Business security systems
While Cobalt robots have been patrolling the hallways at Slack offices for some time now, the recent trip to Chicago for GSX came with some exciting news about the next phase of the company’s relationship with Slack. The company’s new integration with this industry-leading enterprise collaboration platform will help keep safety and security a priority for you and your entire office. “Slack is one of the most ubiquitous communications platforms among modern enterprises, and we...
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is cha...
Today’s market wants access management systems that are easy to set up and use. They must be easily scalable and able to integrate with other security solutions like video and intrusion systems. And access management systems need to be highly resilient and always available. With the introduction of the Access Management System 2.0, Bosch has addressed all these needs. Access Management System 2.0 The entire customer journey is designed to be as effortless and as simple as possible. Speci...
Johnson Controls has announced the release of the advanced CEM Systems S3050 Portable Reader is a lightweight hand-held card reading device for use with the AC2000 access control and security management system. It is designed to be used for ID card validation at temporary entrances or remote sites which have no power and as a mobile device for random checks within pre-defined zones. Portable ID card reader A large full color touch screen provides quick and easy navigation and also provides inf...
ExtraHop, global provider of cloud-native network detection and response solutions, has announced that it has joined the Microsoft Intelligent Security Association (MISA), which brings together an elite group of security-related companies partnering with Microsoft to defend against threats facing hybrid enterprises today. ExtraHop also announced a new integration between the ExtraHop Reveal(x) platform and Microsoft Azure Sentinel enabling faster threat investigation and remediation. ExtraHop...
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most h...
Anixter International Inc., a distributor of network & security solutions, electrical & electronic solutions and utility power solutions, enters into a definitive agreement with an affiliate of Clayton, Dubilier & Rice (‘CD&R’) to be acquired in an all cash transaction valued at approximately $3.8 billion. The transaction will result in Anixter becoming a private company and is expected to close by the end of the first quarter of 2020. Under the terms of the merger agreement, CD&R-managed funds will acquire all of the outstanding shares of Anixter common stock for $81.00 per share in cash. Helping industrial distributors As a private company, we believe Anixter will have greater flexibility to focus on" This represents a premium of approximately 13% over Anixter’s closing price on October 29, 2019, and a premium of approximately 27% over the 90-day volume-weighted average price of Anixter’s common stock for the period ended October 29, 2019. “We believe this transaction is in the best interest of Anixter and our stockholders,” said Bill Galvin, Anixter’s President and Chief Executive Officer. “After careful and thorough analysis, together with our independent advisors, our Board of Directors unanimously approved this transaction with CD&R, which has a strong reputation and a track record of success in helping industrial distributors, like Anixter, prosper and grow. We are also pleased that this transaction appropriately recognizes the value of Anixter’s customer relationships, technology and solutions, financial management and global market position. It’s a great outcome for Anixter’s employees, customers and partners. As a private company, we believe Anixter will have greater flexibility to focus on and accelerate our long-term strategic priorities.” Outstanding management team Nate Sleeper, Partner at CD&R, said, “Anixter is an exceptionally well-positioned industrial distributor with leading market positions and differentiated capabilities that deliver strong customer value. We look forward to partnering with the outstanding management team, led by Bill Galvin, on initiatives to grow the business and further strengthen its competitive position while maintaining Anixter’s distinctive culture grounded in operational excellence, innovation, and an unwavering commitment to the company’s employees, customers, and global partners.” Anixter expects to hold a Special Meeting of Stockholders to consider and vote on the proposed merger It is anticipated that upon completion of the transaction, Bill Galvin, along with other members of Anixter’s executive management team, will continue to lead the company. Anixter’s Board of Directors has unanimously approved the agreement with CD&R and recommends that Anixter stockholders approve the proposed merger and merger agreement. Anixter expects to hold a Special Meeting of Stockholders to consider and vote on the proposed merger and merger agreement as soon as practicable after the mailing of the proxy statement to its stockholders. Fully committed financing The transaction is subject to the approval of Anixter’s stockholders, regulatory approvals and other customary closing conditions. The transaction has fully committed financing and is not subject to any condition with regard to the financing. Equity financing will be provided by Clayton, Dubilier & Rice Fund X, L.P., an approximately $10 billion pool of equity capital managed by CD&R; committed debt financing has been obtained from Bank of America, J.P. Morgan, Deutsche Bank Securities Inc. and Credit Suisse. Certain stockholders of Anixter, including entities associated with Sam Zell, Chairman of the Anixter Board, which own approximately 9% of the outstanding shares of Anixter common stock, have entered into a voting agreement with CD&R, pursuant to which they have agreed, among other things, to vote their shares of Anixter common stock in favor of the merger. Provisions of the merger agreement Under the terms of the merger agreement, Anixter may solicit superior proposals from third parties for a period of 40 calendar days continuing through December 9, 2019. In accordance with the merger agreement, Anixter’s Board of Directors, with the assistance of its advisors, intends to solicit superior proposals during this period. Anixter would be obligated to pay a $45 million break-up fee to CD&R In addition, Anixter may, at any time, subject to the provisions of the merger agreement, respond to unsolicited proposals that are reasonably likely to result in a superior proposal. Anixter advises that there can be no assurance that the solicitation process will result in an alternative transaction. To the extent that a superior proposal received prior to December 9, 2019 or, in certain circumstances, 10 days thereafter leads to the execution of a definitive agreement, Anixter would be obligated to pay a $45 million break-up fee to CD&R. Financial advisors for The solicitation process Anixter does not intend to disclose developments with respect to this solicitation process unless and until it determines it is appropriate to do so. Centerview Partners LLC is serving as lead financial advisor, Wells Fargo Securities, LLC is also serving as financial advisor and Sidley Austin LLP is serving as legal advisor to Anixter in connection with the transaction. BofA Securities, J.P. Morgan Securities LLC, Deutsche Bank Securities Inc. and Credit Suisse are serving as financial advisors to CD&R, and Debevoise & Plimpton LLP is serving as legal advisor to CD&R.
Traka is the key management solution of choice for leading multi-sector business protection management company, Guarding UK, ensuring compliant key holding services and integrated audit control capability. Guarding UK manages nearly 1,500 sites across the UK, protecting in the region of £40bn worth of assets at commercial, corporate and residential sites across industry sectors including central London premier sites, retailers, property owners and management agents, together with airports and airlines. Employing around 800 staff, Guarding UK installed bespoke-in-design Traka systems to uphold a pledge to customers for compliant and secure key holding, with remote accountability enabled to ensure keys are managed and available instantly by authorized personnel. Says Mick Spring, Guarding UK, Head of Mobile Services: “Guarding UK prides itself on being recognized as amongst the best leading security company in the country.” Dedicated audit control Guarding UK has installed key cabinets which are designed for organizations with a high key turnover “We are constantly monitoring our resources and systems to not only ensure compliance, but also create a culture that supports our teams to provide a superior service. Traka is a testament to this ambition, providing a unique way for customers to trust us to manage their keys effectively. Having an ability to work with us right from the initial design of a system was what really appealed, allowing us to incorporate different tracking attributes, with full visibility of key whereabouts at any given time." "Should a key holder need to attend a site, we can provide all details of the call out with dedicated audit control, including specific time, which can all be instantly emailed for business reporting.” On-site, Guarding UK has currently installed Traka’s L-Touch key cabinets, which are specifically designed for larger organizations with a high key turnover. High-quality protection management Working with specialist TrakaWEB Software, allowed for dedicated audit control capability, including notifications when keys are not returned, presenting instant traceability and reporting. Lee Payne, Market Development Manager for Traka UK: “Guarding UK is at the forefront of high-quality protection management and has managed to maintain this leading industry position through a commitment to compliance and continuous improvement across its sector offerings and service excellence.” “Within Guarding UK obligation to key holding, the adaptability of Traka technology allows us to create a solution that could not only enhance key management but also improve communications, operations and workflow, enabling staff to present a seamless team approach. The audit trail capability presents a system that can be relied on 24 / 7 / 365 for the ongoing benefit and peace of mind security of all Guarding UK customers.”
Check Point announces the release of the new 1500 series security gateways for SMBs. The two new SMB appliances set new standards of protection against the most advanced fifth-generation cyberattacks, and offer unrivaled ease of deployment and management. According to the 2019 Verizon Data Breach Investigations Report, 43% of all breach victims were small businesses, and 63% of attack attempts against SMBs were successful. The cost of disruption from cyber-attacks against SMBs can exceed $1M, according to a Ponemon Institute report, which can have a devastating effect on an organization. Multi-Layered next-Generation protection The 1550 and 1590 gateways are powered by Check Point’s R80 release. R80 is the industry’s most advanced security management software, and includes multi-layered next-generation protection from both known threats and zero-day attacks using the award-winning SandBlast™ Zero-Day Protection, plus antivirus, anti-bot, IPS, app control, URL filtering and identity awareness. The new 1500 series empowers Small and Midsize businesses with Enterprise Grade Security: 100% block score for malware prevention for email and web, exploit resistance and post-infection catch rate, as seen in the NSS Labs’ recent Breach Prevention Systems (BPS) Group Test Up to 2 times more performance from previous generations. The 1550 Gateway offers 450Mbps of threat prevention performance, and the 1590 Gateway offers 660Mbps The 1550 provides maximum firewall throughput of 2Gbps and the 1590 provides maximum firewall throughput of 4Gbps The 1550 features six 1GbE ports and the 1590 features ten 1GbE ports both have Wi-Fi and integrated cellular modem architected for LTE and 5G Check Point WatchTower mobile application, enables IT staff to monitor their networks and quickly mitigate security threats on the go from their mobile device Out-of-the-box zero-touch provisioning allows for under 1-minute setup IoT devices discovery and recognition for accurate security policy definition. Truly enterprise-Grade security "Small businesses play a critical role in economic growth and innovation across the globe, but often lack the resources to fully protect themselves against today’s advanced cyber-threats,” said Itai Greenberg, VP of Product Management at Check Point Software Technologies. “Now, small and midsize businesses can enjoy truly enterprise-grade security with industry-leading threat prevention capabilities, coupled with easy and intuitive management.”
PAC & GDX, global provider of access control and door entry solutions, has announced the availability of its new Architect range of readers. By integrating cutting edge radio frequency identification (RFID), near field communication (NFC) and Bluetooth technologies into the Architect range, PAC & GDX has made it possible for smartphones to be used as an access control identification tool, thereby providing the highest level of convenience, flexibility and ease of operation. Integrating radio frequency identification technology PAC & GDX offers a lifetime warranty for all Architect readers on account of their quality In addition, PAC & GDX is so confident in the production quality of these products that it is offering a lifetime warranty for all Architect readers. Offering unrivalled levels of modular scalability, Architect can be configured to suit every application – from a single door to a fully integrated global internet based system – and the range currently comprises two variants. Architect-A readers The ‘Architect-A’ is a compact sized reader, while the ‘Architect-One’ is a Mullion reader, which is specially designed for installation in small spaces. Both variants are available in two options, either with RFID only or with Bluetooth & RFID. “In modern workplaces the vast majority of employees have smartphones, so utilizing these devices for access control purposes makes perfect sense,” explained Pete England, Global Product Manager for PAC & GDX. Mobile access He adds, “Put simply, people don’t want to be carrying multiple keys and tokens around when their smartphones can do the same job. Architect is the only solution that provides secure identification modes without the constraint of having to swipe a card.” An access control system needs to perfectly meet the requirements of the environment in which it is installed, and Architect offers five identification modes for a unique user experience. Remote access and control Card Mode allows a smartphone to be used as a classic badge, while Slide Mode makes a user’s hand a card Card Mode allows a smartphone to be used as a classic badge, Slide Mode makes a user’s hand a card, and with Tap-Tap Mode a user taps their smartphone twice and a Bluetooth signal is sent to the reader to unlock. Remote Mode allows a smartphone to be used as a remote control and, last but not least, Hands-Free Mode means a user can simply walk past a reader. In light of the General Data Protection Regulation (GDPR) organizations must do all they can to avoid unauthorized access to personal information. When using an Architect reader, PAC & GDX ensures the process is highly secure thanks to the implementation of encrypted SQL databases and an EAL5+ crypto processor. Security key management AES 256-bit SSL encryption is also employed at server level – the same grade used by banks and hospitals – while master key databases are not stored but regenerated and authenticated after each use. This means that there is no transit of personal data when using Architect. Designed to be used in a wide variety of environments and applications, Architect readers have a rugged design that makes them weather resistant, chemical resistant and able to self-extinguish in a fire. They are also vandal resistant to IK10, which means that they are protected against 20J of impact. This is equivalent to the impact of a 5kg mass dropped from 400mm above a surface. Advanced access control technology With growing demand for access control technology that is intuitive, flexible and secure, products also need to be environmentally friendly. This was an important factor for PAC & GDX when deciding to launch the Architect range and so the entire unit is recyclable, as no resin is used.Using smartphones credentials reduces the need for physical tokens, which reduces inventory, logistical and transport costs Furthermore, the use of smartphones as credentials reduces the need for physical tokens, which reduces inventory, as well as logistic and transport costs. This is not at the expense of style though and bespoke fascia designs are available to complement an organization’s corporate profile. Smartphone access control solution “PAC & GDX is driven by constant innovation and the desire to push the boundaries of what’s possible with access control,” said Pete England, further adding “Smartphones offer new possibilities and it is estimated that over 20 per cent of people within organizations will be using them for access control by 2022.” Pete concluded, “It’s why we have launched the Architect range, which combines convenience, flexibility, operational ease and efficiency, high levels of security, modular scalability and a vandal-proof design. Anyone with a traditional physical based token and reader system that wants to embrace newer technologies now has the perfect solution within reach.”
Fugue, the company delivering autonomous cloud infrastructure security and compliance, has announced its support for Open Policy Agent (OPA), an open source general-purpose policy engine and language for cloud infrastructure. Fugue is leveraging OPA and Rego, OPA’s declarative policy language, for cloud infrastructure policy-as-code to provide customers with maximum flexibility when implementing their custom enterprise policies. The Cloud Native Computing Foundation (CNCF) accepted OPA as an incubation-level hosted project in April 2019. Focus of OPA has been on developing access policies for Kubernetes, while Fugue is driving the adoption of OPA Open Policy Agent on access policies While much of the focus of OPA has been on developing access policies for Kubernetes, Fugue is driving the adoption of OPA to address a wider variety of use cases for securing cloud environments on Amazon Web Services (AWS) and Microsoft Azure, including the application of common compliance frameworks to full cloud infrastructure stacks. The Fugue team has developed tools and enhancements to improve OPA’s developer experience. Fugue has provided many of these enhancements to the OPA open source project, and will continue to do so. Enhancing enterprise security Fugue has also added support to its product for customer-defined rules written using OPA and Rego. This sets Fugue apart from all other cloud infrastructure policy management solutions that rely on proprietary and inflexible rule languages that lock-in customers and are incompatible with other policy languages used elsewhere in the enterprise. Fugue also uses OPA to provide out-of-the-box support for commonly used compliance frameworks including CIS Foundations Benchmarks, GDPR, HIPAA, ISO 27001, NIST 800-53, PCI, and SOC 2. Cloud infrastructure policies Fugue has been developing policy-as-code solutions for some time, and now we’re offering an open source solution" “It’s very simple to build custom policies for our cloud infrastructure environments and validate those configurations pre-deployment using OPA and Fugue,” said Dave Williams, cloud architect and senior consultant at New Light Technologies. “Fugue simplifies the implementation and enforcement of custom cloud infrastructure policies we’ve written using OPA and helps us prove compliance at all times.” “Fugue has been developing policy-as-code solutions for some time, and now we’re offering an easy-to-use, open source solution for writing policies for cloud infrastructure,” said Phillip Merrick, CEO of Fugue. Cloud security He adds, “Our customers can use the same open language for defining their cloud infrastructure policies in Fugue that they are using for other enterprise policy needs. This eliminates the need to learn other vendors’ proprietary, inflexible policy languages.” Fugue’s custom rules capabilities that leverage OPA enable users to: Build and manage custom, user-defined cloud infrastructure rules in OPA Rego via the Fugue API, CLI, and web interface Validate and test custom rules while they are being written with helpful errors that save time Continuously validate and report on compliance for custom rules and out-of-the-box policy frameworks Security rule evaluations “Fugue is running millions of security rule evaluations every day using OPA, so we've put a lot of work into improving performance and developer tooling and will be contributing all of that back to the open source community,” said Josh Stella, co-founder and CTO of Fugue. Josh said, “OPA is a significant development for policy-as-code, and Fugue is fully committed to supporting and contributing to it.”
The Security Industry Association (SIA) announces the 2019 keynote and featured speakers for Securing New Ground (SNG), the security industry’s annual executive conference taking place at the Grand Hyatt New York in Manhattan October 29-30. SNG 2019 will feature keynote remarks from Dr. Steven T. Hunt, chief expert for work and technology at SAP; George Oliver, chairman and CEO of Johnson Controls; and Gary Shapiro, president and CEO of the Consumer Technology Association (CTA). Significant security risks and threats SNG gathers the brightest minds in the security industry and offers a carefully curated program" Additionally, the 2019 conference will include featured presentations from Steve Jones, CEO of Allied Universal, and Brian Tuskan, senior director and chief security officer (CSO) at Microsoft Global Security; and a panel of CSOs and senior security executives from major industries and public safety highlighting significant security risks and threats and how executives mitigate them. “Each year, SNG gathers the brightest minds in the security industry and offers a carefully curated program that inspires these leaders about the potential of the global security industry,” said SIA CEO Don Erickson. “We are thrilled that these top security luminaries from some of the nation’s leading companies will be joining us at SNG 2019 and look forward to diving deep into the most critical industry trends.” Innovative workforce management methods In the conference’s opening keynote presentation, The Human Side of Security, Hunt will explore the impact of integrating security methods into workforce management systems. This session will examine the interaction between security risks, employee psychology, workforce management and information technology and illustrate how physical and information security risks can be mitigated through the use of innovative workforce management methods and technologies. Additionally, attendees will enjoy a keynote-style executive interview featuring Oliver and hosted by SIA Chairman Scott Schafer. This conversation will highlight major industry trends and market drivers and share insights into how one of the security solutions firms — delivering both security technology products and security integration services — is navigating evolutions in technology, business models and customer needs. Managing corporate risk Jones will explore how the business of security is evolving during the session No Off SeasonIn the presentation Consumer Trends Destined to Shape the World, Shapiro will showcase what trends in innovation and consumer preferences are poised to shape the globe and your business. Shapiro is president and CEO of the CTA, the U.S. trade association representing more than 2,200 consumer technology companies and which owns and produces the CES show. In an interview-style session format, Jones will explore how the business of security is evolving during the session No Off Season: Managing Corporate Risk in an Era of Uncertainty. Jones – who, in addition to his role at Allied Universal, authored the book No Off Season – will share insights into what corporate leaders are seeking from security teams and how he has applied leadership lessons to grow his firm while remaining focused on the ultimate goal: managing his clients’ risk and protecting their reputations. Providing end-To-End enterprise security In the session Defining the Future of Security, Tuskan will share his vision on technology, strategy and where the security industry is headed. As CSO for one of technology firms and with a global footprint, Tuskan has a view of security that serves as not only a vision, but also a great example of how strategy and technology can work together. SNG attendees will enjoy Expecting the Unexpected: Security Leaders Speak!, a dynamic panel discussion Tuskan will also discuss the importance of having a strong relationship with the chief information security officer in providing end-to-end enterprise security. Additionally, SNG attendees will enjoy Expecting the Unexpected: Security Leaders Speak!, a dynamic panel discussion featuring Karen Frank, director of global security at Pratt & Whitney; Brad Hegrat, security principal director at Accenture; Andrea Schultz, director of strategic security programs and policy at the National Football League; Trisha Stein, director of administrative operations at the Detroit Police Department; and moderator Pierre Trapanese, CEO of Northland Controls. Small business security These CSOs and senior security executives from major industries and public safety will share perspectives on the significant security risks and threats in their sectors and how they’re mitigating those concerns while keeping an eye on future risks. Other highlights of SNG 2019 will include discussions on the future of consumer and small business security, what politics and policy mean for security businesses, investment insights for the security industry and managing corporate risk; topic-focused thought leadership roundtables; and a lively networking reception. SNG 2019 will be held at the Grand Hyatt New York, and attendees will be offered a special discounted rate at the hotel; the room block will close on Friday, October 11.
Growing up, I was surrounded by the military way of life as my father was a Captain in the Marine Corps during the Vietnam War and my grandfather and uncles all served in the military. Even from a young age, I knew I was going to serve our country. My 22-year career in the military includes serving in the United States Air Force, the California Air National Guard and as a reservist assigned to an active-duty Air Force unit. Training and development operations Over the course of my military career, I held a variety of assignments from starting out as a Gate Guard to becoming a Flight Chief and Non-Commissioned Officer in Charge (NCOIC) of a Security Forces section. I retired from the military as a Master Sergeant. After my deployment to Afghanistan, I joined Allied Universal as a security director. My 17-year career at Allied Universal encompasses roles including Service Manager and General Manager at the West Los Angeles Branch and leading the Training and Development operations and Fire Life Safety Division. In 2008, I was tasked to develop and implement the company’s Healthcare Division. Attaining meaningful employment opportunities Below are just a few reasons why the physical security sector is a natural fit for military veterans: Self-Discipline and Organization Coveted in Security Sector - I believe that the skills learned in the military, such as self-discipline and organization, have provided the necessary tools to be successful. I truly enjoy working with other veterans at my company as we all know that we can count on each other to get the job done right. This bond and sense of commitment to each other is always there. Multi-faceted Career Paths Available - The security sector also offers veterans the ability to attain meaningful employment opportunities with multi-faceted career paths. A veteran’s background and experience are highly valued in this sector and there are many positions to match our skill sets and expertise. The responsibility we have for those in our charge is really not any different than what we have learned in the military. Team Players - Teamwork is a lesson all military veterans learn. In the military, you live and work together, and are taught to support your team members and efficiently collaborate with the people around you. This is an invaluable skill in the security sector whether you are seeking an entry level or management position. No Military to Civilian Decoder Needed - Veterans need a ‘military to civilian decoder’ system to help explain the significance of their military skills and how they translate to the general employment landscape. The physical security sector, however, understands the language of the military and don’t generally require that military responsibilities be coded into language that non-military can understand. Securing mid-Level appointments The physical security sector features a wide variety of jobs from entry level, middle management to senior positions. A retired veteran with a pension may look to the security sector for part-time or full-time entry level work. Other former military, who are not eligible for retirement benefits, may secure mid-level appointments with the goal of climbing the ladder to the highest rungs. The flexibility and opportunity are unparalleled in the security sector. Veterans generally enter the workforce with identifiable skills that can be transferred to the physical security world and are often skilled in technical trends pertinent to business and industry. And what they don't know, they are eager to learn - making them receptive and ready hires in physical security environments that value ongoing learning and training.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasize to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government center or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organization can move their line of defense away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalize their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
A larger proportion of cyberattacks in the first half of 2019 can be attributed to electronic criminals (eCrime adversaries) compared to state-sponsored or unidentified attacks. CrowdStrike, a cybersecurity company that provides the CrowdStrike Falcon endpoint protection platform, observes that 61% of targeted cybersecurity campaigns in the first half of 2019 were sourced from eCrime adversaries, compared to 39% from other sources. Technology was the top vertical market targeted by cyber-attacks in the first half of the year CrowdStrike Falcon Overwatch platform The eCrime portion more than doubled since 2018, reflecting an escalation of criminal players in search of more and larger payouts. The trend is among the information presented in CrowdStrike’s Overwatch 2019 Mid-Year Report: Observations from the Front Lines of Threat Hunting. Falcon OverWatch is the CrowdStrike-managed threat hunting service built on the CrowdStrike Falcon platform. Technology was the top vertical market targeted by cyber-attacks in the first half of the year, followed by telecommunications and non-governmental organizations (including think tanks). Other targets (in decreasing order) were retail, financial, manufacturing, transportation and logistics, gaming, entertainment and engineering. Hospitality disappeared from the list so far this year, although Crowdstrike expects an increase in intrusions aimed at the hospitality industry to put it back in the top 10 by the end of the year. Intrusion adversaries In terms of intrusion adversaries, the top players so far in 2019 are Spiders (eCrime) and Pandas (China). Regarding initial access techniques, the most common remain, in order of prevalence, valid accounts, spear-phishing and exploitation of public-facing applications. 2009 is proving to be an active year with a significant increase in eCrime and the inter-relationships occurring across different groups as they strengthen their organizations, forge alliances and expand their footprint. Need for a proactive security posture Basic hygiene form the foundation for a strong cybersecurity program Many of the techniques used by eCrime actors are easily defensible through strong security products and a proactive security posture, says CrowdStrike, which recommends the following measures to help maintain strong defense in 2019: Be attentive to basic hygiene such as user awareness, asset and vulnerability management, and secure configurations, which form the foundation for a strong cybersecurity program. User awareness programs can combat the continued threat of phishing and related social engineering techniques. Asset management and software inventory ensures that an organization understands it footprint and exposure. Vulnerability and patch management can verify that known vulnerabilities and insecure configurations are identified, prioritized and remediated. Multifactor authentication (MFA) should be established for all users because today's attackers are adept at accessing and using valid credentials. A robust privilege access management process will limit the damage adversaries can do if they get in and reduce the likelihood of later movement. Implementing password protection prevents disabling or uninstalling endpoint protection that provides critical prevention and visibility for defenders. Countering sophisticated cyber attacks As sophisticated attacks continue to evolve, enterprises face more than a "malware problem" As sophisticated attacks continue to evolve, enterprises face more than a "malware problem." Defenders should look for early warning signs that an attack may be underway, such as code execution, persistence, stealth, command control and lateral movement within a network. Contextual and behavioral analysis, when delivered in real time via machine learning and artificial intelligence, effectively detects and prevents attacks that conventional "defense-in-depth" technologies cannot address. "1-10-60 rule" in combating advanced cyber threats CrowdStrike recommends that organizations pursue a "1-10-60 rule" in order to effectively combat sophisticated cyberthreats. That is, they should seek to detect intrusions in under one minute; to perform a full investigation in under 10 minutes, and to eradicate the adversary from the environment in under 60 minutes. A source at CrowdStrike said "Meeting this challenge requires investment in deep visibility, as well as automated analysis and remediation tools across the enterprise, reducing friction and enabling responders to understand threats and take fast, decisive action."
Could millions of burglar and fire alarm control units be recalled by the U.S. Consumer Product Safety Commission? That could be the upshot when the independent agency of the U.S. government rules on a 'Complaint of Non-Conforming Products' investigation requested on behalf of a consultant/forensic expert who says he has identified non-compliance dangers and vulnerabilities related to the devices. Breaching security standards Jeffrey Zwirn, an alarm and security forensic expert, says he has identified problems with the alarm devices and has posted online a series of videos confirming that they do not operate in conformance with Underwriters Laboratories (UL) 985 and 103 and NFPA 72 (National Fire Alarm and Signaling Code) Standards. Specifically, the single data-bus circuits of the hardwired devices can be short-circuited and become either fully or partially non-functional. The U.S. Consumer Safety Product Commission is tasked with promoting the safety of consumer products by addressing “unreasonable risks” of injury, such as risk of fire, chemical exposure, electrical malfunction or mechanical failure.The U.S. Consumer Safety Product Commission is tasked with promoting the safety of consumer products Typically, the CSPC evaluates such requests and determines what corrective action, if any, is appropriate, in this case possibly by the end of the year. IDS Research & Development Inc. (Zwirn’s company) and Connaughton Group LLC, a product integrity consulting firm, sent a request to the CSPC on Sept. 20 asking for an investigation of products across the North American household fire and burglar alarm control units and commercial burglar and fire alarm control panel category. Recalling alarm control units The request estimates that “hundreds of millions” of the units were sold and installed across the United States. They include products sold under brand names such as Honeywell, DSC, NAPCO, ELK Products, and Interlogix. If the recall were to happen, it would be the largest recall in the history of the alarm industry. The request states: “It is our expert opinion that these non-conforming control panels present a foreseeably dangerous and serious public safety hazard and risk to all of the unsuspecting consumers, their families and business owners who have these control panels installed in their homes and businesses.”These non-conforming control panels present a foreseeably dangerous and serious public safety hazard" Zwirn has also submitted the products for investigation by UL and Intertek Testing Services Inc., which respectively provide the UL and ETL certification marks and are Nationally Recognized Testing Laboratories (NRTL). Outcomes of those investigations are forthcoming. Jeffrey Zwirn also promotes and sells a product, The Interceptor, that would address the vulnerability. It is a microprocessor designed to protect the data-bus and auxiliary power output wiring installed throughout a protected premises.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
HID Global, global provider of trusted identity solutions, has enabled BigWise, a global provider of wise solutions worldwide, to bring the security and convenience of biometrics to its retail and restaurant customers. BigWise went from concept to a pilot of its new biometric-enabled Stellar POS platform at a major customer within 30 days using the HID DigitalPersona fingerprint biometric solution. HID DigitalPersona fingerprint biometric solution HID’s fingerprint biometric solution significantly shortened our path for secure fingerprint biometric authentication" “HID’s fingerprint biometric solution significantly shortened our path for adding secure fingerprint biometric authentication services to our Stellar POS platform,” said Jose Rivas, founder and CEO, BigWise Corporation. He adds, “We were able to move very quickly to give our customers valuable new capabilities for stopping internal theft and fraud while simplifying employee access to the Point of Sale (POS) terminal. We expect our lead customer to roll out this new biometric-enabled Stellar POS solution in their operations in the very near future and are excited about the product’s broader market opportunities for us.” EikonTouch fingerprint biometric readers Taking advantage of DigitalPersona’s intuitive biometric software development tools, BigWise added fingerprint biometrics to their POS offering in a matter of weeks. The new solution allows customers the flexibility of choosing the HID Fingerprint biometric reader that meets their requirements, including the DigitalPersona 4500 and EikonTouch fingerprint readers. With the addition of fingerprint biometrics, Stellar POS gives organizations not only a more convenient way to login to their POS terminals but also allows them an effective way to stop labor hour fraud as well as POS theft due to unauthorized manager overrides and approvals. Stellar POS end-to-end solution “We are pleased to have helped BigWise complete this biometric authentication pilot and shorten time to market for its exciting new offering,” said Wladimir Alvarez, senior director of Sales LAM, Extended Access Technology Business Unit with HID Global. “In addition to securing their POS systems DigitalPersona fingerprint biometrics finally allows Bigwise customers to eliminate their dependence on insecure and costly passwords and swipe cards.” Stellar POS provides an end-to-end solution from the store floor or restaurant counter Stellar POS provides an end-to-end solution from the store floor or restaurant counterStellar POS provides an end-to-end solution from the store floor or restaurant counter through the full range of inventory, logistics and production processes and makes it easier to manage offers and promotions, loyalty programs, and accounting and treasury operations. BigWise sells the Stellar POS solution primarily in Colombia, Chile, Argentina and Peru. Identity management HID DigitalPersona biometric readers along with the DigitalPersona software development kit (SDK) solves security and identity management challenges for hundreds of millions of users around the world. To get developers off to a quick start, HID’s DigitalPersona developer kit includes hardware samples, downloadable royalty-free SDKs, sample code, documentation and membership in HID Global’s Crossmatch Developer WebPortal.
Bolloré Logistics is one of the top ten transport and logistics companies in the world. Its warehousing and logistics facility near Auckland Airport, New Zealand, has seen significant growth in recent years and often handles in excess of 2,000 items in a day. As a customs bonded warehouse, the location is subject to strict security requirements. All movements and processing in the warehouse must therefore be monitored closely, as the consequences of damage to facilities or loss of stock could be catastrophic. A combination of c25, v25 and i25 hemispheric cameras, along with several MOBOTIX Dual D15 cameras, provides complete coverage of the 6,600-square-meter site. The new system provides full visibility of the warehouse aisles to protect both employees and customers should an incident occur. Tool for risk management A security system that enables monitoring of business processes and guarantees the availability of historical footage can help companies avoid facing expensive compensation claims. As such, the MOBOTIX system is an invaluable tool for risk management, compliance enforcement and dispute resolution. The stream of metadata generated alongside the video feed cannot be manipulated, which ensures that the images will hold up in a court of law. Moreover, this kind of security system even helps save money: Some insurance companies reduce their premiums when this kind of system has been installed.
When you’re securing premises in Iceland, you need a reliable system that can cope with both plummeting temperatures and low-light levels. Hikvision cameras were used in such a solution – chosen by Securitas Iceland to secure a harbor for customer Samskip in Reykjavik. Global logistics company Samskip is one of the larger transport companies in Europe with offices in 24 countries in Europe, North and South America, Asia and Australia. They operate an extensive network of container services to and from Iceland, along with refrigerated cargo logistics and international forwarding around the world. Special kind of surveillance system One of their locations is a harbor in Reykjavik, which includes warehouses. Operating in sub-zero temperatures and with low-light even in daytime for some of the year, Samskip needs a special kind of surveillance system. When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely. These are also the temperatures where maintenance is more challenging – these are not ideal environments for technicians to be working outside. The biggest snow depth ever recorded in Iceland was 279cm in North Iceland in March 1995, for example. Although this was the worst winter ever recorded, it gives an idea of the potential extremes. There are also snow storms and the high wind chill factor to contend with. Providing clear images in failing light Low light in the winter months means that solutions in Iceland need to be better able to provide clear images in failing light. During winter, Iceland’s high latitude means shorter days - the longest day in the middle of December has only 5 hours of light, for example, with the sunrise at around 11am and sunset between 3 and 4pm. Despite these unique conditions, Samskip needed to have a good overview over all that is happening around the harbor complex, both inside and outside. Specifically, they needed to be able to trace products and goods in the warehouse. Iceland’s security provider, Securitas, rose to the challenge, providing a solution using more than 150 Hikvision products, including PanoVu and DarkFighter® cameras. All these cameras can operate to a temperature of -30˚C. Identifying potential issues The PanoVu cameras provide excellent wide angle surveillance to cover as much of the area as possible. DarkFighter technology is a popular choice in Iceland because it gives clear, useful images even in the lowest of light scenarios. The smart function on the cameras means that operators are able to identify potential issues by analyzing people's behavior. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications They can also trace a product between locations and see its condition at receipt and delivery, enhancing both security and business efficiency. To complement the Hikvision solutions, Securitas chose Seagate as their preferred storage vendor with their Skyhawk. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications. Providing reliable security Skyhawk surveillance drives are equipped with enhanced ImagePerfect™ firmware to deliver ultimate reliability and zero dropped frames, and SkyHawk Health Management, a software designed for prevention, intervention and recovery. Bergvin Þórðarson, Samskip’s Security Manager, says: “The cameras meet the requirements for analysis of people and merchandise. We are confident with both Hikvision and Securitas – in both their product and people. We know that they will fix any issues and react quickly if there’s a problem.” Securing large areas can be a challenge all on its own, but the addition of potentially crippling weather conditions means a security solution needs to be robust. Hikvision cameras were up to the challenge and provided reliable security for the entire operation.
ADT, a security and automation provider serving residential and business customers, announces a partnership to integrate mobile safety solutions into the Lyft platform. Extending ADT’s safety and technology to mobile applications will bring an additional layer of security to Lyft’s rideshare experience. With ADT’s mobile safety platform, Lyft seeks to give riders and drivers more peace of mind. The pilot will focus on an ADT-powered safety feature within the Lyft app that will discreetly connect Lyft users who feel unsafe - by voice or SMS chat - with a security professional at one of ADT’s owned and operated monitoring centers. Detailed incident information After contacting the user, or if there is no response, the ADT security professional will alert authorities as needed so they can arrive at the user's location, equipped with detailed incident information. “As a rideshare company with an exceptional commitment to rider and driver safety, Lyft is the ideal partner for ADT,” said Jim DeVries, President and CEO of ADT. When it comes to safety, there is no better partner for Lyft than ADT" “We look forward to working closely with the Lyft team as together we bring our industry-leading technology to rideshare riders and drivers. We continue to leverage our deep expertise, technology and the trusted ADT brand to expand our reach into new areas of security beyond the home and business. Partnering with Lyft broadens our exposure while enabling ADT to further realize our mission and belief that people deserve to be safer and more secure wherever they are.” Professional monitoring services ADT’s data-driven mobile safety solution provides Lyft with a platform to extend the safety and security of ADT’s professional monitoring services to its users within its mobile app experience. Beginning in early 2020, Lyft intends to pilot the ADT mobile safety solution in nine U.S. markets including Chicago, Los Angeles and New Jersey, with potential to implement nationally to Lyft’s 30 million riders and 2 million drivers. “When it comes to safety, there is no better partner for Lyft than ADT,” said Ran Makavy, EVP and Chief Product Officer of Lyft. “We are extremely excited to enter into this partnership and look forward to a meaningful, industry-leading collaboration.”
With 15,000 visitors per day, and a watch list of about 3,000 people, the casino faced an impossible task to recognize persons of interest in real time. Surveillance staff manually detected only 5–7 known persons per week and was looking for an automated face recognition system to support two separate requirements: Detecting voluntarily excluded patrons to promote responsible gambling and to avoid compliance fines associated with allowing these people to play Detecting banned persons or people on the lookout list for loss prevention and security. Fully managed services At peak times, the system sees 20 persons per second in front of all cameras Cognitec offers the Face VACS-VideoScan Enterprise Solution as a fully managed service that allows the casino to benefit from the technology at affordable cost and with low implementation effort. The system for this casino includes the software, installed on three redundant servers, and 29 Cognitec C5 cameras at various entrances and in walkways. Some cameras have been installed to blend into the wall design, and not disrupt the overall casino decorum. At peak times, the system sees 20 persons per second in front of all cameras. The software stores the appearances of all persons for 30 days, collecting an average of 1 million faces. After this time window, all images, videos and biometric templates are deleted. Taking optimal photos with a hand-held camera When the surveillance team receives an alert, they verify the facial match, and send the person details to the database administrator. The security team receives the confirmed alert on a mobile device to discreetly find and approach the person on the floor. For new enrolments, staff have been instructed on taking optimal photos with a hand-held camera For new enrolments, staff have been instructed on taking optimal photos with a hand-held camera. The technology has been optimized to generate a high rate of true alerts while generating the lowest possible count of false alerts. The surveillance team evaluates the image pairs in an alert within seconds, and discards the alerts with questionable match results. face recognition services The system currently generates up to 30 correct alerts per day. Self-excluded problem gamblers are now detected at a much higher rate, resulting in a significant reduction in fine payments compared to the past with traditional detection methods. Observing such reliable system performance has convinced the client to add more cameras to the system and implement the technology at additional locations. The casino also considers to use the technology for underage detection and VIP recognition. Furthermore, the casino has the option to report visitor demographics and statistics that help planning for staff resources and casino capacities. While Cognitec continues to provide reliable, fully-managed face recognition services, the casino continuously reaps the benefits: a secure environment for customers and staff, a profitable business, and support from the community.
Delfina Chain, Sr Associate Customer Engagement & Development at Flashpoint, discusses what resources defenders must access to in order to keep a finger on the pulse of the cybercriminal underground. Artificial intelligence (AI) is already being applied to diverse use cases, from consumer-oriented devices - such as voice-controlled personal assistants and self-directed vacuum cleaners - to ground-breaking business applications that optimize everything from drug discovery to financial portfolio management. So naturally, there is growing interest within the information security community around how we can leverage AI - which encompasses the concepts of machine learning (ML) and deep learning (DL) - to combat cyber threats. AI-enhanced cyber security The effectiveness and scalability of cybersecurity-related tasks has already been enhanced by AI The effectiveness and scalability of cybersecurity-related tasks, such as malware and spam detection, has already been enhanced by AI, and many expect ongoing AI innovations to have a transformative impact on cyber defence capabilities. However, security practitioners must also recognize that the rise of AI presents a potent opportunity for cybercriminals to optimize their malicious activities. Much like the rise of cybercrime-as-a-service offerings in the underground economy, threat-actor adoption of AI technology is expected to lower barriers to entry for lower-skilled actors seeking to conduct advanced malicious operations. A report from the Future of Humanity Institute emphasizes the potential for AI to be used toward beneficial and harmful ends within the cyber realm, which is amplified by its efficiency, scalability, diffusibility, and potential to exceed human capabilities. Encrypted chat services Potential uses of AI among cybercriminals could include the development of highly evasive malware, the ability for automated systems to exhibit human-like behaviour during denial-of-service attacks, and the optimization of activities such as vulnerability discovery and target prioritization. Fortunately, defenders have a leg up over adversaries in this arms race to harness the power of AI technology, largely due to the time- and resource-intensive nature of deploying AI at its current stage in development. The purpose of intelligence is to inform a course of action. For defenders, this course of action should be guided by the level of risk (likelihood x potential impact) posed by a threat. The best way to evaluate how likely a threat is to manifest is by monitoring threat-actor activity on the deep-and-dark-web (DDW) forums, underground marketplaces, and encrypted chat services on which they exchange resources and discuss their tactics, techniques, and procedures (TTPs). Cobalt Strike threat-emulation software Flashpoint analysts often observe cybercriminals abusing legitimate technologies in a number of way Cybercriminal abuse of technology is nothing new, and by gaining visibility into adversaries’ ongoing efforts to develop more advanced TTPs, defenders can better anticipate and defend against evolving attack methods. Flashpoint analysts often observe cybercriminals abusing legitimate technologies in a number of ways, ranging from the use of pirated versions of the Cobalt Strike threat-emulation software to elude server fingerprinting to the use of tools designed to aid visually impaired or dyslexic individuals to bypass CAPTCHA in order to deliver automated spam. EMV-chip technology Flashpoint analysts also observe adversaries adapting their TTPs in response to evolving security technologies, such as the rise of ATM shimmers in response to EMV-chip technology. In all of these instances, Flashpoint analysts provided customers with the technical and contextual details needed take proactive action in defending their networks against these TTPs. When adversaries’ abuse of AI technology begins to escalate, their activity within DDW and encrypted channels will be one of the earliest and most telling indicators. So by establishing access to the resources needed to keep a finger on the pulse of the cybercriminal underground, defenders can rest easy knowing they’re laying the groundwork needed to be among the first to know when threat actors develop new ways of abusing AI and other emerging technologies.
Round table discussion
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase the cybersecurity of physical security systems?