access card to open their allocated locker. With the readers communicating with Gallagher’s Command Center software management platform, the credit union has a simple-to-operate, customizable system that enables staff to carry just one card on site. Read part one and part three of our banking security mini series.
We live in an age when private customer data is constantly under attack from hackers. Cyber-threats have taken a front seat in the line-up of primary risks facing banks and financial institutions. The fact that cyber-attacks are becoming more prevalent isn't the only issue; they're also becoming more complex and therefore harder to address. And although the convenient interconnectivity of the Internet of Things (IoT) creates many advantages for financial institutions, there is also an increased risk to dangerous threats. Data capture form to appear here! The impact of cyber heists Money taken in cyber heists, both in banking and elsewhere, was estimated at $3 trillion According to Cybersecurity Ventures, the amount of money taken in cyber heists, both in banking and elsewhere, was estimated at $3 trillion overall for 2015, and this substantial amount is expected to double by 2021. In today’s environment, banks, credit unions, and financial organizations of all types are primary targets for hackers. But it’s not just the monetary loss that these businesses need to be concerned about — there is also a threat to the brand, customer trust, and employee safety. Banking surveys Banking choices are influenced by how secure consumers feel when conducting transactions, either in their local branch, at an ATM or online. In one survey, a vast majority of consumers (98%) felt most secure when conducting transactions at their local banking branch, compared with 92% when conducting transactions online and 85% using a mobile phone app. Further, 90% of consumers said they feel safer when they can see video surveillance cameras in their bank or credit union and would choose a financial institution with surveillance over one without, all other things being equal. Here are some other key findings from the survey: Half of consumers have walked away from an ATM without conducting their intended transaction because someone was loitering in the vestibule 60% of consumers noticed a fraudulent transaction before their financial institution, leaving plenty of opportunity for banks and credit unions to be more proactive when it comes to identifying and notifying customers about potential fraud “Banks and credit unions recognize that today’s consumers want a mix of in-person and online banking service options and have very high expectations when it comes to security and customer service,” said Peter Strom, President and CEO, March Networks, which provides security systems for banks. To increase security, biometric solutions are replacing PINs at physical ATMs To increase security, biometric solutions are replacing PINs at physical ATMs and providing a more fool-proof form of identification for banking security. Ways to increase banking security Popular use cases include a) PIN replacement at physical ATMs; b) proof-of-presence (such as pension benefit distribution) that requires liveness detection; c) more easily authenticating multiple transactions during a single ATM session; d) incorporating biometric information directly into a smart device; and e) the ability to leverage investments in biometric enrollment databases across multiple applications. An example of the latter is when fingerprint authentication on mobile devices used for payments and secure mobile banking is also used in conjunction with enrolled information for authentication at an ATM. The availability of interoperable authentication devices would permit cross-bank usage and pave the way for many new applications in the future. By enrolling a citizen’s fingerprints and then creating an ecosystem in which these transactions are strongly tied to that individual’s biometrics, the potential for fraud and identity theft approaches zero, and the process is simple and convenient for users. Read part two and part three of our banking security mini series.
National Bank of Umm Al Qaiwain (the Bank) is a Public Shareholding Company incorporated in Umm Al Qaiwain by Amiri Decree Number (1) on January 5, 1982, issued by His Highness, the Ruler of Umm Al Qaiwain and commenced its operations with effect from August 1, 1982. The Local government of Umm Al Qaiwain is the largest shareholder and promoter of the bank. The bank is engaged in providing retail and corporate banking services through a network of 14 branches in U.A.E. The Bank carries out Islamic banking operations through Islamic Banking window established in 2005 across its branch network. They were searching for a fool-proof solution that would help them in managing the Time-Attendance and overtime calculation. With offices spread over 14 locations in UAE, management of attendance data was a daunting task. centralized attendance data management All manual work for report generation was eliminated outrightly, simplifying the salary procedure Thus, centralized attendance data management and maintaining a complete record of their employees were a part of their key requirements. Moreover, their payroll processing deployed a software - RAMCO, wherein the attendance data was manually entered. After a comprehensive discussion with the customer, Matrix offered a centralized platform - COSEC CENTRA, to manage all the data centrally. Door controllers - COSEC VEGA FAX installed in all the office entrances. These door controllers are integrated with the central platform that pushes the event data to the server. Furthermore, the Matrix platform is integrated with the payroll system - RAMCO. All manual work for report generation was eliminated outrightly, simplifying the salary procedure. After implementing Matrix solutions, NBQ witnessed drastic changes while following their processes. Customized attendance policy formation Effortless attendance management of multiple locations from the Head Office was prominently one of them. The shift allocation and shift correction processes were streamlined. Their solution included some advanced features like customized attendance policy formation and real item alert on attendance related event & auto-scheduled reporting. This, in turn, ensured efficient employee database management improving productivity. Products and solutions offered: COSEC VEGA FAX A complete Time-Attendance and Access Control solution with a blend of aesthetics, size, connectivity, reliability and ease-of-use. Designed for large enterprises with multi-location organizations. COSEC CENTRA PLT A web-enabled application server that controls the entire system from anywhere in the world. It is the heart of the entire solution and acts as a bridge between applications and the devices. COSEC CENTRA TAM An enterprise-grade solution, designed for organizations the Time-Attendance and Leave Management processes like recording entries and exits, salary processing, etc.
PACOM Systems, which designs, develops, and manufactures security platforms for enterprise multi-site and campus environments, announces that Hancock Whitney Corporation continues to roll out the PACOM GMS security management platform to their growing number of bank financial centers and ATMs. Hancock Whitney Corporation operates bank offices and financial centers in Mississippi, Alabama, Florida, Louisiana, and Texas, offering comprehensive financial products and services, including traditional and online banking; commercial and small business banking; private banking; trust and investment services; healthcare banking; certain insurance services; and mortgage services. Multi-Site security management platform GMS meets end-user demands for a multi-site security system with multiple integrations PACOM’s relationship began with Hancock Bank in Mississippi and, after Hancock’s acquisition of Louisiana-based Whitney Bank in 2011, blossomed further still. Currently, the PACOM GMS software platform manages card access and intrusion monitoring at 258 locations and growing. Hancock Whitney does all its own 24/7/365 alarm monitoring from a central location in Gulfport, Mississippi. There are also two company data centers monitored and protected by PACOM GMS. GMS is a robust multi-site security management platform, providing integration between access control, intrusion, video, intercom and virtually any building management or security solution. Designed to manage thousands of locations simultaneously through a single interface, while providing industry-leading availability and redundancy. GMS meets end-user demands for a multi-site security system with multiple integrations. Third-Party monitoring companies “One of the biggest advantages of the PACOM system,” commented Al Tapper, CPP, Manager, Bank Protective Services for Hancock Whitney Corporation, “is it’s all-inclusive with integrated card access and alarms. We have our entire company on a single, integrated platform. We do our own alarm monitoring, which is a big plus because we can immediately verify what is going on in any of our financial centers.” One of our banking acquisitions had two third-party monitoring companies" Tapper continued, “One of our banking acquisitions had two third-party monitoring companies. It was one false alarm after another. That’s dangerous, and it can be quite expensive. With PACOM and self-monitoring, we avoid that. The PACOM system also helps with disaster recovery. We can see what’s going on in our financial centers and know if our alarms are working.” Central monitoring station Hancock Whitney has launched another phase to their company-wide security platform: video integration. When an alarm goes off in any branch, the central monitoring station will automatically be able to see events associated with that alarm. Eventually, all branches and ATMs will have video monitoring with a number of integrated cameras at each location. The system currently provides access to more than 5,000 card holders with varying levels of access privileges. Alarm protocols are in place for each location, with Tapper and his team managing and monitoring the system. “PACOM helps us adapt the system to our changing needs; and when we provide feedback, PACOM listens and will consistently respond directly to that feedback, said Tapper.”
Since 1964 the Central Bank of Jordan has played a crucial role distributing currency, maintaining national reserves of gold and foreign currencies, supporting economic development and ensuring the stability of the country’s financial system. For the bank, maintaining the most robust, up-to-date standards of security is not just mission critical, it’s a matter of national importance. IDIS technology is now trusted to provide full video protection. IDIS Solution Suite video management software (VMS) is at the heart of the Central Bank’s new video system, with the first phase encompassing 425-plus cameras upgrading its headquarters and protecting three branches. Cost-Efficient remote firmware updates The 8300 series also benefits from the industry’s lowest hard disk drive (HDD) failure rate IDIS Solution Suite’s hybrid capability not only enabled seamless switchover from the bank’s legacy analog cameras, it is easier to operate than competitive systems and will allow cost-efficient remote firmware updates and system maintenance. Ametrad implemented powerful IDIS DR-8364D 64-channel NVRs, with a super-fast 900Mbps throughput to ensure high performance and simultaneous live view and playback with no degradation of image quality or latency. The 8300 series also benefits from the industry’s lowest hard disk drive (HDD) failure rate, while supporting RAID 1, 5 and 10 and uses IDIS’s iBank file structure to deliver an unprecedented level of resilience. Multi-Layered protection against video data loss The NVRs also offer the advantage of flexible H.265 and H.264 dual codec performance allowing the Central Bank to reap the benefits of high-definition H.265 recording, while viewing in H.264. IDIS Intelligent Codec offers further storage and bandwidth savings of up to 90% when combined with Motion Adaptive Transmission (MAT). IDIS Solution Suite further optimizes network bandwidth through dynamic multi-stream control IDIS Solution Suite further optimizes network bandwidth through dynamic multi-stream control by detecting overloads to prevent network strain. And, importantly, it improves the control room operator’s quality of experience in the face of varying network bandwidth. IDIS Critical Failover technology provides multi-layered protection against video data loss due to a wide range of potential fault conditions, such as network instability or power failure. Improving maintenance standards This ensures that recordings are automatically updated without the need for engineer callouts and with no risk of gaps in recordings. Testing at project handover confirmed that the Failover metrics fully met the client’s expectations. The IDIS solution was also selected because of its IDIS Ultimate Warranty, and ease of future expansion with guaranteed forward and backward combability. Security directors at the Central Bank wanted to replace their existing video system with the best new generation and futureproof solution that would deliver simultaneously high performance live view and recording. The bank identified the need to improve maintenance standards, eradicate system failures and ensure a low total cost of ownership. They also wanted to mitigate against video data loss, protect against cyber threats, and have a solution that would be easier for operators to use, with faster footage search and retrieval. Mission-Critical projects Integrator Ametrad Technology Services won a hard-fought tender process against top competitors The control room at the bank’s headquarters needed a complete upgrade with the ability to centrally manage and control surveillance across all its branches. It was essential for the entire project to be delivered with minimum disruption that ensured no loss of video coverage during the phased implementation. Following a competitive proof of concept demonstration with the latest IDIS technology, integrator Ametrad Technology Services won a hard-fought tender process against top competitors, including the long-established previous contract holder. The successful partnership between Ametrad Technology Services and IDIS resulted in efficient project delivery, on time as promised, and has put the two companies a lead position for other mission-critical projects across the Levant region. Password breaches and cyber security loopholes In operation the bank’s new system has lower bandwidth requirements and faster recording retrieval time, making the security operation both more effective and more economical. The bank’s central monitoring team can now work more efficiently, with their new IDIS VMS providing event forwarding, acknowledgements, notifications, live pop-ups and other valuable functions. IDIS’s true plug-and-play technology is also less vulnerable to password breaches and cyber security loopholes, as installation engineers don’t need to manage IP addresses or manually enter passwords for each device. And IDIS’s Linux based servers and proprietary protocols ensure the highest level of resistance to hacking. Highest standard of video surveillance As the system expands FEN will act as force multiplier by reducing installation costs IDIS’s For Every Network (FEN) capability, which uses peer-to-peer technology, also allowed Ametrad engineers to quickly name each branch and connect the system to IDIS Solution Suite. As the system expands FEN will act as force multiplier by reducing installation costs, speeding up implementation time and protecting against human error by eliminating the complexity and cyber challenges associated with multi-site surveillance. "Working in close partnership with IDIS we were able to deliver a smooth, staged technology migration at these critical security sites, with no delays, problems or interruptions to recording," said Ahmad Shanawani, Managing Director of Ametrad Technology Services. Meanwhile, the Central Bank’s engineering department confirms that the IDIS solution now provides the uncompromising standard of protection they need, with lower ongoing costs, easier operation and the assurance that they will continue with the highest standard of video surveillance going forward.
Financial institutions require reliable IP video surveillance systems that provide high-performance, quality, and scalability. Unfortunately, with limited budgets, many financial institutions are still utilising outdated appliances. When security is not a priority, they are putting themselves at risk for fraud, theft, and data breaches. Security Integrators have an opportunity to help financial institutions by upgrading their systems with an up-to-date NVR server and overall video surveillance system which significantly increases performance and mitigates risk. Modern video surveillance system Integrators should utilise BCDVideo’s IP video surveillance appliances which are purpose-built for each unique project. Integrators should utilise BCDVideo’s IP video surveillance appliances which are built for each unique project Budgets can vary depending on the size of the financial institution. Since not all banks and credit unions have the same security budget as large institutions, it can be challenging to upgrade to a modern video surveillance system. To save on the overall cost, generic - often referred to as white-box solutions - are viewed as the only reasonable option. Many white-box solutions are made without performance or quality in mind and are built with miscellaneous parts. Ultimately, the end-user suffers from an unreliable system without extended warranties and support because they opt for short-term savings. White-box solutions are not the only option. Security Integrators should utilise BCDVideo’s IP video surveillance appliances, all of which are purpose-built for each unique project, regardless of size. Giving customers greater security Most of their appliances come standard with a 5-year Keep Your Hard Drive warranty that lowers total cost of ownership. Standard warranties typically require that a failed hard drive be returned to the manufacturer during replacement. KYHD warranty gives customers greater security, compliance enablement, and complete control over their data KYHD warranty gives customers greater security, compliance enablement, and complete control over their data BCDVideo understands that sensitive data could be compromised when the hard drive leaves the site, which is why they offer a Keep Your Hard Drive warranty. The KYHD warranty gives customers greater security, compliance enablement, and complete control over their data, which is particularly important given GDPR requirements. Security Integrators can feel confident quoting any project knowing they can turn to a live video surveillance expert to help them with network design or storage calculations. Mission-critical configurations Choose from a portfolio of products from entry-level to mission-critical, enterprise configurations, as well as a variety of supported architectures. There are three ways to get into contact with BCDVideo: call, email, or submit your request online. BCDVideo is the single source to troubleshoot any implementation or warranty issues. With pre- and post-sales support, save time and resources by not having to call multiple manufacturers or call centers to troubleshoot issues. Experts are on hand to answer questions or troubleshoot a system via remote access. Reduce your total cost of ownership over 5-years with BCDVideo’s lifetime technical and global on-site support warranty, in addition to a guaranteed response. d response.
Traka has launched a new downloadable white paper to open a discussion on the changing nature of retail banking in the UK, using latest case examples to consider branch management and shifting customer expectations. The white paper, titled ‘Shaping the retail banking industry’ looks at several factors influencing the sector, including the increasing expectations and values of customers demanding a more personalized branch experience. Key and equipment management Incorporating analysis from globally renowned financial services, including PwC, Accenture and Deloitte, the paper highlights the opportunities for innovation, together with collaboration and adoption of new operational processes. This incorporates key and equipment management to enable retail banks to deliver on top quality service. The future for retail banking could arguably also be cited as bleak and in a state of industry disruption" Says Mike Hills, Traka UK Market Development Manager and Author of the white paper: “Against a backdrop of negative press concerning the state of UK high streets, the future for retail banking could arguably also be cited as bleak and in a state of industry disruption, as customers move towards a more mobile-connected lifestyle.” Staff and customer security “However, our research in putting together this white paper tells a different story. That actually, the sector has a real chance to embrace the changes occurring and entice their customers, meeting demands for personal service. We found that brands riding the storm are taking small yet significant steps to tailor their services and make operational differences that are proving key to their success.” The white paper focusses on Traka’s experience with Nationwide Building Society to demonstrate how supporting operational efficiency can benefit banking staff and ensure they can focus on serving their customers, without compromising on security. Retail Banking security Mike concluded, “We have brought this white paper together using the latest research and intrinsic market reports, together with case evidence on the future of the retail banking industry and the issues faced by the sector to ensure long term success.” “Within this, we wish to stimulate debate and encourage views and contributions from as many different voices as possible. We look forward to your opinion, experience or comment on this matter of growing importance so together, we can look to support and shape the future of retail banking.”
Ping Identity, the provider of Identity Defined Security, announces its successful completion of the Financial-grade API (FAPI) conformance testing, as part of the process defined by Open Banking Ltd. This builds on Ping Identity’s previous success as the first identity platform to pass all 70 technical security tests, as set by Open Banking Ltd., with zero warnings. The most recent set of FAPI conformance testing evaluated the latest versions of the Ping Intelligent Identity platform, including PingFederate, PingAccess and PingDirectory, within a mock banking environment. Additional technical requirements It switches to an API model with structured data that utilizes a token model such as Open Authorization The inclusion of FAPI within the Ping Identity solution for Open Banking helps allow banks to overcome insecure practices such as screen scraping by using stored user credentials. Instead, it switches to an API model with structured data that utilizes a token model such as Open Authorization. FAPI is a technical specification developed as a multi-industry standard by the FAPI Working Group of OpenID Foundation (OIDF). It leverages OAuth 2.0 and OpenID Connect (OIDC) to define additional technical requirements for the financial industry and other sectors requiring higher security. For banks specifically, FAPI provides various advantages. This includes enabling applications to securely interact with financial accounts, while also enhancing the user’s ability to control security and privacy settings. Secure identity requirements In concurrence with the specification, OpenID Foundation maintains a cloud-based testing suite for conformance testing by banks, certified third-party security providers and platform vendors—such as Ping Identity. The Ping Intelligent Identity platform is used by hundreds of financial services enterprises, including many of the CMA 9 and Open Banking Ltd. itself. Additionally, FAPI is of increasing relevance to the growing number of new fintech start-ups in areas such as investment, wealth management, insurance, payments and even real estate. “This is significant beyond the Open Banking and financial services sector,” explains Rob Otto, EMEA Field CTO, Ping Identity. “Other digitally-focused sectors, with similar secure identity requirements, now have a proven template that can allow them to quickly deploy their own security controls, which have been stringently tested by the largest financial institutions in the UK.”
Round table discussion
The role of video surveillance is expanding, driven by all the new ways that video – and data culled from video – can impact a business. As a growing population of video cameras expands into new fields of view, we asked this week’s Expert Panel Roundtable: What is the most unusual application of surveillance cameras you have seen recently?
Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
Beyond Security - Access Control For Multi-Tenant SitesDownload
Reducing The Cost of Video Surveillance System Deployment and OperationDownload
RFID and Smartphone Readers in Physical Access ControlDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals