Ping Identity, the Intelligent identity solution for the enterprise, announces the first annual Ping YOUniverse (formerly IDENTIFY), an identity security event where security professionals come together to share real-world identity management stories and solutions for improved digital experiences. The event will empower current and prospective Ping Identity customers, security and IAM professionals, IT architects, CISOs and line-of-business owners with actionable examples of how to overcome hyb...
Pyronix is pleased to announce the release of its second-generation CO-WE detector - providing protection against carbon monoxide with newly added features. Carbon monoxide (CO) is a colorless, odorless, tasteless, and highly toxic gas that can be deadly if it accumulates in enclosed spaces. The CO-WE (2nd Generation) is an essential lifesaving device, which protects homes and families against this danger; raising the alarm locally via its 85dB sounder and remotely via connected Pyronix smart...
A security solutions developer, designer, and provider, Videcon, has launched their new Concept Pro ColourSmart camera range, providing clear full-color imagery 24 hours a day. The complete CCTV range combines Videcon’s Deep Learning technology and powerful software, to allow footage to always remain in color with clear and crisp imagery, day, or night. ColourSmart Features The ColourSmart cameras have a larger lens and image sensor which allows them to let in as much light as poss...
When technology performs a required task effectively, there is little reason to upgrade to the ‘next big thing’. In this regard, the physical security market is notoriously slow to change. Much of yesterday’s most robust and dependable equipment is still in place at thousands of customer sites, still performing as well as the day it was installed. However, there comes a point when any technology becomes outdated. We asked this week’s Expert Panel Roundtable: Which securi...
Paxton’s combined video management and access control platform, Paxton10, now allows administrators to manage multiple sites, spanning cities, countries, and even continents. Paxton10 Paxton10 is the newest and most powerful system, developed by the international security manufacturer, Paxton Access Limited (Paxton). The new system is critically acclaimed among industry experts, as well as a favorite for Paxton installers. One Paxton installer and the Managing Director of Seen Se...
ANSecurity, an advanced network, and data security company, has become a Palo Alto Networks Managed Security Services Partner (MSSP). ANSecurity has delivered Palo Alto Networks security solutions for over 10 years, and as David Hood, CEO, explains, “We already work with many of our clients using Palo Alto Networks technology as part of our own co-driver managed services methodology, and this certification is a formalization of a long-standing relationship that validates that our security...
The Croatian defender and UEFA Cup winner Darijo Srna will become the brand ambassador of the Ukrainian security systems manufacturer Ajax Systems in Croatia. The slogan of the campaign is “Ajax. My defense tactics.” “Darijo is a world soccer legend and a real superstar in Croatia. His brand ambassador status will bring further momentum to the Ajax promotion in the Adriatic market,” Ajax Systems CMO, Valentyn Hrytsenko. “I have a smart Ajax security system at home, and now even when I am at training camps or on long trips I can rest assured that my home and my loved ones are well-protected. It’s convenient that the system is controlled with an app on my smartphone — this allows me to manage the household security from anywhere in the world,” Darijo Srna. Darijo’s recommendations As part of the campaign launch, a series of digital activities was scheduled as well as exclusive merchandise and materials were prepared for Ajax B2B partners. The main campaign goal is to enhance and consolidate the company’s standing in the Adriatic region. In addition to being an Ajax user himself, in the past Darijo also recommended the system to his former teammate Paulo Fonseca, the ex-coach of Shakhtar, whose home was robbed. After the incident, an Ajax system was sent to Fonseca to Italy as a gift: it was installed in his home for protection against any possible accidents. The Adriatic market Ajax Systems entered the Adriatic market in 2017. One of the most important achievements of the company on the market is its partnership with Alarm Automatika, the largest distributor of security equipment in the region. The global goal of Ajax is to become the #1 brand in its segment. To make professional security comfortable for users and give installers the opportunity to work with user-friendly, innovative equipment that has no compromises on reliability.
The National Security Inspectorate (NSI) is once again supporting the BSIA’s British Security Awards, taking place at the London Marriott Grosvenor Square on 30th June 2021. The British Security Awards recognize key achievements from within the private security industry and for the third consecutive year, NSI is sponsoring the ‘Apprentice of the Year' Award. Dedicated to the next generation of engineers within the industry, this category will award an apprentice for their outstanding commitment to training, personal initiative, and customer service. Comments by the Chief Richard Jenkins NSI Chief Executive commented, “Our support of apprenticeships in the security and fire sectors is an intrinsic part of NSI’s commitment to raising standards and while an ongoing need to bridge the future skills gap exists, our support of apprenticeships remains as ever pertinent. We encourage companies to nominate their exceptional apprentices and give them the recognition they deserve.” “We look forward to this year’s British Security Awards as a vital opportunity to shine a spotlight on the invaluable contribution of those within the private security industry who go above and beyond to keep people, property, and assets safe.” Entries for the British Security Awards 2021 will close on 16th April and finalists will be announced on 4 May 2021.
Hikvision, an IoT solution provider with video as its core competency announced Foxstream has joined the Hikvision Embedded Open Platform (HEOP) program for the FoxIntruder edge-based intrusion detection solution – which is available for Hikvision’s range of DS-2TD2137/VP thermal cameras. Perimeter security With this integration, FoxIntruder can now be embedded directly into Hikvision’s thermal cameras at the edge to provide an extremely reliable and easily deployable end-to-end solution for high-security perimeter protection. This solution also features less bandwidth and lower latency than server-based solutions. Users simply need to add a camera’s IP address into the browser to access the HEOP application, which provides the following: Real-time visualization based on alarm triggers and video event playback Minimal false alarm rates Integration with industry-leading VMS platforms and Central Station Receivers Quick and simple configuration and intuitive operation An API for integration with other platforms Edge-based perimeter protection "Foxstream has an excellent reputation for optimal perimeter detection algorithms and extremely low rates of false alarms. Now, validated by Hikvision for their HEOP program, we can provide this as an embedded solution for edge-based perimeter protection. FoxIntruder for HEOP uses the same tried and trusted algorithms that we use in our FoxVigi and FoxBox solutions, with even simpler configuration settings.” “In combination with Hikvision thermal cameras, this product combination provides reliable and optimal perimeter protection against intruders to secure large sites!," says Franck Depierre, Product Manager at Foxstream. Long-term implications “We are happy to see that more and more technology partners, like Foxstream, are joining our HEOP program. This is part of our long-term strategy to build the best possible market offerings for customers alongside technology partner solutions that fit inside our HEOP cameras." "Through the HEOP program, technology partners can showcase their technologies to a wider audience as well as deliver solid value propositions to the market,” says Myler Zhong, Vertical Director at Hikvision Europe. Hikvision’s HEOP program provides a platform for third-party technology partners to develop their own applications and install them directly into Hikvision cameras, which brings a greater variety of intelligent functionality directly to customers.
With a solid COVID-19 continuity plan, a strong focus on people retention, and new ways of collaborating with partners, Milestone Systems achieved a net revenue of DKK 1 billion in 2020. Milestone’s net revenue amounted to DKK 1 billion in 2020, a decrease of 1% compared with 2019. The operating income (EBIT) was DKK 112 million, a decrease of 9%, reflecting the pandemic’s impact on sales, an increase in development capacity, and investments in new headcounts to fuel future growth. New ways to collaborate “Given the challenging situation of the pandemic, our annual result is a successful outcome, made possible by our people, without whom long-term sustainable growth would not be possible." "We quickly turned around how we manage the company and found new ways of supporting our network of partners. This resilience combined with the adaptability of our people and partners prepared us to face the new challenges,” says Chief Executive Officer Thomas Jensen, Milestone Systems. People First In 2020, Milestone’s People First approach was tested to its core. It was crucial for Milestone to avoid restructuring while supporting its people — keeping them motivated and feeling included as part of the team. To support this, Milestone launched the Grow Together program that focuses on mental and physical health and knowledge-sharing about exercise, food, and sleep. In addition, despite the COVID-19 pandemic, Milestone lived up to the ambition to invest in people and growth, increasing the number of employees by 69 to a total of 934 at the end of 2020. Increased support of partners The wide network of channel and technology partners is the core of Milestone’s open video technology platform. When the pandemic hit, Milestone optimized its support to help partners keep selling Milestone solutions. Product training went online with webinars attracting thousands of partners and, with the Milestone Care™ campaign, Milestone helped its partners to continue their business without having to be onsite with their customers. Future growth opportunities Looking ahead, Thomas Jensen expects challenges but also looks forward to Milestone’s continued growth journey. He concludes, “COVID-19 created a lot of uncertainty and unpredictability in 2020." "The pandemic is not behind us yet, and therefore we see challenges as well as opportunities ahead. But with our strong COVID-19 continuity plan, we are confident that 2021 will become another growth year for Milestone.”
VMware, Inc. unveiled expanded cloud workload protection capabilities to deliver security for containers and Kubernetes. The new solution will help increase visibility, enable compliance and enhance security for containerized applications from build to production in the public cloud and on-premises environments. Comprehensive cloud platform “Containers and Kubernetes are enabling organizations to develop and modernize applications faster than ever, but the innovation is also expanding the attack surface,” said Patrick Morley, senior vice president, and general manager, Security Business Unit, VMware. “Our solution extends security to containers and Kubernetes to deliver one of the industry’s most comprehensive cloud workload protection platforms. With security built into the development and deployment of applications, we are bridging the gap between the SOC and DevOps teams to help our customers reduce the risks that come with running containers across clouds.” Addressing threats For many organizations, migrating to the cloud has had to happen quickly and at a large scale to ensure business continuity amid the global pandemic. Development teams are looking to containers and Kubernetes for speed and the ability to scale application delivery. According to Gartner, “by 2025 more than 85 percent of global organizations will be running containerized applications in production, which is a significant increase from fewer than 35 percent in 2019.” Organizations need security for modern workloads to address a new set of threats and build resilient digital infrastructure. Better Security VMware Carbon Black Cloud Container builds security to analyze and control application risks Security is especially complex in multi-cloud infrastructures. VMware Carbon Black Cloud Container builds security into the continuous integration and delivery (CI/CD) pipeline to analyze and control application risks before they are deployed into production. Expanding the VMware Carbon Black Cloud Workload offering, the new capabilities will enable organizations to better secure containerized applications in Kubernetes environments. The solution shifts security left to protect the entire lifecycle of Kubernetes applications. InfoSec teams can now scan containers and Kubernetes configuration files early in the development cycle to address vulnerabilities with unparalleled visibility. The solution provides continuous cloud-native security and compliance to better secure applications and data wherever they live. Enable Collaboration for InfoSec and DevOps Teams Containers and Kubernetes offer development teams flexibility with an infrastructure-as-code approach. However, security is often a roadblock to faster production deployments and later bolted on as an afterthought. The VMware container security module will empower InfoSec and DevOps teams to better collaborate and identify risks earlier in the development cycle with built-in security. The expanded offering will provide a new vantage point to allow cross-functional teams to detect and fix vulnerabilities to achieve simple, more secure multi-cloud Kubernetes environments. Comprehensive solution for InfoSec VMware’s expanded cloud workload protection capabilities will deliver a comprehensive solution for InfoSec teams including: Security Posture Dashboard: Provides a combined view of vulnerabilities and misconfigurations to enable complete visibility into security posture across Kubernetes workload inventory. InfoSec and DevOps teams can gain deep visibility into workload security posture and governance to enable compliance, with the ability to freely explore Kubernetes workload configuration via customized queries. Container Image Scanning and Hardening: InfoSec and DevOps teams can scan all container images to identify vulnerabilities and restrict the registries and repositories that are allowed in production. Teams can set minimum standards for security and compliance, generate compliance reports and follow CIS benchmarks and Kubernetes best practices. Prioritized Risk Assessment: Vulnerability assessments allow InfoSec and DevOps teams to review images running in production and only approved images are deployed. Security teams can use the prioritized risk assessment to detect and prevent vulnerabilities by scanning Kubernetes manifests and clusters. Compliance Policy Automation: Infosec teams can shift left into the development cycle, streamline compliance reporting, and automate policy creation against industry standards such as NIST, as well as the customer’s organizational requirements. This enables the integrity of Kubernetes configurations through control and visibility of workloads that are deployed to an organization’s clusters. Customizable policies help enforce configuration by blocking or alerting on exceptions. The Future of Intrinsic Security with VMware Carbon Black and Tanzu The container security module complements the VMware Tanzu portfolio. Select Tanzu editions include a global control plane for centralized management of all aspects of cluster lifecycle, including policies for access, data protection, and more. Customers can now add powerful security for containers and Kubernetes applications while simplifying operations for InfoSec and DevOps teams. Customer Quote DoubleVerify ensures viewable, fraud-free, brand-safe ads. DoubleVerify powers the new standard of digital marketing performance, ensuring viewable, fraud-free, brand-safe ads. “It’s important that we have full visibility into the risk of our entire Kubernetes workload environment, as well as the ability to detect and prevent vulnerabilities before containers are deployed,” said Roy Berko, Senior Director of DevOps, DoubleVerify. “With VMware’s container security offering, we now have instant visibility to help reduce risk of our containerized applications all from a single dashboard.” Analyst Quote IDC is the premier global market intelligence firm, examining consumer markets by devices, applications, networks, and services “Kubernetes has become the de-facto best-practice standard for developing cloud-native applications, yet developers are still leveraging siloed and inefficient tools with limited cross-organization visibility,” said Frank Dickson, Program Vice President, Security & Trust at IDC. “VMware’s container security offering provides an opportunity for security and DevOps teams to work more closely together to leverage the power of Kubernetes and better secure the unique lifecycle development processes of container-based applications.” Product Availability VMware container image scanning and CI/CD integration capabilities are expected to be available in April 2021. Runtime security for detection and response will be available later this year.
Zenitel, a provider of intelligent critical communication solutions, is pursuing its growth strategy in the EMEA region and specifically in Southern Europe through the launch of a new Center of Excellence (CoE) in Spain. Zenitel has appointed its longtime partner in Spain, COINTEL SL, to this role in the Iberian market. Partnership with Cointel COINTEL SL, based in Bilbao, will consolidate Zenitel’s presence and will continue to build a strong and sound ecosystem network. Cointel benefits from a good geographical footprint in Spain, with representation in Bilbao & Barcelona that is planned to grow in the coming years. This close partnership will support Cointel’s growth strategy towards new market segment coverage, expanding and enlarging it from very solid transportation, building security, industry, and prison-based segments to others such as education and healthcare. Local Presence Cointel's in-depth understanding and local presence in the Spanish region is an opportunity to deliver the best audio solution “We reserve the highest level of accreditation and partnership for our Centers of Excellence, so it is just natural that COINTEL has become our CoE in Spain, given their performance throughout our long-standing cooperation,” says Wim Van Winghe, VP Sales EMEA for Zenitel. “Our CoEs represent our brand, products, and reputation in their designated markets. Cointel's in-depth understanding and strong local presence in the Spanish region creates an excellent opportunity for us to deliver the best audio solution to customers.” High-End Intercom Systems Specialist COINTEL has extensive experience with selling Zenitel products and is a well-known, recognized local player in the market. As a specialist in high-end intercom equipment and solutions, COINTEL is a trusted partner within the Spanish market when it comes to communication in security-critical areas. Its dedicated team is continuously trained to provide first-rate sales and product service. "We feel proud and motivated to become Zenitel Center of Excellence for the Iberian market,” says Gilber Landeta, CEO for COINTEL, adding, “We value this trusted partnership as a step forward in our long-term commitment and engagement. We have always promoted the Zenitel portfolio within our local market. This new role, which means being more closely linked to the manufacturer, will reinforce our positioning as a key player in audio within our market.” Expansion of CoE Program In the coming months, Zenitel will continue to expand its CoE program throughout the EMEA region, by consolidating its partner and consultant ecosystem network, comprising channel partners, security distributors, technology partners, and architects & engineering companies, as well as surveillance solution providers.
Human beings have a long-standing relationship with privacy and security. For centuries, we’ve locked our doors, held close our most precious possessions, and been wary of the threats posed by thieves. As time has gone on, our relationship with security has become more complicated as we’ve now got much more to be protective of. As technological advancements in security have got smarter and stronger, so have those looking to compromise it. Cybersecurity Cybersecurity, however, is still incredibly new to humans when we look at the long relationship that we have with security in general. As much as we understand the basics, such as keeping our passwords secure and storing data in safe places, our understanding of cybersecurity as a whole is complicated and so is our understanding of the threats that it protects against. However, the relationship between physical security and cybersecurity is often interlinked. Business leaders may find themselves weighing up the different risks to the physical security of their business. As a result, they implement CCTV into the office space, and alarms are placed on doors to help repel intruders. Importance of cybersecurity But what happens when the data that is collected from such security devices is also at risk of being stolen, and you don’t have to break through the front door of an office to get it? The answer is that your physical security can lose its power to keep your business safe if your cybersecurity is weak. As a result, cybersecurity is incredibly important to empower your physical security. We’ve seen the risks posed by cybersecurity hacks in recent news. Video security company Verkada recently suffered a security breach as malicious attackers obtained access to the contents of many of its live camera feeds, and a recent report by the UK government says two in five UK firms experienced cyberattacks in 2020. Cloud computing – The solution Cloud stores information in data centres located anywhere in the world, and is maintained by a third party Cloud computing offers a solution. The cloud stores your information in data centres located anywhere in the world and is maintained by a third party, such as Claranet. As the data sits on hosted servers, it’s easily accessible while not being at risk of being stolen through your physical device. Here’s why cloud computing can help to ensure that your physical security and the data it holds aren’t compromised. Cloud anxiety It’s completely normal to speculate whether your data is safe when it’s stored within a cloud infrastructure. As we are effectively outsourcing our security by storing our important files on servers we have no control over - and, in some cases, limited understanding of - it’s natural to worry about how vulnerable this is to cyber-attacks. The reality is, the data that you save on the cloud is likely to be a lot safer than that which you store on your device. Cyber hackers can try and trick you into clicking on links that deploy malware or pose as a help desk trying to fix your machine. As a result, they can access your device and if this is where you’re storing important security data, then it is vulnerable. Cloud service providers Cloud service providers offer security that is a lot stronger than the software in the personal computer Cloud service providers offer security that is a lot stronger than the software that is likely in place on your personal computer. Hyperscalers such as Microsoft and Amazon Web Service (AWS) are able to hire countless more security experts than any individual company - save the corporate behemoth - could afford. These major platform owners have culpability for thousands of customers on their cloud and are constantly working to enhance the security of their platforms. The security provided by cloud service providers such as Claranet is an extension of these capabilities. Cloud resistance Cloud servers are located in remote locations that workers don’t have access to. They are also encrypted, which is the process of converting information or data into code to prevent unauthorized access. Additionally, cloud infrastructure providers like ourselves look to regularly update your security to protect against viruses and malware, leaving you free to get on with your work without any niggling worries about your data being at risk from hackers. Data centres Cloud providers provide sophisticated security measures and solutions in the form of firewalls and AI Additionally, cloud providers are also able to provide sophisticated security measures and solutions in the form of firewalls and artificial intelligence, as well as data redundancy, where the same piece of data is held within several separate data centres. This is effectively super-strong backup and recovery, meaning that if a server goes down, you can access your files from a backup server. Empowering physical security with cybersecurity By storing the data gathered by your physical security in the cloud, you're not just significantly reducing the risk of cyber-attacks, but also protecting it from physical threats such as damage in the event of a fire or flood. Rather than viewing your physical and cybersecurity as two different entities, treat them as part of one system: if one is compromised, the other is also at risk. They should work in tandem to keep your whole organization secure.
Q: Mr. Seiter, Mr. Ekerot, you both joined Bosch Building Technologies’ business unit Video Systems & Solutions as Senior Vice Presidents in March 2020, when the Coronavirus pandemic was just beginning. How did your business unit get through 2020? Magnus Ekerot: The crisis was also felt at Bosch. At the same time, demand has risen for solutions that keep businesses open and protect people's health. We offer corresponding video solutions that can make a significant contribution to containing the pandemic. Michael Seiter: Overall, we managed the past year well despite the challenges and have been growing again since the third quarter compared to 2019. We see good opportunities for further growth in 2021. Q: Has the Corona crisis again accelerated the development of smart technologies in the security technology market, and does the security market in contrast to most industries benefit from the crisis more than it suffers? Michael Seiter: The Corona crisis has definitely demonstrated that the future lies in data-driven solutions. Thanks to our product development strategy already being based on this, we at Bosch were very quickly able to develop new products for the ‘New Normal’ and to expand existing products accordingly. To give one or two examples: in cooperation with Philips, we very quickly developed a people counting solution for retail operations – smart Philips displays in conjunction with smart cameras from Bosch that provide protection for staff and customers. The In-Store Analytics software solution was also implemented with additional features. Shop owners can now make decisions based on customer movement data such as “Where do we position products to avoid queues or crowds?” HTD involves a touch-free monitoring system to accurately and speedily identify people with heightened skin temperature The latest highlight is the Bosch Human Skin Temperature Detection solution, in short HTD. This involves a touch-free monitoring system to accurately and speedily identify people with heightened skin temperature at control points in offices, factory floors, or airports. The benefits of previously existing solutions on the market are sometimes called into question. Competitors are often unable to deliver what they promise because, for example, the measured temperature of the skin does not correspond to the core temperature of the person, or fluctuates, due to environmental influences. Therefore, we developed a software-based solution that, in compliance with GDPR, first allows people with potentially elevated body temperatures to be filtered out, and in a second step, allows medical personnel to perform a more targeted fever measurement. Q: You see a lot of potential for the video security industry in new technologies such as Artificial Intelligence and the Internet of Things. What specific opportunities do you mean, and how are you leveraging these technologies at Bosch Building Technologies? Michael Seiter: Bosch has committed itself fully to an “AIoT” – AI meets IoT – strategy. The development of AI algorithms and software, in general, is at Bosch significantly driven in the security space. By AIoT, we specifically mean the networking of physical products and the deployment of artificial intelligence. With AI we aim to enable clients to understand events at an ever-deeper level and predict them in the future – the keyword being predictive – so that they can act proactively. This is particularly important for health and safety. An example is the Intelligent Insights solution where the user can anticipate potentially dangerous situations, for instance in maintaining social distance and a maximum number of people numbers in any one area. Q: From your point of view do you have an advantage over other suppliers when it comes to AI-based products in the video arena? Michael Seiter: The analysis and utilization of video data have long been front and center with us. Since 2016 we’ve been following the strategy of offering AI applications in the form of integrated intelligent video analytics as a standard in our network cameras. Data such as color, object size, object speed, and direction are all measured. Simply put, you can say this is seeing and understanding – which is the principle behind smart security cameras. Today it’s much more a question of intelligent, data-based solutions than collecting high-quality pictures and storing them for the record. Bosch has been investing heavily in AI for years, from which we can benefit greatly in our area. In the first quarter, for example, we will launch a vehicle detector based on deep learning that is already running on our cameras. This will create significant added value for our customers in the area of intelligent traffic control. Q: Mr. Ekerot, what advantages do customers have in AI-based video security from Bosch? Magnus Ekerot: A key advantage is strong customer focus with tailored solutions that are at the same time modular and scalable through new AI algorithms A key advantage is our strong customer focus with tailored solutions that are at the same time modular and scalable through new AI algorithms. Take the example of Camera Trainer, a machine learning software that can be directly uploaded to Bosch network cameras. The camera is thus trained up on recognizing objects and situations – tailored to the specific needs of our customers. If the camera detects the defined scenario, it performs a predefined action in real-time – for example, a count or an alarm. The latest example is our new camera platform Inteox. As a completely open camera platform, Inteox combines Bosch's intelligent video analytics with an open operating system. This allows programmers to develop specific software applications - or apps - for various application purposes. These can then be loaded onto cameras – the same principle as an app store for smartphones. To sum up, Bosch AI applications support customer-specific needs related to data analysis while enabling totally new applications within and beyond the video security market. Q: Can you name a specific current project where Bosch has deployed an AI-based solution? Magnus Ekerot: A current ground-breaking project using our smart cameras is being implemented as a pilot in the USA. Smart Ohio enables users to configure more intelligent traffic flows and thus ensure mobility, safety, and the efficient use of roads today and tomorrow. The new vehicle detector mentioned by Mr. Seiter also plays a central role here. Our overall goal is to provide connected smart sensor solutions for public and private transportation agencies to enable them to operate their roads safely and efficiently. The Intelligent Insights can anticipate potentially dangerous situations, for instance in maintaining social distance and a maximum number of people numbers in any one area Q: Mr. Seiter, you have been involved with the topic of mobility for some time. What experience from your previous job in the automotive business of Bosch might help you when it comes to further develop the video portfolio of Bosch Building Technologies? Michael Seiter: There's a lot to tell. First of all, the development of core algorithms for video-based solutions, whether for autonomous driving, for vehicle interior monitoring, or for our Bosch Building Technologies video systems, all come together at Bosch's Hildesheim location. This gives us considerable synergies and allows us to bring R&D results to market faster and more flexibly. Essentially, assisted driving systems use AI algorithms that process ever-increasing volumes of video data. Attempts are being made to imitate the human being and enable the vehicle to understand better the surrounding environment with its ‘eyes’. This predictive capability is especially critical with autonomous driving. For example, key questions include: “How should the car respond and what could potentially happen next?” “What kind of environment does it find itself in?” etc. There are many activities in this area at Bosch that in my new role in security we can also strongly benefit from. I am now bringing a lot of this experience and existing R&D achievements to Bosch Video Systems & Solutions, which also results in further synergies with our mobility division: At Stuttgart Airport, autonomous driving is already being implemented together with Mercedes-Benz and the parking garage operator Apcoa as part of the "Automated Valet Parking" project, or AVP for short, in which intelligent video systems from Bosch Building Technologies are making a significant contribution. Mr. Ekerot, you have a lot of experience in the video security area. Where do you position Bosch Building Technologies now in this market and what specific goals are you pursuing? Magnus Ekerot: Our clients are looking for reliable partners and products. We are a strong brand; you can rely on Bosch products. Bosch is a thought leader in video and a pioneer in AI applications in this field since 2016. Data security is everything to us: Our products conform to the EU’s GDPR regulations. Beyond that, we have an extensive camera portfolio that complies with the US National Defense Authorization Act (NDAA) for video security devices. This enables our portfolio to be deployed for example within US government buildings. We are planning to conclude more software maintenance agreements with our clients in 2021. These deliver investment and future security for our customers and include for example a ‘patch guarantee’ along with regular updates with new functionalities. This is the first step in a comprehensive plan to access new revenue channels for us and our partners delivering the best technology and excellent service to the end-user! Overall, many new products will be launched this year and this trend will intensify. Our goal is to establish new product families that follow a simple principle: “The development and delivery of disruptive, predictive video solutions that every user can trust because of the underlying sustainable forward-thinking mindset.” It’s been much discussed of late that Bosch is one of the very first companies globally that operates on a CO2-neutral basis. How does sustainability impact your business? Magnus Ekerot: IoT solutions are actually sustainable and contribute to environmental protection Our IoT solutions are actually sustainable and contribute to environmental protection. For example, our cameras are sustainable in that they remain up-to-date through software updates and needn’t be constantly exchanged for new ones. Our systems demonstrate sustainability also operationally as they can be managed remotely. System integrators don’t need to be physically present, thus avoiding unnecessary travel with its accompanying emissions. All in all, Bosch Building Technologies develops ways to accompany and support our clients in reaching their climate goals via new technologies. This can be done, for example, through improved energy efficiency, the total cost of ownership models, organizing and simplifying the supply chain, and helping our customers meet their social responsibilities. The Power of Bosch helps us here to leverage company-wide research to be two steps ahead, a shade faster, when it comes to new technologies and initiatives that our and future generations will benefit from. I should also say that I am personally very proud to work for a company that set an ambitious climate goal for itself and achieved it! Can you already share a preview of your technology innovations in 2021? Michael Seiter: We see great market potential for our cameras that use artificial intelligence and can be updated flexibly throughout their lifecycles. I have already mentioned the deep learning-based vehicle detector in our cameras. More such solutions – also for other applications where object and person recognition are important – will follow in the course of the year. And the best part is: with AI, the more data we collect and the more intelligently we use it, the better the solutions become and the more added value they bring to the customer. This will revolutionize our industry! Another example is our cloud-based solutions, for example for alarm monitoring. Here, we can now also integrate third-party cameras and, building on this, offer and jointly develop our intelligent software-based solutions. This gives our customers more opportunities to take advantage of the opportunities created by AI. The trend towards integration of the various security technologies seems to be driven mostly by the rapid progress in software development. Does this affect full-range suppliers such as Bosch and what specific plans for fully integrated security solutions do you have for the future? Michael Seiter: Naturally, this suits us as a full-scope supplier. Bosch solutions are deployed in many cross-domain client projects. We have experts for the different domains under one roof and a strong brand with the same quality promise for all areas. Nevertheless, it is always also about specific domain excellence. Only when you master all different areas and have profound and proven expertise in each of them you can succeed in integrated cross-domain projects. The respective business units craft their future strategies and innovation roadmaps with this in mind – as we do in the field of Video Systems & Solutions. Our business unit offers fully integrated Bosch video solutions that can be extended and operated on open systems. This is why we drive open platforms such as Inteox, to offer customers from a wide range of industries the right solutions. Our Bosch Integration Partner Program that we launched in 2012 is also heading in this direction – every product can be integrated into multiple other systems and VMS solutions. In summary: At Bosch, we are both a one-stop-shop, but also an open-system, meaning we offer customers maximum flexibility in their choice of products and services.
Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials are increasingly enabling smart cities to improve the experience and safety of the people who reside there. Rising scope of 5G, AI, IoT and the Cloud The main foundations that underpin smart cities are 5G, Artificial Intelligence (AI), and the Internet of Things (IoT) and the Cloud. Each is equally important, and together, these technologies enable city officials to gather and analyze more detailed insights than ever before. For public safety in particular, having IoT and cloud systems in place will be one of the biggest factors to improving the quality of life for citizens. Smart cities have come a long way in the last few decades, but to truly make a smart city safe, real-time situational awareness and cross-agency collaboration are key areas which must be developed as a priority. Innovative surveillance cameras with integrated IoT Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns. From dangerous drivers to terrorist attacks, petty crime on the streets to high profile bank robberies, innovative surveillance cameras with integrated IoT and cloud technologies can go some way to helping respond quickly to, and in some cases even prevent, the most serious incidents. Many existing safety systems in cities rely on aging and in some places legacy technology, such as video surveillance cameras. Many of these also use on-premises systems rather than utilising the benefits of the cloud. Smart programming to deliver greater insights These issues, though not creating a major problem today, do make it more challenging for governments and councils to update their security. Changing every camera in a city is a huge undertaking, but in turn, doing so would enable all cameras to be connected to the cloud, and provide more detailed information which can be analyzed by smart programming to deliver greater insights. The physical technologies that are currently present in most urban areas lack the intelligent connectivity, interoperability and integration interfaces that smart cities need. Adopting digital technologies isn’t a luxury, but a necessity. Smart surveillance systems It enables teams to gather data from multiple sources throughout the city in real-time, and be alerted to incidents as soon as they occur. Increased connectivity and collaboration ensures that all teams that need to be aware of a situation are informed instantly. For example, a smart surveillance system can identify when a road accident has occurred. It can not only alert the nearest ambulance to attend the scene, but also the local police force to dispatch officers. An advanced system that can implement road diversions could also close roads around the incident immediately and divert traffic to other routes, keeping everyone moving and avoiding a build-up of vehicles. This is just one example: without digital systems, analyzing patterns of vehicle movements to address congestion issues could be compromised, as would the ability to build real-time crime maps and deploy data analytics which make predictive policing and more effective crowd management possible. Cloud-based technologies Cloud-based technologies provide the interoperability, scalability and automation Cloud-based technologies provide the interoperability, scalability and automation that is needed to overcome the limitations of traditional security systems. Using these, smart cities can develop a fully open systems architecture that delivers interoperation with both local and other remote open systems. The intelligence of cloud systems can not only continue to allow for greater insights as technology develops over time, but it can do so with minimal additional infrastructure investment. Smart surveillance in the real world Mexico City has a population of almost 9 million people, but if you include the whole metropolitan area, this number rises sharply to over 21 million in total, making it one of the largest cities on the planet. Seven years ago, the city first introduced its Safe City initiative, and ever since has been developing newer and smarter ways to keep its citizens safe. In particular, its cloud-based security initiative is making a huge impact. Over the past three years, Mexico City has installed 58,000 new video surveillance cameras throughout the city, in public spaces and on transport, all of which are connected to the City’s C5 (Command, Control, Computers, Communications and Citizen Contact) facility. Smart Cities operations The solution enables officers as well as the general public to upload videos via a mobile app to share information quickly, fixed, body-worn and vehicle cameras can also be integrated to provide exceptional insight into the city’s operations. The cloud-based platform can easily be upgraded to include the latest technology innovations such as license plate reading, behavioral analysis software, video analytics and facial recognition software, which will all continue to bring down crime rates and boost response times to incidents. The right cloud approach Making the shift to cloud-based systems enables smart cities to eliminate dependence on fiber-optic connectivity and take advantage of a variety of Internet and wireless connectivity options that can significantly reduce application and communication infrastructure costs. Smart cities need to be effective in years to come, not just in the present day, or else officials have missed one of the key aspects of a truly smart city. System designers must build technology foundations now that can be easily adapted in the future to support new infrastructure as it becomes available. Open system architecture An open system architecture will also be vital for smart cities to enhance their operations For example, this could include opting for a true cloud application that can support cloud-managed local devices and automate their management. An open system architecture will also be vital for smart cities to enhance their operations and deliver additional value-add services to citizens as greater capabilities become possible in the years to come. The advances today in cloud and IoT technologies are rapid, and city officials and authorities have more options now to develop their smart cities than ever before and crucially, to use these innovations to improve public safety. New safety features Though implementing these cloud-based systems now requires investment, as new safety features are designed, there will be lower costs and challenges associated with introducing these because the basic infrastructure will already exist. Whether that’s gunshot detection or enabling the sharing of video infrastructure and data across multiple agencies in real time, smart video surveillance on cloud-based systems can bring a wealth of the new opportunities.
Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in a timely fashion. Safe work environment Businesses have a duty of care to provide a safe working environment for their employees and contractors. It is therefore important to limit exposing drivers to risk, to put in place proper safety and security protocols, and to clearly outline them in company policies. Whether an employee or contractor, these drivers represent the brand they work for. If they do not adhere to company-mandated safety and security rules, because the business did not make them aware or they intentionally did not comply by acting with malice, this can put the drivers, other employees, customers and the company at risk financially, legally and with regard to their reputation. Adherence to safety protocols Operating in haste typically results in forced errors and mistakes within the business" “This need to hire drivers quickly resulted in many businesses lowering their standards and accepting certain risks to meet the increased demand. Operating in haste typically results in forced errors and mistakes within the business, potentially leading to harmful events and a damaged brand reputation,” stated Thomas Kopecky, Chief Strategy Officer and Co-Founder, Ontic Technologies (Ontic), a unified protective intelligence software platform. In the conversation presented below, Kopecky outlines the safety and compliance requirements needed to manage the risks while meeting the demand for drivers. Q: What risks do employers face as they ramp up hiring to meet higher demand for drivers? Thomas Kopecky: There have been instances in which a transportation contractor with multiple violations has simply established the business under a new name but continues to operate dangerously. Hastily hiring such a firm without proper enhanced vetting increases the risk from a safety, as well as a business continuity standpoint. Having to terminate a contract and replace a contractor midway can also have significant financial repercussions. In addition to problems created by executing too quickly, employers are now required both to mitigate their own general liability risks and to manage the perceived risk they may create due to the pandemic. For example, if a delivery driver tests positive for COVID-19, there is the potential they have also exposed customers. Employers must consider contactless delivery or other methods and protocols to mitigate this presumed risk of the pandemic. Q: What are the elements of safety and compliance involved in onboarding new drivers? Thomas Kopecky: When onboarding new drivers, corporations must think about more than clean background checks and adequate infrastructure. Whether employees or contractors, organizations must focus on what other risks the drivers bring with them. As part of this review, an open source scrub should be conducted at the outset to discover the driver’s online activity. Through this exercise, a whole host of questions can be addressed including, for example, whether their morals and values align with those of the company. Are they involved with fringe or radical interest groups? Do their actions conflict with the culture of the organization, and could they have a negative impact? These are all questions that employers should be considering when hiring new drivers or contracting a new company. Q: What tools are available to help companies vet their driver fleets and how can these tools make a difference? Employers should also consider State Business Records for potential red flags Thomas Kopecky: To vet their driver fleets, corporations can use several tools and resources that will strengthen the organization’s overall security. Ideally this is a software platform that brings all this information into one place so vetting, real-time data and concerning activities are not siloed but can be connected in order to assess potential risks and threats. Logically, businesses should consider reviewing Department of Transportation Records, which allow organizations to check whether drivers are licensed and appropriately insured. Employers should also consider State Business Records for potential red flags, such as whether an organization is delinquent or no longer functioning in a given state. Finally, it’s beneficial to review civil records as these can highlight any active or past cases associated with an organization. This includes fraud, bankruptcy, poor business practises, and more. Q: What should be the standard methodology to investigate and collect data on new driver programs? Thomas Kopecky: Corporate culture and company policies impact the level of vetting required (determined by company policy), which varies from business to business. Quite often, most valuable investigative content is associated with an actual fleet company owner and not a recently created business entity so it behooves corporations to research this information first. Then verify the information provided is correct, and whether any other conflicting information exists. As previously noted, employers should review civil and criminal records at the state level and cases at the federal level, as it is often the fleet company or owner involved in litigation that could reflect negatively on a brand. Media coverage and consumer complaints are another critical source for negative mentions that may not always appear in public records. You should also ask if the Department of Transportation (DOT) regulates this contract or driver; and if they were once a provider and are now re-applying, is it under a new name? If the answer is yes to either question, it will be necessary to check DOT records for adequate licensing or insurance coverage to ensure providers applying under a new name aren’t trying to circumvent the vetting process. Q: What are the privacy concerns, and how can potential employers ensure they do not violate issues of privacy as they vet drivers (and/or other employees)? Businesses must conduct their operations in a fair, lawful, and transparent manner Thomas Kopecky: Businesses must conduct their operations in a fair, lawful, and transparent manner. Employers often dictate their own guidelines and requirements from company to company. Companies must ensure they follow the law and handle data used for vetting driver fleets in a manner compliant with General Data Protection Regulation (GDPR), Health Information Portability and Accountability Act (HIPAA), and the Fair Credit Reporting Act (FCRA). When utilizing software platforms, those that aggregate public record data in real-time and efficiently to provide actionable insights will be key for protecting corporate driver fleets and businesses overall. Q: How is addressing these issues different in the case of a contracted service versus a company employee? Thomas Kopecky: Addressing these issues will vary from company to company, but it will be important for clients' legal counsel to help interpret the law in the respective state they operate in and make this final determination. This will help shape policy and the employer’s compliance requirements in the area of operation. In some jurisdictions, contractors are vetted and treated like employees who are protected by FCRA. In contrast, there are more broad interpretations of what level of vetting and continuous monitoring can take place on contractors versus employees in other jurisdictions. Q: What is at risk if companies fail to address these issues? Thomas Kopecky: If companies fail to address security issues with managing their driver fleets, they risk major liability, business continuity and brand reputation. Every employee and contractor is in essence an ambassador of the brand, and in many instances, they are the only customer-facing representative for the enterprise. Imagine you are a contractor driving for a major delivery service. If you were to get into an accident and tragically kill someone driving their branded truck, the repercussions of that accident would harm the brand as opposed to the small contracting company by which you are employed. This can have a disastrous impact on the enterprise, both from a reputation and financial standpoint. When proactive steps are not taken to evaluate fleet companies or their owners, this can be viewed as negligence. Consider another example: A brand hires a driver company that has committed fraud while operating under another company’s name. What is the brand’s cost to conduct an initial onboarding assessment of this company versus the cost of investigating an issue, terminating the contract, and dealing with any potential litigation that might follow? The latter is clearly the financial burden. Corporations must proactively address risk associated with their driver fleets to mitigate risk before it occurs. Q: What is the biggest misconception (in the industry and/or the public at large) about employee vetting requirements? Enhanced vetting today often includes looking into a contractor’s background or its company Thomas Kopecky: We have passed the days where everything is all about criminal background checks and instant alerts when a driver receives a DUI. We are entering a world where business continuity and resiliency are necessary. Companies are so reliant on contracted services or seasonal employee pools that if that roster of operators were found to be unsuitable, the business itself would not meet the demands of its customers. Before the digital age, people only understood the driver vetting process to be based around a search of felony convictions. Enhanced vetting today often includes looking into a contractor’s background or its company from a different vantage point. Employers must begin to think about litigation history, negative media coverage and vocal social platforms, history of poor business practices or fraud, and more. These are factors that need to be considered for a business to mitigate risk and maintain continuity of service in an era where timeliness and instant gratification are highly valued.
John Wiegand died in 1986, but the communications protocol that bears his name is still alive and well, connecting access control readers to controllers using two wires – one to transmit “zeros” and the other to transmit “ones.” The Wiegand protocol persists despite its limitations, including one-way communication, lack of encryption, and inability to manage the readers in a system centrally. In a Wiegand system, a controller provides no acknowledgement that data has been received. Systems that still use the Wiegand protocol are performing below accepted industry standards and are vulnerable to over-the-counter exploits. A session at ISC West’s Virtual Event highlighted a replacement technology that solves those problems and expands the security, flexibility and functionality of systems. The technology is called OSDP (Open Supervised Device Protocol), which is now a standard managed by the Security Industry Association (SIA) and designated as an international standard by the International Electrotechnical Commission (IEC 60839-11-5). Aligning three components OSDP requires alignment of three critical components – the access control system, readers and controllers. The access control system, readers and controllers OSDP is an RS-485 protocol used to pass card format data from the reader to the controller. Like the Wiegand protocol, it uses two wires, but in this case one wire transmits data and the other receives data. Installation is simplified because no system needs more than four wires – two for OSDP communication and two more for power. In contrast, using Wiegand, additional wires are needed to add other capabilities – up to 8 or more wires in all. OSDP cable runs can extend up to 4,000 ft (compared to 500 feet for Wiegand). Resolving problems Therefore, unlike Wiegand, OSDP sends information in both directions and provides “supervision” of the readers. If there is a problem with a reader, such as a reader communication error or disconnect, that notification is sent back to the access control management system. OSDP also supports encryption for greater security, in effect enabling end-to-end encryption for a host system, controller, I/O modules, readers and credentials. That notification is sent back to the access control management system OSDP also provides additional capabilities, such as control of a reader’s LED and buzzer as well as sending text notifications and messages to compatible displays. Integrators and/or end users can also push configuration and firmware updates to readers all at once. Because OSDP is “open,” there are more third-party integrations and standardizations. OSDP is particularly valuable for U.S. government applications because it meets federal access control requirements such as PKI for FICAM. Wiring requirements Best practice dictates rewiring a project using RS-485 cabling. Specific wiring requirements are needed for OSDP, including 24 gauge (AWG) stranded cables that are a shielded twisted pair with 120 Ohm impedance and overall lower capacitance. However, especially for shorter cable runs, existing wire from Wiegand installations can sometimes suffice, say if it is a cable run of less than 100 ft. Installers should prove their competency before being deployed to an outside installation “Installation of OSDP is not hard, just different than field technicians are used to deploying,” said Tony Diodato of Cypress Integration Solutions, one of the ISC West presenters. Therefore, training of technicians is paramount, and installers should prove their competency before being deployed to an outside installation in order to avoid problems. Integrators or installing teams should have a “lab” setup to thoroughly familiarise themselves with installation to ensure successful deployments. Various in-line devices are available to help transition existing Wiegand applications to OSDP, even if one component or other does not support OSDP. For example, data converters enable installation of an OSDP reader with a legacy Wiegand control panel. Replacing existing devices in legacy Wiegand systems with OSDP devices and using data converters can provide some benefits of OSDP without requiring a full “rip-and-replace” installation.
Historically, concerns about inclusion and diversity have not been widely discussed in the security market. In the last couple of years, however, the Security Industry Association (SIA) and other groups have worked to raise awareness around issues of diversity and inclusion. Specifically, SIA’s Women in Security Forum has focused on the growing role of women in all aspects of security, and SIA’s RISE community has focused on “rising stars” in an industry previously dominated by Baby Boomers. The next generation of security leaders There is a business case to be made for diversity and inclusion, says a report by McKinsey & Company. According to the management consulting company, gender-diverse companies are 24% more likely to outperform less diverse companies, and ethnically diverse companies are 33% more likely to outperform their less diverse counterparts. Furthermore, the “next generation of security leaders” – employees under 30 – are particularly focused on diversity and inclusion. Diversity refers to the traits and characteristics that make people unique A panel discussion at ISC West’s Virtual Event highlighted aspects of inclusion and diversity, starting with a definition of each. Diversity refers to the traits and characteristics that make people unique. On the other hand, inclusion refers to the behavior and social norms that ensure people feel welcome. “We are all on a journey, and our journey takes different paths,” said Willem Ryan of AlertEnterprise, one of the SIA panelists. “There are opportunities to improve over time. We can all change and increase our ability to have a positive impact.” Industry responsibility The industry has a responsibility to the next generation of industry leaders to address issues of inclusion and diversity. Forbes magazine says that millennials are more engaged at work when they believe their company fosters an inclusive culture. So the question becomes: How do we unify and create opportunities to work with and champion tomorrow’s leaders? SIA is driving change in our industry to achieve that goal. More women are active in SIA than ever before. The SIA Women in Security Forum now has 520 members, said Maureen Carlo of BCD International, the SIA Women in Security Forum Chair and another panelist. Also, more women than ever are chairing SIA committees and serving on the SIA Board of Directors. More women than ever are chairing SIA committees Overcoming unconscious bias Former SIA Chairman Scott Shafer of SMS Advisors, another of the panelists, noted that SIA awarded the Chairman’s Award to the Women in Security Forum in 2019, and to the RISE community steering committee in 2020. “There are lots of ways we are seeing the elevation of women and ethnic groups in the security industry,” said Shafer. One topic of interest is the problem of “unconscious bias,” which can be overcome by looking at something through some else’s lens. Ryan suggested use of the acronym SELF – Slow Down, Empathize, Learn, and Find commonalities. Ryan recalled the value of being mentored and having someone shepherd him around the industry. “Now I want to give back,” he said. “We need to look at the things we can change in ourselves, in our company, in our communities, and in our industry. Change comes from the bottom and the top.” Increasing representation “It takes all of us to increase representation everywhere,” said Kasia Hanson of Intel Corp., another panelist. “We have in common that we are all human beings. Let’s make sure the next generation all have opportunities.” Diverse companies can attract better talent Moving forward, the panelists urged the industry to get involved and create opportunities because inclusion drives diversity. Diverse companies can attract better talent and attain a competitive advantage. Awareness of unconscious bias, and working to eliminate it, is an important element of change. Despite the progress the security industry is making, change continues to be incremental. As Ruth Bader Ginsburg has said, “Real change, enduring change, happens one step at a time.”
Meeting a challenge is what business is all about. Challenges are beneficial to any company, providing a valuable learning opportunity and a means to demonstrate expertise, skill, and an approach to solving a problem in a unique or innovative way. Working in partnership with Oslo Airport to install the RTT110 EDS system presented Rapiscan Systems with not just one, but two unique challenges. Challenges faced by Rapiscan The first was creating a proprietary water cooling system that worked in tandem with the airport’s green initiatives, and the second a ‘Level 4’ review option running in parallel to the traditional baggage screening process. Both would be challenges enough for a well-established technology, but the Oslo Airport project came at a formative time in the RTT’s history. A key step for RTT110 “We had a machine that was very much in its infancy, that still had its fair share of teething problems,” explains Craig Chitty, Head of International Aviation Programmes. “It was a big undertaking at a very early stage of our experience installing the RTT out in the field.” Steve Revell, Senior Director of Aviation CT at Rapiscan explains that the Oslo Airport project was a key step for the RTT. “The first major airport in Western Europe to take on the RTT was Oslo Airport. It’s a very prestigious and forward-thinking airport, and the operators were not afraid to take pioneering risks.” Eco-friendly system Rapiscan's water-cooling solution would allow the RTT to integrate with Oslo’s eco-friendly concept The standard throughout the industry is for EDS and baggage scanning systems to employ Air Conditioning to cool machinery and manage the thermal load. However, as a result of Oslo Airport’s commitment to environmentally responsible construction (the first Oslo Airport terminal was considered the greenest in the world at the time construction finished in 2017), Rapiscan was tasked with designing an entirely unique water-cooling solution that would allow the RTT to integrate with Oslo’s eco-friendly concept of operations – to think outside the ‘cooling box’. “The curveball was that ordinarily, you would use air conditioning, but Oslo wanted to use chilled water to help reduce carbon emissions,” Steve Revell explains. Integrating water cooling system This was a challenge that sent the Rapiscan design team back to the drawing board, as Craig Chitty recalls. “We had to work with our supplier to come up with a solution that met the airport’s requirement to use reclaimed snow, which is melted down and pumped around the airport. We had to design a method of integrating this water cooling concept into our system, meeting some very stringent criteria that the airport set.” “It was incredibly challenging because the original design of these water-cooled AC’s needed a specific pressure and temperature, which the airport couldn’t provide us with as their supply fluctuated too much. We had to go back to the drawing board, to redesign our system to make it more robust.” World’s first RTT system Rapiscan's flexible RTT technology became the world's first such technology This innovation put Rapiscan at the forefront of flexible RTT technology, resulting in a world-first; “To this day we are the only company who can provide the RTT as an externally water-cooled system, or an internally cooled air-conditioned system,” Steve Revell summarises. This example of NRE, or ‘Non-Recurring Engineering’, was not the only instance of Rapiscan’s commitment to working alongside partners to develop bespoke solutions to the challenges of each application. Oslo not only necessitated an original approach in terms of product design but also process implementation – recurrent Level 4 image analysis. Security screening for baggage As baggage travels through an airport, it is subjected to multiple levels of security screening and imaging, both by human operators and computer algorithms. Baggage that is deemed to contain a potential security threat is escalated to higher levels of scrutiny by multiple operators, balancing the consistent throughput of baggage and passengers against ensuring constant levels of safety. Oslo required an extra level added to the normal ‘flow’ of screening. “If a bag is rejected by a Level 3 operator it goes into a Level 4 area within the BHS (Baggage Handling System) of the airport”, explains Craig Chitty. “It shows up on a screen. It is a concept of operations that we don’t employ in any other airport even now; it is still very unique to Oslo.” Concept of operations Rapiscan’s Director of Business Development for EDS, Martin Zborovjan, explains further, “We had to do some development to allow that concept of operations to happen. They decided they wanted to re-screen baggage for a second time using the same machine.” “Usually this would rely on a machine decision, but in this case but the operator sees the second image automatically, right next to the image from the first screening, and the machine does not make a decision. It’s a very unusual concept.” Benefits of Level 4 function The Level 4 function enabled processing bags more quickly and more correctly Steve Revell is quick to identify the benefits the Level 4 function provides both the airport and the passengers, “We were the first to establish a Level 4 system in Oslo. If technology is able to produce a machine decision very quickly, and if that’s a reject decision to get that image off to an operator very quickly, the only two things it can do are to process bags more quickly and more correctly.” “By default, more bags are getting onto the right airplane, people are standing in queues for less time and the airside customer experience is much improved.” Going an extra mile While many companies will consider a project as ‘job done' when equipment is installed and running, for the Rapiscan team the Oslo project was a committed partnership from the initial tender phase, through the design process, and on into the future. “Oslo was effectively our first competitive tender,” Martin Zborovjan explains. “We were willing to listen to Oslo and to go the extra mile. This behavior was the underlying theme of the interaction with Oslo”. The project was more than just a sales opportunity; “Complex projects allow us to learn something.” Forming a partnership The working partnership between Rapiscan and Oslo is something Steve Revell is very proud of. “It [was] and is a very long-established partnership; from the start of engaging with us at contract award, through to going operationally live was just under three years,” he explains. “There was lots of testing, analysis, and development, lots of joint agreements with the government. We agreed on the final solution which we very much wanted to do as a partnership.” Delivering a successful project “There were also problems, which gave us an opportunity to showcase our most important tool which is how we behave when things are going wrong. We never shied away from our responsibilities, we took every problem presented to us and worked together to find the solution.” “A strong working partnership developed; we were always on the end of a phone with the Oslo team, or on a plane for face-to-face meetings. This partnership continues today and is the backbone to delivering this complex but successful project,” Revell summarises. Adopting new technology The aviation industry thrives on partnerships, on service providers working to meet challenging requirements through innovation and cooperation. Taking a technology that was, at the time, still in its infancy and working to adapt this technology to a stringent set of requirements is a clear example of Rapiscan’s dedication to working with its partners – a commitment the company makes to every project, both now and into the future.
Suprema, a global company in biometrics and access control solutions, announced that it supplied BioSign 4.0, its under-display fingerprint recognition algorithm to the Samsung Galaxy S21 smartphones with support from Qualcomm Technologies, Inc. BioSign, Suprema’s smartphone fingerprint recognition technology, has gained global recognition since its installation on Samsung Galaxy J5 models in 2017. Since then, Suprema has been supplying BioSign solutions to other Samsung smartphone models including Samsung Galaxy S10, Galaxy Note10, Galaxy 20, and Galaxy Note 20 series. Fingerprint recognition speed BioSign 4.0, installed in the Galaxy S21, has been receiving great reviews for its fingerprint recognition speed. BioSign 4.0 delivered enhanced speed and accuracy compared to its predecessor, BioSign 3.0, significantly upgrading user convenience with 50 percent faster and more than twice as accurate recognition performance. BioSign 4.0 employs deep-learning mechanisms to optimize fingerprint analysis to efficiently recognize rich fingerprint information obtained from the larger sensing area of the second-generation Qualcomm® 3D Sonic Sensor Gen 2 installed in the Galaxy S21 series. Qualcomm 3D Sonic Sensor Gen 2 Qualcomm Technologies unveiled the high-performance ultrasonic sensor, the Qualcomm 3D Sonic Sensor Gen 2 that was supplied to Samsung Galaxy S21 series, in January at CES 2021. With a 77%-larger fingerprint sensing area than the previous generation, the Qualcomm 3D Sonic Sensor Gen 2, was able to significantly improve fingerprint recognition performance. The ultrasonic sensor has ultra-thin form factors and is optically isolated from the display panel allowing for sleek smartphone designs. Performance and user convenience “Suprema's fingerprint recognition technology has been continuously selected for the Samsung Galaxy S series, proving to the world the technological superiority of our solution,” said Brian Song, the president of Suprema Inc. “With the excellent reviews BioSign 4.0 has been receiving for its overpowering performance and user convenience, we expect to be able to grow sales and market share. Suprema will continue to advance our fingerprint and face recognition technologies using AI and deep learning, leading the biometrics market into the future,” Song remarked.
Midway Car Rental, the privately-owned car rental company in Southern California, caters to both an exclusive and expansive clientele, including VIPs, high-end hotels, and replacement vendors like dealerships and body shops. The company currently owns and operates 15 locations and has aggressive plans for expansion, with 6 or 7 more sites planned for this calendar year. Challenges faced With a portfolio that includes Ferraris, Lamborghinis, and Jaguars, Midway can have up to a million dollars of assets parked on any of its lots. Some of the company’s newest locations lack secure perimeter fencing. Sean Perez, Midway’s General Manager, says, “We needed to protect our vehicles, but even more importantly, we had to ensure the safety of our employees and clients.” The problem became acute when Midway opened a new location to provide loaner and replacement vehicles for an adjacent dealership partner. Prior to Midway’s arrival, the lot had been populated by vagrants and the homeless who would sleep in and around the cars parked there. “When we took over the property, we needed to provide a safe and secure environment where we could conduct business,” Perez explains. “There were issues with vandalism and graffiti. Some of the displaced homeless would get aggressive. We needed a proactive solution – a way to stop these incidents from happening rather than trying to prosecute the individuals after the damage was done.” Expansion opportunities Traditionally, Midway’s properties have been less exposed, with electronically secure gates or fences that restrict access. However, as Midway’s expansion plans include growing alignment with business partners like dealerships, many future sites will likely face similar security challenges. To address this situation, the company sought: A scalable system that could grow incrementally with Midway’s expansion Flexible technology that could be moved to new sites with minimal effort A technology partner capable of servicing and supporting a long-term solution The ability to outsource monitoring services in the near future “I tend to be conservative,” says Perez. “I wanted to start off slow and then, when comfortable that we’d found both the right partner and technology, have the ability to really scale up.” Solution recommended Midway Car Rental deployed ROSA units, Responsive Observation Security Agents, manufactured by Robotic Assistance Devices (RAD). “I have to tell you, I was a bit skeptical at first about these ROSA units,” says Perez. “You can stick an armed guard out there, but the idea that a technology device could provide both consistent monitoring and serve as a deterrent system seemed like a stretch. However, our two ROSAs are really helping us protect our assets. In very short order, our problem decreased and our situation has improved dramatically.” AI-based ROSA solution ROSA is a compact, self-contained, security and communication solution that can be deployed in about 15 minutes ROSA is a compact, self-contained, security and communication solution that can be deployed in about 15 minutes. Its AI-driven security systems include human and vehicle detection, license plate recognition, responsive digital signage and audio messaging, and complete integration with RAD’s software suite notification and response library. Two-way communication is optimized for cellular, including live video from ROSA’s dual high-resolution, full-color, always-on cameras. “The folks from RAD sent out an engineer to help us determine where to mount the ROSA units by identifying areas on our site that are most exposed to potential vandalism or other threats,” says Perez. The devices are highly visible, featuring scrolling LED text, colorful neon ribbons, and two video cameras. Automated detection and response ROSA may be programmed to display welcome messages or marketing messages during business hours, along with a reminder to visitors that the property is under surveillance. When it detects the motion of humans or vehicles on the lot, it sends an alert to Perez and his team along with an associated video clip, keeping them well informed of activity happening in real-time. During off-hours, ROSA's automated response kicks in. Its friendly daytime messaging is replaced with a more stern warning to trespassers. Upon detecting a human or moving vehicle, ROSA responds with flashing red lights and a visual warning to vacate the property immediately. If ROSA continues to detect a presence, more lights, sirens, and a pre-recorded audio message add a sense of urgency. Monitoring personnel, who have been alerted of the event and have access to live video, can also issue pointed commands over ROSA's loudspeaker. Ultimately, if the police must be summoned, the encounter has been thoroughly documented and recorded. Effective security Perez describes ROSA's effectiveness as a deterrent. "I've watched when people encounter the system. Initially, their reaction is one of shock and awe. When the unit goes off with its lights flashing and they hear those verbal commands, they’re terrified. They look like they've seen a ghost. Literally, in less than ten days after we put those things out, the word had spread to stay away. The vagrants were gone. It was like night and day." Independent monitoring Currently, Midway's management has chosen to monitor the system themselves. Perez explains, "Initially, I was getting alerts somewhat often, but they quickly tapered off. At this point, they're infrequent. With just these two units in place, plus two more scheduled to go up in Newport Beach in the coming weeks, we can handle the monitoring independently.” “Within the next year or two, as we open new locations and add more units, we'll take advantage of RAD's monitoring services. We had that in mind when we went this route – that with our continued growth, we would eventually leverage that option." Customer-friendly solution The system is very intuitive and customer-friendly "The system is very intuitive and customer-friendly," adds Perez. "I've used other systems that are really cumbersome. The RAD SOC dashboard is nothing like that. The ease-of-use is amazing." So is the deployment process. As ROSA requires nothing more than the power to operate, it is truly plugged and play. "We had them installed and received training all within a few hours on one day," says Perez. "We haven't run into any issues, but if we do, the relationship we've built with the RAD team is so good that I can call on them at any time for assistance. They are very, very customer-centric." Evaluating ROI Midway Car Rental quantifies the value ROSA delivers in several ways, including monetarily, a reduction in crime, and improved peace of mind. Perez elaborates, "Thanks to the ROSA units, we've addressed all sorts of issues. Damage to vehicles, graffiti on the exterior of the building, the homeless tampering with our electrical outlets to charge their phones, trash left around the property – that’s all gone since we put the ROSAs in. There are also important intangibles that you really can't put a price tag on, like an improvement in employee well-being and productivity because our staff now feels safe at work." Easy installation RAD's cloud-based software simplifies the management of multi-site systems The system's scalability and flexibility ensure that Midway's investment will continue to pay dividends. Perez says, "We're growing so fast, we're trying to put flagpoles in the markets where we identify a need, but that doesn't mean we're locking ourselves into long-term leases." "Down the road, if we decide to move locations, our ROSAs move with us. We heavily factored their ability to easily install, uninstall, and re-install when deciding to go with this technology." Consistent with Midway's plans, RAD's cloud-based software simplifies the management of multi-site systems. As new Midway locations open and ROSA units are installed, management and monitoring of all devices can occur through one login to the centralized RAD SOC dashboard. Alert notifications include the location of the activated unit. RAD’s additional services In addition to ROSA, RAD offers a suite of other products that share the same platform for delivering automated remote services, including some that are more appropriate for indoor use. Should Midway encounter new security challenges in the future, they can expand their system with other RAD devices. "For now, ROSA is what fits our needs best, but I've seen some of those other units, and they look pretty cool," says Perez. ROSA subscription Midway uses the ROSA units through RAD's subscription model. The company pays low monthly tuition that covers unlimited use of the devices, software and software updates, maintenance, and technical support. Their out-of-pocket equals a small fraction of what hiring a security guard would cost. When asked whether Perez recommends the system to others, his answer is concise. "It's a no-brainer!" he laughs. "Knock-on-wood, we've been near without incident for the four months since the ROSAs went up. I attribute that to the units' effectiveness."
ComplyAdvantage, a global data technology company transforming financial crime detection announced that Gemini, a crypto exchange and custodian selected ComplyAdvantage’s hyperscale platform for anti-money laundering risk management. Compliance teams around the world need access to intelligent technologies that can uncover risk in real-time and decrease operational costs so their companies can transact with trust and grow with confidence. With the accelerated adoption of cryptocurrency and digital assets, Gemini wanted a solution that could continue to scale with its rapid growth. Customizable solution “We selected ComplyAdvantage because of the company’s agile approach to financial crime risk management,” said Elena Hughes, Chief Compliance Officer at Gemini. “ComplyAdvantage’s hyper-scalable model, customizable screening solution, and collaborative approach to Gemini’s model were critical to meeting our compliance needs.” Risk monitoring and real-time analysis Leveraging its proprietary data asset and advanced machine learning, ComplyAdvantage helps to detect sanctions and adverse events while uncovering hidden risks during customer onboarding and throughout the client lifecycle, automating AML risk monitoring to help companies like Gemini maintain the highest level of compliance oversight and integrity. "Gemini is a great example of a market leader implementing the best in compliance practices to support the company’s customer on-boarding,” said Charles Delingpole, founder and CEO ComplyAdvantage. “Now, Gemini can scale with our real-time, high-quality sanctions, PEPs, and adverse media solutions, allowing them to make more informed decisions on their customers relative to their risk-based approach.” Prevents financial crimes Already the preferred choice of some of the world’s largest banks, enterprises, and high-growth fintech, ComplyAdvantage uses machine learning to help regulated organizations manage their risk obligations and prevent financial crime. The company’s proprietary database is derived from millions of data points that provide dynamic, real-time insights across sanctions, watchlists, politically exposed persons, and negative news. This reduces dependence on manual review processes and legacy databases by up to 80% and improves how companies screen and monitor clients and transactions.
Midway Car Rental, the privately-owned car rental company in Southern California, caters to both an exclusive and expansive clientele, including VIPs, high-end hotels, and replacement vendors like dealerships and body shops. The company currently owns and operates 15 locations and has aggressive plans for expansion, with 6 or 7 more sites planned for this calendar year. The challenge With a portfolio that includes Ferraris, Lamborghinis, and Jaguars, Midway can have up to a million dollars of assets parked on any of its lots. Some of the company’s newest locations lack secure perimeter fencing. Sean Perez, Midway’s General Manager, says, “We needed to protect our vehicles, but even more importantly, we had to ensure the safety of our employees and clients.” The problem became acute when Midway opened a new location to provide loaner and replacement vehicles for an adjacent dealership partner. Prior to Midway’s arrival, the lot had been populated by vagrants and the homeless who would sleep in and around the cars parked there. “When we took over the property, we needed to provide a safe and secure environment where we could conduct business,” Perez explains. “There were issues with vandalism and graffiti. Some of the displaced homeless would get aggressive. We needed a proactive solution – a way to stop these incidents from happening rather than trying to prosecute the individuals after the damage was done.” Traditionally, Midway’s properties have been less exposed, with electronically secure gates or fences that restrict access. However, as Midway’s expansion plans include growing alignment with business partners like dealerships, many future sites will likely face similar security challenges. To address this situation, the company sought: A scalable system that could grow incrementally with Midway’s expansion Flexible technology that could be moved to new sites with minimal effort A technology partner capable of servicing and supporting a long-term solution The ability to outsource monitoring services in the near future The solution “I tend to be conservative,” says Perez. “I wanted to start off slow and then, when comfortable that we’d found both the right partner and technology, have the ability to really scale up.” Midway Car Rental deployed ROSA units, ¬Responsive Observation Security Agents, manufactured by Robotic Assistance Devices (RAD). “I have to tell you, I was a bit skeptical at first about these ROSA units,” says Perez. “You can stick an armed guard out there, but the idea that a technology device could provide both consistent monitoring and serve as a deterrent system seemed like a stretch. However, our two ROSAs are really helping us protect our assets. In very short order, our problem decreased and our situation has improved dramatically.” About ROSA ROSA is a compact, self-contained, security and communication solution that can be deployed in about 15 minutes ROSA is a compact, self-contained, security and communication solution that can be deployed in about 15 minutes. Its AI-driven security systems include human and vehicle detection, license plate recognition, responsive digital signage and audio messaging, and complete integration with RAD’s software suite notification and response library. Two-way communication is optimized for cellular, including live video from ROSA’s dual high-resolution, full-color, always-on cameras. “The folks from RAD sent out an engineer to help us determine where to mount the ROSA units by identifying areas on our site that are most exposed to potential vandalism or other threats,” says Perez. The devices are highly visible, featuring scrolling LED text, colorful neon ribbons, and two video cameras. ROSA may be programmed to display welcome messages or marketing messages during business hours, along with a reminder to visitors that the property is under surveillance. When it detects the motion of humans or vehicles on the lot, it sends an alert to Perez and his team along with an associated video clip, keeping them well informed of activity happening in real-time. Functions During off-hours, ROSA's automated response kicks in. Its friendly daytime messaging is replaced with a more stern warning to trespassers. Upon detecting a human or moving vehicle, ROSA responds with flashing red lights and a visual warning to vacate the property immediately. If ROSA continues to detect a presence, more lights, sirens, and a pre-recorded audio message add a sense of urgency. Monitoring personnel, who have been alerted of the event and have access to live video, can also issue pointed commands over ROSA's loudspeaker. Ultimately, if the police must be summoned, the encounter has been thoroughly documented and recorded. Perez describes ROSA's effectiveness as a deterrent. "I've watched when people encounter the system. Initially, their reaction is one of shock and awe. When the unit goes off with its lights flashing and they hear those verbal commands, they’re terrified. They look like they've seen a ghost. Literally, in less than ten days after we put those things out, the word had spread to stay away. The vagrants were gone. It was like night and day." Intuitive and customer-friendly Currently, Midway's management has chosen to monitor the system themselves. Perez explains, "Initially, I was getting alerts somewhat often, but they quickly tapered off. At this point, they're infrequent. With just these two units in place, plus two more scheduled to go up in Newport Beach in the coming weeks, we can handle the monitoring independently. Within the next year or two, as we open new locations and add more units, we'll take advantage of RAD's monitoring services. We had that in mind when we went this route – that with our continued growth, we would eventually leverage that option." "The system is very intuitive and customer-friendly," adds Perez. "I've used other systems that are really cumbersome. The RAD SOC dashboard is nothing like that. The ease-of-use is amazing." So is the deployment process. As ROSA requires nothing more than power to operate, it is truly plug and play. "We had them installed and received training all within a few hours on one day," says Perez. "We haven't run into any issues, but if we do, the relationship we've built with the RAD team is so good that I can call on them at any time for assistance. They are very, very customer-centric." Evaluating ROI Midway Car Rental quantifies the value ROSA delivers in several ways, including monetarily, a reduction in crime, and improved peace of mind. Perez elaborates, "Thanks to the ROSA units, we've addressed all sorts of issues. Damage to vehicles, graffiti on the exterior of the building, the homeless tampering with our electrical outlets to charge their phones, trash left around the property – that’s all gone since we put the ROSAs in. There are also important intangibles that you really can't put a price tag on, like an improvement in employee well-being and productivity because our staff now feels safe at work." RAD's cloud-based software simplifies the management of multi-site systems The system's scalability and flexibility ensure that Midway's investment will continue to pay dividends. Perez says, "We're growing so fast, we're trying to put flagpoles in the markets where we identify a need, but that doesn't mean we're locking ourselves into long-term leases. Down the road, if we decide to move locations, our ROSAs move with us. We heavily factored their ability to easily install, uninstall, and re-install when deciding to go with this technology." Consistent with Midway's plans, RAD's cloud-based software simplifies the management of multi-site systems. As new Midway locations open and ROSA units are installed, management and monitoring of all devices can occur through one login to the centralized RAD SOC dashboard. Alert notifications include the location of the activated unit. RAD’s suite of products In addition to ROSA, RAD offers a suite of other products that share the same platform for delivering automated remote services, including some that are more appropriate for indoor use. Should Midway encounter new security challenges in the future, they can expand their system with other RAD devices. "For now, ROSA is what fits our needs best, but I've seen some of those other units, and they look pretty cool," says Perez." Midway uses the ROSA units through RAD's subscription model. The company pays a low monthly fee that covers unlimited use of the devices, software and software updates, maintenance, and technical support. Their out-of-pocket equals a small fraction of what hiring a security guard would cost. When asked whether Perez recommends the system to others, his answer is concise. "It's a no-brainer!" he laughs. "Knock-on-wood, we've been nearly without incident for the four months since the ROSAs went up. I attribute that to the units' effectiveness."
Check Point Research (CPR) discovered new malware on Google’s Play Store that spreads via WhatsApp messages. The malware is designed to automatically respond to incoming WhatsApp messages on the victim’s device, using content that the malware downloads from a remote server. Hidden in fake Netflix app CPR found the malware hidden in a fake Netflix application on the Play Store called FlixOnline, which promised unlimited entertainment from anywhere in the world. If successful, the malware enables its threat actors to perform a range of malicious activities, such as spreading additional malware via malicious links, stealing credentials and data from users' WhatsApp accounts, and spreading fake or malicious messages to users. WhatsApp contacts and groups, for example, work-related groups. Malware spreading through link The malware was designed to be wormable, meaning it can spread from one Android device to another after a user clicks on the malicious link in the message and downloads the malware. It works like this: Victim installs the fake FlixOnline app from Google’s Play Store which contains the malware The malware changes permissions on the user’s device to enable automatic responses to new notifications on WhatsApp The malware responds to every WhatsApp message the victim receives with an automatic reply crafted by the threat actors In this campaign, the response was a fake Netflix site that phished for users credentials and credit card information Automated response The malware sent the following automatic response to its victims incoming WhatsApp messages, attempting to lure others with the offer of a free Netflix service: 2 Months of Netflix Premium Free at no cost For REASON OF QUARANTINE (CORONA VIRUS)* Get 2 Months of Netflix Premium Free anywhere in the world for 60 days. Fake service within the application CPR found the malware hidden within an application on Google Play called FlixOnline CPR found the malware hidden within an application on Google Play called FlixOnline. The app turned out to be a fake service that claimed to allow users to view Netflix content from around the world on their mobiles. However, instead of allowing the mobile user to view Netflix content, the application is actually designed to monitor a user’s WhatsApp notifications, sending automatic replies to a user’s incoming messages using content that it receives from a remote server. Innovative hijack technique Aviran Hazum, Manager of Mobile Intelligence at Check Point Software said, “The malware’s technique is new and innovative, aiming to hijack users. Whatsapp account by capturing notifications, along with the ability to take predefined actions, like dismiss or reply via the Notification Manager.” “The fact that the malware was able to be disguised so easily and ultimately bypass Play Store’s protections raises some serious red flags. Although we stopped one campaign using this malware, the malware may return hidden in a different app.” Mobile security solution Users should be wary of download links or attachments that they receive via WhatsApp or other messaging apps The Play Store’s protections can only go so far, so mobile users need a mobile security solution. Luckily, we detected the malware early, and we quickly disclosed it to Google who also acted quickly. Users should be wary of download links or attachments that they receive via WhatsApp or other messaging apps, even when they appear to come from trusted contacts or messaging groups. If you think you’re a victim, we recommend immediately removing the application from devices and changing all passwords. App taken down by Google CPR responsibly disclosed its findings to Google. The malicious application was subsequently taken down by Google. Over the course of two months, the FlixOnline app was downloaded approximately 500 times. CPR has shared its research findings with WhatsApp, though there is no vulnerability on WhatsApp’s end. Security Tips for Android Users Install a security solution on your device Download applications only from official markets Keep your device and apps up to date
Round table discussion
We are several weeks into 2021, and it is already shaping up to be an eventful year. The happenings and trends from 2020 will likely carry over into the new year, but in a fast-moving industry such as ours, there will also be additional trends to watch. Looking toward the year ahead, we asked this week’s Expert Panel Roundtable: What will be the biggest security trends in 2021?
For several decades, Baby Boomers represented the largest sector of employees in the physical security market. However, these security professionals born between 1946 and 1964 are now nearing retirement – or have already retired. How will the security market change as the next generations step up to make their contributions? We asked this week’s Expert Panel Roundtable: As Baby Boomers approach retirement age, what are the positives and negatives in the physical security market?
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
Commercial security: Manufacturers & Suppliers
Best Practices Guide: Analog Video To CloudDownload
Delivering a Smart, Secure and Healthy Workplace with CloudDownload
Are Your Technology Providers Keeping You In The Dark?Download
Capture New Opportunities With Computer Vision And Video AnalyticsDownload