CHeKT announces a partnership with OPTEX, the supplier of outdoor sensors for intrusion security. CHeKT delivers a visual-monitoring platform for alarm monitoring centers. This partnership with Optex will significantly advance the protection capabilities of security integrators globally. The solution relies on ‘The CHeKT Bridge’, the first product brought to market by CHeKT. With years of development, the CHeKT Bridge premiered in April 2018 at the ISC West trade show. The vision of...
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all o...
GJD has hit the ground running in 2019 with the appointment of Jason Hill as the company’s Commercial Director. Mark Tibbenham, Managing Director of GJD has big plans for the British manufacturer of external motion detectors and LED illuminators, and has recruited Jason Hill to help deliver on his aspirations. GJD Expands In The US Commenting on the new appointment, Mark said: “Even though we were 2017 recipients of the Queens Award for Enterprise, International Trade there are a s...
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality...
As the world continues to become more connected, it’s becoming increasingly important to adjust security and safety procedures in the workplace. But today’s ever-evolving office environment can present unique safety and preparedness challenges. No two businesses are exactly alike, with some located in numerous buildings or spread out across campuses, while others have employees that frequently journey from different locations, work remotely or travel internationally. With this shif...
Security Essen 2018 presented itself as the international source of inspiration for the industry. 950 exhibitors from 43 countries showed their innovations for increased safety and convenience to over 36,000 trade visitors from 125 nations at Messe Essen on topics ranging from cyber security to innovations for building security and new solutions for the protection of valuables. The representatives of the companies, associations and institutions were in great demand as discussion partners. There...
Whether you need to protect a single facility or an entire campus of commercial buildings, the UL listed XR Series Access/Burglary/Fire control panels by Digital Monitoring Products (DMP) are up to the task. With its recent XR Series Version 182 update, this can-do panel now offers even more features and functionality. XR Series Control Panel Now customers using the XR Series control panel have increased speed, reliability, and greater distance in controlling Z-Wave Plus devices using their Virtual Keypad app. Also, customers have the ability to store a back-up copy of all Z-Wave programming. DMP’s Dual Authority, previously called Two Man Rule, has also expanded with more options for added flexibility. Now, customers can assign Dual Authority to specific areas, as well as Profiles. In area information, the options for Dual Authority are none, ARM, DISARM (which includes access control requests), and all these operations in an area. XR Series Allows Remote Diagnostics Not only can customers control specific actions, but in profiles, they now can specify which authorized users need Dual Authority for access or arming/disarming operations. This will help facilitate granularity in assigning who requires Dual Authority, such as a third-party vendor or an individual who provides cleaning services; whereas the two-person authorization requirement can be applied among other users, such as tellers in a bank. Now, customers have the flexibility to specify that. Dual Authority is a feature of XR550N and E panels. Also, as part of this update, DMP’s XR Series allows remote diagnostics from the Tech APP, just like the XT panel does. Now, the Tech APP can be used to perform communication testing and walk tests, as well as Z-Wave diagnostics. DMP is also increasing the sensor activity zones from 10 to 50, giving customers much greater access to their homes and businesses through their Virtual Keypad app.
Digital Monitoring Products (DMP) is excited to announce the launch of its XTLtouch security panel. Unlike any other DMP security system, the XTLtouch is an enhanced all-in-one, combining DMP’s elegant, intuitive 5-inch graphic touchscreen keypad with the popular XTLplus. All-in-one Security System “The XTLtouch represents the natural extension of our proven XT and XTLplus security technology,” says DMP Vice President of Sales Mark NeSmith. “Our XTLplus set the standard for security, fast installations, and ease of operation. We’re taking that technology and designing an enhanced all-in-one system.” Unlike any other all-in-one, the XTLtouch incorporates multiple enhancements, he adds. For instance, it has an external 110db wireless siren that can be placed anywhere. Security Installation “The first thing an intruder might do is try to disable the sound maker. But with the XTLtouch, since the siren won’t be coming from the main panel, it’s not alerting the intruder to where the main system is; therefore, it’s more secure.” To ensure the best coverage across the premises, DMP offers the option of installing up to eight wireless sirens To ensure the best coverage across the premises, DMP offers the option of installing up to eight wireless sirens. Placing the sirens away from the keypad also alleviates stress for the end user who’s disarming the system. “If there’s a siren blasting in your ear, and you’re trying to disarm your panel, it’s nearly impossible to think. This takes away that stress.” Entry Check-In Protection If the system isn’t disarmed in the designated delay timeframe, the XTLtouch’s built-in Entry Check-In Protection guarantees that the trouble signal is sent to the monitoring center immediately. In the event of an attack, this is a proactive safeguard against a burglar’s fast tactic to disable the security system before it can send a signal. “Entry Check-In Protection is based on the same reliable check-in technology that we’ve used for years, even for our high-security customers,” NeSmith explains. “Our messages never go through a third-party NOC where they’re re-transmitted. They’re sent to the monitoring center receiver directly.” Identical User Interface The XTLtouch also offers flexible installation options. This adds to the system’s security and functionality. “If the best cell reception or wireless coverage is on the second floor, that’s not a problem. You can put the XTLtouch wherever you need to and still add keypads exactly where your customer wants them.” The new XTLtouch can support up to seven additional wireless keypads, all with an identical user interface as the main unit. According to NeSmith, “With only one keypad format to learn, users don’t get confused about the way their system functions operate.” Not only is it easy to operate, but the XTLtouch also installs quickly and easily Commercial And Residential Security Not only is it easy to operate, but the XTLtouch also installs quickly and easily. Options include table top, wall mount or in-wall installations. “That’s part of delivering a complete security solution. These options ensure fast and easy installations while fitting the end user’s preferences.” Compared to other all-in-one systems, the XTLtouch is one of the most compact. And yet, packed into that keypad-sized alarm panel are the same high-security features that commercial and residential customers have come to expect from DMP: 99 zones of 900 MHz Two-Way Wireless, built-in Wi-Fi and LTE communication, as well as Z-Wave Plus support, all included in the base unit. Video Integration The XTLtouch also includes all the system automation features that consumers crave, giving them the ability to control lights, locks, and thermostats as they come and go or use the new Custom Actions programming to automate up to 20 different user programmable scripts. Consumers can add video integration with multiple options and control it all from the Virtual Keypad app or VirtualKeypad.com browser. “We’re very excited about the XTLtouch — no other all-in-one offers this kind of powerful and flexible solution,” NeSmith concludes. “Plus, it’s competitively priced. We believe it’s going to allow us to more aggressively compete in the residential and small commercial markets.”
Eyecloud Cam, smart home security camera, is now available via a Kickstarter campaign. Aimed at keeping house, family and belongings safe, Eyecloud Cam ensures affordable security with a single Eyecloud Cam costing less than $100. Eyecloud Cam Home Security Camera Eyecloud Cam is a home security camera that constantly monitors the safety of the family and home by putting one of the most advanced computer vision AI technology right inside the camera. After positively identifying a threat, Eyecloud Cam sends out a notification with a description of the event, with unprecedented accuracy as to why it has chosen to send out this alarm. To make a Smart Home even more safe, Eyecloud is working on making the Eyecloud Cam fully compatible with Amazon Alexa. Computer Vision AI Technology Eyecloud Cam is completely cordless and requires no base station to operate The Eyecloud Cam is stylish, yet compact and discrete. Put the easy-to-mount Eyecloud Cam at the precise location to facilitate 24-hour detection and surveillance. An Eyecloud Cam at the front door can monitor visitors, inside the home, the Eyecloud Cam can warn of intruders, watch over pets and children, or could help provide early warning of safety incidents. To ensure the safety of property, put an Eyecloud Cam in the backyard or watch over the garage. With its long six-month battery life, onboard AI, and 8GB of local storage, Eyecloud Cam ensures all-round residential, family, and property security, even while power and internet access are unavailable. Eyecloud Cam is completely cordless and requires no base station to operate. Configurable For Alert Situations The cam's smart technology can tell the difference between intruders, visitors, acquaintances, or kids playing in the backyard, and sends alerts only when it detects unusual events. For privacy reasons, the Eyecloud Cam will send a text notification warning to all the connected users, who can then open the app to find out the real reason for the alert. The Eyecloud Cam is completely configurable for alert situations, from snapshots or videos, the owner is in complete control.
Philip Halpin, Senior Vice President & Head of Global Security for Brown Brothers Harriman, and James A. Gagliano, Retired FBI Supervisory Special Agent, CNN Law Enforcement Analyst, and Adjunct Assistant Professor, headline ISC East’s Keynote Series. ISC East, sponsored by the Security Industry Association (SIA), is proud to announce not one, but two new keynote speakers for this year’s inaugural Keynote Series. The ISC East Keynote Series features veterans of the security industry who are well-known for their widely-respected accomplishments; and who are prepared to help security and public safety professionals gain new perspectives to arm them with the information they need to lead the security industry into the future. Security Management & Analysis Halpin plans to discuss how technology is poised to disrupt the physical security industryFeatured in the Day One Keynote on November 14th titled “Friend or Foe? Technology Disruption and the Physical Security Industry,” Philip Halpin, Senior Vice President & Head of Global Security for one of the country’s oldest and largest privately held financial firms Brown Brothers Harriman, will speak on how he deals with the demands on security and people management, while riding the wave of technology disruption. Halpin also plans to discuss how technology has changed how we work and live, and how it’s clearly poised to disrupt the physical security industry. Day Two’s Keynote Series session on November 15th will highlight James A. Gagliano, a Retired FBI Supervisory Special Agent, CNN Law Enforcement Analyst, and Adjunct Assistant Professor at St. John’s University. Gagliano’s session, titled “Twenty-First Century Best Practices: Reporting from the Front Lines on How Law Enforcement and the Security Industry are Confronting Emerging Threats, ” will discuss some of the 21st Century changes in law enforcement and security postures, as well as address recent responses to contemporary challenges, such as active shooters, bombings, VIP protection, and drone applications by identifying and breaking down an ever-evolving threat matrix. Security Education “ISC East is honored to have Philip Halpin and James Gagliano as Keynote Speakers for our 2018 event. Their extensive experience managing real-world security and safety issues will be very valuable for our audience at the Show. The ISC East Keynote Series spans from corporate and private sector security to law enforcement and public safety, reflecting essential content in line with our ISC Security Events theme of Comprehensive Security for a Safer, Connected World,” said Will Wise, Group Vice President, Security Portfolio at Reed Exhibitions. The SIA Education@ISC East Program helps security professionals learn from experts and take their security to the next levelIn addition to the Keynote Series, ISC East features SIA Education@ISC, an inspiring free education program composed of over 25 sessions that provide critical information on the newest and most relevant technologies in the industry. Brought to you by SIA, the SIA Education@ISC East Program delivers all-new content on the most current business trends, technologies and latest developments to help security professionals learn from experts, keep up-to-date and take their security to the next level. Public Safety & Security “The security industry attends ISC East not only for the diversity of technology solutions on the Show Floor, but for the practical education and thought-provoking keynotes for which the event has become known for,” said Don Erickson, CEO of the Security Industry Association. “Keynote speakers like Philip Halpin and James Gagliano combined with more than two dozen compelling SIA Education@ISC sessions, create an exceptional content program for ISC East 2018.” Taking place November 14-15, 2018 at the Javits Center, ISC East is Northeast’s largest security trade show where over 7,000 security and public safety professionals convene in New York each year to meet experts from over 250 leading security brands through exhibits, education, networking events, and more. New this year, ISC East will be co-located with Unmanned Security Expo and Infosecurity North America, creating a fully comprehensive event for the security industry in New York City.
Berlin-based manufacturer, Bird Home Automation Group, has expanded its product portfolio with the launch of the new DoorBird D2101KV IP video door intercom. The new model is equipped with one call button and a multifunctional keypad which makes it ideal for single-family homes, hotels and commercial spaces that require a safe and efficient access control solution. The D2101KV IP video door intercom is the first DoorBird product that combines a doorbell with an integrated keypad. The backlit call button operates as a doorbell or an automatic door opener within individually set time windows. With 12 backlit buttons, the multifunctional keypad enables secure access control for single-family homes and business premises, e.g. health care facilities and law firms. Built-in RFID Reader And 4D Motion Sensor The new D2101KV offers all the DoorBird functions one would expect. Features such as visitor history and push notifications to a smart device or IP phone are available. In addition, PIN codes, scheduling and permissions for the integrated keypad can be comfortably managed in the DoorBird app. The user can generate and assign PIN codes from anywhere in the world to grant access to the premises to visitors or service providers. The integrated keypad can also send HTTP requests to home automation systems to trigger events, e.g. arming burglar alarm or controlling motorized shades. Like the existing DoorBird D21x models which up to now included either call buttons or an integrated keypad, the D2101KV comes in stainless steel. The weatherproof housing contains high-quality components such as a HD 180° wide-angle, hemispheric lens camera, and a two-way echo and noise cancelling audio system. The model also has a built-in RFID reader and a 4D motion sensor. These features combined with the integrated keypad make the D2101KV a powerful IP video door intercom and access control solution.
PACOM Systems, part of STANLEY Product & Technology, a provider of security and access control solutions, is helping users reduce false alarms with the PACOM 8003 intelligent security control panel. A true hybrid panel, the PACOM 8003 is capable of delivering both advanced access control and robust, EN Grade 3 intrusion detection across applications of all sizes; from simple two-door installations to campuses and multi-site estates. Built to ensure compliance with widely recognized EN 50131 and BS8243 PD6662-2017 approvals, the PACOM 8003 helps to reduce false alarms by meeting exacting standards concerning the method by which alarms are confirmed and therefore whether a police response is activated. To this end, the PACOM 8003 can confirm alarm activation by video, audio and sequential alarm verification. The PACOM 8003 offers up to eight configurable five state inputs and eight outputs comprising two relays and six open collectors Easy Scalability And Convenient Deployment As an intelligent, IP-enabled, hybrid device, the PACOM 8003 uses PACOM-Edge technology which offers advanced security capabilities across an organization’s Ethernet backbone, so reducing the need for traditional security cabling which means easy scalability plus fast and convenient deployment. The PACOM 8003 offers up to eight configurable five state inputs and eight outputs comprising two relays and six open collectors. Inputs can be expanded up to 64 and outputs can be expanded up to 32 via the addition of on-board expansion modules and/or remote I/O devices. With high demand across the globe for intelligent control panels, STANLEY Product & Technology has recognized and responded to the need of installers for greater choice in systems. The PACOM 8003 addresses this need with features such as a network port and the option of on-board access as standard. Better Return On Investment “Over the last few years there has been a seismic shift in the technology that is incorporated into modern intruder alarm systems, and manufacturers have to demonstrate fresh and innovative thinking and design,” commented Gavin O'Keeffe, Global Technical Director at STANLEY Product & Technology. “The PACOM 8003 can significantly improve return on investment through a security solution that has been carefully engineered to protect people, property and assets – while reducing false alarms. The hybrid PACOM 8003 delivers more scalability, power and flexibility than any other integrated control panel in its class.”
Small business owners work hard. They are often the first ones there in the morning and the last to leave at night. Even then, they likely bring their work home with them. During that time, everything they do is aimed at making their business as successful as possible. Because of this, many business owners don’t take vacations, and if they do, they spend a lot of time worrying about their business while they’re away. In both cases, the potential for burnout is tremendously high. The primary concern for these individuals is loss, whether from theft, waste, vandalism or other causes. Depending on the degree of the loss, it can have a devastating effect on small business. Therefore, professional security solutions must be top of mind for these businesses. Small business owners can take advantage of advanced technology that can help them work smarter, not harder Video Surveillance For Small Businesses One technology that can address loss, the feeling of helplessness that comes from not being on site and more is video surveillance. Sadly, it’s not always on the radar for small business owners, many of whom think video surveillance is very expensive and out of reach. But that couldn’t be farther from the truth. There are high-quality, relatively inexpensive solutions that don’t require much, if any, configuration, allowing an installer to place cameras, run cable, plug cameras into the recorder and use software to get end users up to speed on remote access. Best of all, almost all of these solutions come with a mobile app or other means of accessing video—both live and recorded—remotely from a smartphone or tablet. In a world where our phones have become our lifeline to a lot of information, including email, banking, inventory management and more, a security system simply has to provide this type of access. Given the availability of cost-effective video surveillance solutions and their ease of use, small business owners can take advantage of advanced technology that can help them work smarter, not harder in a few key areas. Video surveillance solutions come with a mobile app for accessing video remotely from a smartphone or tablet Efficient Incident Monitoring Having a high-quality video surveillance system with proper coverage means that any time an incident or loss occurs, a small business owner can go back and find it on the video and identify exactly what happened. For example, if something goes missing from a retail store, reviewing the video will reveal exactly what happened, when it happened, how it happened and—depending on lighting, camera resolution and field of view—possibly who took it. Video systems can also be valuable from a liability perspective. Slip-and-fall claims are not uncommon, but in many cases they turn out to be false. Thankfully, cameras can provide video that will support or refute a claim. Without video, such incidents could be costly for small businesses. A simple review of recorded videos will solve any mystery and eliminate the potential for a long argument with no evidence Video Recording For Incident Verification Another example would be a customer who claims they were shorted on the change they received from a cashier. Rather than taking the time to count the money in the drawer and reconcile that with receipts, a small business owner could simply review video from a camera placed above the point of sale to determine if the customer’s claim is correct or if they may have been mistaken. This feature can also help alleviate or avoid a potentially awkward or difficult situation when there’s a difference of opinion with a supplier. Say for instance a delivery driver claims he or she brought three cases of product to the back door, but there are only two cases in the stockroom. A simple review of the video that’s been recorded will solve the mystery once and for all and eliminate the potential for a long, drawn-out argument with no evidence one way or the other. Smartphones For Remote Monitoring It’s natural for small business owners to feel stressed when they’re not at their physical location. After all, they’re the ones who have invested in the business and are responsible for making sure it runs smoothly and profitably from day to day. For small business owners with surveillance systems, vacations can become not only a reality but also the relaxing time they are supposed to be. For small business owners with surveillance systems, vacations can become not only a reality but also the relaxing time Rather than sitting on a beach and worrying about whether the store opened on time or if employees are doing what they’re supposed to be doing, an owner can pull out his or her smartphone, log in to remotely to the video system and know for sure. That peace of mind is invaluable for small business owners. This is also helpful for business owners with multiple locations. Because no one can be in two—or more—places at once, a video surveillance system can provide eyes and in some cases ears at a location, which can be accessed at the click of a button. Video Surveillance For Training For a small business, it’s imperative that employees follow established policies and that staffing levels are maintained at the most efficient level possible. These are two other areas where video surveillance can help. If a small business owner sees that something isn’t being done properly, whether by a single employee or if the problem is more widespread, he or she can use video for training purposes. They can sit down with the employee or employees to review the video and explain the proper policies and procedures. Conversely, video can be used to demonstrate proper techniques or even to recognize employees for a job well done. From a staffing standpoint, reviewing video could reveal unexpectedly busy or down times Maintaining Staffing Levels From a staffing standpoint, reviewing video could reveal unexpectedly busy or down times. A business owner can review video from 3 p.m. on a Saturday to see how many customers are in a location and determine the ratio of employees to customers. Looking at a variety of times over a period of weeks or months could help determine optimal staffing levels, which may lead to the decision to increase staffing on Saturday afternoons when a store is busy. This will help improve customer experience and potentially increase sales. Motion Detection For Accurate Access Control Cameras can be deployed with motion-detection sensors to alert business owners when someone enters a certain area, whether during or after business hours. In many cases, detected motion can trigger an alert and/or a video clip to be sent to the business owner’s smartphone so they can review and verify whether something is out of the ordinary. These deployments could be set up to monitor a variety of locations, such as an office, safe, doors and other sensitive areas at all times or just during specific hours. If motion is detected during off hours, the business owner can view video and alert police that an unauthorized individual is at their business. Surveillance videos can be used to demonstrate proper techniques or even to recognise employees for a job well done Cybersecure Video Surveillance Systems From a cybersecurity perspective, manufacturers are constantly releasing firmware updates to protect cameras from malware and/or unauthorized intrusion. Once someone has accessed any device, all systems and devices connected to the same network become vulnerable. Updating these devices tends to be an afterthought for small business owners, who may either forget or simply not have the time to do it. So it should come as no surprise that these important updates often go uninstalled. Today’s advanced video systems overcome this obstacle with easy updating, which can be performed by small business owners or installers to ensure constant protection. Other systems are available with auto-updating capabilities, which remove the onus from small business owners completely. Today’s advanced video systems overcome cyberthreats with easy updating Cost-Effective Surveillance Solutions These are just a few of the many benefits video surveillance systems offer small business owners. What’s important to note is that for each to be successful requires having to have the right camera for the right environment. For instance, a camera positioned at the back door of a business has to have wide dynamic range to deal with changing light levels throughout the day. A camera used to monitor transactions must offer high enough resolution to identify bill denominations. Today’s solutions are cost-effective, easy to use and offer the flexibility to monitor operations from anywhere at any time – giving small business owners the power to work smarter, not harder to grow their bottom line.
There was a time when one of our biggest challenges was securing our physical assets, whether that was our people or our property from crime. We researched and deployed the very latest in video solutions, intrusion systems, fire alarms and access control devices, all in an effort to keep the bad guys out and the good guys safe, along with protecting our facilities from break-ins, robberies and countless other crimes. However, times are changing. No longer must we only be concerned about keeping intruders out of our buildings but now—off our networks. It should come as no surprise that cybercrime is one of the biggest threats organizationisations of all shapes and sizes face today. While attacks on major brands and Fortune 500 companies make headlines, there were purportedly 918 reported data breaches, compromising nearly 2 billion data records in just the first six months of 2017. Of those 918 breaches, 500 of them had an unknown number of compromised records. Some in the industry referred to not locating cyberattacks in a swift manner as a breach detection gap or dwell time Reducing Breach Detection Gap Depending on your organization, these cybercrimes and the investigation into them, may be handled by your IT department. However, considering the magnitude of these crimes, it now falls on the entire organization, including the traditional security or loss prevention executives, to band together to combat these threats. One of the biggest challenges cyberattacks pose is timing. Often cyberattacks can go undetected for weeks, months or even years. Some in the industry referred to this timing as a breach detection gap or dwell time and is defined as the time elapsed between the initial breach of a network by an attacker and the discovery of that breach by the victim. To put that into perspective, the most recent Ponemon report on the cost of a data breach showed dwell time for malicious attacks has stretched to an average of 229 days—a long time for bad actors to be lurking around your networks. Many companies rely on heritage-based services offered by managed security service providers (MSSPs) Traditional Cybersecurity Measures We are familiar with traditional cyber lines of defence against these attacks like firewalls and anti-virus software. While these solutions are effective at identifying and potentially stopping known forms of malware and viruses that are attacking companies every day, they are blind to signatureless and zero-day malicious activity. Unfortunately, this trend does not show signs of letting up as internal security processes are having trouble keeping up with increasingly sophisticated land pervasive threats. Many companies rely on heritage-based services offered by managed security service providers (MSSPs) that use security information and event management (SIEM) software, or intrusion detection systems/intrusion prevention systems (IDS or IPS respectively) to monitor networks for malicious activities on a continuous basis. However, these activities are based on known threats where a valid signature of the cyberattack or system logs are available and used to analyze activity. They then provide security alerts to the client and generate reports for compliance purposes. This form of alerting often generates an overwhelming number of notifications causing what is coined in the industry as ‘alert fatigue’ making it hard to weed out what is important from what is not. Managed detection response uses a combination of advanced technology and expert human analysis to combat cybercrime Managed Detection And Response The Ponemon Institute found that companies spend an average of 21,000 hours each year analyzing false negative/false positive alerts trying to detect and contain cyberattacks. This translates to approximately 17,000 security alerts in a week of which only 4% were deemed reliable and investigated. This can potentially waste nearly $1.3 million per year on investigating and managing inaccurate data. Based on this overwhelming challenge, it’s time for organizations to look at improving real-time threat detection and incident response capabilities beyond standard security screening and compliance requirements. In addition to the services provided by an MSSP, it would be wise to add or layer a managed detection and response (MDR) service to your arsenal of cyber defence weapons. An MDR analyst can replay the event allowing him to dig deeper into the incident and determine remediation steps Identifying Real Threats With MDR Services MDR services use a unique combination of advanced technology and expert human analysis. Equating MDR services to traditional physical security devices, it is more like having a DVR, where an analyst can go back and replay the incident on the network via packet capture technology. Event logs and signatures by themselves don’t provide visibility and detail. Traditional cyber defences act like a conventional alarm system. The alarm sounds and a notification is sent, but there is no context or detail about the incident and it is up to the recipient to determine if the alarm is valid, what exactly happened and what to do about it. With packet capture on the network, an MDR analyst can replay the event allowing him to dig deeper into the incident and determine remediation steps. This approach helps quickly identify real threats to the business, provides remediation specifics for timely resolution, and significantly cuts through the false positive noise so security teams can focus on the things that matter. Efficient Incident Management MDR services only notify clients after the incident is verified. The notifications provide granular detail of the scope and severity of an attack with recommendations for quick containment and response. MDR services offer 24/7/365 continuous monitoring of customer network data, provide analysis of the data to add context to the event and notify the customer of the incident. With MDR services, clients have direct communication with the security analyst and rely less on using an alert portal With MDR services, clients have direct communication with the security analyst and rely less on using a portal for alerting, investigations, case management and workflow activities. Because MDR services rely on advanced tools and human analysis, they are more apt to uncover malicious activity that has breached the first line of defence and can reduce the time from infection to detection to minutes rather than months. Combating Cybercrime With Secure Networks To sum it all up, MSSPs focus on perimeter devices like firewalls, or IDS/IPS and SIEM and provide device management such as updating firewall rules, anti-virus software and compliance reporting. They are typically used to supplement internal IT or security teams. An MDR service concentrates on detecting threats that have penetrated the perimeter. MDRs deliver threat notification and remediation guidance. While both solutions provide value to their clients, their basic areas of focus are different. Cybercriminals are becoming more coordinated in their efforts to steal our data, disrupt our operations and damage our brands. It is time that we coordinate our efforts across the entire organization to combat them.
ASSA ABLOY discussed the importance of securing the critical infrastructure, the building and beyond, at a media press conference April 15 on the opening day of ISC West 2015 in Las Vegas. Martin Huddart, president of ASSA ABLOY’s Access and Egress Hardware Group, based in New Haven, Conn., outlined some of the current and future objectives of the company, which continues to fine-tune its global leadership in door opening solutions while playing a significant role in the future of access control technologies. “Guards and barriers are the first line of defense in access control, and the next layer is doors and frames as well as bullet-resistant doors,” says Martin Huddart, president of ASSA ABLOY’s Access and Egress Hardware Group Huddart spoke about the 2013 acquisition of Ameristar while showcasing its recent launch of the Freedom C2 access control point command and control system. Freedom C2 is a PC-based system developed in response to demand for an integrated and seamless combination of Active Vehicle Barrier Control System (AVBCS), Access Control Point Controls System (ACPCS), Automated Installation Entry (AIE), Perimeter Intrusion Detection System (PIDS), Wrong Way and Over Speed Protection (WW/OS) and support for CCTV/DVR. Freedom C2 puts all of this functionality on a single platform that is easy to use and can stand alone or function as part of a network. Media were treated to an intense video showcasing the capabilities of the Freedom C2 in action—stopping a speeding vehicle dead in its tracks. “Guards and barriers are the first line of defense in access control, and the next layer is doors and frames as well as bullet-resistant doors,” Huddart said. He added that the Freedom C2 is easy to install and the system is password-protected, with the features accessible to a user determined, controlled and monitored by that user’s login. Huddart also discussed the importance of doors, frames and securing the perimeter of a facility for total access control. But in addition to the focus on the mainstay of perimeter security, he unveiled new ideas, technologies and products to illustrate how ASSA ABLOY is “reimagining access control.” Huddart outlined a renewed focus on the growing multi-family market, while announcing a suite of next-generation solutions now available from Yale Locks & Hardware designed for growing multi-family and small business segments called nexTouch™. nexTouch™ is the next generation of the Yale InTouch access control lock, Yale Real Living™ digital deadbolts, and user-friendly, cloud-based software specifically designed for managing multi-family properties. The small business solution includes the same locks plus integration with burglar alarm systems, such as those from Honeywell and Alarm.com, and with connected home platform solutions such as those offered by Icontrol Networks. Mobile access trends In discussing future trends, Huddart said mobile phone access control is at a tipping point. “Hospitality venues like Starwood Resorts are using mobile phones instead of keys. Now users can have their keys on their phones and over the air and the technology is agnostic.” At ISC West, ASSA ABLOY also unveiled HID Mobile Access® support across a broad range of access control locks from ASSA ABLOY Group brands Corbin Russwin and SARGENT. This enables the ability to use phones and other mobile devices enabled with Bluetooth® Smart and NFC credentials with the IN120 WiFi lock, Access 700 and Passport 1000 PoE and WiFi locks and the SE LP10 Integrated Wiegand lock. HID Mobile Access "powered by Seos" provides an easy, intuitive solution for issuing, delivering and revoking digital credentials on iOS and Android mobile phones and tablets with Bluetooth Smart and/or NFC technology. Offering comprehensive security, it protects identity data and keeps over-the-air communications between mobile devices and locks private. “Seos is like having a magic key chain, and you don’t have to fool around with keys -- it’s all in the phone. Mobile-enabled locks allow customers to extend the convenience and security of mobile access to a wider variety of applications, while maintaining interoperability with their existing credential base.”
A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. What Is Jackpotting? ATM jackpotting is a combination of a physical crime and a cyberattack. Typically, a criminal with a fake ID enters a grocery shop or pharmacy posing as an ATM technician, then uses a crowbar to open the top of the ATM – the “top hat” – to gain access to the personal computer that operates the machine. If a legitimate customer approaches the machine in the meantime, it can operate as usual until activated otherwise by the malware Once he or she has access to the PC, they remove the hard drive, disable any anti-virus software, install a malware program, replace the hard drive and then reboot the computer. The whole operation takes about 30 seconds. The malware then enables the thief to remotely control the ATM and direct it to dispense all its cash on command. An accomplice – the “mule” – later approaches the ATM to collect the bounty, as the “technician” remotely directs the machine to dispense all its cash. If a legitimate customer approaches the machine in the meantime, it can operate as usual until activated otherwise by the malware. ATMs in supermarkets and pharmacies tend to be targeted because they may not be as well-protected, and store personnel likely would not know who is authorized to work on the ATM. In contrast, anyone approaching an ATM at a bank location would be more likely to be challenged. Emergence Of Criminal Activity The crime first emerged in the United States several months ago, and the U.S. Secret Service, financial institutions and ATM manufacturers have been scrambling to find a solution. Older ATMs are particularly vulnerable. In some cases, financial institutions have not embraced the highest levels of security offered by ATM manufacturers because of costs, and because previously the crime was not common in the U.S. One estimate is that losses north of $10 million have occurred in the U.S. just in the last couple of months. “There are solutions, and then there are ways to get around the solutions,” says Samir Agarwal, Accelerite’s general manager for security. Hackers remove the hard drive, disable any anti-virus software, install a malware program, replace the hard drive and then reboot the computer ATM Protection Technology Accelerite is a Santa Clara, CA, software company that focuses on the digital enterprise, including hybrid cloud infrastructure, endpoint security, Big Data analytics, and the Internet of Things. Accelerite’s solution to the ATM jackpotting problem is built on the company’s Sentient security framework. Accelerite’s approach to ATM jackpotting is to immediately stop the dispensing of cash when any sign of trouble is detected. The system can track alarms, such as when a “top hat” is opened, when a hard disk is removed, if the antivirus software has been tampered with, and so on. The system can send a notification within 20 seconds that the ATM is being hacked and then automatically shut down the machine. If the bad guy reboots the machine, the system can confirm there was a previous alert and shut it down over and over. “We create multiple lines of defense,” says Agarwal. “The criminal would decide it’s not worth his while and walk away.” The consequences of jackpotting impact every level of the industry, including ATM manufacturers and financial institutions Origins Of ATM Jackpotting ATM jackpotting originated back in 2010 when Barnaby Jack, a New Zealand hacker and computer expert, demonstrated how he could exploit two ATMs and make them dispense cash on the stage at the Black Hat computer security conference in Las Vegas. Since then, malware has been created and made available on the “Dark Web” that can instruct an ATM to dispense all its cash on demand. Previously ATM jackpotting attacks have focused on more cost-conscious global markets and those likely to use older-model ATMs with fewer security features. Strong U.S. law enforcement also likely prevented criminals from taking the risk – until now. Attacks in the United States have raised awareness. “There is more cognisance of the possibility of bad things happening,” says Agarwal. “This came out of nowhere and had not happened in the past in the United States. This crime is unlike what you hear about hacks or when data is stolen – there’s just money being stolen.” Best Practices To Prevent An Attack However, the consequences impact every level of the industry, including ATM manufacturers and financial institutions. Also, the supermarket and grocery shops that are targeted face additional security challenges, and even consumers could lose confidence in ATMs if they think their personal information could be at risk. There are best practices that can also prevent an attack. For example, an ATM computer could have a “white list” of approved applications and not allow anything to be installed that is not on the list; for instance, no malware. Another approach is to encrypt the disk drive so that a key or certificate is needed in order to install new software. Agarwal notes that solving the challenge of ATM jackpotting illustrates the need to combine both physical and cybersecurity approaches to protect modern companies. “It’s the reality as we move into a more digital world,” he says. “Physical security at that level will be difficult to protect, and you will be depending more on cyber solutions. It’s the direction the world is moving into.”
ADT is looking to "bring the voice of the customer" into the continuing development and expansion of Z-Wave, the radio frequency (RF) communication and product-level interoperability technology that enables wireless networking of battery-powered devices in the home. ADT is the newest Principal Member of the Z-Wave Alliance consortium. Z-Wave is one of the enabling technologies of ADT’s Pulse security and home automation system, which enables a home's electronics to communicate with each other and with the user. Z-Wave unifies devices like door locks and lighting controls into an integrated network. ADT is the Z-Wave Alliance’s seventh and newest Principal Member, and also the first service-based company represented on the Z-Wave Board of Directors. The other Principal Members are original equipment manufacturers GE/Jasco, Ingersoll-Rand, Linear, Evolve, FAKRO and Sigma Designs. “As a service provider who touches the end user directly, we bring a different perspective that rounds out the Z-Wave board,”says Steve Shapiro, ADT’s Vice President of Industry Relations. ADT was previously a full-level member and has been active in the Z-Wave Alliance since implementing Z-Wave as part of ADT Pulse. Becoming a Principal Member “reaffirms [ADT’s] commitment to the technology going forward,” he adds. The Z-Wave Alliance oversees development and implementation of the technology. The Alliance is made up of member companies participating at various tiers in technology working groups and accessing the technology to develop products. The Z-Wave Alliance includes 160 full-level members involved in developing products and about 110 Affiliate members (mostly resellers and installers). At the top level of the Z-Wave Alliance are the companies that guide development and implementation of the technology, the Principal Members whose representatives make up the Alliance Board of Directors. Shapiro is joining the Z-Wave Alliance Board. Z-Wave technology is used throughout the security and home automation markets, enabling radio frequency (RF)communication and product-levelinteroperability among battery-powereddevices in the home Z-Wave technology is used throughout the security and home automation markets, enabling radio frequency (RF) communication and product-level interoperability among battery-powered devices in the home, including climate controls, door locks, security sensors, appliances and remote control. There are 1,000 or so products from 100 companies that are Z-Wave certified, which means they communicate within a 50-foot range using low power consumption that allows one- or two-year battery life. Mesh networks of these devices, each communicating and also relaying signals from other devices, can extend the operable range to cover an entire house or small commercial facility. Z-Wave enables greater wireless networking in the home and realization of home automation systems with more capabilities. “ADT adds a complementary view to the board based on their knowledge of customer needs,” says Mark Walters, Z-Wave Alliance chairman. “Having North America’s leader in residential security advising the Z-Wave Alliance at the Board level brings a focus to that market segment in terms of guiding the alliance in both marketing and technical development. Security companies now have someone representing them who understands and directly participates in their business.” Principal Members must be nominated by an existing Principal Member and then approved by the Board of Directors. “We are not just a security company, but a service provider for home and business automation,” Shapiro says. “Security is a great platform for automation, and it’s a natural combination.” He notes that 44 percent of ADT customers opt for the ADT Pulse service, and the number has been climbing quarter over quarter since 2010. “It confirms how the different kinds of systems make sense together,” he says.
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8.8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometres distribution network and 4,386 kilometres of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management SystemBosch’s Building Integration System Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. Cameras With Built-In Video Analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities All systems and cameras are monitored by security personnel at the company’s control center in Recife. For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfills the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
Nestled on the banks of the river Thames, Kew Gardens in southwest London is home to the most diverse collection of living plants anywhere in the world. At 330 acres in size, it’s London’s largest UNESCO world heritage site, and has a history stretching back more than 250 years. The Royal Botanical Gardens, Kew, attracts more than 1.6 million visitors every year, coming to see the 30,000 different kinds of plants, and to visit the Herbarium, which has over seven million preserved plant specimens. As an internationally important botanical research and educational institution, Kew’s library contains more than three quarters of a million books, along with more than 175,000 prints and drawings of plant life. 24/7 Video Surveillance Coverage A need was identified to upgrade the existing legacy analog CCTV system to one capable of transmitting and recording in true HD Kew Gardens hosts a wide variety of events throughout the year, including festivals, concerts and art exhibitions, as well as learning experiences for all ages and interests, in addition to the garden attractions. The site is accessible via London Underground, Overground, buses and river services in summer, and the public can enter via four separate gates: the Elizabeth Gate, the Brentford Gate, Victoria Gate and the Lion Gate. There are also a number of other access gates to the gardens which are not open to the public. Because of the sheer volume of visitors and the multitude of public and trade entrances to Kew Gardens, the site requires around the clock video surveillance coverage, seven days a week. Analog To IP CCTV System Kew’s CCTV control room operations team works to monitor the safety and security of the park, but a need was identified to upgrade the existing legacy analog CCTV system to one capable of transmitting and recording in true High Definition. Security specialist firm The ITS Group was called in to help. The ITS Group is comprised of ITS Fire and Security, ITS Electrical, ITS Fire Training and ITS Building Services. The company has 20 years of experience within the fire and security industry, and provides CCTV, intruder alarms, barrier gates, security lighting, panic alarms, access control, and door and video entry, alongside a swathe of other services. The results were achieved in the process of implementing a Hikvision IP HD video surveillance system ITS Group Director Tim Dyer said the Kew project required upgrading equipment in the Gardens’ security control room and providing site-wide cameras which can be used to view all entrances for both public and trade, as well as various strategic locations throughout the Gardens. Challenges In Installing Surveillance System The massive 330-acre site is a huge area to monitor in itself, and Tim Dyer says the very public nature of the Gardens and its operations meant the actual video system installation posed some security continuity challenges. “Because the control room needed to be in operation 24/7, close co-ordination was required between ITS and the security team on-site,” he says. “We needed to maintain the CCTV in line with the changing site requirements on a daily basis. This, coupled with access issues and working in a public environment, was very challenging, and the fact that we were able to achieve such good results is testament to the close co-ordination between the site team and Kew security.” Those results were achieved in the process of implementing a Hikvision IP High Definition video surveillance system, which included new 43-inch and 22-inch HD monitors for the control room, along with new touchscreen network keyboards and joysticks. HD Images In Low Light When there’s no light at all, the Darkfighter cameras switch to IR mode and record black and white images at 0 LuxControl room operators monitor images from a number of different Hikvision cameras. These include an initial 48 DarkfighterX network speed domes, which provide color HD images in light levels as low as 0.001 Lux. That’s pretty dark. And when it gets darker still, they provide black and white images in light levels down to 0.0001 Lux. When there’s no light at all, the Darkfighter cameras switch to IR mode and record black and white images at 0 Lux. In addition, they offer 25x zoom capabilities and Deep Learning-powered target classification for automatic tracking and perimeter protection. They’re complemented by 29 Darkfighter 2 megapixel motorized varifocal lens cameras, 21 ultra-low light smart bullet cameras, and six low light smart cameras. Images are recorded to Hikvision 16-channel Turbo HD digital video recorders which support analog, HD-TVI, and IP cameras, H.264, H.264+ and dual-stream compression, and can output at up to 4K resolution. Improved Picture Quality The Gardens now have a full HD system which can be expanded with additional cameras in the future"The resulting system is not only powerful and effective in the short-term but is purposefully planned to incorporate forthcoming changes. “The Gardens now have a full HD system which can be expanded with additional cameras in the future,” Tim Dyer says. “It allows them to take advantage of technology advances and newly developed functionality on any cameras or devices they add to the system in future.” Tim Dyer says the Hikvision system has revolutionised Kew’s video picture quality and functionality. “Making the change from an old analog system to installing a new Hikvision IP system has transformed the Gardens’ picture quality, both during the day and at night,” he says. “The zoom facility is amazing and precise, and the reliability of them is second to none, making the work of the control room operatives a much easier role.” The HD surveillance system has been received exceptionally well by those whose opinion matters most: the security team at Kew Gardens. John Deer, Head of Security, said: “I am delighted with the installation of Hikvision cameras at the Royal Botanic Gardens, Kew. They are of the highest quality, which has enhanced the overall security across the 330-acre site.”
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8,8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Detecting And Deterring Power Thefts Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometers distribution network and 4,386 kilometers of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. Bosch Video Security And Intrusion Detection Systems For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS) As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. All systems and cameras are monitored by security personnel at the company’s control center in Recife. IP Cameras With Built-In Video Analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfills the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
We all assume, in fact expect, a bank to be secure. The major challenge: the customers should not notice the actually highly complex security equipment. As they definitely should not have the feeling of being watched. Apart from Regiobank Solothurn being our house bank, the collaboration between the bank and Siaxma has already extended over ten years. With the new building in Zuchwil, there was the opportunity for the first time to plan and install a totally digital system All the branches have the video surveillance equipment which is controlled at a computer workstation at the Solothurn headquarters, where the data is analyzed too. The access control was added gradually and is initially being used in Biberist and Zuchwil. With the new building in Zuchwil, there was the opportunity for the first time to plan and install a totally digital system. This includes access control, door management, video surveillance, a burglar alarm system and alarm management – all from one source. This was one of the requirements the Regiobank specified. Authorization Using One Badge Digital access control has one major advantage for all users: they can enter all the buildings and rooms they have authorization for with just one badge. These badges are issued and managed at the Solothurn headquarters. Mechanical keys have largely disappeared from everyday business at the Zuchwil and Biberist branches. The administrator can change or extend the access rights in comfort at their PC workstation. Saves Cost For Additional Licenses Using their personal badge, customers can now use the lift to the basement, on their own or accompanied, and open their boxHow do customers get to their deposit boxes now? Keys are also a thing of the past here. Customers report to the desk where the bank employee then authorises them with access to the vault for one whole day. Using their personal badge, they can now use the lift to the basement, on their own or accompanied, and open their box. So that the Regionbank does not have to release and pay for hundreds of additional licences, we manage the vault in the system like a client. This means: one license with as many users as you like. Advantages for the end user: Centralized administration with customized issuing of rights by user, building, day and time frame One system for all locations Clear responsibilities Traceability
As prime targets for criminals, banks have always faced major security challenges. But today, when banks are pressed to increase revenues, improve operational efficiency, and mitigate risk, defending against security threats is increasingly expensive. Two key drivers in the banking sector are customer trust and operational efficiency. Both are significantly strengthened by a quality integrated ‘smart’ banking security solution. Smart Banking Security Solution A robust security strategy is of the highest priority and is usually embedded within the bank’s Risk Management Plan. This enables banks to manage operational risk and compliance demands. The modern approach to bank security design incorporates IT, Channel Management and Identity and Access Management systems into one solution. At the heart of Vanderbilt, systems are compliance with some of the highest industry and regulatory standards. These systems impact all bank functions and help deliver greater trust, operational efficiencies, and excellent customer experience. Vanderbilt Video Surveillance Vanderbilt can provide live video surveillance that continuously monitors and provides quality images should a suspicious event need to be investigated In the bank’s self-service area, Vanderbilt can provide live video surveillance that continuously monitors and provides quality images should a suspicious event need to be investigated. Meanwhile, Vanderbilt’s Seismic detectors protect ATM's 24/7. These detectors give immediate and reliable alerts of attacks on the enclosure, but unlike other detectors, do not register false alarms triggered by passing traffic or the vibrations of the ATM itself. Seismic Detectors And Interlocking Electronic security measures are also used in other banking situations – for example, when a customer claims he tried to withdraw cash from an ATM and was issued a receipt, but no cash – the bank can check with a specialized data department to ascertain whether the money was deducted from the customer’s account. When a staff member unlocks the vault, the door to the secured area simultaneously locks Unique codes grant workers who fill ATMs access to secured areas and the ability to unlock ATM's. The worker's code over-rides any ‘delayed unlock function,' so he can immediately access the ATM and fill it. There are set time limits for the work to be done. The ATM buzzes for a pre-determined time before the machine is due to auto-lock. If the worker needs more time, he can delay this. Once the job is done – the ATM automatically locks. Another example of bank security involves interlocking. When a staff member unlocks the vault, the door to the secured area simultaneously locks. This prevents anyone else from gaining entry until the vault is once again locked. This ensures the safety of staff members and the security of vault contents. Electronic Security There are many layers of electronic security protecting the bank. If the manager arrives early, he uses his card to gain access to the branch office and a PIN to disarm the alarm. His code disables the office and secure area, but the ATM's, vaults and safe deposit boxes remain armed. A Central Monitoring Station is alerted to the early entry. They need to know whether the entry is routine or under duress. The monitoring station views the manager on live video as he executes a pre-determined security procedure and until he hits an ‘All is OK' button. If there is a problem – the manager can send a silent ‘Duress Alarm' rather than the ‘All is OK.' The Monitoring Station can listen in – and if necessary can call the police. Security in banking is an essential issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability – flagship traits of the Vanderbilt brand. Banks wish to operate in an open and friendly layout while ultimately safeguarding their customers, staff, and assets. Vanderbilt's solutions respond to these expectations and enable active safeguarding foundations to be laid.
Davis School District is the second largest in Utah and ranks 52nd in the U.S. Given its large student population spread across 299 square miles, the school district has placed a high value on maintaining the safety and security of its schools, each of which is equipped with a video surveillance system. Until recently, those systems were analog across the district – but given the performance and quality of video those systems generate, Davis School District changed that. Dome Camera With Built-In-Motion DetectionThe SND-6084R is a fixed-dome type with built-in motion detection, which is ideal for covering areas where nobody should be at night The choice to go with Samsung IP cameras district-wide was based primarily on the quality of the cameras. Samsung’s recorders and Samsung Security Manager (SSM) video management system solidified the decision. Along with other models, the system employs the SND -6084R, a fixed – dome with built-in-motion detection, as well as the SNP -6200RH, PTZ camera. Samsung Techwin offers more than one camera with infrared illumination to support day/night use in outdoor areas, but they have different capabilities. The SND-6084R is a fixed-dome type with a wide field-of-view. With built-in motion detection, it’s ideal for covering areas where nobody should be at night. Integrating Video Surveillance With Intrusion Detection In contrast, the SNP-6200RH is a PTZ-type camera, which might be better for an active parking lot, for example, where a security officer can use the PTZ function to have a closer look at something if necessary. Following each installation, the Samsung cameras have demonstrated their value several times over. As the number of Samsung cameras continues to grow, the Davis School District will be integrating video surveillance with intrusion detection systems to further enhance the ability to identify the cause of and respond to burglar alarms. Upgrades will continue for the foreseeable future as funding becomes available and technology continues to advance.