Bosch introduces the new Flexidome multi 7000i camera family offering IR and non-IR models that provide 12- or 20-megapixel resolution to deliver highly detailed multi-directional overviews. These overviews are combined with built-in Artificial Intelligence (AI) to support predictive solutions in wide-area coverage applications such as intersections, public spaces, and retail. Each image sensor, offering 3- or 5-megapixel resolution, runs built-in AI that adds metadata to video feeds to convert...
ASSA ABLOY has invested in Paravision, an advanced facial recognition solutions provider, and is recognized for its world-class leadership in accuracy. Facial recognition solution "The investment in Paravision is a strategic technological investment for the ASSA ABLOY Group and will accelerate the development of biometric solutions that leverage facial recognition algorithms and provide complementary growth opportunities,” says Nico Delvaux, President, and CEO of ASSA ABLOY. “In p...
Passwordless identity management provider Beyond Identity announced its expansion into Europe with a series of new hires to its sales, marketing and engineering team as well as a new Frankfurt data center. Launched in April 2020 by Silicon Valley heavyweights Jim Clark and Tom (TJ) Jermoluk, Beyond Identity has introduced a revolutionary passwordless identity management solution. The company completely eliminates insecure passwords and replaces them with asymmetric cryptography, a technology th...
Allegion US, a globally renowned provider of security products and solutions, has announced that it has received federal government approval for its Schlage Multi-Technology (MT-485) Readers, when paired with the LenelS2 OnGuard version 7.6 access control system. Schlage MT Readers Schlage’s MT Readers simplify access control solutions by recognizing magnetic stripe, proximity, Schlage smart card and NFC-enabled smart devices with a firmware update, ensuring a seamless transition to high...
Display solutions play a key role in SOCs in providing the screens needed for individuals and teams to visualize and share the multiple data sources needed in an SOC today. Security Operation Center (SOC) Every SOC has multiple sources and inputs, both physical and virtual, all of which provide numerous data points to operators, in order to provide the highest levels of physical and cyber security, including surveillance camera feeds, access control and alarm systems for physical security, as...
Effective visitor management must go beyond meeting and greeting visitors who enter the reception area of any business or public building. It must enhance building security, protect facilities and employees, and improve users' and visitors' overall experience. Bosch's just released easy-to-use, browser-based visitor management software offers all the benefits for enhancing the visiting process and integrates seamlessly with the access management system 3.0.1. Visitor management software The u...
Organizations around the world sent an unprecedented number of people home during 2020 to work and attend school remotely, many of them with Chromebook laptops whose shipments more than doubled year over year. HID Global, identity solutions company, is helping organizations bring these people and their Chromebooks back to a hybrid work and classroom environment using its HID HydrantID Account Certificate Manager (ACM) digital certificate management offering. Seamless connections According to the market research firm Canalys, “Chromebooks set record shipment volumes, reaching 11.2 million units in Q4 2020, a remarkable 287% increase over Q4 2019, bringing the full-year 2020 total to 30.6 million units.” HID HydrantID ACM and its new Chromebook Certificate Enrollment Extension (CEE) feature enable organizations to issue and manage the digital certificates for bringing these devices back to physical work and study settings, ensuring they can connect to networks seamlessly and securely without passwords. Easy, cloud-based approach “The traditional walled-fortress IT security posture isn’t feasible as we transition to hybrid remote and in-person work and study environments using a growing variety of computing devices and operating systems,” said By Mrugesh Chandarana, Senior Product Manager, Commercial CA and PKI Services with HID Global, Identity and Access Management. “The huge influx of Chromebooks is here to stay and HID HydrantID ACM with its CEE feature is the first solution to provide an easy, cloud-based approach to digital certificate management that enables these devices to authenticate to enterprise networks in a passwordless, Zero Trust network access environment.” Digital certificate lifecycle management The solution offers automated digital certificate lifecycle management with tracking, installation, and renewal HID HydrantID ACM with the CEE feature offers automated digital certificate lifecycle management with tracking, installation, and renewal. It enables users of any Chromebook to make or model to be securely up and running on the network by simply plugging in their devices and seamlessly deploying certificates for passwordless authentication without any user intervention. Early adopters of the HID HydrantID CEE solution for Chromebooks include a large financial institution with a sizable remote workforce, as well as high schools and colleges where Chromebook usage grew substantially during the 2020/2021 academic year. Passwordless authentication The CEE feature is especially valuable for users as it allows them to have passwordless authentication while seamlessly navigating between remote connectivity and direct connection to the in-office network. For organizations that do not have an internal Microsoft Active Directory Certificate Services (ADCS) infrastructure, the CEE allows them to implement a seamless experience for their users while freeing up Help and\or Service Desk resources. By implementing the CEE using HID HydrantID Managed PKI-as-a-Service, organizations eliminate operational complexity and dramatically reduce costs related to operating and deploying an organizational private PKI.
Bosch has introduced the new Autodome IP starlight 5100i IR moving camera with a new 1/1.8 inch sensor offering 4-megapixel resolution and 30x optical zoom. It offers HDR X combined with starlight technology and dual illumination – integrated IR and white light – to capture images that can distinguish individuals or objects for identification or proof. Complemented with built-in Artificial Intelligence (AI), the camera, when idle, supports operators with object detection in areas of interest to enhance safety in city surveillance and perimeter protection applications. Essential video analytics The Autodome IP starlight 5100i IR, designed for outdoors, includes an automatic rain-sensing wiper to maintain clear images during wet conditions, is weatherized with an IP66 rating, and is vandal resistant with IK10 housing. In order for video security to become predictive, it is important to consider the benefits of interpreting video data and how it can do more for businesses than security alone. To support this philosophy, the Autodome IP starlight 5100i IR features built-in essential video analytics. This built-in AI enables the camera to add sense and structure with metadata to captured video data, which is the basis for converting this data into actionable insights. Creating sterile zones The Autodome IP starlight 5100i IR offers HDR X combined with starlight technology Relevant insights, like the detection of moving objects, help to create sterile zones, which establishes a boundary prohibiting any activity. These sterile zones enhance perimeter protection of buildings, parking lots, and restricted areas, increasing overall safety. The camera’s AI can also make it possible to retrieve the right footage from hours of stored video instantly and analyze the scene by providing different statistics so an operator can act faster and more efficiently to potential threats. One of the greatest challenges in city surveillance is capturing usable video during the daytime and in low-light and pitch dark scenarios. The Autodome IP starlight 5100i IR offers HDR X combined with starlight technology and dual illumination – integrated IR and white light – to capture usable images 24/7. Ensuring perfect exposure The new HDR X technology has a dynamic range of up to 133 dB ensuring perfect exposure while eliminating motion-related artefacts in scenes with challenging lighting conditions and moving objects during the daytime. In low-light scenes, starlight technology provides clear and relevant images with color filtering down to 0.010 lux. The integrated IR illumination can help identify objects in monochrome up to 320 meters At night, especially in pitch dark scenes, the camera's white light provides full-color images in complete darkness up to 60m (196 feet). The integrated IR illumination can help identify objects in monochrome up to 320 meters (1,049 feet) thanks to the built-in intelligent IR beam, which ensures optimum illumination of objects regardless of zoom level. The visible white light acts as a deterrent to intrusion, loitering, and other undesirable activities in city surveillance settings. Extensive user management All Bosch IP cameras are secure by design, a systematic approach centered on a built-in Trusted Platform Module (TPM), safely storing all certificates and keys needed for authentication and encryption. This method offers extensive user management to ensure only authorized users have access to data, supports a public key infrastructure set-up, and provides software sealing to detect changes in the cameras' configuration settings. As a company committed to security and sustainability, all Bosch cameras support remote configuration, management, and planning. System integrators can work remotely with customers to perform services such as changing configuration settings or installing firmware updates, ensuring systems meet the highest reliability standards. It minimizes the number of commutes, resulting in sustainable business practices that are economically viable, socially responsible, and environmentally friendly.
Alcatraz AI, the developer of secure frictionless access control solutions, has announced that its Alcatraz AI Rock solution now has capabilities that can detect and prevent tailgating at entrances and in a variety of industries. Countering the menace of tailgating Tailgating is one of the most common and innocent security breaches – an employee opening a door and holding it open, sometimes inadvertently, for a colleague, visitor, or vendor who should not have access. The problem is that tailgating opens a facility to undocumented and unauthorized entry. The Alcatraz AI Rock solution delivers a frictionless, facial authentication access control solution that mitigates tailgating. Alcatraz AI Rock solution Alcatraz AI Rock solution detects tailgating by identifying, in real time, an individual at an entrance The Alcatraz AI Rock solution detects tailgating by identifying, in real time, an individual as he/she approaches an entrance and identifies whether the individual has been authenticated. If an unauthorized user follows an authenticated user through a door, the solution will identify that user as a tailgater, and an alert is sent and logged into the access control system, along with a still picture of the unauthorized person. Ensuring secure, authorized access To prevent tailgating, the solution can be configured to send an alert to the access control system in the form of a unique credential that can only give access to authorized users. In this way, it can provide data on tailgating hotspots, and ultimately, modify physical security and access control, and adjust employee behavior. “Physical security is a top priority for companies that want to protect their staff, offices and property, and mitigating tailgating is one way to ensure physical security,” said Tina D’Agostin, CEO of Alcatraz AI. Tina adds, “Our access control solution gives security teams the ability to not only detect and respond to tailgating in real time, but to prevent it, as well. We’re excited to share this solution with security teams.”
In the AIoT era, the world is getting smarter. Everything is going to have an online “ID” and then connected into a vast net of IoT devices, like a laptop computer, a cellphone phone, a connected thermostat, or a network security camera. Cybersecurity in the AIoT era According to a Markets and Markets report, IoT is extensively used by smart cars to smart manufacturing and connected homes and building automation solutions. However, currently, there are no unified global technical standards for IoT, especially in terms of communications. This results in inefficient data management and reduced interoperability mechanism and ultimately may cause reduced security in the IoT network. The global Internet of Things (IoT) security market size is expected to grow from USD 12.5 billion in 2020 to USD 36.6 billion by 2025, at a Compound Annual Growth Rate (CAGR) of 23.9%. Importance of cybersecurity Various vertical industries store unprecedented amounts of data on devices like IP cameras and NVRs Dahua Technology, a video-centric smart IoT solution and service provider, believes cybersecurity is of vital strategic importance in the age of AIoT. In various vertical industries, such as traffic, banking & finance, hospital, and critical infrastructure, organizations collect, process, and store unprecedented amounts of data on devices like IP cameras and NVRs. A significant portion of that data can be sensitive or private information, which can be prone to cyber-attacks and the situation, is getting worse because there are more devices than people. As a security solution provider, Dahua Technology continuously invests in cybersecurity and actively copes with network security issues. Continuous investment & active coping Committed to becoming a leader in cybersecurity and privacy protection in the global security industry, Dahua Technology has been developing and exploiting cybersecurity for nearly 10 years. The company keeps investing about 10% of its annual sales revenue in R&D every year, including cybersecurity. In addition, the company put together a professional team of nearly 100 personnel to focus on cybersecurity issues. With rich experience and sufficient resources, Dahua Technology promises to be positive, open, cooperative, and responsible when it comes to cybersecurity. Dahua Technology cybersecurity approach 1. Organizational structure In order to achieve better efficiency and effectiveness, Dahua Technology operates a comprehensive system to cope with all cybersecurity-related issues. The system, led by the cybersecurity committee, also contains a cybersecurity & data protection compliance group, cybersecurity institute, and product security incident response team (PSIRT). The cybersecurity committee, above all departments or teams, can call resources from the whole company, from the R&D center to the legal department, supply chain, overseas business department, etc. when necessary. Cybersecurity Institute is in charge of building the sSDLC process and implementing the process to all Dahua product series, making sure that all Dahua products are strong against cyberattacks. 2. Security development lifecycle Dahua adopts a bunch of professional sSDLC (Security Development Lifecycle) security software to improve product security Dahua Technology adopts a bunch of professional sSDLC (Security Development Lifecycle) security software to improve product security. During the security design phase, STRIDE + Attack Tree + PIA is adapted to improve threat modeling. During the security realisation phase, OWASP top 10 and over 150 CWEs are used to achieve static code analysis. During the security test phase, over 20 tools within 7 fields are applied to realize the multiple security testing. CompTIA PenTest+/Security+ are used to carry out professional penetration testing, while compliance ISO 30111&290147 and MITRE org CAN are followed during vulnerability management after the products are sold. 3. Emergency response system Cooperation with professionals from across the globe is a great way to improve vulnerability detection. Therefore, Dahua Cybersecurity Center (DHCC) is established to solve cybersecurity issues with security vulnerability reporting, announcement/notice, and cybersecurity knowledge sharing with our global customer base in order to provide them with more robust and secure products/solutions. Product Security Incident Response Team (PSIRT) is an integral part of DHCC. Composed of professionals ranging from marketing, supply chain, service, and legal representatives, PSIRT is responsible for receiving, processing, and disclosing Dahua product and solution-related security vulnerabilities. Team members are on duty 7 days a week and guarantee to respond to an emergency within 48 hours. End-user, partner, supplier, government agency, industry association, and independent researchers are encouraged to report potential risk or vulnerability to PSIRT by email. 4. Personal data & privacy protection Dahua Technology also attaches great importance to personal data & privacy protection. Complying with applicable laws and regulations such as EU’s General Data Protection Regulation, EDPB’s Guidelines on the concepts of controller and processor in the GDPR, ETSI EN 303645’s Cyber Security for Consumer Internet of Things: Baseline Requirements as well as US’s California Consumer Privacy Act, the company established the Personal Data & Privacy Protection Standard. The standard stipulates that privacy protection methods such as de-identification, data encryption, and systematic access control, privacy-friendly setting are fully adapted to the complete data life cycle all the way from the collection, transmitting, storage to sharing, copying, and deleting. In addition, working with world-renowned third-party institutions, Dahua Technology has received Protected Privacy IoT Product Certification and ETSI Certification from TÜV Rheinland, as well as ISO 27018 Certification and ISO 27701 Certification from BSI, which help demonstrating its capability in managing personal information and compliance with privacy regulations around the world. 5. Continuously iterating security baseline The security baseline built a security element layout of "AAA+CIA+P", a systematic protection framework Centered on the core principles of Security by Design and Security by Default, the Dahua security baseline initiative taps into product safety technology to provide users with adequate safety guarantees. Based on and practicing the security and privacy design principles, the security baseline builds a security element layout of "AAA+CIA+P", forming a systematic protection framework covering physical security, system security, application security, data security, network security, and privacy protection. 7 versions of baseline and 100+ principles have been developed to adapt Authentication, Authorization, Audit, Confidentiality, Integrity, Availability, and Privacy protection deeply into the product quality assurance system, making sure that all Dahua products enjoy the factory default security. 6. Product security center In order to help users clearly understand the security status and capabilities of the device, the product security center will assist users to conveniently and quickly set up the right security configuration to suit the scenarios. General security capabilities include privacy protection (face occlusion, information hiding, etc.), video encryption, security alarm, trusted protection, CA certification management, key management service, attack defense, and so on. 7. Cybersecurity ecosystem Adhering to openness and cooperation, Dahua Technology keeps cooperating with international authoritative security institutions to jointly build a secure ecosystem. By rich & in-depth communicating and cooperation with institutions like TÜV Rheinland, BSI, DNV·GL, Intertek EWA-Canada, and bright sight security lab, the company stays advanced its security capabilities and systems. In a widely networked world of IoT, cybersecurity challenges are pretty much a universal sore spot for companies globally. Dahua Technology, in the business of keeping people safe, takes cybersecurity seriously from head to toe. With a mindset that emphasizes cybersecurity and all the resources that it can allocate to establish, carry out and strengthen the cybersecurity approach, Dahua Technology plans to stay positive, open, responsible and improving for the matter of cybersecurity.
Security stakes are high at healthcare premises. Patients expect and deserve privacy and safety. Yet, most medical buildings must remain welcoming spaces, many open around the clock. The protection of drugs and confidential data is critical, and every breach demands thorough investigation. Such needs go way beyond what mechanical security was designed to meet. Real-time control and monitoring Hospitals, for example, are often large and spread out. Their locks may need to integrate with fire detection, CCTV, and other building systems. Labs and pharmacies are safer when access is managed with time-limited ‘keys’, which can be revoked. In care homes, security must be matched by convenience for a client group, who may have limited dexterity or learning skills. Here, real-time control and monitoring can help managers to react quickly. Too much is asked of a traditional metal key, if it is expected to do all this. Yet, wired security doors can be an expensive retrofit option. Fortunately, there is a solution: wireless access control. Wireless access control solutions Wireless devices provide the easiest upgrade or replacement for any access control system Wireless devices provide the easiest upgrade or replacement for any access control system, based on mechanical or magnetic locks. Credentials, including RFID smartcards, programmable keys, or secure mobile keys stored on a smartphone, replace cumbersome physical keys. Wireless components make it a cost-effective option to add electronic control to many more areas of a building. With online locking systems, facility managers can monitor and manage premises at any time of day or night, even viewing the status of medicine cupboards or server racks from the same administration software interface. Integrating wireless locks Swapping existing locks for battery-powered cylinders or escutcheons can link a door to an access control system. In one recent survey of access control professionals, 95% of respondents judged system integration with other building/security management functions to be ‘somewhat’ or ‘very’ important. To meet this challenge at the Haute Savoie region’s new hospital, managers selected Aperio locking integrated online with an ARD access management system. Because Aperio locks are wireless, the hospital could introduce more layers of security and secure doors without incurring excessive installation or operating costs, including for sensitive offices and drugs stores. Staff no longer carry big bunches or waste time hunting down keys. Individual permissions are all stored on a single, programmable RFID credential. Battery-powered Aperio devices All battery-powered Aperio devices integrate natively with the central system, so wired and wireless access points at Center Hospitalier Métropole Savoie (CHMS) are managed together, with real-time logs, remote door opening, and free time-slot management. “Having just a single badge, and not having to carry around heavy keys, has been a major advantage for us,” said Béatrice Dequidt, Health Executive at Center Hospitalier Métropole Savoie. “We have implemented internal HR management procedures, creating badges that are automatically integrated into ARD's operating software,” adds Alain Gestin, CHMS’s IT Systems Architect. Powerful, real-time access control Aperio and ARD also maintain compatibility of credentials with the French government’s electronic CPS Aperio and ARD also maintain compatibility of credentials with the French government’s electronic Health Professional Card (CPS), for added staff convenience. Multiple key systems and varied openings, including fire doors, glass doors, offices, pharmacies, car parks, and lifts, plus hundreds of workers and contractors needing different, constantly changing permissions. Faced with these challenges, managers at Hospital MAZ, in Zaragoza, knew mechanical keys could not provide the 21st-century security they needed. SMARTair Wireless online access control Hospital MAZ upgraded locks to SMARTair Wireless Online electronic access control, which keeps facility managers updated in real time. A unified access system is controlled by intuitive software, installed at the central server, and managed via client servers in different departments. Because the SMARTair Wireless Online system updates via communications hubs in real time, security managers implement all changes via the central system, without needing to waste time walking through the hospital, changing rights one door at a time. Employee convenience is greatly enhanced. Staff and contractors carry a single MIFARE smart card programmed with individual access permissions. Cards are personalized to double as employee IDs, so 625 staff and approximately 100 contractors only carry a single card. "We have achieved all our objectives with the installation of the system,” said Miguel Angel Hernández Jerez at Hospital MAZ. Intelligent keys Programmable electronic key systems put the advantages of access control into a familiar form. They reinvent the key for the 21st century, making it more flexible, powerful, and better equipped to handle modern security demands. Lost keys and departed employees are no longer a problem, because their access rights are canceled with a click. The key’s familiarity is welcome to a user group who are not experts — at least, not in access control. CLIQ electro-mechanical locking system CLIQ offers easy-to-use access control, based on high-security mechanical disc cylinders Managing physical keys can impact nursing care, as pharmacy managers at the UK’s Queen Elizabeth Hospital, Birmingham discovered. An older, mechanical system made it difficult to keep track of who held the right keys. Searching for that person wasted valuable time. They identified a better solution for convenient secure access to controlled medicines: CLIQ electro-mechanical locking. CLIQ offers easy-to-use access control, based on high-security mechanical disc cylinders, combined with encrypted electronic locking and identification. With CLIQ, power to the lock is supplied by a standard battery inside every CLIQ key, so no wires are required — making it an ideal retrofit solution for doors, cabinets, and mobile drug trolleys. Each employee carries a single programmable CLIQ key to open any authorized CLIQ lock. No CLIQ device unlocks without the key first being authorized by the software. Remote key management QE Birmingham’s new CLIQ system allows for remote key management. Audit trails for locks and padlocks are available on-demand, so nurse managers can instantly see who has accessed particular cabinets or drug trolleys. “Programmable key solutions really boost medicine safety in hospitals,” said Stephan Schulz, CLIQ Product Manager at ASSA ABLOY Opening Solutions EMEA, adding “Nurses at Queen Elizabeth, Birmingham, carry their own key with personalized access rights, so they don’t waste time finding out who has the key to every cupboard. Patients benefit.” “The message from all nursing staff is that patients are getting medicines much easier and in a more timely fashion,” said Inderjit Singh, Chief Pharmacist at QE Birmingham, adding “For us, the key return on investment is the quality of service we’re providing.” Simple, effective door control without software When installing a Code Handle electronic PIN lock, users need never worry again In any busy medical facility, however small, it is easy to leave a door unlocked. With expensive equipment or controlled drugs on the other side, an opening invites opportunist trouble. But, when installing a Code Handle electronic PIN lock, users need never worry again. A Code Handle fits right over an existing cylinder, users can simply swap the current handle for a low-profile Code Handle, and fix it in place with two screws, to instantly add PIN security to a consultation room, medicine store, or equipment cupboard. It adds electronic security without a bulky push-button door unit, which disrupts interior aesthetics. Code Handle electronic PIN lock solution In Spain’s Basque Country, Fylab sought this easy solution for their consulting rooms. Requirements were straightforward: secure, keyless access around a facility with a lot of daily traffic from professionals and the public. They needed a device that is easy to retrofit, with a design to chime with Fylab’s contemporary medical workplace. Code Handle added this security to three consulting-room doors, without wires or cables. “I am no artist or handyman, but I managed to fit the handles within 10 minutes,” said Fylab’s Founder, Borja Saldias Retegui. Their Code Handle devices lock both wooden and glass doors, keeping equipment and personal belongings safe. “Code Handle provides the simplest solution for access control in a small facility,” Borja Saldias Retegui adds.
Pyronix launches its latest security peripheral, the MCEXTERNAL-WE outdoor wireless magnetic contact. Perimeter security This tough, tamperproof and weatherproof contact extends perimeter protection applications to secure sheds, garages, gates, and more, with remote voice push notification alerts via the smart device apps, HomeControl2.0 and ProControl+. “We’re very pleased to add this perimeter protection option to the range, as this really extends perimeter protection use case applications of the system as a whole,” Laurence Kenny, Pyronix Marketing Director, said. Easy to fit and voice recognition Featuring an IP66 rating, this highly discreet and versatile Grade 2 device is easy to fit and calibrate while delivering reliable performance with reduced false alarms, even with gaps of up to 70mm between contact and magnet. MCEXTERNAL-WE has been designed to offer maximum coverage and flexibility for multiple purposes Connect the MCEXTERNAL-WE to security cameras to provide perimeter protection with voice push notifications and instant video verification of any intrusion via ProControl+. “The MCEXTERNAL-WE has been designed to offer maximum coverage and flexibility for multiple purposes, whether securing an outbuilding or a gate,” Laurence said. Voice and video- verification He continued: “We’re delighted to add this outdoor contact to the range, as a system can now offer both volumetric coverages of an area using our outdoor XD detectors, as well as a specific outbuilding and perimeter defense with the MCEXTERNAL-WE.” “By adding this to our app-enabled systems, the user will be notified via a voice push notification to their app whenever the contact is triggered – letting them know of a break-in or to simply tell them that their gate has been opened.” “If the contact has been linked to one of our cameras, say the LightCamera, the user will also receive Full-HD video verification and active defense capabilities via ProControl+; increasing not only the level of interactivity and value our security system provides users, but also upsell opportunities for our installers.” Wireless installation Built from quality plastics for satisfying installation, the MCEXTERNAL-WE also provides a wireless range of 300m in open space and outstanding 2-year battery life. Extend perimeter protection applications with the tough, tamperproof, and weatherproof MCEXTERNAL-WE. Secure from the outside in.
Over the past year, companies have had to deal with the COVID-19 pandemic and how it has affected their operations. From new digital services through to security, the response to more hybrid and remote working showed some of the assumptions that we have made over the years, and it required companies to innovate and fill those gaps. Physical and IT security was no exception to this. In the rush to support home working, many IT security teams realised how much they rely on physical security to help with their identity management approaches. To adapt to what is taking place now, identity management has to evolve too. Challenging our assumptions around identity management Identity management involves ensuring that authorized and authenticated individuals can get access to the tools and data they need to work, and restricting access from those that don’t. Identification is establishing who a user is, and then authentication verifies someone is who they say they are through a combination of different methods or factors linked to who they are, what device they are using, what they know, and what they have. Physical security provides an identity perimeter by restricting device access to only those that are allowed to enter a location, whether this is through using technology like smart cards or biometrics through to people managing who can enter the building at reception. With this boundary in place, using a combination of username and password is enough to meet security requirements. A more ‘zero trust’ approach is needed where we trust nothing and verify everything However, the pandemic took this away. For many IT security teams, this showed how much they had taken physical security for granted in their security planning. Alongside having to provide remote access that is secure, these teams had to think about how to manage identities securely as well. The default approach of username and password is not enough when everyone can be working on any device and from essentially any location. Instead, identity has become the new perimeter. The new office is wherever a user and device are, and authentication must change that we can prove people are who they say they are. A more ‘zero trust’ approach is needed where we trust nothing and verify everything. The mindset behind zero trust security is to regard all sources of network traffic, both external and internal, as potential routes for attacks. Therefore, all users and resources must be verified and authenticated wherever they come from, system data must be collected and analyzed for risks, and network access and traffic must be limited and monitored. While it may seem a bit paranoid, zero-trust security is rooted in the realities of the cloud computing age. Multi-factor authentication or MFA can be used to add more types and factors for authentication. So, in addition to something you know like a password, you can use something you have as well. This would typically be a one time password sent to the user’s phone or from a cellphone authenticator app, which fills the role of something they have. Managing this at any scale requires work. For large companies with established processes and identity management strategies, this would be something they could add on as part of that remote working implementation. However, for many smaller businesses that don’t have established IT directories or that have a wide range of different and new applications in place to support, it is more challenging. Everything is different One reason for this is the sheer variety of IT assets, devices, and applications that now have to be supported. Rather than the IT-designed network of machines that is standardized and fully controlled, we today have a far wider range of devices, operating systems and locations in play. Alongside this, there is the issue of controlling access to cloud-based services and Software-as-a-Service (SaaS) applications, which have also grown in popularity. The traditional IT directory that is normally used as the starting point for identity management is not normally equipped to manage the modern identity landscape. Looking at cloud-based directories is therefore a worthwhile step, as these are built to manage Identities, SaaS applications and VPNs and also support both multiple operating systems and the wide range of different devices that today’s users have. From a physical security perspective, identity and access management can be an area to develop. While the need for building access is reduced at the moment, it will return when the pandemic ends. In these circumstances, new approaches may also be needed. For example, fingerprint biometric security processes are popular to fill the requirement around verifying that someone is who they say they are. However, traditional approaches like fingerprint scanners may be less popular as they require users to touch the readers. For high traffic locations with lots of people, that will be a risk. Instead, combining access and identity can be made easier through approaches that take advantage of the new flexibility that pandemic responses needed. For example, using the physical access control support in today’s smartphones can enable organizations to use biometric fingerprint readers or face recognition without having to enforce everyone using the same biometric reader. By linking to phone applications that employees have on their devices, fingerprints or other forms of biometric data can be used to grant access. Thinking about context Looking into the future, many of us are looking forward to things going back to the way that they were before the pandemic. However, there are a lot of things that we had to adapt and use to keep operations running and secure during lockdown that we should continue to make use of. Rather than simply going back, we should look ahead at a more hybrid approach to everything, including security. This includes looking at context for identity and access management. Rather than simple approaches that are either too insecure or overkill for employees, we can set out situations that match the most common working situations and then enforce some rules on when access is granted. For this, we can look at how to use authentication and access control more effectively alongside other security factors. As we move to a more hybrid way of working, this flexibility of approach will be necessary to cope with all the different scenarios that employees will be in The first element here is the devices that users have. Trusted devices can be their own factor for authentication, where a device trust can be set up with a specific user account and linked to a specific device like a PC, laptop or tablet. If the user is not using one of those devices, then they can have an additional factor for authentication used, such as entering a one-time password from their cellphone or a cellphone push authentication. This approach does not restrict users that may need to work from other devices occasionally, but it does protect against theft of passwords or dictionary attacks on credentials. The second element is location. When users connect, they will use an IP address that connects them to a network either in the office, to their home provider, or to a public network. Depending on the circumstances, you can put rules in place on how you manage those connections. For a user that is in the office, they may get access automatically in the same way they used to. With conditional access based on geolocation, user access can be allowed or blocked based on a user’s physical location or challenged with a step-up authentication. For example, your business may be based in the UK and with offices in Europe. Getting an access request from India or China may not be legitimate, so IP addresses from those countries can be automatically blocked. Alternatively, if you do have staff that will travel to those countries, then access can be dependent on using a known device and authentication step before signing in. The approach here is to use conditional access based on identity, location, and device and make access as simple as possible for the user and without causing excess risk to the organization. By looking at specific circumstances and context, you can design your access management approach to fit the user. As we move to a more hybrid way of working, this flexibility of approach will be necessary to cope with all the different scenarios that employees will be in.
Organizations faced a number of unforeseen challenges in nearly every business sector throughout 2020 – and continuing into 2021. Until now, businesses have been on the defensive, reacting to the shifting workforce and economic conditions, however, COVID-19 proved to be a catalyst for some to accelerate their long-term technology and digitalization plans. This is now giving decision-makers the chance to take a proactive approach to mitigate current and post-pandemic risks. These long-term technology solutions can be used for today’s new world of social distancing and face mask policies and flexibly repurposed for tomorrow’s renewed focus on efficiency and business optimization. For many, this emphasis on optimization will likely be precipitated by not only the resulting economic impacts of the pandemic but also the growing sophistication and maturity of technologies such as Artificial Intelligence (AI) and Machine Learning (ML), technologies that are coming of age just when they seem to be needed the most.COVID-19 proved to be a catalyst for some to accelerate their long-term technology and digitalization plans Combined with today’s cutting-edge computer vision capabilities, AI and ML have produced smart cameras that have enabled organizations to more easily implement and comply with new health and safety requirements. Smart cameras equipped with AI-enabled intelligent video analytic applications can also be used in a variety of use cases that take into account traditional security applications, as well as business or operational optimization, uses – all on a single camera. As the applications for video analytics become more and more mainstream - providing valuable insights to a variety of industries - 2021 will be a year to explore new areas of use for AI-powered cameras. Optimizing production workflows and product quality in agriculture Surveillance and monitoring technologies are offering value to industries such as agriculture by providing a cost-effective solution for monitoring of crops, business assets and optimizing production processes. As many in the agriculture sector seek to find new technologies to assist in reducing energy usage, as well as reduce the environmental strain of modern farming, they can find an unusual ally in smart surveillance. Some niche farming organizations are already implementing AI solutions to monitor crops for peak production freshness in order to reduce waste and increase product quality. For users who face environmental threats, such as mold, parasites, or other insects, smart surveillance monitoring can assist in the early identification of these pests and notify proper personnel before damage has occurred. They can also monitor vast amounts of livestock in fields to ensure safety from predators or to identify if an animal is injured. Using video monitoring in the growing environment as well as along the supply chain can also prove valuable to large-scale agriculture production. Applications can track and manage inventory in real-time, improving knowledge of high-demand items and allowing for better supply chain planning, further reducing potential spoilage. Efficient monitoring in manufacturing and logistics New challenges have arisen in the transportation and logistics sector, with the industry experiencing global growth. While security and operational requirements are changing, smart surveillance offers an entirely new way to monitor and control the physical side of logistics, correcting problems that often go undetected by the human eye, but have a significant impact on the overall customer experience. Smart surveillance offers an entirely new way to monitor and control the physical side of logistics, correcting problems that often go undetected by the human eye. Video analytics can assist logistic service providers in successfully delivering the correct product to the right location and customer in its original condition, which normally requires the supply chain to be both secure and ultra-efficient. The latest camera technology and intelligent software algorithms can analyze footage directly on the camera – detecting a damaged package at the loading dock before it is loaded onto a truck for delivery. When shipments come in, smart cameras can also alert drivers of empty loading bays available for offloading or alert facility staff of potential blockages or hazards for incoming and outgoing vehicles that could delay delivery schedules planned down to the minute. For monitoring and detecting specific vehicles, computer vision in combination with video analysis enables security cameras to streamline access control measures with license plate recognition. Smart cameras equipped with this technology can identify incoming and outgoing trucks - ensuring that only authorized vehicles gain access to transfer points or warehouses. Enhance regulatory safety measures in industrial settings Smart surveillance and AI-enabled applications can be used to ensure compliance with organizational or regulatory safety measures in industrial environments. Object detection apps can identify if employees are wearing proper safety gear, such as facial coverings, hard hats, or lifting belts. Similar to the prevention of break-ins and theft, cameras equipped with behavior detection can help to automatically recognize accidents at an early stage. For example, if a worker falls to the ground or is hit by a falling object, the system recognizes this as unusual behavior and reports it immediately. Going beyond employee safety is the ability to use this technology for vital preventative maintenance on machinery and structures. A camera can identify potential safety hazards, such as a loose cable causing sparks, potential wiring hazards, or even detect defects in raw materials. Other more subtle changes, such as gradual structural shifts/crack or increases in vibrations – ones that would take the human eye months or years to discover – are detectable by smart cameras trained to detect the first signs of mechanical deterioration that could potentially pose a physical safety risk to people or assets. Early recognition of fire and smoke is another use case where industrial decision-makers can find value. Conventional fire alarms are often difficult to properly mount in buildings or outdoor spaces and they require a lot of maintenance. Smart security cameras can be deployed in difficult or hard-to-reach areas. When equipped with fire detection applications, they can trigger notification far earlier than a conventional fire alarm – as well as reduce false alarms by distinguishing between smoke, fog, or other objects that trigger false alarms. By digitizing analog environments, whether a smoke detector or an analog pressure gauge, decision-makers will have access to a wealth of data for analysis that will enable them to optimize highly technical processes along different stages of manufacturing - as well as ensure employee safety and security of industrial assets and resources. Looking forward to the future of smart surveillance With the rise of automation in all three of these markets, from intelligent shelving systems in warehouses to autonomous-driving trucks, object detection for security threats, and the use of AI in monitoring agricultural crops and livestock, the overall demand for computer vision and video analytics will continue to grow. That is why now is the best time for decision-makers across a number of industries to examine their current infrastructure and determine if they are ready to make an investment in a sustainable, multi-use, and long-term security and business optimization solution.
The sound of sirens in the distance is commonplace, nowadays. Whether related to a medical emergency or everyday crimes, such as theft, property crimes, and so on, we’re all accustomed to hearing these sirens by now. It is worth noting that many incidents that police respond to take place at night. According to a recent report by the Sleep Judge, more than half of murders, manslaughter, sexual assaults, robberies, aggravated assaults and motor vehicle thefts happen long after the sun has set. To anyone looking to address the round-the-clock security challenge, deploying the most comprehensive surveillance solution is a must, and this means, looking at the instrumental role illumination plays in video capture. Limitations of Traditional Video Surveillance If surveillance cameras can’t be used to prevent, detect and/or resolve crimes that occur in these areas, the entire security operation is obsolete For surveillance cameras relying on video analytics and artificial intelligence (AI) to deliver functionalities such as facial recognition, license plate reading and motion detection, nighttime crimes can pose something of a problem. Without adequate illumination, images from video cameras are grainy and unusable. Without proper lighting, potential criminals and moving objects essentially become indistinguishable, at night, thereby inhibiting even the most advanced security technologies. This limitation of traditional surveillance technology not only hinders immediate police response, but it also stops crime investigations dead in their tracks. Often, without video evidence that is clear and discernible, conviction in a court of law is next to impossible. A common response to this issue is to place security cameras near streetlights or well-lit areas. After all, according to NPR, street lights are effective in deterring crime, as “there are people — neighbors, pedestrians or police — to actually see suspicious activity.” However, even if streetside and primary entrances are well lit, the areas that still need most to be surveilled are rear or side doorways shrouded by darkness, unlit back alleys, and so on. If surveillance cameras can’t be used to prevent, detect and resolve crimes that occur in these areas, the entire security operation is obsolete. Best-in-class security solutions must be able to see everything, day and night. A Purpose-Designed Solution to the Problem Addressing this issue is easier than you might think. Much like a human eye needs some sort of light to “see,” so does video surveillance technology. Integrating external illuminators into a security solution can optimize camera performance exponentially, expanding a camera’s video capture and coverage abilities and ensuring the operation of video analytics, day and night. Opting for an external illuminator allows system integrators to select a device that matches the exact emission range of a camera’s field of view (FOV). The result is an evenly lit visual field, where captured images are clear and effective for security purposes. The two most common options available to integrators include infrared (IR) and white light illuminators. Each technology is built to optimize particular deployments, depending on their needs. Infrared Versus White Light IR illuminators emit IR light, which is invisible to the human eye and perfect for covert surveillance operations. When cameras need to be able to detect potential threats over long distances, IR illuminators are perfect for the job as they typically have longer emission ranges. IR illuminators are optimal for surveillance operations in license plate recognition, border patrol, safe cities, theme park, and medical sleep lab applications. If an end user needs to implement full-color video analytics for identification purposes, such as facial, object and license plate recognition, white light illuminators are undoubtedly an integrator’s best bet. IR illumination and traditional thermal security cameras, after all, are only able to provide black-and-white images, whereas object recognition software often identifies objects based on their color. White light illuminators installed alongside AI-powered surveillance cameras enable enhanced video image clarity, which, optimizes video analytics performance. When customers want to physically deter suspicious activity, deploying white light illuminators is effective. A recent study out of Crime Labs New York found that businesses that deployed visible lights to deter crime “experienced crime rates that were significantly lower,” which “led to a 36 percent reduction in ‘index crimes’”. On top of all this, LED based white lights operate at low running costs and typically have long lifespans, saving end users thousands of dollars a year in energy costs without having to sacrifice surveillance optimization. External Versus Built-In Illumination Security customers looking to use lighting to deter crime and improve the performance of video surveillance may consider “all-in-one" solutions, as some cameras have LEDs (light emitting diodes) built into them. These LEDs typically encircle the lens and therefore shed light in whatever direction the camera is pointed. However convenient these may seem, built-in illumination can cause problems.Cameras deployed without proper illumination are rendered blind, especially at night First, LEDs built into cameras and next to other electronic components often cause heat to build up, which attracts insects that can trigger motion detection and obstruct a camera’s view. This heat buildup also shortens the LED lights lifespan. Built-in LEDs also tend to create “hot spots” with glare and reflection back into the camera, often because these lights only cover a 30-degree field of view (FOV), even though the average camera’s FOV is 90 degrees. This issue can severely limit a camera’s visibility, essentially rendering those remaining 60 degrees dark and unusable. All in all, when integrating lighting solutions into your security deployment, a cost-effective solution that enhances a camera’s video capture and coverage abilities, are external illuminators because they offer flexible choices of field of view and distances. Best-in-Class Solution When it comes to criminal conviction in a court of law, “seeing really is believing.” Cameras deployed without proper illumination are rendered blind, especially at night, just as any security officer would be when patrolling the same unlit area. To guarantee end users the most reliable and highest performing security solution, consider integrating best-in-class illumination into your offerings.
Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionizing radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method. AI algorithms Other innovations include an automatic screening lane, centralized image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI. CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021. Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travelers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitizer container of up to 12 ounces, one per passenger in a carry-on bag. a paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.
At an Oldsmar, Fla., water treatment facility on Feb. 5, an operator watched a computer screen as someone remotely accessed the system monitoring the water supply and increased the amount of sodium hydroxide from 100 parts per million to 11,100 parts per million. The chemical, also known as lye, is used in small concentrations to control acidity in the water. In larger concentrations, the compound is poisonous – the same corrosive chemical used to eat away at clogged drains. The impact of cybersecurity attacks The incident is the latest example of how cybersecurity attacks can translate into real-world, physical security consequences – even deadly ones.Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. The computer system was set up to allow remote access only to authorized users. The source of the unauthorized access is unknown. However, the attacker was only in the system for 3 to 5 minutes, and an operator corrected the concentration back to 100 parts per million soon after. It would have taken a day or more for contaminated water to enter the system. In the end, the city’s water supply was not affected. There were other safeguards in place that would have prevented contaminated water from entering the city’s water supply, which serves around 15,000 residents. The remote access used for the attack was disabled pending an investigation by the FBI, Secret Service and Pinellas County Sheriff’s Office. On Feb. 2, a compilation of breached usernames and passwords, known as COMB for “Compilation of Many Breaches,” was leaked online. COMB contains 3.2 billion unique email/password pairs. It was later discovered that the breach included the credentials for the Oldsmar water plant. Water plant attacks feared for years Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. Florida’s Sen. Marco Rubio tweeted that the attempt to poison the water supply should be treated as a “matter of national security.” “The incident at the Oldsmar water treatment plant is a reminder that our nation’s critical infrastructure is continually at risk; not only from nation-state attackers, but also from malicious actors with unknown motives and goals,” comments Mieng Lim, VP of Product Management at Digital Defense Inc., a provider of vulnerability management and threat assessment solutions.The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online “Our dependency on critical infrastructure – power grids, utilities, water supplies, communications, financial services, emergency services, etc. – on a daily basis emphasizes the need to ensure the systems are defended against any adversary,” Mieng Lim adds. “Proactive security measures are crucial to safeguard critical infrastructure systems when perimeter defenses have been compromised or circumvented. We have to get back to the basics – re-evaluate and rebuild security protections from the ground up.” "This event reinforces the increasing need to authenticate not only users, but the devices and machine identities that are authorized to connect to an organization's network,” adds Chris Hickman, Chief Security Officer at digital identity security vendor Keyfactor. “If your only line of protection is user authentication, it will be compromised. It's not necessarily about who connects to the system, but what that user can access once they're inside. "If the network could have authenticated the validity of the device connecting to the network, the connection would have failed because hackers rarely have possession of authorized devices. This and other cases of hijacked user credentials can be limited or mitigated if devices are issued strong, crypto-derived, unique credentials like a digital certificate. In this case, it looks like the network had trust in the user credential but not in the validity of the device itself. Unfortunately, this kind of scenario is what can happen when zero trust is your end state, not your beginning point." “The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online for the first time as part of digital transformation projects,” says Gareth Williams, Vice President - Secure Communications & Information Systems, Thales UK. “While the move towards greater automation and connected switches and control systems brings unprecedented opportunities, it is not without risk, as anything that is brought online immediately becomes a target to be hacked.” Operational technology to mitigate attacks Williams advises organizations to approach Operational Technology as its own entity and put in place procedures that mitigate against the impact of an attack that could ultimately cost lives. This means understanding what is connected, who has access to it and what else might be at risk should that system be compromised, he says. “Once that is established, they can secure access through protocols like access management and fail-safe systems.” “The cyberattack against the water supply in Oldsmar should come as a wakeup call,” says Saryu Nayyar, CEO, Gurucul. “Cybersecurity professionals have been talking about infrastructure vulnerabilities for years, detailing the potential for attacks like this, and this is a near perfect example of what we have been warning about,” she says. Although this attack was not successful, there is little doubt a skilled attacker could execute a similar infrastructure attack with more destructive results, says Nayyar. Organizations tasked with operating and protecting critical public infrastructure must assume the worst and take more serious measures to protect their environments, she advises. Fortunately, there were backup systems in place in Oldsmar. What could have been a tragedy instead became a cautionary tale. Both physical security and cybersecurity professionals should pay attention.
Thermal cameras can be used for rapid and safe initial temperature screening of staff, visitors and customers. Used the right way, the cameras can help prevent unnecessary spread of viruses like the novel coronavirus. During the global pandemic, use of thermal cameras has increased, but they have not always been used correctly, and therefore, not effectively. Hikvision’s temperature screening thermal products are currently assisting users in initial temperature screening across the global market. During 2020, demand increased in most markets, and the company highly recommends that Hikvision’s thermographic cameras be used in accordance with local laws and regulations. Limitations of the technology include throughput and the impact of ambient conditions. Detect viruses and fever Hikvision releases a video that illustrates how skin temperature measurements are normalized within minutes Thermal cameras cannot detect viruses and fever and should only be used as a first line of screening before using secondary measures to confirm, says Stefan Li, Thermal Product Director at Hikvision. “We also believe it is important for businesses and authorities to use [thermal cameras] alongside a full program of additional health and safety procedures, which includes handwashing, regular disinfection of surfaces, wearing protective clothing such as masks, and social distancing.” Hikvision has released a video that illustrates how skin temperature measurements are normalized within minutes after someone emerges from the cold. Mr. Li says the video demonstrates the accuracy of forehead measurement under difficult circumstances when people come inside from a cold outdoor environment. Temperature screening facilities “There have been some claims that measuring the forehead temperature is not as accurate as measuring the inner canthus, and we believe this video demonstrates the accuracy of forehead measurement very well,” he says. “We also illustrate how the skin temperature will experience a process of recovery (warming up), no matter if it is measured by a thermal camera or a thermometer.” Mr. Li adds that people should wait five minutes in such circumstances before starting a temperature measurement. “We hope that stakeholders who are involved in the design of temperature screening facilities and associated health and safety procedures will recognize how important it is to consider the skin temperature recovery time, and that forehead measurement can provide accurate test results,” says Mr. Li. Thermal imaging manufacturers The algorithm is based on a large number of test results to obtain a value that tends to be dynamically balanced The temperature measurement principle of thermal imaging is to detect the heat radiation emitted by the human body. The detected heat value often does not reflect the true internal body temperature of an individual. Furthermore, the temperature varies among different parts of the human, such as the forehead, ears, underarms, etc. A temperature compensation algorithm can be used to adjust the measured skin temperature to align with the internal body temperature. The algorithm is based on a large number of test results to obtain a value that tends to be dynamically balanced. At present, thermal imaging manufacturers in the market, and even forehead thermometer manufacturers, have developed their own algorithms to map the skin temperature measured by the camera to the internal body temperature, so as to compensate the skin temperature to the internal body temperature. Thermal cameras This is also why Hikvision recommends that the "actual body temperature" should be checked with a secondary device for confirmation. The calibration work for a thermal camera is completed in the production process at the factory, including calibration of reference values and detection point and so on. At the same time, the equipment parameters should be adjusted before on-site use to ensure accurate temperature reads. Hikvision does not deny the accuracy of temperature measurement at the inner canthus but prefers forehead temperature measurement and algorithms based on actual use scenarios, says Mr. Li. A large amount of test data and practical results indicates that the forehead is a correct and easy-to-use temperature measurement area, says the company. There are advantages and disadvantages of choosing different facial areas for temperature measurement. Default compensation temperature Two main approaches direct the measurement area and how compensation algorithms are applied: Forehead area + default forehead compensation algorithm value Upper half face (forehead + canthus) + default inner canthus compensation algorithm value. Both methods deploy compensation algorithms, but the default compensation temperature of the inner canthus will be less than the default compensation temperature of the forehead, generally speaking. The reason is that the temperature of the inner canthus of most people is higher than their forehead, so the temperature compensation is relatively low (i.e., closer to the actual temperature inside the body.) Upper face area Hikvision found that selecting the upper face area plus the default compensation value for the inner canthus resulted in situations when the calculated temperature is lower than the actual temperature. For the Hikvision solution, the forehead is a relatively obvious and easy-to-capture area on an entire face Mr. Li explains: “The reason is that when the camera cannot capture the position of the inner canthus (for example, when a person is walking, or the face is not facing the camera), the camera will automatically capture the temperature of the forehead. Then the result that appears is the sum of the forehead temperature plus the default compensation temperature of the inner canthus, which is lower than the actual temperature of the person being measured. Therefore, errors are prone to occur.” Thermal imaging products But for the Hikvision solution, the forehead is a relatively obvious and easy-to-capture area on an entire face. Also, the default forehead compensation temperature is based on rigorous testing and can also correctly mimic the actual temperature of the person being measured, says Mr. Li. After many test comparisons, considering that the results of forehead temperature measurement are relatively more stable, and in order to avoid the false results from inner canthus temperature measurement, Hikvision chose the forehead temperature measurement approach. “We look forward to bringing thermal imaging products from a niche market where there is a relatively high-end industry application to a mass market and serving more users,” says Mr. Li. Facial recognition terminals Additional application parameters can maximize effectiveness of thermal cameras for measuring body temperature: Positioning and height - All cameras must be mounted appropriately to avoid loss of accuracy and performance. The installation height of each camera must be adjusted according to camera resolution and focal length, and stable installation is needed to avoid errors caused by shaking. Ensuring a ‘one-direction path’ - The detection area must ensure that cameras capture the full faces of all those passing by or stopping, and obstacles should be avoided in the field of view, such as glass doors that block the camera. Adequate start-up and usage - A waiting time of more than 90 minutes is required for preheating, after the initial start-up. Before conducting a thermal scan, people should be given three to five minutes to allow their body temperature to stabilize. When Hikvision MinMoe facial recognition terminals are used, people must stand at a fixed distance, pass one by one, make a short stop, and face the camera directly. Hikvision cameras support efficient group screening, but one-by-one screening is suggested for more accurate results, says Mr. Li. Unstable environmental condition An unstable environmental condition may affect the accuracy of thermal camera systems Environmental factors can impact the accuracy of thermal cameras, and the idea of using a black body is to provide the camera with a reference point that has a stable temperature. The black body is heated to a specific temperature and helps the thermal camera to know how much error is caused by environmental factors in the room, and how the camera should calibrate itself in real time to improve its accuracy. A black body can help increase the temperature measurement accuracy, and the most common improvement is from ±0.5 degrees to ±0.3 degrees. However, it also increases the cost of the installation. In some markets, customers may require black bodies in order to comply with regulatory accuracy requirements. An unstable environmental condition may affect the accuracy of thermal camera systems for measuring temperature. Medical temperature measurement Therefore, Hikvision suggests that the ambient conditions should be met for installation and use. First of all, users should avoid installing devices in hot or changeable environments. All cameras require indoor environments with calm air, consistent temperature and no direct sunlight. Installation should also be avoided in semi-open locations that may be prone to changes in ambient conditions, such as doorways, and there should be enough stable, visible light. All devices should be installed to avoid backlighting, high temperature targets, and reflections in the field of view as far as possible. “We often see the misconception that thermal cameras can replace medical temperature measurement equipment, which is not the case,” says Mr. Li. Rapid preliminary screening “Temperature screening thermographic cameras are designed for the detection of skin-surface temperatures, and the measurement should be conducted to achieve rapid preliminary screening in public areas. It is really important that actual core body temperatures are measured subsequently with clinical measurement devices.”
Adani Group is a multi-national conglomerate headquartered in Ahmedabad, Gujarat, India and has a diversified portfolio of businesses, including resources, logistics, energy sectors and agriculture business. Adani Group is the largest port developer and operator in India, with Mundra being the country's largest commercial port. With multiple ports, branches, manufacturing units and corporate offices at various locations, Adani Group is one of the largest business units. In all, this business group has 15,000+ employees and 50,000+ workers (with 900+ third-party contractors), who are involved in the incorporation of various work orders across 25+ business units. Managing staff attendance and diverse shifts Adani Group is widely engaged in multiple business units and ports with 50,000+ workers under 900+ contractors, employed at various locations. Maintaining and managing entire attendance, diverse shifts and leave policies for the various locations, and numerous workers at a central place was critical for them. Moreover, task allotment to workers based on its requirements, skills under a contractor and its verification against the respective contractor's report were tedious tasks for the management. To provide approved and appropriate induction of each worker at a defined level, monitor the progress status of each work order and its segregation based on reports were quite challenging. Report generation to eliminate the fraudulent and erroneous payment of wages at contractors' end had been the need of the hour. Moreover, their requirement of timely and error-free payroll processing was arisen to improve overall productivity. COSEC Contract Workers Management COSEC Contract Workers Management offers centralized attendance management solution for various branches After comprehensive discussion regarding problems and requirements, Matrix offered COSEC Contract Workers Management solution for their 50,000+ workers, who have been employed under 900+ contractors, spread across four locations in India. COSEC Contract Workers Management offers centralized attendance management solution for various branches, spread across multiple locations, which automates all processes, right from recording entries and exits up to processing salaries. Enrolment of the worker credentials COSEC Contract Workers Management facilitates enrolment of the worker credentials, along with a photograph, documents, and induction details. It helps contractors to manage workers efficiently, using contractors' self-service portal. The solution provides multiple connectivity possibilities via Ethernet, Wi-Fi and mobile broadband. It eases the tracking of work order progress. It offers seamless integration with SAP using the database to database linking and offers the feature of real-time notifications, in cases of exceptional situations via email and SMS. Results: Enhanced security with effective worker's enrollment process abiding by various induction levels. Increase in productivity of admin by 20%. Easy decision making due to the generation of customized reports. Smooth and effective monitoring of work orders. Improved security with centralized control and monitoring - Reduced time spent by the security department. Error-free man hours' computation for quick & effective wages' calculation. Minimized manual interventions. Matrix products and solutions Offered: COSEC CENTRA LE - Application Software Platform expandable up to one million users. COSEC LE CWM - Contract Workers Management Module for COSEC CENTRA LE. COSEC DOOR FOW - Fingerprint and RF Card-based Door Controller with Wi-Fi connectivity. COSEC PATH DCFM - Fingerprint, Mifare Card and NFC-based Door Controller. COSEC VEGA FAX - Fingerprint and RF Card-based Premium Door Controller with Touch Sense LCD, IP65, Wi-Fi, PoE. COSEC DOOR FOP - Fingerprint and RF Card-based Premium Door Controller with LCD and Keypad.
82% of schools and colleges in both the US and Northern Europe see a potential role for CCTV/video monitoring systems in supporting a safe return to face-to-face teaching in school buildings and across further education college campuses, following the pandemic. Many schools and colleges have already adapted their video monitoring systems. For example, half (50%) of all those in charge of these systems had already adapted their existing video systems to help manage social distancing. A further 34% planned to use their systems for this purpose within the next 12 months. Video monitoring systems The AVA Security Education Sector Security Survey provides a wealth of data and insight linked to how Operations, Security, and IT directors and managers within educational establishments in the US, Norway, Sweden, and the UK, are adapting their video monitoring or CCTV systems in the wake of the pandemic. Nearly four of every 10 (38%) educational institutions were already using their video monitoring systems to trace all student, staff, and visitor movements in, out, and around their premises and grounds to protect everyone from infection. A further 46% planned to configure these systems for this same purpose within the next 12 months. Safe-specific video analytics Nearly a third (29%) was already using their existing video systems to help provide temperature level health checks at some building entrances. A further 43% planned to enable temperature checking via their CCTV systems within the next year. Interestingly, 41% had already deployed their video systems for reporting on class or lecture hall occupancy levels and people density levels in retail areas, dining facilities, and other leisure areas where students congregate. A further 41% said they were planning to add this capability via their video systems over the next 12 months. Contactless access control The education sector is a deployer of facial recognition analytics in existing cameras Mask detection analytics is also being widely deployed in US and Northern Europe’s schools and colleges: 35% had already deployed video analytics software now available for alerting security staff when teachers or students are inside a building but not wearing a mask. A further 31% planned to deploy mask detection analytics within the next 12 months. However, the education sector is a more cautious deployer of facial recognition analytics in existing cameras to enable visual identification and contactless access control in the interests of reducing COVID infection via card touch-in gates. Only 22 percent of schools and colleges have deployed facial recognition to date, although this is set to more than double as 29% over the next 12 months. Reduced VMS costs The biggest challenge of supporting all these changes appears to be paying for them: 31% of those in charge of video monitoring systems had already seen a significant reduction in budgets available for upgrading and improving video monitoring capabilities in the last year. A further 29% had seen a small reduction in budgets over the same timeframe. A further 8% thought fresh budget cuts were likely in 2021. Cybersecurity has become a key IT priority As IT, Operations, and Security staff have had to run systems as well as teaching remotely during the pandemic, there has been an increased focus on cybersecurity to protect access to vital data and online learning resources. Just in the last few weeks, the University of Hertfordshire experienced a major cyberattack which led to the shutting down of key online learning apps including Zoom for students enrolled there. Over a third (35%) of educational institutions’ decision-makers questioned thought it ‘very likely’ that they would need to place a ‘larger focus on cybersecurity for all devices and applications that are networked’ as one impact of the pandemic. A further 48% thought an increased cybersecurity focus was ‘likely’. Linked to this, 27% of directors and managers running video security systems in schools and colleges saw an improvement to the video ‘system’s resilience and back-up systems/procedures’ as a ‘High Priority’ improvement that they needed to implement to protect video data this year, while a further 44% saw it as ‘Somewhat a Priority’. Smarter, easier to use video systems There was some disquiet about the quality of existing video systems’ core capabilities, the Ava Security research found. For example, 29% thought it was a ‘High Priority’ to improve the speed of finding and retrieving video evidence after a security or safety incident. A further 40% saw it as ‘Somewhat a Priority’ to improve the systems’ retrieval capabilities to find ‘required footage of incidents easier and quicker. It currently takes too long.’ Further, 22% saw the need for ‘better integration between video monitoring camera systems and other security-related systems, such as access control or alarm systems’ as a ‘High Priority’, while over half (57%) saw wider security systems integration as ‘Somewhat a Priority’ now. Nearly two-thirds (66%) of video monitoring system decision-makers in the education sector were keen to make their video monitoring systems ‘more intelligent, using video analytics to support better post-event decision-making’ – placing this improvement as either a ‘High Priority’ or ‘Somewhat a Priority’. Cloud on the horizon 73% of the education sector is experiencing accelerated cloud migration Others were more focused on Cloud Migration of more IT Systems. Over half (51%) confirmed that their cloud migration plans had been accelerated in 2020/21 and a further 32% confirmed that a new budget had already been allocated for moving more services into the cloud in the financial year 2020/21. That means that altogether (net) 73% of the education sector is experiencing accelerated cloud migration. Linked to this, the same study uncovered that 58% found ‘adoption of Video Surveillance as a Service (VSaaS) i.e., moving their video monitoring system into the cloud’, as a ‘net priority’ for improving and optimizing their video monitoring systems looking forward. VSaaS selection criteria For the 82% of all education respondents actively considering VSaaS options right now, there were many criteria determining provider selection. Nearly nine out of 10 net (87%) considering VSaaS right now, agreed with the statement ‘It must have very strong cybersecurity, including end-to-end encryption from the camera to the cloud.’ The VSaaS selected must also offer a reduction in the ‘Total Cost of Ownership of our video monitoring system’, according to 48% of educational institutions considering migration to VSaaS. Further, 45% of decision-makers questioned insisted on greater ease of use, supporting the statement ‘It must be configurable and operable by non-IT people’. Third-party cameras While 24% of education sector decision-makers considering VSaaS, said it was critical that the provider was not headquartered in mainland China. A net 80% of video monitoring system decision-makers in the education sector also considered it important that the VSaaS selected ‘must allow us to continue using our existing third party cameras which we have already installed, we don’t want to rip & replace any equipment.' A net 80% considering VSaaS also confirmed ‘It must allow us to view their directly attached cloud cameras alongside our third-party cameras on the same interface’. Further, the same number of respondents (net 80%) considered it net important (either ‘very’ or ‘quite important’) that the VSaaS ‘must allow us to use our existing Video Management Software (VMS) or provide the same functionality as we get from our VMS’. Latest analytic capabilities An even higher number, net 84%, regarded it as important that the VSaaS selected ‘must enable us to run the latest video analytics capabilities such as occupancy levels for social distance management (in a room), noise analytics (e.g., breaking glass, screaming, yelling, etc), people and vehicle search, object searching and color searching’. Balance of power The Ava study also explored whether the events of the last year had prompted changes in terms of who looks after the management of video monitoring systems. There was some evidence in the education sector that as CCTV has increasingly been migrated onto the network, IT departmental control is increasing. According to the study, nearly a third (31%) of schools and colleges’ video systems passed more control of their video monitoring systems to their IT department – taking the total percentage of video systems run by IT in the education sector to 39%. However, security and/or facilities management still holds the balance of power in the running of these systems with 50%, with 24% gaining responsibility for video monitoring during the pandemic. Only 4% of systems confirmed they had fully outsourced video system management and 7% confirmed that more of the management, upgrading, and running of their systems had been outsourced over the last year. Workspace management technologies Ava Security also found evidence that the education sector is an early adopter of other workspace technologies designed to make it easier for students to manage the use of school and college facilities while minimizing the risk of COVID infection. For example, 52% of educational institutions captured in the Ava study expressed interest in offering staff and students the capability of remote pre-booking of working areas in libraries, classrooms, and lecture halls and pre-registering students via mobile-ready apps. Nearly four out of every 10 people responsible for managing video monitoring in their school or college (38%) felt remote booking of extra cleaning of surfaces before or after classes would be a useful innovation. Cybersecurity is critical to VSaaS selection There is a strong determination to adapt existing school surveillance systems to new COVID-safe requirements" Vegard Aas, Head of Online Business at Ava Security, commented, “The fact that four out of five education sector video monitoring system decision-makers are already actively considering VSaaS and weighing up criteria for selection is very encouraging." “There is also clearly a strong determination to adapt existing school video surveillance systems to new COVID-safe requirements. And the fact that a third (32%) confirmed that a new budget had already been allocated for moving more services into the cloud this year provides significant scope for optimism as we enhance our VSaaS offering with Ava Cloud Connector for example, which enables those running systems to plug existing third party cameras into Ava’s open Aware Cloud platform.” Cloud Connector Ava Security recently launched its Cloud Connector offering to enable video security system owners easy and cost-effective transition of video security solutions to the cloud. This brings Ava’s advanced real-time video analytics and proactive security to existing surveillance cameras by integrating them with Ava’s open Aware Cloud platform. Ava’s Cloud Connector eliminates the need to rip and replace existing video security devices to directly reap the cost and operational efficiencies of a true cloud service.
Merrion Vaults, an Ireland-based provider of safe deposit boxes, has selected biometric identity verification technology from Iris ID. Merrion Vaults rents safe deposit boxes, like those found at banks, but with a significant difference, customer identities are authenticated through highly accurate iris readers, in order to enhance security. Private safe deposit boxes Merrion Vaults operates private safe deposit boxes in Glasgow and Edinburgh, in Scotland, Nottingham, Liverpool and Newcastle, in England and Dublin, in Ireland. Seamus Fahy, Director, Merrion Vaults, said the iris readers are replacing fingerprint recognition systems for authenticating customer identity. Fahy believes the choice of contactless iris readers was well timed, with the ongoing COVID-19 pandemic. Seamus Fahy stated, “The initial customer reaction to the Iris ID readers has been excellent. The customers love it.” Fingerprint readers It’s a simple, easy process for them to swipe an access card and then look into the reader with nothing to touch" He adds, “It’s a simple, easy process for them to swipe an access card and then look into the reader with nothing to touch. The entire process takes a few seconds to complete. Using the fingerprint reader, customers would forget which finger they registered with or would press too hard or too lightly on the reader. If they couldn’t get access, we’d have to check their names and passwords, and then re-register them. It was a hassle.” According to Fahy, the Iris ID readers are part of a tight security plan that includes video surveillance, access control, turnstiles, intrusion alarms and panic buttons, as well as seismic and water sensors. Employees monitor cameras at each facility and in a system-wide control room in Dublin, Ireland. Iris recognition system Mohammed Murad, Vice President of Iris ID feels the iris recognition system allows rapid and highly accurate authentication of Merrion Vaults customers, due to each person’s unique iris patterns. Mohammed Murad said, “The accuracy, speed and convenience of the Iris ID system are critical for a business that identifies its customers using biometrics. Our system also provides another critical layer of security, ensuring only Merrion customers gain access to the vault. No two people, including identical twins, have the same iris patterns.” Iris iCAM7S system readers The Iris iCAM7S system readers provide a mirror interface with color-alignment indicators guiding customers through the authentication process while capturing iris images at distances of up to 15 inches. Fahy adds that many banks in the United Kingdom are discontinuing safe deposit box service, creating an opportunity for private vendors to fill the gap. Merrion Vaults plans to open new facilities in Belfast, Northern Ireland, Reading and Bristol, England and Barcelona, Spain in 2021. Longer-term plans include locations in cities across the U.S. Merrion Vaults partners with Aditech, which uses dial-in capabilities to remotely configure and set up the system and test it with Merrion Vault’s IT department.
Suprema, a global company in biometrics and access control solutions, announced that it supplied BioSign 4.0, its under-display fingerprint recognition algorithm to the Samsung Galaxy S21 smartphones with support from Qualcomm Technologies, Inc. BioSign, Suprema’s smartphone fingerprint recognition technology, has gained global recognition since its installation on Samsung Galaxy J5 models in 2017. Since then, Suprema has been supplying BioSign solutions to other Samsung smartphone models including Samsung Galaxy S10, Galaxy Note10, Galaxy 20, and Galaxy Note 20 series. Fingerprint recognition speed BioSign 4.0, installed in the Galaxy S21, has been receiving great reviews for its fingerprint recognition speed. BioSign 4.0 delivered enhanced speed and accuracy compared to its predecessor, BioSign 3.0, significantly upgrading user convenience with 50 percent faster and more than twice as accurate recognition performance. BioSign 4.0 employs deep-learning mechanisms to optimize fingerprint analysis to efficiently recognize rich fingerprint information obtained from the larger sensing area of the second-generation Qualcomm® 3D Sonic Sensor Gen 2 installed in the Galaxy S21 series. Qualcomm 3D Sonic Sensor Gen 2 Qualcomm Technologies unveiled the high-performance ultrasonic sensor, the Qualcomm 3D Sonic Sensor Gen 2 that was supplied to Samsung Galaxy S21 series, in January at CES 2021. With a 77%-larger fingerprint sensing area than the previous generation, the Qualcomm 3D Sonic Sensor Gen 2, was able to significantly improve fingerprint recognition performance. The ultrasonic sensor has ultra-thin form factors and is optically isolated from the display panel allowing for sleek smartphone designs. Performance and user convenience “Suprema's fingerprint recognition technology has been continuously selected for the Samsung Galaxy S series, proving to the world the technological superiority of our solution,” said Brian Song, the president of Suprema Inc. “With the excellent reviews BioSign 4.0 has been receiving for its overpowering performance and user convenience, we expect to be able to grow sales and market share. Suprema will continue to advance our fingerprint and face recognition technologies using AI and deep learning, leading the biometrics market into the future,” Song remarked.
With a mission to recognize the faces of the people entering/exiting premises of the Government Institution in Indonesia, and analyze their attributes in real-time, the authority needed an extremely robust and ‘highly secured’ facial recognition system. Due to heavy footfall at the premise, it was difficult for staff to manually record information of visiting people and verify their identity on a daily basis. Sometimes, they faced challenge in verifying them due to changes in appearance or features of the visitors. Videonetics MeraFace Videonetics MeraFace, the advanced facial recognition software was selected after a thorough technical evaluation Videonetics MeraFace, the advanced facial recognition software was selected after a thorough technical evaluation by the partner, as well as government decision-makers. The software was selected for its highest accuracy in recognizing and detecting faces in varied lighting conditions, thereby providing additional attributes of gender, age, and emotions, and comprehensive statistical reporting. Operating 24x7 for 365 days, on one of the busiest premises, with a heavy footfall of VIPs, citizens, media, and government officials, Videonetics MeraFace was deployed at strategic locations with high human traffic flows, including entry and exit points, and lift lobby area of the institution. Key features of Videonetics MeraFace include: Video streams from IP cameras are processed at MeraFace to detect faces in real-time and operators find a probable match with the registered faces. In case, any face that is not registered but has been captured and stored in the system can also be found anytime. Operators have been keeping records of registered faces and attributes of the person’s face for future search and investigation. Powered by AI & Deep Learning framework, MeraFace analyzes and delivers more information, such as gender, age, emotion, eventually helpful for officials to make accurate visitors’ analysis. Now, operators can identify and classify VIP, suspected, blacklisted people in real-time with easy clicks and send the instant notification to the staff, for any swift action. At the time of any suspicious activity, operators can quickly investigate a person’s face in the given videos or collection of face images. Moreover, this feature has been phenomenally successful as an investigation tool, for conducting post-incident analysis. Scalable facial recognition system Videonetics MeraFace has proven to be a reliable and scalable system for the government authority, by delivering fast and highly accurate results. With the system, the security staff can recognize and detect faces in real-time. Furthermore, MeraFace has helped in appointing a smaller number of security guards around the entrance or exit of the premise, thanks to an automated facial recognition system of identifying and validating information. The risk of human errors in face matching has also been eliminated. “Videonetics has not only delivered a perfect facial recognition solution, but also delivered on its reputation of providing outstanding training and support, to us and customer. Our customer has invested in the future-proof technology that has the ability to grow with their needs,” stated Alfred Bisuk, Technical Manager, Lamjaya Inovasi Komputindo.
SATO, a global company in the development of auto-ID and labelling solutions, has announced the launch of its innovative TEMPCHECK TouchFree solution to enable a 100% contactless approach to verify the identity, health, and safety of all on-site employees and visitors. The fully automated solution combines a tablet device, which has facial recognition and temperature scanning capabilities, with the SATO CT4-LX intelligent label printer to facilitate triple confirmation at the point of entry. With full track and trace capabilities, the TEMPCHECK TouchFree solution records and stores data electronically, deleting it after a set period of time to comply with HIPPA and GDPR policies. Rapid and accurate solution The TEMPCHECK TouchFree solution from SATO is designed to protect, prevent and limit the spread of infection Paul McIntyre, Industrial & Retail Sales Executive at SATO, said, “The health and safety of employees and visitors at any workplace or venue should always be a top priority. Now, with the COVID-19 pandemic, it has become vital that entrance points should become the focal point of information gathering to ensure the safety and security of all those in the building.” “The TEMPCHECK TouchFree solution from SATO is designed to protect, prevent and limit the spread of infection, should an outbreak occur. Not only can our technology help to identify which entrance the individual arrived from, but it can also pinpoint who was in front and behind the person in a line, alongside where they are seated in a stadium environment. This means it can rapidly and accurately identify any potential infection cluster, with all data firmly secured in a local network requiring zero cloud access.” Contactless solution To use the TEMPCHECK TouchFree solution, individuals simply scan a QR, NFC, RFID, or barcode and allow the device to scan their face – with or without a mask – to verify their identity. Their temperature is then recorded and sent via Bluetooth to the label printer, which displays their name, date, time entered, and their assigned location in the building on the printed label. The label also features a QR code that can be scanned by any peripheral device for ID checking and access rights. “At SATO, we continuously strive to innovate with ceaseless creativity,” added McIntyre. “Our contactless auto-identification and temperature checking solution is a superb replacement for the thumbprint, palm print, or keypad entry systems that are required as part of overall security protocols, as well as health and safety regulations. Its end-to-end touch-free access, combined with data gathering and secure retrieval, makes for a value-added solution that is ideal for large corporate, sporting events and more when physical social restrictions lift.”
Round table discussion
During the coronavirus lockdown, employees worked from home in record numbers. But the growing trend came with a new set of security challenges. We asked this week’s Expert Panel Roundtable: What is the impact of the transition to remote working/home offices on the security market?
When technology performs a required task effectively, there is little reason to upgrade to the ‘next big thing’. In this regard, the physical security market is notoriously slow to change. Much of yesterday’s most robust and dependable equipment is still in place at thousands of customer sites, still performing as well as the day it was installed. However, there comes a point when any technology becomes outdated. We asked this week’s Expert Panel Roundtable: Which security technologies are becoming outdated or obsolete?
Our Expert Panel Roundtable is an opinionated group. However, for a variety of reasons, we are sometimes guilty of not publishing their musings in a timely manner. At the end of 2020, we came across several interesting comments among those that were previously unpublished. Following is a catch-all collection of those responses, addressing some of the most current and important issues in the security marketplace in 2021.
Biometric authentication: Manufacturers & Suppliers
- HID Biometric authentication
- Suprema Biometric authentication
- BQT Solutions Biometric authentication
- Illustra Biometric authentication
- Anviz Biometric authentication
- Hikvision Biometric authentication
- CDVI UK Biometric authentication
- CEM Biometric authentication
- IDEMIA Biometric authentication
- PCSC Biometric authentication
- Vanderbilt Biometric authentication
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload