Cellphone device and app security provider Trustonic announces that its Trusted Execution Environment (TEE) solution is the first hardware-backed TEE to complete the EMVCo Software-Based Cellphone Payments security evaluation process. EMVCo is the global technical body that facilitates the worldwide interoperability and acceptance of secure payment transactions. As such, this evaluation process confirms that the Trustonic TEE provides a robust security foundation that meets the requirements of s...
Intersec 2020, a popular security, safety, and fire protection trade show, held under the patronage of HH Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum, opened its doors to the latest security safety solutions and three days of agenda-setting discussion, as global industry sources tip the Middle East security sector for 10% annual growth over the next two years. With more than 1,100 exhibitors from 56 countries, Intersec was officially inaugurated by Major General Expert Rashid Thani Al Mat...
Global security company Hanwha Techwin recently took part in Intersec 2020, the security exhibition in the Middle East. Held in Dubai (UAE), the trade show provided the perfect opportunity for Hanwha Techwin to showcase its products, including Middle East-optimized devices and cutting-edge AI solutions, on a truly global stage. Intersec is an annual trade fair for the security and safety sectors, where all the latest trends and technologies can be found under one roof. At this year’s even...
ONVU Technologies, the provider of empathy-led solutions in the surveillance, learning and retail industries, announced that Simon Pearson has joined the Group as VP Commercial. In this role, Pearson will have revenue responsibility for the Group businesses, Oncam, ONVU Learning and ONVU Retail. He will bring cohesion, direction and overall strategic vision to the sales and marketing activities across the group to help propel the Group into its next stage of growth. Pearson is an experienced te...
New ways to identify fake security devices on banknotes, passports and other secured documents will be at the heart of the Optical Document Security conference for central banks, ID issuers and authorities, banknote and ID printers / integrators and secure document component suppliers. The Optical Document Security conference, which takes place in San Francisco, California (January 29 – 31, 2020), will provide insight and guidance for everyone involved in improving the specification, desi...
IDIS is poised to extend its deep learning capabilities, and to lead the sector with more advanced projects in the Middle East, with the launch a powerful line-up of Edge VA bullet and fixed domes featuring essential on-board analytics, to be showcased at Intersec (19-21 January in Dubai) on stand SA-A28. Crucially, the new camera range will allow users to leverage the power of IDIS Instant Meta Filtering, with the ability to access and search video data, stored on IDIS NVRs, through the totall...
Security companies provide a type of service that tends to go unnoticed except when it’s missed. Businesses, banks, stores, event organizers and VIPs are their main clients. Their demand is increasing, mostly due to the expansion that Southern California has experienced in the latest years. Small cities and towns are increasingly growing every day, mostly due to internal migration and the high prices of rent in Los Angeles County. Veteran Los Angeles security company HillQuest Security knows about this growth and the demand for services like the ones they provide. That’s why they’ve decided to expand their already wide range of services (which included more than 60 cities by 2018) to the entirety of Orange and Riverside counties. Security options for businesses HillQuest Security has started to provide security guard services in Orange County and Riverside since early 2019. What was initially a test venture that turned out to be really successful for the company became a full-service activity. Now, HillQuest has started to offer its full range of security options for businesses and individuals in those areas. Our trained, licensed expert security officers can handle any and all of your security needs" Businesses and other entities in the OC and Riverside can now hire HillQuest Security mobile patrols, bodyguards, security systems, loss prevention, and other security services for banks, construction areas, health care facilities, hotels, apartment complexes, movie sets, parking lots, schools and event venues. Security services “We provide security services that are perfectly tailored for you,” says John Bouzy, HillQuest Security owner. "Our trained, licensed expert security officers can handle any and all of your security needs. Moreover, we can do that any time of day as well." According to its website, the company is insured with a $5 million dollar policy and all officers “meet the standards set by the Bureau of Security and Investigative Services".
Remote electronic signature specialist, Cryptomathic, announces that its popular e-signature solution, Signer, has been recognized as providing the highest possible level of security following its Common Criteria certification to the new eIDAS protection profile 419241-2 for remote Qualified Electronic Signatures. Signer’s Common Criteria certification significantly raises the bar. Not only does Signer join an elite few remote Qualified Signature Creation Devices (QSCDs) to be certified against the new eIDAS protection profile, it is the first solution to place the Signature Activation Module (SAM) inside the Hardware Security Module (HSM). This means the signing payload can only be executed from inside the protected cryptographic environment, making it significantly more resistant to attack, including from insiders. Protected cryptographic environment Common Criteria certification is expected to become a mandatory requirement under the eIDAS regulation Signer also offers What You See Is What You Sign (WYSIWYS) functionality, which provides strong non-repudiation and addresses long term validation signature profiles for XML or PDF documents. The combination of these factors elevates Signer to a high-assurance level that is unmatched anywhere else in the e-signature industry. “Common Criteria certification to this new protection profile is widely expected to become a mandatory requirement under the terms of the eIDAS regulation, so we’re delighted to be this far ahead of the game,” comments Guillaume Forget, Managing Director, Cryptomathic GmbH. High security software “The governments, banks and other entities that use Signer rely on Cryptomathic to provide the highest possible assurance level in its remote qualified e-signature services. To meet these expectations, we have set up and enforced a secure development environment and procedures that meet the highest levels within Common Criteria." "Cryptomathic has demonstrated the ability to document and meet security properties, again, at the highest level. The certification has shown that our development team in Denmark is in full control of all tools and processes related to the complete product life cycle. It’s a terrific achievement and cements our position at the bleeding edge of high security software.” Electronically sign documents Cryptomathic is provider of e-signature technology and assists multiple trust services providers and banks to enable their customers to electronically sign documents and transactions at the highest assurance level.
Genetec Inc., a pioneer technology provider of unified security, public safety, operations, and business intelligence announced strategic new initiatives to support its fast growth in Mexico. To spearhead these new initiatives, long time Genetec sales leader, Alain Bissada, who is currently Senior Director for Canada, is taking on a new expanded role to include Mexico as part of his responsibilities. In this new position, Alain Bissada will be responsible for supporting the company’s wide range of public safety, industrial, enterprise, retail and banking customers in Mexico, and put in place the necessary infrastructure to support its ambitious growth plans. Unified IP security solutions Genetec has been growing its market presence in Mexico at a very rapid pace Genetec is currently undertaking a recruitment campaign to support its growth in the region and is actively looking for a new country manager. The company will be moving to new, modern offices in the Polanco region of Mexico City, featuring a state-of-the-art experience center to showcase its entire range of unified IP security solutions, a sales engineering lab, training facilities, and additional space to accommodate new employees. As the vendor of video surveillance, access control and license plate recognition solutions, Genetec has been growing its market presence in Mexico at a very rapid pace. The company currently has public safety customers in 26 out of Mexico’s 32 states, and hundreds of private customers across a wide range of industries including, manufacturing, logistics, utilities, hospitality and more. Physical security infrastructure investment “Customers are looking for technology solutions that not only enable them to protect people and assets but also help them make the most of their video surveillance and physical security infrastructure investment to improve their operations,” said Alain Bissada, Senior Director, Canada and Mexico. “I look forward to working with our talented team and network of systems integrators in Mexico to support our ambitious plans in the region and to give our customers the support they need to meet their security and business operations needs.”
HID Global, global provider of trusted identity solutions, has announced that it has collaborated with Temenos, the banking software company, to integrate HID’s risk-based authentication solution with Temenos Infinity, a breakthrough digital front office product, and Temenos T24 Transact, the next generation in core banking. The joint offering, available on-premise or in the cloud, provides an agile, simplified path to secure digital banking, reducing the time and cost of delivering risk-based adaptive authentication, threat detection, and transaction signing on the Temenos platform. As part of the integration, HID Global’s authentication solution can now offer self-service functions to over 3,000 Temenos customers through Temenos MarketPlace. Temenos MarketPlace Temenos MarketPlace serves as an online store, where Temenos curates the most innovative fintechs Temenos MarketPlace serves as an online store, where Temenos curates the most innovative fintechs and connects them with financial institutions from around the world. HID Global’s authentication solution for Temenos customers combines its ActivID Authentication Platform with the HID Risk Management Solution featuring real-time risk profiling technology. It also includes HID Approve, a next-generation multi-factor authentication solution for online and mobile banking customers. HID Approve combines the security of public key-based cryptography and mobile-based out-of-band transaction signatures with the convenience of mobile push notification. HID Approve public key-based cryptography solution “HID has partnered with Temenos for more than a decade to provide solutions for nearly 100 banks worldwide,” said Brad Jarvis, Vice President and Managing Director of Identity & Access Management Solutions (IAMS) with HID Global. Brad adds, “This latest collaboration streamlines banks’ ability to implement advanced user authentication services with Temenos Infinity and Temenos T24 Transact. The pre-configured integration makes it easier than ever for Temenos customers to deploy out authentication tools without any customized development.” Risk-based authentication HID Global’s three plug-and-play components for risk-based authentication are tightly integrated with Temenos Infinity and Temenos T24 Transact. They provide several key capabilities that enable existing financial institutions and new digital startups to better facilitate secure digital banking: User profiles are automatically synchronized to the multi-tenant HID Authentication service when new accounts are created in Temenos T24 Transact. Administrators manage user authentication in Temenos Infinity. The solution handles all authentication administration tasks including management of the user device and credentials, in addition to displaying user authentication events and audit logs directly within Temenos Infinity. The HID Risk Management solution enables customers to protect their financial transaction systems and banking applications using a combination of evidence-based threat detection capabilities with behavioral biometrics supported by machine learning. Countering rapid increase in cases of financial fraud Banks need to protect their customers as well as retain them and improve trust"“As more and more customers bank through digital channels, incidents of fraud naturally increase and the ramifications to both bank and consumer can be massive,” said Adam Gable, Product Director – Financial Crime Mitigation, Treasury and Risk, Temenos, adding “Banks need to protect their customers as well as retain them and improve trust. Using a combination of innovative technologies and techniques, HID’s risk-based authentication solution means customers benefit from improved security at the source of the financial transaction – the device. Adam further stated, “The solution is a great addition to the Temenos MarketPlace, pre-built to work with the cloud-native and cloud-agnostic Temenos Infinity and Temenos T24 Transact. With this integration, Temenos customers will benefit from reduced cost and complexity of integration, while gaining access to a greater variety in security options.” Multi-Tenant HID Authentication Service “We are very excited to see our long-standing relationship with HID further strengthened with the introduction of this risk-based user authentication solution,” said Paul Roberts, Director – Temenos MarketPlace. “In today’s digital banking world, this solution brings essential protection and additional peace of mind for both banks and their customers.” The multi-tenant HID Authentication Service includes interoperable Application Programming Interfaces (APIs) to allow for standard integrations with third-party software and supports easy scalability, testing and deployment.
Geutebrück is well positioned for the industry 4.0. The family-owned company has expanded its portfolio within a short time, from being a pure CCTV supplier of products for distributors and installers to a provider of software-based all-round solutions for safety and process optimization, including for end customers. Part of this were not only comprehensive technical developments or a significantly higher range of services, but also organizational reorganization, such as the Business and Development division that was newly created in April. It includes the Key Account, Key Market Development, Pre-Sales and Marketing departments. Burkhard Henzgen is the General Manager Business Development. He directly reports to the two CEOs Katharina Geutebrück and Christoph Hoffmann. Henzgen is supported by Georg Goffin, Director Sales, who is responsible for the DACH region with his team, and Dr. Christian Gutzen, who also heads the newly created "Pre-Sales" division. User-friendly video security software Museums, KRITIS, banks or public authorities from over 70 countries use Geutebrück's solutions Isabel Kluth, who only joined Geutebrück in October, is in charge of national and international marketing. The Finance, HR and Controlling departments, for which Andreas Degen is responsible as Commercial Director, have also been restructured. Katharina Geutebrück, CEO: "The new management team will ensure that we continue to be experts in a field that only a few providers worldwide are able to master.” Geutebrück is an international provider of highly available, user-friendly video security software and the corresponding hardware. The Geutebrück experts provide consulting and services to customers throughout the planning phase, during implementation and after completing the order. Well-known museums, KRITIS (critical infrastructures), companies from industry and logistics, banks or public authorities from over 70 countries use Geutebrück's solutions. The family-owned company is managed in the second generation by Katharina Geutebrück and her husband Christoph Hoffmann and celebrates its 50th anniversary in 2020.
NEC Corporation and NEC Asia Pacific have announced their participation at the inaugural SFF x Switch event at the Singapore EXPO Convention & Exhibition Center from 11th to 15th November 2019. SFF x Switch During the three-day exhibition and conference of SFF x Switch (11-13 November), NEC will exhibit a suite of digital solutions aimed at empowering financial service providers with the technology to create innovative digital services for their customers. Key solutions to be exhibited at NEC's booth (#2R17) include: NEC will showcase a cloud-based facial authentication solution with liveness detection Banking as a Service: This vendor-agnostic end-to-end solution provides financial service providers with a suite of innovative functions systems, such as deposits, loans, and asset financing as a subscription-based service. This service is provided by Banqsoft A/S, a fully owned subsidiary of KMD A/S, a NEC company. Digital ID: NEC will showcase a cloud-based facial authentication solution with liveness detection which forms part of its Biometric Digital Identity Service (BDIS); a federated ATM which allows users to withdraw money from different banks with only their face; blockchain technology to secure shared ATM-based bank transactions; and Denso Wave's SQRC (Secured QR Code) solution that combines facial recognition to facilitate POS transactions for offline authentication requirements. End-to-end digital solutions "With the rise in security risks and the need to develop new, unique products for customers, banks and service providers worldwide have to be agile to succeed in this digital age," said Daichi Iwata, Director, Digital Integration Division, NEC Corporation. "NEC's comprehensive, end-to-end digital solutions are well-placed to address the emerging challenges to create banks of the future." A combination of the Singapore FinTech Festival (SFF) and the Singapore Week of Innovation and Technology (SWITCH), this week-long event features various activities, conferences and exhibitions centered on innovations across the themes of FinTech and Deep Tech.
The explosive expansion of IT infrastructure has led to the identity and access management market gaining substantial momentum. As the onslaught of information technology continues, organizations are able to offer users quick and easy access to systems and information from any place, at any time. However the ease of access is inherently associated with the risk of security breach. Organizations have to find a balance between fulfilling user demands and doing so in a manner that is safe enough so that cybercriminals cannot take advantage of the system, thus strengthening identity and access management market trends. The prominence of IAM solutions in the BFSI sector In 2016, the world was shocked by the news of the Bangladesh bank heist in which cybercriminals were successful in conducting unauthorized money transfer from Bangladesh Central Bank to banks in Philippines, Sri Lanka and other parts of Asia. In the heist, criminals used Society for Worldwide Interbank Financial Telecommunication (SWIFT) credentials of Bangladesh Bank's employees to carry out more than three dozen fraudulent transactions and extracted $81 million from Bangladesh Central Bank. More than three dozen fraudulent transactions and extracted $81 million from Bangladesh Central Bank. More recently in 2018, hackers were able to siphon nearly $20 million from Mexican banks. Analysts point out that targeted bank systems had security holes that made access to internal servers much easier. Also lack of strong access controls was used by hackers to use credentials of compromised employee to gain considerable mileage in the siphoning. Identity and access management industry has therefore registered a lot of interest through the financial sector and banks as financial institutions need to prove themselves reliable of customers’ trust. Banks and other financial institutions are rapidly adopting identity and access management solutions which are capable of providing strong security starting at authentication level and extending all the way to application and data layers. IAM solutions make it possible for financial institutions to integrate new applications and deploy to cloud with greater ease and rapidity. With versatile hybrid deployment model provided by leading IAM solutions, connectivity to SaaS applications as well as legacy enterprise web applications happens more quickly as well as securely. IAM solutions make it possible for financial institutions to integrate new applications and deploy to cloud The significance of cloud and its impact on IAM market outlook Just as the banking sector is facing the challenge of identity authentication as customers around the world are demanding any time access, the proliferation of IoT and cloud technologies is changing the very texture of the society in multiple ways. With advancement in IoT technologies, the advent of smart cities has gathered considerable traction. While sensors have been installed in New York that can detect gunshots and alert police, the city of Boston has developed a mobile app helps citizens to report civic problems like burnt out streetlights and potholes. Cities like Paris, Oslo and Hong Kong have large internet- connected statues that are filled with moss to absorb air pollution and notify operators about malfunctions. The network of connected devices continues to expand and the rise of 5G connectivity is anticipated to be connecting traffic signals, air quality sensors, police patrol cars, etc., over the coming years. Reportedly there would be billions of connected devices around the world by 2020 which will naturally create immense opportunities for identity and access management industry players. This is because new security threats will continue to surface, as without proper security all connected devices are at the risk of being hacked. The evolution of the smart era – how will it impact IAM market dynamics? Connected devices that constitute the very fabric of smart cities are essentially IoT devices that would be in the field for the next ten fifteen years and therefore identity and access management must be built into the system from the beginning. As identities, keys and tokens have to be managed every time new devices are added, or old ones are removed and the cloud ecosystem is updated, the security components within devices have to be managed well to extend their lifecycle. Identity and access management must be built into the system from the beginning Not only cities but factories are also getting smarter. The term Industry 4.0 came to be first used when the German government used it to define the country’s strategy towards increased digitization in manufacturing. As technologies like IoT and cloud computing continued to expand, they came to be included in the term, and Industry 4.0 came to represent the ecosystem of Internet-connected machines with streamlined and automated workforce and reduced production costs. As the ecosystem continued to expand, trust and identity became important issues in order to ensure the integrity of a smart factory. Healthcare is rapidly becoming a fully digital environment IAM solutions – Influencing the coveted medical domain Other fields like healthcare have also not been impervious to the effects of technological transition. Healthcare is rapidly becoming a fully digital environment that has reaped the benefits of sophisticated IT tools in delivery of care. This has however exposed sensitive healthcare data to cybercriminals who had attempted to hold critical systems and patient records of hospitals to ransom. Healthcare is rapidly becoming a fully digital environment In recent years more than 80% of healthcare institutions have reported that they registered some degree of cyberattacks. Providers and users are increasingly operating from multiple locations, many of which are outside the hospital premises. With users demanding to access systems through a variety of devices, identity and access management has come to witness greater traction from healthcare providers. Over the coming years, the world will be rapidly adopting 5G networks. Though 5G promises much more speedy services for users and business ecosystems, the technology is also expected to impose greater responsibilities on confidentiality of user data and integrity of applications. Identity and access management industry players had been investing in expansive R&D as cyber threats continue to evolve and introduction of new technologies and advent of IoT drastically changes the relationship that users have with their devices. Identity and access management is expected to be useful when much more than personal information is at stake. When cyber criminals have the power to hold hospitals or traffic signals to ransom and disrupt daily lives, health and safety become a priority for authorities and security measures have to be tightened. For instance, after the bank heists in Mexico, the Mexican bank authorities have come to recognize the inevitability for the need of greater control and security of banking networks. Mexican banks have invested heavily over the last year in strengthening their defenses. As such measures against cyberattacks become the norm, identity and access management market is expected to register massive gains over the ensuing years.
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organizations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains. User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anything like the 5.4 billion user IDs on haveibeenpwned.com, their login has already been compromised. If it's not listed, it could be soon. Recent estimates state that 8 million more credentials are compromised every day. Ensuring Safe Access Data breaches, ransomware and phishing campaigns are increasingly easy to pull off. Cyber criminals can easily find the tools they need on Google with little to no technical knowledge. Breached passwords are readily available to cyber criminals on the internet. Those that haven’t been breached can also be guessed, phished or cracked using one of the many “brute-force” tools available on the internet. It's becoming clear that login credentials are no longer enough to secure your users' accounts. Meanwhile, organizations have a responsibility and an ever-stricter legal obligation to protect their users’ sensitive data. This makes ensuring safe access to the services they need challenging, particularly when trying to provide a user experience that won’t cause frustration – or worse, lose your customers’ interest. After GDPR was implemented across the European Union, organizations could face a fine of up to €20 million, or 4% annual global turnover Importance Of Data Protection So how can businesses ensure their users can safely and simply access the services they need while keeping intruders out, and why is it so important to strike that balance? After GDPR was implemented across the European Union, organizations could face a fine of up to €20 million, or 4% annual global turnover – whichever is higher, should they seriously fail to comply with their data protection obligations. This alone was enough to prompt many organizations to get serious about their user’s security. Still, not every business followed suit. Cloud Security Risks Breaches were most commonly identified in organizations using cloud computing or where staff use personal devices According to a recent survey conducted at Infosecurity Europe, more than a quarter of organizations did not feel ready to comply with GDPR in August 2018 – three months after the compliance deadline. Meanwhile, according to the UK Government’s 2018 Cyber Security Breaches survey, 45% of businesses reported breaches or attacks in the last 12 months. According to the report, logins are less secure when accessing services in the cloud where they aren't protected by enterprise firewalls and security systems. Moreover, breaches were most commonly identified in organizations using cloud computing or where staff use personal devices (known as BYOD). According to the survey, 61% of UK organizations use cloud-based services. The figure is higher in banking and finance (74%), IT and communications (81%) and education (75%). Additionally, 45% of businesses have BYOD. This indicates a precarious situation. The majority of businesses hold personal data on users electronically and may be placing users at risk if their IT environments are not adequately protected. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine Hacking Methodology In a recent exposé on LifeHacker, Internet standards expert John Pozadzides revealed multiple methods hackers use to bypass even the most secure passwords. According to John’s revelations, 20% of passwords are simple enough to guess using easily accessible information. But that doesn’t leave the remaining 80% safe. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine. Brute force attacks are one of the easiest methods, but criminals also use increasingly sophisticated phishing campaigns to fool users into handing over their passwords. Users expect organizations to protect their passwords and keep intruders out of their accounts Once a threat actor has access to one password, they can easily gain access to multiple accounts. This is because, according to Mashable, 87% of users aged 18-30 and 81% of users aged 31+ reuse the same passwords across multiple accounts. It’s becoming clear that passwords are no longer enough to keep online accounts secure. Securing Data With Simplicity Users expect organizations to protect their passwords and keep intruders out of their accounts. As a result of a data breach, companies will of course suffer financial losses through fines and remediation costs. Beyond the immediate financial repercussions, however, the reputational damage can be seriously costly. A recent Gemalto study showed that 44% of consumers would leave their bank in the event of a security breach, and 38% would switch to a competitor offering a better service. Simplicity is equally important, however. For example, if it’s not delivered in ecommerce, one in three customers will abandon their purchase – as a recent report by Magnetic North revealed. If a login process is confusing, staff may be tempted to help themselves access the information they need by slipping out of secure habits. They may write their passwords down, share them with other members of staff, and may be more susceptible to social engineering attacks. So how do organizations strike the right balance? For many, Identity and Access Management solutions help to deliver secure access across the entire estate. It’s important though that these enable simplicity for the organization, as well as users. Organizations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so Flexible IAM While IAM is highly recommended, organizations should seek solutions that offer the flexibility to define their own balance between a seamless end-user journey and the need for a high level of identity assurance. organizations’ identity management requirements will change over time. So too will their IT environments. organizations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so. Importantly, the best solutions will be those that enable this flexibility without spending significant time and resource each time adaptations need to be made. Those that do will provide the best return on investment for organizations looking to keep intruders at bay, while enabling users to log in safely and simply.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban On Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes A Splash With Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact Of Data-Driven Smart Cities On Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyze data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing The Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends For 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How To Prevent ATM Jackpotting With Physical And Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need To Look Beyond Technology For Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organization. 10. The Evolution Of Facial Recognition From Body-Cams To Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
Most customers interface with their financial institutions using automated teller machines (ATMs), which have security issues. However, there are solutions available to combat all current security threats, and the cost of protection is coming down. The ATM industry is therefore in a position to minimize losses, while ensuring consumers continue to get the vital cash they need to lead their daily lives. It is important for the ATM industry to constantly innovate to meet new security challenges. So what innovations are we going to see in the next five years? Contactless technology Contactless technology will be a great help against ATM skimming, in which criminals steal personal information at ATM machines. Contactless is already being used in some European countries, and the number is increasing. Not having to insert a card into the ATM removes the opportunity to trap cards and also gets around the problem of “foreign” devices installed to read cards. So contactless technology, which some saw as the end of cash, can help make ATMs and cash more secure. Data capture form to appear here! Not having to insert a card into the ATM removes the opportunity to trap cards Biometrics are certain to be used increasingly to bolster ATM security. Finger, palm, vein, iris and facial recognition all have potential in this respect. Any of these may in the future be used with or without cards, PINs and one-time codes. Speed of operation in relation to biometrics could ultimately govern their use at ATMs. There may also be privacy issues that need to be addressed. The ATM vestibule environment must add security with proper security and surveillance equipment. ATM vestibules, or lobbies, are installed for many good reasons. For one, more convenient, 24/7 locations equals better customer retention for a bank, offering comfort and convenience. 24/7 access to ATMs, night drops, coin counters, online banking kiosks, and other self-service solutions are very much in demand. Second, ATM vestibules protect customers from inclement weather and provide a more comfortable banking environment (however, vagrancy can be an issue; therefore ATM vestibules should require card access). Security and surveillance solutions can’t just be for show. ATMs and crime A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and the United States. Rough estimates place the total amount of global losses at up to $60 million. The protection of ATMs ATMs in supermarkets and pharmacies tend to be targeted because they may not be as well-protected, and store personnel likely would not know who is authorized to work on the ATM. In contrast, anyone approaching an ATM at a bank location would be more likely to be challenged. ATM jackpotting originated back in 2010 when Barnaby Jack, a New Zealand hacker and computer expert, demonstrated how he could exploit two ATMs and make them dispense cash on the stage at the Black Hat computer security conference in Las Vegas. Since then, malware has been created and made available on the “Dark Web” that can instruct an ATM to dispense all its cash on demand. ATM jackpotting ATM jackpotting is a combination of a physical crime and a cyberattack ATM jackpotting is a combination of a physical crime and a cyberattack. Typically, a criminal with a fake ID enters a grocery shop or pharmacy posing as an ATM technician, then uses a crowbar to open the top of the ATM – the “top hat” – to gain access to the personal computer that operates the machine. Once he or she has access to the PC, they remove the hard drive, disable any anti-virus software, install a malware program, replace the hard drive and then reboot the computer. The whole operation takes about 30 seconds. The malware then enables the thief to remotely control the ATM and direct it to dispense all its cash on command. If a legitimate customer approaches the machine in the meantime, it can operate as usual until activated otherwise by the malware. Catch up on part one and part two of our banking security mini series.
In the banking world, the threat of unwanted intrusions into premises leading to loss of property and even risk to life is always present. Small wonder then that banking institutions take so much care over their security systems and also over their choice of suppliers for those products. In the retail banking sector, requirements for intrusion detection and related security measures are necessarily more stringent and more specialized than in most other areas of business and commerce. Data capture form to appear here! The banks clearly need to work with suppliers whose integrity is beyond question. They should also be looking for organizations that can offer expert advice, gained through their knowledge of design and manufacturing security products. Systems need specialist installer partners in order to provide a seamless solution. Systems need specialist installer partners in order to provide a seamless solution The special requirements of the banking sector These supplier organizations must also fully understand the special requirements of the banking sector and, ideally, should be able to demonstrate proven experience in that sector. They must also be willing and able to work with the bank as a partner, to find better ways of addressing old threats and to develop effective measures to counter new ones. Video is a big component of providing security, and variable lighting conditions pose a persistent challenge in video surveillance applications such as large banks and financial institutions. Typically, these venues include an abundance of windows. The resulting excessive light can damage video image quality, by flooding the image plane of the surveillance camera. Dramatic differences between light and dark areas complicate the ability of video cameras to view someone standing in the shadows. A contrasting lack of windows at teller stations can result in dim lighting, equally damaging video image quality, in critical surveillance areas where clear, detailed images are needed the most. Stark contrasts between white and black levels in video images can obliterate faces and finer details of a subject when in a darker area. Particularly, this happens when a person is amid dark internal lighting, with his/her back to the sun. Data capture form to appear here! A new network architecture When upgrading a bank’s digital security system, a new network architecture needs to be created. Usually, this means switching from DVRs to NVR servers. As a result, network switches attach to the camera allowing for easier future system expansion. Along with the newly gained scalability, throughput performance on servers can achieve significantly higher levels. Servers, networking and workstations provide enterprise-quality performance for all financial projects, regardless of size. Servers, networking and workstations provide enterprise-quality performance for all financial projects Implementing a complete video solution with high-performance servers, modern networking protocols and powerful workstations is now possible in financial institutions, even for small projects. Servers, networking and workstations provide enterprise-quality performance for all financial projects, regardless of size. Software is also part of the solution. A new software platform helps banks and credit unions simplify, modernize, and automate security, surveillance and fraud investigations across their enterprise. The platform eases the daily challenges security investigators face. It simplifies and reduces the time to access live and recorded video through an intuitive interface, empowering users to quickly find the data needed to eliminate risks while increasing productivity. With an enhanced user experience, investigators can reduce training time, align investigation workflow, streamline video sharing, and focus on more critical tasks. The fraud and security challenges banks contend with can be overwhelming, but prompt action is necessary to limit the damage that can greatly affect customers, employees, and the brand. When an incident occurs, investigators must turn to innovative security tools to be able to swiftly locate and analyze data. But these solutions are typically complex to use and manage. Investigators must turn to innovative security tools to be able to swiftly locate and analyze data Changing work environments The changing work environment of financial institutions is impacting security needs. A credit union in Australia operates an innovative, modern working environment that utilizes flexible workspaces in place of traditional desks. Staff are not allocated a specific desk but instead choose where they wish to sit each day. To facilitate the operation of the flexible work environment and provide employees with storage for their personal effects (work-related material is stored elsewhere), the credit union uses banks of brightly colored lockers that are managed by electronic access control. Using Gallagher’s smartcard, multi-technology T20 and T10 readers on each locker bank, staff badge their access card to open their allocated locker. With the readers communicating with Gallagher’s Command Center software management platform, the credit union has a simple-to-operate, customizable system that enables staff to carry just one card on site. Read part one and part three of our banking security mini series.
We live in an age when private customer data is constantly under attack from hackers. Cyber-threats have taken a front seat in the line-up of primary risks facing banks and financial institutions. The fact that cyber-attacks are becoming more prevalent isn't the only issue; they're also becoming more complex and therefore harder to address. And although the convenient interconnectivity of the Internet of Things (IoT) creates many advantages for financial institutions, there is also an increased risk to dangerous threats. Data capture form to appear here! The impact of cyber heists Money taken in cyber heists, both in banking and elsewhere, was estimated at $3 trillion According to Cybersecurity Ventures, the amount of money taken in cyber heists, both in banking and elsewhere, was estimated at $3 trillion overall for 2015, and this substantial amount is expected to double by 2021. In today’s environment, banks, credit unions, and financial organizations of all types are primary targets for hackers. But it’s not just the monetary loss that these businesses need to be concerned about — there is also a threat to the brand, customer trust, and employee safety. Banking surveys Banking choices are influenced by how secure consumers feel when conducting transactions, either in their local branch, at an ATM or online. In one survey, a vast majority of consumers (98%) felt most secure when conducting transactions at their local banking branch, compared with 92% when conducting transactions online and 85% using a mobile phone app. Further, 90% of consumers said they feel safer when they can see video surveillance cameras in their bank or credit union and would choose a financial institution with surveillance over one without, all other things being equal. Here are some other key findings from the survey: Half of consumers have walked away from an ATM without conducting their intended transaction because someone was loitering in the vestibule 60% of consumers noticed a fraudulent transaction before their financial institution, leaving plenty of opportunity for banks and credit unions to be more proactive when it comes to identifying and notifying customers about potential fraud “Banks and credit unions recognize that today’s consumers want a mix of in-person and online banking service options and have very high expectations when it comes to security and customer service,” said Peter Strom, President and CEO, March Networks, which provides security systems for banks. To increase security, biometric solutions are replacing PINs at physical ATMs To increase security, biometric solutions are replacing PINs at physical ATMs and providing a more fool-proof form of identification for banking security. Ways to increase banking security Popular use cases include a) PIN replacement at physical ATMs; b) proof-of-presence (such as pension benefit distribution) that requires liveness detection; c) more easily authenticating multiple transactions during a single ATM session; d) incorporating biometric information directly into a smart device; and e) the ability to leverage investments in biometric enrollment databases across multiple applications. An example of the latter is when fingerprint authentication on mobile devices used for payments and secure mobile banking is also used in conjunction with enrolled information for authentication at an ATM. The availability of interoperable authentication devices would permit cross-bank usage and pave the way for many new applications in the future. By enrolling a citizen’s fingerprints and then creating an ecosystem in which these transactions are strongly tied to that individual’s biometrics, the potential for fraud and identity theft approaches zero, and the process is simple and convenient for users. Read part two and part three of our banking security mini series.
PACOM Systems, which designs, develops, and manufactures security platforms for enterprise multi-site and campus environments, announces that Hancock Whitney Corporation continues to roll out the PACOM GMS security management platform to their growing number of bank financial centers and ATMs. Hancock Whitney Corporation operates bank offices and financial centers in Mississippi, Alabama, Florida, Louisiana, and Texas, offering comprehensive financial products and services, including traditional and online banking; commercial and small business banking; private banking; trust and investment services; healthcare banking; certain insurance services; and mortgage services. Multi-Site security management platform GMS meets end-user demands for a multi-site security system with multiple integrations PACOM’s relationship began with Hancock Bank in Mississippi and, after Hancock’s acquisition of Louisiana-based Whitney Bank in 2011, blossomed further still. Currently, the PACOM GMS software platform manages card access and intrusion monitoring at 258 locations and growing. Hancock Whitney does all its own 24/7/365 alarm monitoring from a central location in Gulfport, Mississippi. There are also two company data centers monitored and protected by PACOM GMS. GMS is a robust multi-site security management platform, providing integration between access control, intrusion, video, intercom and virtually any building management or security solution. Designed to manage thousands of locations simultaneously through a single interface, while providing industry-leading availability and redundancy. GMS meets end-user demands for a multi-site security system with multiple integrations. Third-Party monitoring companies “One of the biggest advantages of the PACOM system,” commented Al Tapper, CPP, Manager, Bank Protective Services for Hancock Whitney Corporation, “is it’s all-inclusive with integrated card access and alarms. We have our entire company on a single, integrated platform. We do our own alarm monitoring, which is a big plus because we can immediately verify what is going on in any of our financial centers.” One of our banking acquisitions had two third-party monitoring companies" Tapper continued, “One of our banking acquisitions had two third-party monitoring companies. It was one false alarm after another. That’s dangerous, and it can be quite expensive. With PACOM and self-monitoring, we avoid that. The PACOM system also helps with disaster recovery. We can see what’s going on in our financial centers and know if our alarms are working.” Central monitoring station Hancock Whitney has launched another phase to their company-wide security platform: video integration. When an alarm goes off in any branch, the central monitoring station will automatically be able to see events associated with that alarm. Eventually, all branches and ATMs will have video monitoring with a number of integrated cameras at each location. The system currently provides access to more than 5,000 card holders with varying levels of access privileges. Alarm protocols are in place for each location, with Tapper and his team managing and monitoring the system. “PACOM helps us adapt the system to our changing needs; and when we provide feedback, PACOM listens and will consistently respond directly to that feedback, said Tapper.”
Since 1964 the Central Bank of Jordan has played a crucial role distributing currency, maintaining national reserves of gold and foreign currencies, supporting economic development and ensuring the stability of the country’s financial system. For the bank, maintaining the most robust, up-to-date standards of security is not just mission critical, it’s a matter of national importance. IDIS technology is now trusted to provide full video protection. IDIS Solution Suite video management software (VMS) is at the heart of the Central Bank’s new video system, with the first phase encompassing 425-plus cameras upgrading its headquarters and protecting three branches. Cost-Efficient remote firmware updates The 8300 series also benefits from the industry’s lowest hard disk drive (HDD) failure rate IDIS Solution Suite’s hybrid capability not only enabled seamless switchover from the bank’s legacy analog cameras, it is easier to operate than competitive systems and will allow cost-efficient remote firmware updates and system maintenance. Ametrad implemented powerful IDIS DR-8364D 64-channel NVRs, with a super-fast 900Mbps throughput to ensure high performance and simultaneous live view and playback with no degradation of image quality or latency. The 8300 series also benefits from the industry’s lowest hard disk drive (HDD) failure rate, while supporting RAID 1, 5 and 10 and uses IDIS’s iBank file structure to deliver an unprecedented level of resilience. Multi-Layered protection against video data loss The NVRs also offer the advantage of flexible H.265 and H.264 dual codec performance allowing the Central Bank to reap the benefits of high-definition H.265 recording, while viewing in H.264. IDIS Intelligent Codec offers further storage and bandwidth savings of up to 90% when combined with Motion Adaptive Transmission (MAT). IDIS Solution Suite further optimizes network bandwidth through dynamic multi-stream control IDIS Solution Suite further optimizes network bandwidth through dynamic multi-stream control by detecting overloads to prevent network strain. And, importantly, it improves the control room operator’s quality of experience in the face of varying network bandwidth. IDIS Critical Failover technology provides multi-layered protection against video data loss due to a wide range of potential fault conditions, such as network instability or power failure. Improving maintenance standards This ensures that recordings are automatically updated without the need for engineer callouts and with no risk of gaps in recordings. Testing at project handover confirmed that the Failover metrics fully met the client’s expectations. The IDIS solution was also selected because of its IDIS Ultimate Warranty, and ease of future expansion with guaranteed forward and backward combability. Security directors at the Central Bank wanted to replace their existing video system with the best new generation and futureproof solution that would deliver simultaneously high performance live view and recording. The bank identified the need to improve maintenance standards, eradicate system failures and ensure a low total cost of ownership. They also wanted to mitigate against video data loss, protect against cyber threats, and have a solution that would be easier for operators to use, with faster footage search and retrieval. Mission-Critical projects Integrator Ametrad Technology Services won a hard-fought tender process against top competitors The control room at the bank’s headquarters needed a complete upgrade with the ability to centrally manage and control surveillance across all its branches. It was essential for the entire project to be delivered with minimum disruption that ensured no loss of video coverage during the phased implementation. Following a competitive proof of concept demonstration with the latest IDIS technology, integrator Ametrad Technology Services won a hard-fought tender process against top competitors, including the long-established previous contract holder. The successful partnership between Ametrad Technology Services and IDIS resulted in efficient project delivery, on time as promised, and has put the two companies a lead position for other mission-critical projects across the Levant region. Password breaches and cyber security loopholes In operation the bank’s new system has lower bandwidth requirements and faster recording retrieval time, making the security operation both more effective and more economical. The bank’s central monitoring team can now work more efficiently, with their new IDIS VMS providing event forwarding, acknowledgements, notifications, live pop-ups and other valuable functions. IDIS’s true plug-and-play technology is also less vulnerable to password breaches and cyber security loopholes, as installation engineers don’t need to manage IP addresses or manually enter passwords for each device. And IDIS’s Linux based servers and proprietary protocols ensure the highest level of resistance to hacking. Highest standard of video surveillance As the system expands FEN will act as force multiplier by reducing installation costs IDIS’s For Every Network (FEN) capability, which uses peer-to-peer technology, also allowed Ametrad engineers to quickly name each branch and connect the system to IDIS Solution Suite. As the system expands FEN will act as force multiplier by reducing installation costs, speeding up implementation time and protecting against human error by eliminating the complexity and cyber challenges associated with multi-site surveillance. "Working in close partnership with IDIS we were able to deliver a smooth, staged technology migration at these critical security sites, with no delays, problems or interruptions to recording," said Ahmad Shanawani, Managing Director of Ametrad Technology Services. Meanwhile, the Central Bank’s engineering department confirms that the IDIS solution now provides the uncompromising standard of protection they need, with lower ongoing costs, easier operation and the assurance that they will continue with the highest standard of video surveillance going forward.
Financial institutions require reliable IP video surveillance systems that provide high-performance, quality, and scalability. Unfortunately, with limited budgets, many financial institutions are still utilizing outdated appliances. When security is not a priority, they are putting themselves at risk for fraud, theft, and data breaches. Security Integrators have an opportunity to help financial institutions by upgrading their systems with an up-to-date NVR server and overall video surveillance system which significantly increases performance and mitigates risk. Modern video surveillance system Integrators should utilize BCDVideo’s IP video surveillance appliances which are built for each unique project Budgets can vary depending based on the size of the financial institution. Since not all banks and credit unions have the same security budget as large institutions, it can be challenging to upgrade to a modern video surveillance system. To save on the overall cost, generic or often referred to as white-box solutions are viewed as the only reasonable option. Many white-box solutions are made without performance or quality in mind and built with miscellaneous parts. Ultimately, the end-user suffers from an unreliable system without extended warranties and support all because of short-term savings. White-box solutions are not the only option. Security Integrators should utilize BCDVideo’s IP video surveillance appliances which are purpose-built for each unique project, regardless of size. Giving customers greater security Most of their appliances offer a 5-year Keep Your Hard Drive warranty that lowers total cost of ownership. Standard warranties request that a failed hard drive be returned to the manufacturer during replacement. KYHD warranty gives customers greater security, compliance enablement, and complete control over their data BCDVideo understands that sensitive data could be compromised when the hard drive leaves the site, which is why they offer a Keep Your Hard Drive warranty. KYHD warranty gives customers greater security, compliance enablement, and complete control over their data. Security Integrators can feel confident quoting any project knowing they can turn to a live video surveillance expert to help them with network design or storage calculations. Mission-Critical configurations Choose from a portfolio of products from entry level to enterprise to mission-critical configurations as well as a variety of supported architectures. There are three ways to get into contact with BCDVideo: call, email, or submit your request online. BCDVideo is the single source to troubleshoot any implementation or warranty issue. With post-sale support, save time and resources by not having to call multiple manufacturers to troubleshoot issues. Experts are on hand to answer questions or troubleshoot a system via remote access. Reduce your total cost of ownership over 5-years with BCDVideo’s lifetime tech & global on-site support warranty, in addition to a guaranteed response.
Traka has launched a new downloadable white paper to open a discussion on the changing nature of retail banking in the UK, using latest case examples to consider branch management and shifting customer expectations. The white paper, titled ‘Shaping the retail banking industry’ looks at several factors influencing the sector, including the increasing expectations and values of customers demanding a more personalized branch experience. Key and equipment management Incorporating analysis from globally renowned financial services, including PwC, Accenture and Deloitte, the paper highlights the opportunities for innovation, together with collaboration and adoption of new operational processes. This incorporates key and equipment management to enable retail banks to deliver on top quality service. The future for retail banking could arguably also be cited as bleak and in a state of industry disruption" Says Mike Hills, Traka UK Market Development Manager and Author of the white paper: “Against a backdrop of negative press concerning the state of UK high streets, the future for retail banking could arguably also be cited as bleak and in a state of industry disruption, as customers move towards a more mobile-connected lifestyle.” Staff and customer security “However, our research in putting together this white paper tells a different story. That actually, the sector has a real chance to embrace the changes occurring and entice their customers, meeting demands for personal service. We found that brands riding the storm are taking small yet significant steps to tailor their services and make operational differences that are proving key to their success.” The white paper focusses on Traka’s experience with Nationwide Building Society to demonstrate how supporting operational efficiency can benefit banking staff and ensure they can focus on serving their customers, without compromising on security. Retail Banking security Mike concluded, “We have brought this white paper together using the latest research and intrinsic market reports, together with case evidence on the future of the retail banking industry and the issues faced by the sector to ensure long term success.” “Within this, we wish to stimulate debate and encourage views and contributions from as many different voices as possible. We look forward to your opinion, experience or comment on this matter of growing importance so together, we can look to support and shape the future of retail banking.”
Ping Identity, the provider of Identity Defined Security, announces its successful completion of the Financial-grade API (FAPI) conformance testing, as part of the process defined by Open Banking Ltd. This builds on Ping Identity’s previous success as the first identity platform to pass all 70 technical security tests, as set by Open Banking Ltd., with zero warnings. The most recent set of FAPI conformance testing evaluated the latest versions of the Ping Intelligent Identity platform, including PingFederate, PingAccess and PingDirectory, within a mock banking environment. Additional technical requirements It switches to an API model with structured data that utilizes a token model such as Open Authorization The inclusion of FAPI within the Ping Identity solution for Open Banking helps allow banks to overcome insecure practices such as screen scraping by using stored user credentials. Instead, it switches to an API model with structured data that utilizes a token model such as Open Authorization. FAPI is a technical specification developed as a multi-industry standard by the FAPI Working Group of OpenID Foundation (OIDF). It leverages OAuth 2.0 and OpenID Connect (OIDC) to define additional technical requirements for the financial industry and other sectors requiring higher security. For banks specifically, FAPI provides various advantages. This includes enabling applications to securely interact with financial accounts, while also enhancing the user’s ability to control security and privacy settings. Secure identity requirements In concurrence with the specification, OpenID Foundation maintains a cloud-based testing suite for conformance testing by banks, certified third-party security providers and platform vendors—such as Ping Identity. The Ping Intelligent Identity platform is used by hundreds of financial services enterprises, including many of the CMA 9 and Open Banking Ltd. itself. Additionally, FAPI is of increasing relevance to the growing number of new fintech start-ups in areas such as investment, wealth management, insurance, payments and even real estate. “This is significant beyond the Open Banking and financial services sector,” explains Rob Otto, EMEA Field CTO, Ping Identity. “Other digitally-focused sectors, with similar secure identity requirements, now have a proven template that can allow them to quickly deploy their own security controls, which have been stringently tested by the largest financial institutions in the UK.”
Columbia Bank, a Northwest community bank headquartered in Tacoma, Washington, sought to upgrade their video surveillance solution to improve image quality and retention time. They also wanted to maximize field of view to deliver a more forceful and expansive – yet, less intrusive – solution. Working with Cook Security Group, Inc., Ross Armstrong, vice president of physical security at Columbia Bank, chose to overhaul video surveillance in their 150-plus branches across the Northwest, many of which included older analog cameras. They chose to install a mix of Hanwha Techwin models including Wisenet P series PNM-9000VQ multi-sensor / multi-directional outdoor vandal-proof dome cameras with 5 megapixel lens modules and Wisenet X series XND-8020F 5 megapixel indoor flush mount dome cameras. Surveillance cameras managed by Omnicast VMS The project, which started in June of 2018, has already deployed over 1,200 Hanwha Techwin cameras across 80 locationsColumbia Bank is in the process of the multi-phase upgrade that converts their existing branches to Hanwha Techwin video surveillance cameras managed by Genetec’s Security Center Omnicast Video Management System (VMS). The project, which started in June of 2018, has already deployed over 1,200 Hanwha Techwin cameras across 80 locations. They will complete another 60 sites in 2019, and 30 more in 2020. The video cameras serve as part of an overall physical security plan and are positioned to provide expansive coverage of bank interiors including teller lines, exteriors including parking lots and surrounding areas and ATM machines. Cameras bundled with analytics Armstrong said Columbia Bank tested out a of variety of models before deciding on Hanwha Techwin. “I didn't know which camera vendors would give us the biggest bang for the buck,” he said. “But I settled on Hanwha Techwin for a couple of reasons. One, is the price competitiveness and, two, the fact that the cameras come bundled with so many analytics that many companies want to charge extra for those licenses.” One of the analytics features the Columbia Bank security team uses with regularity is the loitering feature, specifically at their ATM machines One of the analytics features the Columbia Bank security team uses with regularity is the loitering feature, specifically at their ATM machines. “If an individual is loitering around one of our ATMs beyond the set time limit, then we have it programmed into Genetec’s Security Center to send an alert." "Omnicast snaps a photo of the loiterer and emails it to everyone designated on our security team. We then can take a quick look at that photo and quickly determine whether or not somebody is utilizing the ATM as a customer or if they're doing something they're not supposed to, such as trying to break into the ATM or installing a skimmer.” Health monitoring of the cameras Armstrong said, as he tested cameras from other vendors, he noticed a consistent drop rate which he was concerned would get worse. Even though 98 percent availability seems acceptable, any downtime creates a risk of missing critical events" “Security Center provides health monitoring of the cameras, and what I looked for was if the availability started dropping below 98 percent. Even though 98 percent availability seems acceptable, any downtime creates a risk of missing critical events. One camera model we were testing was experiencing regular outages, where we would lose 30 seconds off and on throughout the day. These short loses added up quickly and we were seeing availability times dropping somewhere around 93 to 94 percent. That wasn't acceptable. “When I reviewed the data on the Hanwha Techwin model, the average availability was consistently above 99 percent, which was so impressive. It might just be a two percent difference, but it's inevitable that the one time you need it is the one time that camera is not working as expected. Columbia Bank was unwilling to accept the risk of utilizing equipment that failed to meet our standards, and decided to partner with Hanwha Techwin, who provided a much more reliable end user experience.” Utilizing H.265 and WiseStream compression Impact on network infrastructure and bandwidth were also determining factors for Columbia Bank as they chose to upgrade their video surveillance system. Armstrong said he was disappointed to find many camera manufacturers were not quickly integrating usage of H.265 compression technology into their products. He said he is impressed that Hanwha Techwin utilizes H.265 in so many of its camera models, as well as the fact that Hanwha has incorporated its own WiseStream technology into its cameras, making them even more efficient. Hanwha Techwin Wisenet P and X series cameras use H.265/H.264/MJPEG with Hanwha’s exclusive WiseStream II compression technology Hanwha Techwin Wisenet P and X series cameras use H.265/H.264/MJPEG with Hanwha’s exclusive WiseStream II compression technology. WiseStream dynamically controls encoding, balancing quality and compression according to movement in the image. Combined with H.265 compression, the bandwidth efficiency can be improved by up to 75 percent compared to current H.264 technology. Installing non-Intrusive cameras Community banks are charged with keeping employees, customers, and assets safe, but also need to present a warm and inviting environment since they are often a hub of civic activity. In-your-face video surveillance cameras in a bank can be threatening to any would-be criminal, but they are also off-putting to customers that visit banks on a day-to-day basis. This allows us to get higher quality images – and a wider field of view – while not intruding into people’s personal space"When Armstrong and his team were evaluating camera solutions across its branches, they wanted to find a way to let customers know they were providing the latest in video security without the potentially intrusive analog cameras that often can be found just inches away from customers during transactions at the teller counter. Higher resolution 5 megapixel cameras “It’s a balance – you want customers to feel secure, but you don’t want them to feel like they are in a prison or a fishbowl,” said Armstrong. He said they removed the older analog cameras on the teller line and replaced them with the higher resolution 5 megapixel Hanwha Techwin models, which were placed off the teller line. “This allows us to get higher quality images – and a wider field of view – while not intruding into people’s personal space,” he said. SPD-150 49 Channel Decoder for connectivity One way to convey that Columbia Bank is all business when it comes to security was with an innovative decoder offered by Hanwha Techwin. Armstrong said they wanted to have video monitors showing surveillance camera feeds in certain higher-risk locations so that customers would know they are being recorded, and that would serve as a deterrent to any would be criminals. However, with the change in hardware, they were unable to connect monitors directly to a DVR. Armstrong said Hanwha’s SPD-150 49 Channel Decoder has allowed them to connect analog, HDMI, and VGA. Columbia Bank has provided video evidence to help law enforcement investigate a variety of incidents including drive-by shootings, traffic accidents, and arson “Being able to put one Hanwha decoder unit in a branch and run three monitors off of it – as well as the ability to hook monitors up to some cameras directly – has saved us tremendous amounts of money while adding a visual security feature.” Adding cameras outdoor to assist community Columbia Bank has long emphasized that they are a community bank that’s community minded. When Armstrong and his team decided to upgrade their video surveillance solution, they made the decision to add video surveillance cameras to the exterior of all bank locations not only to protect their customers as they come and go, but also to assist the community and law enforcement when incidents occur in areas surrounding their branches. We’re very pleased with the solution from Cook Security Group, Hanwha Techwin, and Genetec" “We look at it as the opportunity to give back to the community and provide assistance in a variety of ways,” said Armstrong. So far, Columbia Bank has provided video evidence to help law enforcement investigate a variety of incidents including drive-by shootings, traffic accidents, and arson. Satisfied with the system’s performance Columbia Bank has been well served by the Hanwha Techwin-Genetec security solution and Armstrong said they are very satisfied with the performance of the system. “Hanwha Techwin has been a phenomenal partner for us,” he said. “And that’s what I look for in a security provider – a long-term partnership. We’re very pleased with the solution from Cook Security Group, Hanwha Techwin, and Genetec and we look forward to completing all phases of the project.”
Round table discussion
The role of video surveillance is expanding, driven by all the new ways that video – and data culled from video – can impact a business. As a growing population of video cameras expands into new fields of view, we asked this week’s Expert Panel Roundtable: What is the most unusual application of surveillance cameras you have seen recently?
Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
3 Reasons To Migrate To A New Access Control SystemDownload
Schooling the Market on Education SecurityDownload
Lawrence, Massachusetts Deploys FLIR Video System For SafetyDownload