Globally renowned biometrics company, Fingerprint Cards AB (Fingerprints) has launched a new solution for the PC market. Following several successful integrations in Chromebooks, biometric authentication is in increased demand as a more convenient and secure authentication method for both consumer and enterprise PCs. Growing application of biometrics Fingerprints’ new solution is tailored for use across a growing number of different form factors and use cases, including notebooks, 2-in-1...
Quantum Corporation has announced new software with advanced features and capabilities for DXi backup appliances to significantly improve backup and restore system performance, as well as monitor systems remotely utilizing cloud-based analytics. The new DXi 4.1 software also integrates with Veeam Backup & Replication v10 and the new Fast Clone feature, to enable ultra-fast synthetic full backups in Veeam environments for more efficient use of resources for large enterprises. Improved synth...
Cozaint Corporation, manufacturer of ‘smart’ physical security platforms, has announced the launch of the BOBBY-W wall-mounted physical security kiosk. Available immediately, this ‘Video Surveillance as a Service’ (VSaaS) device has been designed to augment human security guard environments that need additional eyes and ears on their premises. BOBBY-W physical security kiosk BOBBY-W is based on a custom, Cozaint-built expandable platform that allows for the integration...
Alcatraz, developer of secure frictionless access control platforms, has named Debraj Sinha as Product Marketing Manager - an important role as the physical security technology startup brings its innovative Rock facial authentication product to market. Based in Silicon Valley, Sinha oversees all marketing efforts related to Alcatraz and its core hardware and software solutions including product launch and go-to-market strategy. His current focus at Alcatraz is to execute marketing campaigns, de...
Check Point Research has published its latest Global Threat Index for July 2020. Researchers found that after a five-month absence, Emotet has surged back to 1st place in the Index, impacting 5% of organizations globally. Since February 2020, Emotet’s activities – primarily sending waves of malspam campaigns – started to slow down and eventually stopped, until re-emerging in July. This pattern was observed in 2019 when the Emotet botnet ceased activity during the summer months...
Intelligent Insights is a new software tool that brings together every element from scene to screen, from intelligent cameras enabling video data capture and interpretation, to the visualization and reporting of data in one simple overview. Using data to improve security, safety, and business decisions has become increasingly important to the market and continues to grow. Intelligent Insights Now, Bosch has introduced an affordable software solution, called Intelligent Insights that enables cu...
Intelligent Insights is a new software tool that brings together every element from scene to screen, from intelligent cameras enabling video data capture and interpretation, to the visualization and reporting of data in one simple overview. Using data to improve security, safety, and business decisions has become increasingly important to the market and continues to grow. Now, Bosch has introduced an affordable software solution called ‘Intelligent Insights’ that enables customers to use data in new ways. It completes the data journey from scene to screen and helps users quickly understand the context of various situations, enabling them to make informed decisions. When, for example, the maximum number of people allowed to be in the area is reached, Intelligent Insights can immediately inform users. Intelligent Insights can be used standalone or seamlessly integrated with other systems to enhance situational awareness further. From scene to screen Intelligent Insights uses Bosch cameras’ built-in intelligence (Video Analytics) to interpret video images and captures camera metadata from situations involving moving objects, people counting, and crowd detection. The software tool then collects, aggregates, and displays this information using a series of pre-defined widgets enabling users to visualize and evaluate a complete scene from a simple overview screen. Based on this, users can react faster and more efficiently, making better-informed decisions and improving overall security and safety. Usable data delivered Intelligent Insights comes with a series of widgets, all of which contribute to specific safety and security needs Usable data can be visualized in two ways: As a widget and as a report. All widgets are displayed in a simple, easy-to-read dashboard that allows users to select and display only the widgets that they need at any given time. The report functions as a more detailed post-analysis, helping users adjust and alter actions in the future. Intelligent Insights comes with a series of widgets, all of which contribute to specific safety and security needs. Occupancy counting and Crowd detection Area fill level, Occupancy counting, and Crowd detection offer the ability to monitor and detect crowds accurately and count individuals and objects. The user can specify the desired occupancy rate of an area by determining the maximum number of people allowed to be in that area within a given time. In particular, Area fill level and Occupancy counting are becoming increasingly applicable as they can activate and trigger an external output device when the threshold is reached. This could be a simple alert, a message displayed on a monitor at the entrance to inform visitors if they are allowed to enter, or a public announcement. This is very helpful when considering public health issues like the rapid spread of viruses such as COVID-19, in locations that can attract large numbers of people. Information from multiple cameras Object counting enables users to accurately count the number of vehicles or customer-defined objects Intelligent Insights also offers Object counting and People counting. Object counting enables users to accurately count the number of vehicles or customer-defined objects within the field of view of one or more cameras. It is ideal in situations with fast-moving objects, such as roads or crossroads, where traffic frequency rates must be tracked to determine data such as peak or low traffic periods. People counting is used to count individuals, for example, when entering or leaving a building. This widget can aggregate the counting information from multiple cameras to provide users with an early warning when a sudden increase of people is detected, indicating a potential security issue. Intelligent Insights uses only anonymous data from cameras, ensuring people’s privacy is protected at all times. Real-time overview With the Object positioning widget, users can get a real-time overview of all objects moving in a certain area. This is especially helpful for applications such as perimeter protection. Based on their GPS position, which can be determined by cameras that feature built-in Video Analytics, the objects are plotted onto a map and classified with icons. Intelligent Insights starts with a basic license that includes all widgets and one dashboard, displaying 16 widgets. When needed, dashboards and widgets can be added according to customer needs and requirements. Customers can enhance their video security solution to an integrated security solution that covers intrusion detection Furthermore, when customers use Bosch Intelligent Video Analytics, output and data from the Camera Trainer technology (included in Intelligent Video Analytics) like counting statistics of customer-specific objects can be visualized and reported. All this, combined with new widgets and functionalities incorporated in forthcoming updates and versions, makes Intelligent Insights a future-proof solution. Integration with BVMS Intelligent Insights is not only a powerful standalone software package but also designed for seamless integration. When integrated with the video management system of Bosch (BVMS), users can manage their live and recorded video streams and Intelligent Insights data within one unified graphical user interface (GUI). This integration eliminates the need to switch between multiple applications to get a complete picture of the situation. Another advantage of the integration with BVMS is that customers can enhance their video security solution to an integrated security solution that covers intrusion detection with B and G Series and access control management with the Access Management System 3.0. With the launch of Intelligent Insights, Bosch has introduced a new software solution that brings new insights to the security and safety industry. One that already adds value today, but will undoubtedly add more in the future.
Ajax Systems have announced that the latest OS Malevich 2.9 update brings significant changes for users and security industry professionals. The new data import feature simplifies the process of replacing old hubs with new ones. Remote activation/deactivation Detectors that work incorrectly can now be deactivated remotely and still be part of the system. Button and transmitter got new types of alarm notifications, adjustable in the app. Automation devices can now work in pulse mode and activate electrical appliances for a short period. The in-app panic button can now be used anywhere, not just at the protected property. Upon activation, it sends smartphone coordinates to an alarm monitoring company and all system users. Data import: Replacing hubs without reconfiguring the system With the import feature, all settings, connected devices, security groups, scenarios, and users can be easily migrated from an old hub to the new one. Engineers and user-administrators can install a more advanced hub model on the protected property without reconnecting each detector. Import feature also allows engineers to quickly restore the security system’s integrity, if its hub fails for some reason. Even if the system has hundreds of devices, dozens of scenarios, and several ReX range extenders, data import will take less than 15 minutes. The process is almost fully automated. Just connect the new hub to the internet, switch off the old one, start the data import, and follow instructions in the app. Temporary device deactivation Wrong installation, bad mounting choice, low signal level, broken tamper, or any other malfunction can easily result in a false alarm. With the release of OS Malevich 2.9, engineers can deactivate malfunctioning detectors remotely. No need to delete them from the list of devices. No need to rush to location. Two types of temporary device deactivation are available in the Ajax app, one is complete device deactivation and the other, deactivation of the notifications about the lid state. When the device is entirely deactivated, it doesn’t execute system commands and can’t take part in automation scenarios. Hub ignores all alarms and notifications of the deactivated devices. If notifications about the lid state of the device are disabled, the hub ignores only its tamper alerts. Alarm monitoring companies and users can still receive other alarms and notifications of this device. Temporary device deactivation function became one of the most popular requests from European PRO-users. Now, the functionality is available for all Ajax users. Pulse mode for Socket and WallSwitch Socket and WallSwitch (with firmware version 126.96.36.199 or higher) as well as Relay (with any firmware version) can now toggle switch devices, powered from the mains for a defined period, from 0.5 to 255 seconds. When the timer expires, devices switch back to their initial state: on or off. Previously, Pulse mode was available only in the Relay settings. It allowed electrical contacts to touch for up to 15 seconds and let the current flow. At the same time, Socket and WallSwitch could work only in bi-stable mode, closing and opening an electric circuit following the user’s command or executing a specific scenario. An additional command was required to change their state again. With OS Malevich 2.9 update, users have more options for automating lighting, electromechanical locks, and electric valves that control the water supply. Unlike Relay, WallSwitch and Socket can control electrical appliances without intermediary relays, rechargeable batteries, or an inverter. Adjustable alarm types for Button and Transmitter Information in alarm notifications defines how an alarm monitoring company and users will respond to the situation With OS Malevich 2.9 release, the settings of button and transmitter were expanded with an option to choose a type of alarm that the device communicates with an alarm monitoring company and other users: Intrusion Fire Medical help Alarm button Gas Information in alarm notifications defines how an alarm monitoring company and users will respond to the situation Information in alarm notifications Information in alarm notifications defines how an alarm monitoring company and users will respond to the situation. That’s why it has to correspond to the nature of the threat accurately. For instance, a wired gas detector connected to Ajax via a transmitter should notify about a gas alert. And button provided to an older person should notify about a medical emergency. By choosing an appropriate alarm type, engineers and user-admins change both the text of an alarm notification and a code of the event sent to the CMS. Transmission of smartphone coordinates to alarm monitoring companies using the in-app panic button Button, SpaceControl and panic button A panic button is a tool that is hardly ever used. But in case of an emergency, it can save lives. Button, SpaceControl, or the panic button in the Ajax app notifies CMS operators if someone is in danger and are located on protected premises. An alarm monitoring company will respond immediately, once the button is pressed. With OS Malevich 2.9 release, the in-app panic button transmits an alarm notification along with the smartphone coordinates to an alarm monitoring company. All system users also get the coordinates and can copy them to get directions using GPS apps. Now, users can call for help using the Ajax app from wherever they are. The second layer of protection from accidental pressing in SpaceControl SpaceControl key fob With OS Malevich 2.9 release, SpaceControl gets additional protection from accidental pressing SpaceControl key fob has to be within reach, in a pocket, bag, or keychain, the places where its buttons can be easily pressed by accident. So, they have equipped SpaceControl with firm buttons and developed a filter that ignores any pressing shorter than 0.15 seconds. With OS Malevich 2.9 release, SpaceControl (firmware 188.8.131.52 or higher) gets additional protection from accidental pressing, which has already proved its efficiency in button. Now, double-click and long-press activation options are available in the device settings in the Ajax app. They recommend turning on this feature to avoid situations when premises are accidentally armed, or the panic button is unintentionally pressed. Other features added include: The option to configure Socket LED brightness - Now, it can be turned off or dimmed. Users can check for the new features in the device settings in the Ajax app or check the Socket manual if in need of help. Notifications about hubs being switched off/on or factory reset - Now, alarm monitoring companies and users will be informed of why a hub went offline. The option to switch off the visual indication of a detector triggering - The LED indicator of a detector can now be deactivated in the device settings. The feature is available for DoorProtect, DoorProtect Plus, MotionProtect, MotionProtect Plus, CombiProtect, MotionProtect Outdoor, MotionCam, and GlassProtect with firmware update 184.108.40.206 and higher, as well as MotionProtect Curtain with firmware update 220.127.116.11 or higher. New devices support - Hub 2 Plus, StreetSiren DoubleDeck, MultiTransmitter.
CertiPath, an innovator and renowned company in high-assurance identity, credential and access management services for highly regulated environments, has announced the appointment of industry veteran, Jack L. Johnson, Jr. as Advisor to CertiPath’s Board of Directors, effective immediately. Johnson has over 30 years of industry experience that includes executive positions with Guidehouse Consulting and its legacy firm, PricewaterhouseCoopers, the Department of Homeland Security as its first Chief Security Officer, and has also served with the United States Secret Service for over 20 years. Security assessments expert Johnson is currently the Chief Executive Officer (CEO) and Managing Partner of Jack Johnson and Associates, a strategic consulting firm that specializes in security assessments, providing business and risk consulting domestically and internationally. “As part of Jack’s role, he will offer guidance and direction with regard to our growth initiatives and ongoing business strategies, identifying opportunities that align with CertiPath’s mission,” states Jeff Nigriny, President and Founder of CertiPath. High-assurance credentials provider I have known and worked with CertiPath’s rock-solid, principled leadership team members for decades" Jeff adds, “Because our primary focus is to develop and provide unparalleled, groundbreaking technologies and services that enable high-assurance credentials in the federal government and commercial spaces, we look forward to enhancing the ever-changing landscape with Jack helping to take us to the next level.” Jack Johnson stated, “I have known and worked with CertiPath’s rock-solid, principled leadership team members for decades. They are a well-regarded company that has been filling an essential niche in the identity management space.” Jack adds, “I’m excited to work alongside these great professionals, as the company is on the cusp of expanding significantly and I look forward to being a part of their success.” Protective and intelligence-related duties veteran Johnson’s career spans a full range of investigative, protective and intelligence-related duties, as well as assignments with various Presidents, Vice Presidents, Presidential candidates and foreign heads of state. Johnson received his Bachelor of Science degree from the University of Maryland, a Master’s degree in Forensic Science from George Washington University, and as a veteran of the United States Army, he is involved in the Code of Support Foundation.
Tenable, Inc., the globally renowned cyber exposure company, has published a global industry study that revealed the vast majority of UK organizations (96%) have experienced a business-impacting cyber-attack in the past 12 months, according to both business and security executives. The data is drawn from ‘The Rise of the Business-Aligned Security Executive’, a commissioned study of more than 800 global business and cyber security leaders, including 103 respondents in the UK, conducted by Forrester Consulting on behalf of Tenable. ‘The Rise of the Business-Aligned Security Executive’ As cybercriminals continue their relentless attacks, 63% of respondents in the UK have witnessed a dramatic increase in the number of business-impacting cyber-attacks over the past two years. Unfortunately, these attacks had damaging effects, with organizations reporting loss of employee data (44%), financial loss or theft (36%) and customer attrition (34%). 65% of security leaders in the UK say these attacks also involved operational technology (OT). Countering the growing rate of cyber-attacks Fewer than 50% of security leaders said they are framing cyber security threats within the context of a specific business risk Business leaders want a clear picture of how at risk they are and how that risk is changing as they plan and execute business strategies. But only four out of 10 of local security leaders say that they can answer the fundamental question, ‘How secure, or at risk, are we?’ with a high level of confidence, despite the prevalence of business-impacting cyber-attacks. Looking at global respondents, fewer than 50% of security leaders said they are framing cyber security threats within the context of a specific business risk. For example, though 96% of respondents had developed response strategies to the COVID-19 pandemic, 75% of business and security leaders admitted their response strategies were only ‘somewhat’ aligned. Measuring and managing cyber security Organizations with security and business leaders who are aligned in measuring and managing cyber security as a strategic business risk deliver demonstrable results. Compared to their siloed peers, business-aligned security leaders are: Eight times more likely to be highly confident in their ability to report on their organizations’ level of security or risk. 90% are very or completely confident in their ability to demonstrate that cyber security investments are positively impacting business performance compared with 55% of their siloed counterparts. 85% have metrics to track cyber security ROI and impact on business performance versus just 25% of their siloed peers. Organizations with business-aligned cyber security leaders are also: Three times [3.2x] more likely to ensure cyber security objectives are in lock step with business priorities. Three times [3.3x] more likely to have a holistic understanding of their organization’s entire attack surface. Three times [3.3x] more likely to use a combination of asset criticality and vulnerability data when prioritizing remediation efforts. In the future, there will be two kinds of CISO - those who align themselves directly with the business and everyone else" “In the future, there will be two kinds of CISO - those who align themselves directly with the business and everyone else. The only way to thrive in this era of digital acceleration is to bring cyber into every business question, decision and investment,” said Renaud Deraison, Chief Technology Officer and Co-Founder, Tenable, Inc. Renaud adds, “We believe this study shows that forward-leaning organizations view cyber security strategy as essential to innovation and that when security and the business work hand-in-glove, the results can be transformational.” Study to examine cyber security strategies Forrester Consulting conducted an online survey of 416 security and 425 business executives, as well as telephonic interviews with five business and security executives, to examine cyber security strategies and practices at midsize to large enterprises in Australia, Brazil, France, Germany, India, Japan, Mexico, Saudi Arabia, the UK and the US. The study was fielded in April 2020. ‘Business-impacting’ relates to a cyber-attack or compromise that results in a loss of customer, employee, or other confidential data, interruption of day-to-day operations, ransomware payout, financial loss or theft, and/or theft of intellectual property.
Aqua Security, the pure-play cloud-native security, announced that its Cloud Native Security Platform is available through Red Hat® Marketplace, an open cloud marketplace that makes it easier to discover and access certified software for container-based environments across the hybrid cloud. Built in partnership by Red Hat and IBM, Red Hat Marketplace is designed to meet the unique needs of developers, procurement teams and IT leaders through simplified and streamlined access to popular enterprise software products, including the Aqua Platform. Prevent suspicious activity The Aqua Platform provides full visibility into application activity, allowing organizations to detect and prevent suspicious activity and attacks, providing transparent, automated security while helping to enforce policy and simplify regulatory compliance. Aqua’s native integration with OpenShift provides a full-stack security solution for the joint customers, automating security controls in CI/CDs like OpenShift Pipelines and enforcing application immutability in production. The Red Hat Marketplace makes it easy for users to find and purchase the Aqua Platform, and they can then use the on-demand deployment capability to install and evaluate Aqua with zero-touch and minimal configuration. Existing customers can also use the same on-demand, zero-touch environment to purchase additional licenses. Growing business efficiently “Enterprise buying patterns are increasingly shifting toward automated, online billing mechanisms that allow companies to leverage existing cloud or services budgets, as well the flexibility to utilize OPEX budgets for software purchases when necessary,” said Dror Davidoff, CEO and co-founder of Aqua. “By working more closely with our industry-leading partners like Red Hat and IBM, we are able to leverage the multitude of sales platforms they offer to help accelerate time-to-value for our joint customers while growing our business efficiently.” Simplifying purchase “We believe Red Hat Marketplace is an essential destination to unlock the value of cloud investments,” said Lars Herrmann, senior director of technology partnerships, Red Hat. “With the marketplace, we are making it as fast and easy as possible for companies to implement the tools and technologies that can help them succeed in this hybrid multi-cloud world. We've simplified the steps to find and purchase the Aqua Platform that is tested, certified and supported on Red Hat OpenShift, and we've removed operational barriers to deploy and manage Aqua on Kubernetes-native infrastructure to secure your applications.” All solutions available through the Red Hat Marketplace have been tested and certified for Red Hat OpenShift Container Platform, allowing them to run anywhere OpenShift runs.
During the Black Hat USA 2020 Virtual Event, Exabeam, the Smarter SIEM™ company, announced that customers can now license its cloud SIEM technology by use case, beginning with licensable use cases for expedited insider threat and compromised credential detection. In addition, to simplify the process of acquiring and installing critical security content, the company is unveiling the new Exabeam Content Library, an easy-to-use security content repository to help organizations deploy advanced use cases more efficiently. Exabeam use case content increases threat visibility and enables security operations center (SOC) teams to extract more value from their SIEM. According to the ‘Exabeam 2020 State of the SOC Report,’ security managers and analysts rated their ability to create content the lowest among all hard skills, yet creating rules and models to detect advanced threats, like lateral movement and credential switching, is critical to their security maturity. By providing a simple way to acquire the content needed to detect and remediate these critical security use cases, Exabeam is speeding the time to maturity for organizations. Security business needs “Security use cases for a SIEM tool should be a priority in the CISO’s tool box, and should not only cater to basic security hygiene, for which best practices exist, but also cater to the business needs of the organization,” wrote Gorka Sadowski, senior director analyst at Gartner in a Gartner report. The Content Library is an online repository of knowledge and content that organizations can use to roll out new use cases. The initial release allows customers to quickly map data sources to security use cases and to download the necessary parsers. Exabeam is also announcing new, easy-to-implement content and tools to help customers maintain security as they adapt to a remote workforce. Investigate data exfiltration Exabeam is further enabling security teams to rapidly obtain value by detecting insider threats" Exabeam Cloud Connector for Code42 allows security teams to quickly detect and investigate data exfiltration by departing and remote employees, as well as the leak of high value data during a merger or acquisition. This announcement follows the previous release of the Exabeam Cloud Connector for Zoom. The ability for Exabeam solutions to easily plug into existing security environments enhances SOC team speed and efficacy. “New research shows that one-third of organizations have been hit with successful cyberattacks since the forced move to work from home. As security teams rush to respond to the pandemic and the increase in threats, it is critical that they find cost-effective ways to strengthen and mature their security posture,” commented Adam Geller, chief product officer, Exabeam. “In announcing these innovations, Exabeam is further enabling security teams to rapidly obtain value by detecting insider threats and compromised credentials and improving their security posture for remote employees.” Turnkey Playbooks “Unlike other SIEM vendors, Exabeam has allowed us to quickly add analytics to detect and investigate insider threats without having to replace our existing log management investment,” explained Director Damien Manuel, Cyber Security Research and Innovation Center at Deakin University. “That’s a critical capability in the context of constantly evolving risks and potential vulnerabilities, and it gives us a smarter strategy to protect our organization, employees, customers and data.” Exabeam has also released the first of its previously announced Turnkey Playbooks, automated solutions for common security investigations that do not require third-party licenses or configuration. The new Turnkey Playbook for Threat Intelligence automatically identifies malicious domains, IP addresses, URLs, files, and email addresses with no additional configuration or third-party threat intelligence licenses required.
Today’s environment has evolved into something that according to some may seem unexplainable. But in the context of video surveillance, this is something that we understand. Allow me to shed some light and understanding in terms of security and why it truly is a necessity. Security is not a luxury, it is a necessity. An essential practice now peaking the interests of all businesses small and large. A video surveillance system is a cost effective option that does not require monitoring fees. As business slows, temporarily shuts down or closes, an increase in vacant properties is inevitable. This pandemic will continue to put severe pressure on many businesses around the country. With so many considered non-essential, it is really sad to see how many must shutter their doors and lay off employees. Keeping an eye out for suspicious activity using a commercial grade surveillance system that supports advanced analytics, may end up saving your potential customers thousands of dollars down the road. Demand for video surveillance and security products We can certainly draw on the conclusion that security is a “need” more so than a “want”. Times like this just further cement that thought process. In today’s economic spiral, people aren’t actively looking for lighting controls or home theaters. What they look for is a way to keep their loved ones safe, protect their homes, businesses and property. Video surveillance technology provides added security for you, your family and your business In my opinion, you will see video surveillance and security product sales skyrocket in the coming months and years. It has been reported that response times for first responders may be impacted as a result of COVID-19, leaving those with bad intent more time to ransack a property knowing that law enforcement may be slow to respond. Criminals will always take advantage of the situation. All we can do as a community is use common sense, stay vigilant through these odd times and watch out for one another. For some of us that may mean mitigating risks with technology. Affordable video monitoring solutions Having a solution that can quickly and securely share video footage may be the difference between identifying a perpetrator and becoming a victim. Ella, a video search platform developed by IC Realtime, makes every second of video instantly searchable and shareable, either with the authorities or your neighborhood social apps. Plus it is compatible with any RTSP streaming device. To wrap this up, it’s not about pointing out the obvious, it’s really about bringing awareness as to how technologies can be implemented to provide peace of mind without breaking the bank. Video surveillance technology is a way to do that and provide added security for you, your family and your business.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data center, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. CV-19 means that huge numbers of people are getting access to the same desktop and files, and collaborative communication toolsBut as we know, CV-19 means that huge numbers of people are getting access to the same desktop and files, applications and collaborative communication tools that they do on a regular basis from the office or on the train. Indeed, the new generation of video conferencing technologies come very close to providing an “almost there” feeling. Hackers lie in wait Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical servers. Less than a month ago, we emerged from a period of chaos. For months hackers had been exploiting a vulnerability in VPN products from Pulse Secure, Fortinet, Palo Alto Networks, and Citrix. Patches were provided by vendors, and either companies applied the patch or withdrew remote access. As a result, the problem of attacks died back. But as companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on. That’s because remote desktop protocol (RDP) has been for the most part of 2019, and continues to be, the most important attack vector for ransomware. Managing a ransomware attack on top of everything else would certainly give you sleepless nights. As companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical serversExposing new services makes them also susceptible to denial of service attacks. Such attacks create large volumes of fake traffic to saturate the available capacity of the internet connection. They can also be used to attack the intricacies of the VPN protocol. A flow as little as 1Mbps can perturbate the VPN service and knock it offline. CIOs, therefore, need to acknowledge that introducing or extending home working broadens the attack surface. So now more than ever it’s vital to adapt risk models. You can’t roll out new services with an emphasis on access and usability and not consider security. You simply won’t survive otherwise. Social engineering Aside from securing VPNs, what else should CIO and CTOs be doing to ensure security? The first thing to do is to look at employee behavior, starting with passwords. It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposed. Best practice would be to get all employees to reset their passwords as they connect remotely and force them to choose a new password that complies with strong password complexity guidelines. As we know, people have a habit of reusing their passwords for one or more online services – services that might have fallen victim to a breach. Hackers will happily It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposedleverage these breaches because it is such easy and rich pickings. Secondly, the inherent fear of the virus makes for perfect conditions for hackers. Sadly, a lot of phishing campaigns are already luring people in with the promise of important or breaking information on COVID-19. In the UK alone, coronavirus scams cost victims over £800,000 in February 2020. A staggering number that can only go up. That’s why CIOs need to remind everyone in the company of the risks of clickbait and comment spamming - the most popular and obvious bot techniques for infiltrating a network. Notorious hacking attempts And as any security specialist will tell you, some people have no ethics and will exploit the horrendous repercussions of CV-19. In January we saw just how unscrupulous hackers are when they started leveraging public fear of the virus to spread the notorious Emotet malware. Emotet, first detected in 2014, is a banking trojan that primarily spreads through ‘malspam’ and attempts to sneak into computers to steal sensitive and private information. In addition, in early February the Maze ransomware crippled more than 230 workstations of the New Jersey Medical Diagnostics Lab and when they refused to pay, the vicious attackers leaked 9.5GB or research data in an attempt to force negotiations. And in March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHO and healthcare organizations in general since the pandemic broke. We’ll see lots more opportunist attacks like this in the coming months. More speed less haste In March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHOFinally, we also have bots to contend with. We’ve yet to see reports of fake news content generated by machines, but we know there’s a high probability it will happen. Spambots are already creating pharmaceutical spam campaigns thriving on the buying behavior of people in times of fear from infection. Using comment spamming – where comments are tactically placed in the comments following an update or news story - the bots take advantage of the popularity of the Google search term ‘Coronavirus’ to increase the visibility and ranking of sites and products in search results. There is clearly much for CIOs to think about, but it is possible to secure a network by applying some well thought through tactics. I believe it comes down to having a ‘more speed, less haste’ approach to rolling out, scaling up and integrating technologies for home working, but above all, it should be mixed with an employee education program. As in reality, great technology and a coherent security strategy will never work if it is undermined by the poor practices
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilizing the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualization and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
A larger proportion of cyberattacks in the first half of 2019 can be attributed to electronic criminals (eCrime adversaries) compared to state-sponsored or unidentified attacks. CrowdStrike, a cybersecurity company that provides the CrowdStrike Falcon endpoint protection platform, observes that 61% of targeted cybersecurity campaigns in the first half of 2019 were sourced from eCrime adversaries, compared to 39% from other sources. Technology was the top vertical market targeted by cyber-attacks in the first half of the year CrowdStrike Falcon Overwatch platform The eCrime portion more than doubled since 2018, reflecting an escalation of criminal players in search of more and larger payouts. The trend is among the information presented in CrowdStrike’s Overwatch 2019 Mid-Year Report: Observations from the Front Lines of Threat Hunting. Falcon OverWatch is the CrowdStrike-managed threat hunting service built on the CrowdStrike Falcon platform. Technology was the top vertical market targeted by cyber-attacks in the first half of the year, followed by telecommunications and non-governmental organizations (including think tanks). Other targets (in decreasing order) were retail, financial, manufacturing, transportation and logistics, gaming, entertainment and engineering. Hospitality disappeared from the list so far this year, although Crowdstrike expects an increase in intrusions aimed at the hospitality industry to put it back in the top 10 by the end of the year. Intrusion adversaries In terms of intrusion adversaries, the top players so far in 2019 are Spiders (eCrime) and Pandas (China). Regarding initial access techniques, the most common remain, in order of prevalence, valid accounts, spear-phishing and exploitation of public-facing applications. 2009 is proving to be an active year with a significant increase in eCrime and the inter-relationships occurring across different groups as they strengthen their organizations, forge alliances and expand their footprint. Need for a proactive security posture Basic hygiene form the foundation for a strong cybersecurity program Many of the techniques used by eCrime actors are easily defensible through strong security products and a proactive security posture, says CrowdStrike, which recommends the following measures to help maintain strong defense in 2019: Be attentive to basic hygiene such as user awareness, asset and vulnerability management, and secure configurations, which form the foundation for a strong cybersecurity program. User awareness programs can combat the continued threat of phishing and related social engineering techniques. Asset management and software inventory ensures that an organization understands it footprint and exposure. Vulnerability and patch management can verify that known vulnerabilities and insecure configurations are identified, prioritized and remediated. Multifactor authentication (MFA) should be established for all users because today's attackers are adept at accessing and using valid credentials. A robust privilege access management process will limit the damage adversaries can do if they get in and reduce the likelihood of later movement. Implementing password protection prevents disabling or uninstalling endpoint protection that provides critical prevention and visibility for defenders. Countering sophisticated cyber attacks As sophisticated attacks continue to evolve, enterprises face more than a "malware problem" As sophisticated attacks continue to evolve, enterprises face more than a "malware problem." Defenders should look for early warning signs that an attack may be underway, such as code execution, persistence, stealth, command control and lateral movement within a network. Contextual and behavioral analysis, when delivered in real time via machine learning and artificial intelligence, effectively detects and prevents attacks that conventional "defense-in-depth" technologies cannot address. "1-10-60 rule" in combating advanced cyber threats CrowdStrike recommends that organizations pursue a "1-10-60 rule" in order to effectively combat sophisticated cyberthreats. That is, they should seek to detect intrusions in under one minute; to perform a full investigation in under 10 minutes, and to eradicate the adversary from the environment in under 60 minutes. A source at CrowdStrike said "Meeting this challenge requires investment in deep visibility, as well as automated analysis and remediation tools across the enterprise, reducing friction and enabling responders to understand threats and take fast, decisive action."
iSpace Environments, a Minneapolis-based commercial furniture and technology dealership, is now using Carousel Digital Signage software to promote its services and amplify its message throughout its showroom as part of a technology upgrade and renovation. A longtime Carousel Digital Signage reseller, iSpace provides furnishing and technology design and integration services to clients in the corporate, higher education, healthcare, and automobile retail sectors. As organizations re-open following the COVID-19 pandemic, iSpace is helping clients reconfigure their workspaces to comply with the new health and safety regulations. Their interior transformation adheres to these compliance standards and demonstrates how furniture and technology can create safe, comfortable work environments. Content creation and management Showing the technology creates awareness of what AV technology offers for workplace design" iSpace is now using Carousel Cloud software to communicate health and safety guidelines, welcome messaging, visitor information, and examples of how clients can apply digital signage to their own environments. All visual messaging is distributed to flat panel televisions and video walls throughout the building, leveraging Carousel Cloud’s interoperability with Apple TV devices to simplify and centralize media playout. iSpace’s AV experts demonstrate the software’s capabilities during tours, including multi-display support, Apple TV interoperability, and ease of use including simplified content creation and management. Communicate competitive advantage “Showing the technology creates awareness of what AV technology offers for workplace design,” said Nate Pesch, Technology Sales Manager at iSpace Environments. “Our customers aren’t always aware of our technology-related products and services, and Carousel Cloud helps us communicate our competitive advantage.” Pesch confirms that the digital signage content they show to visitors often opens the conversation to broader possibilities. “The Carousel content always looks visually impressive and provides an opportunity to share our expertise around technology integration,” he said. “We have many examples of becoming a one-stop shop for customers.” Standalone server infrastructure Those conversations then lead to Carousel Cloud’s benefit in workspace communications. Carousel Cloud gives users the flexibility of being able to update content at any time and from anywhere - a benefit that Pesch says is increasingly critical during as business operations continue to change. He also points to the cost-reducing benefits of Carousel Cloud, which eliminates the traditional expense of a standalone server infrastructure. Instead, Carousel Cloud software is deployed on the organization’s existing IT infrastructure and can use common Apple TV devices or BrightSign media players (including the BSN.cloud platform) on the playout side. Use built-in templates One organization’s safety protocol may different from another, but everybody wants to feel safe" “Carousel software is easy to learn, so an organization lacking in-house design resources can use built-in templates to create content,” said Pesch. “That’s important these days as many content managers are working from home. With Carousel Cloud, content managers can make changes remotely. We can also show how easy it is to use these templates across different aspect ratios, as we display the content on portrait screens, landscape screens, and video walls in our showroom and meeting spaces. It’s very powerful.” iSpace Environments, which has remained open through the pandemic as an essential business, is seeing an increase in traffic as organizations consider how life in the workplace will change. With organizations across the globe updating facilities in accordance with new regulations, many customers are aiming to create environments that communicate how safety is their top priority. Organization’s safety protocol “We’re helping people get back to business any way we can, whether it’s with screen dividers on desks, furniture reconfigurations, or digital signage to communicate the proper safety measures,” said Pesch. “Businesses and schools need to show that they’re thinking about safety, and digital signage is one way to communicate that they’re doing something about it. One organization’s safety protocol may different from another, but everybody wants to feel safe. Digital signage is one of the most effective ways to communicate these messages.”
Samson Security has adopted SmartTask to support the rapid growth of the business, which has seen the company treble in size in less than a year. The workforce management software is initially being used for electronic proof of attendance, across more than 400 security officers and engineers that deliver a wide range of services, including manned guarding, mobile patrol, alarm response and FM services. Advanced guarding management and monitoring “We needed an advanced guarding management, monitoring and reporting solution that could adapt and expand to our changing requirements as we grow,” explains John Richards, Operations Director at Samson Security Ltd. John adds, “Our mobile and manned services now span the North West, the Midlands and North Wales, so SmartTask will give us the visibility and control needed to coordinate and protect our team, while maintaining our excellent service standards.” SmartTask workforce management software Samson Security selected SmartTask because of the simplicity and flexibility of the system SmartTask will replace a previous time and attendance solution, which no longer met the needs of the business. Having undertaken a review of the marketplace, Samson Security selected SmartTask because of the simplicity and flexibility of the system. The app-based nature of the system means that employees can use the software via a personal or work smartphone, while providing the opportunity to use additional functionality such as patrol monitoring and electronic forms. Security guards are using either a SmartTask-enabled smartphone or an onsite landline to accurately record the start and end times, as well as any required check calls. The app captures a timestamp and GPS location for accurate customer reporting and SLA monitoring for alarm responses. Controlled access Samson Security also uses the control room dashboard at its National Command Center to gain complete visibility of any exceptions, while mobile and office managers have controlled access for their individual areas of responsibility. John adds, “We are already exploring other ways of using SmartTask, which will enable us to consolidate much of our employee scheduling and workforce management requirements into a single system. We have set up bespoke smart forms, so will shortly be rolling out electronic incident reporting to our team, replacing our existing paper-based process.” Scalable, flexible solution He further said, “The scalable and flexible nature of SmartTask means we can take a phased approach, avoiding operational disruption and not overburdening our internal resources.” Paul Ridden, Chief Executive Officer of SmartTask commented, “We have developed our software to meet the precise needs of security and FM companies now and in the future. Possessing high levels of configurability and scalability, backed by first-rate service and support, SmartTask can support the long-term success of our customers in-line with their business and operational priorities.”
STANLEY Security, one of the UK’s renowned security and business solutions providers, has installed a wall mounted Thermal Temperature Monitoring Solution in the reception area of Amcor Flexibles Winterbourne site, as a valuable addition to the raft of measures that the company has in place to protect its staff from COVID-19. As a key manufacturer of pharmaceutical and medical packaging, Amcor Flexibles Winterbourne, based in the UK, has a workforce which has been designated as key workers in the COVID-19 pandemic. Remaining open for business and working at full capacity during the lockdown was and continues to be vital. COVID-19 specific safety measures Amcor has put in place a raft of COVID-19 specific safety measures, with the latest requirement being a temperature monitoring solution that could be used to detect elevated temperatures of anyone entering the main reception area, without putting reception staff in any danger. While a raised temperature is not necessarily an indication of illness, and many people with the COVID-19 virus are asymptomatic, monitoring temperatures of people arriving on site is one extra measure to help protect against the spread of the virus. Thermal Temperature Monitoring Solution STANLEY Security provided Amcor with an automated Thermal Temperature Monitoring Solution STANLEY Security provided Amcor with an automated Thermal Temperature Monitoring Solution, featuring a wall mounted hybrid thermal network camera, a blackbody calibration device, and an NVR. The contactless, non-invasive system is able to monitor temperatures within large groups of people at a distance, reducing manpower requirements and improving personnel safety. The blackbody device provides a constant reference temperature in view of the thermal camera, for accurate temperature monitoring during continuous operation. This prevents changes in the ambient temperature, such as air conditioning being activated, from affecting the systems accuracy. Security alerts When a person with an elevated temperature is detected by the system, an alert is raised which is then acted upon by reception staff during office hours or security staff out of hours. Amcor has a clear policy for dealing with this situation, which differs depending on the nature of the visitor. For Amcor Flexibles Wintebourne’s Operations Manager, Shaun Golding, the system has proven very straightforward to use and is a valuable addition to the raft of measures the company has in place to protect its staff from COVID-19. Elevated temperature detection Shaun said, “So far we’ve only had one person who was detected with an elevated temperature and was sent for a test. But that single person could have come into contact with five or six people during the course of their working day. By having this Temperature Monitoring Solution in place, we prevented that from happening, further reducing the risk.” He adds, “STANLEY Security installed the system in less than a day, without any disruption to our business. The services they have provided us have been really good and I would recommend them.” As an existing customer, STANLEY Security was familiar with the Amcor site in Bristol, having installed CCTV and access control systems there in the past.
Auto Trader is an FTSE100 technology company and is an agile, fast-paced business, and so needs to have a robust risk management framework which gives the ability to manage risks on a real-time basis. It had an existing risk and compliance management framework; however, this relied on multiple spreadsheets, and so action tracking and reporting were a manual and lengthy process. They were looking for a solution that could bring together multiple risk registers, give them the ability to assign actions to risk owners for them to maintain and provide real-time reporting and dashboards at different levels of detail. Auto Trader wanted a solution that out of the box met most of their requirements, but also needed a flexible solution and so recognized the need for professional services to configure to meet specific requirements. Gartner’s Magic Quadrants They saw that SureCloud’s solutions could allow them to aggregate risks across different business functions, to track actions and to report on a real-time basis. The fact that SureCloud also has a vast portfolio of GRC solutions that may be useful to Auto Trader in the future as they expand their GRC journey attracted them to Platform, as the business could grow into the solution over time. Auto Trader needed a solution that was easy and intuitive to operate, to ensure users will feel confident in how to navigate the software and therefore gain quick value. They also wanted users to be able to "dip in and out" of the Platform quickly. After reviewing several solutions, many on Gartner’s Magic Quadrants like SureCloud. Auto Trader found that other vendors lacked the flexibility that SureCloud offered. Manage complex risks We were attracted to SureCloud due to the flexibility of the solution in comparison to other GRC solutions" Claire Baty, Governance, Risk and Compliance Director at Auto Trader, commented: “We were looking for a solution that would be simple to use, yet provide the ability to manage complex risks, while complementing our agile ways of working." "We were attracted to SureCloud due to the flexibility of the solution in comparison to other GRC solutions, as it gave us the ability to design our own user journeys and reporting tools, and the modular approach that means we can continue to enhance our framework over time. We are looking forward to working with SureCloud on this important project.” Digital automotive marketplace Nick Rafferty, COO at SureCloud commented: “We are thrilled to be working with Auto Trader, the UK and Ireland's largest digital automotive marketplace. Not only to help them meet their Risk and Compliance needs but also to be chosen due to our level of agility in our Platform. I look forward to seeing the relationship grow as our technology flexes to their way of working while automating and streamlining their programs." "SureCloud is proud to be helping another market-leader ditch spreadsheets for good.”
Aeroturn LLC, a turnstile manufacturer that offers 100% Made In The USA turnstiles, announced that the company’s turnstiles were selected for deployment at multiple locations of a major Biopharma manufacturer in North America. Biopharmaceutical, also known as a biological medical product, or biologic, is any pharmaceutical drug product manufactured in, extracted from, or semi-synthesized from biological sources. Upgrading security Different from totally synthesized pharmaceuticals, they include vaccines, blood, blood components, allergenics, somatic cells, gene therapies, tissues, recombinant therapeutic protein, and living medicines used in cell therapy. With the current global health pandemic, the Biopharma manufacturer needed to upgrade the security at its central US location quickly and efficiently. Over the years, Aeroturn has been instrumental in helping this Biopharma giant secure multiple campuses where security needs to be at the highest level. With a heavy focus on research and development, the Biopharma company was looking for a turnstile solution that could operate without any downtime and secure its perimeter effectively. With major security upgrades over the years which warranted finding the best turnstile manufacturer in the industry; the decision was solely based on performance. 10 million passages guarantee After researching multiple vendors and receiving live product demonstrations, the physical security team knew that Aeroturn was the clear winner. “We are proud to have been selected as the winning turnstile solution after competing against two other large well-known turnstile manufacturers,” states Michael Stoll, VP of Technical Sales & Marketing at Aeroturn. “Aeroturn won the initial project back in 2018 and all future installations based on superior reputation, performance specifications, durability, endurance, our 5-year warranty & zero maintenance mechanisms, and a 10 million passages guarantee.” With a phased approach, Aeroturn won Phase I in September of 2018 and deployed four lanes of its enhanced X-Wing turnstiles with custom LED’s that matched the corporate colors at the Biopharma company’s North American headquarters. Phase II consisted of an additional 11 lanes of X-Wing turnstiles that were deployed the following year at another North American campus. Customized turnstile solution After proving themselves over the course of two years, Aeroturn was selected once again in 2020 to complete Phase III with an additional 8 lanes of turnstiles and the remaining to be deployed at the end of 2020 at the same campus. Each location came with its own set of customized floor conditions, side entry cabling, and low-profile platforms when necessary; making this a customized turnstile solution. In addition, all work was performed off-hours and weekends to help minimize disruption at the facility at no additional cost to the Biopharma company. Due to the current national emergency, the Biopharma company needed to be proactive when it came to securing its entrance ways and knew it could rely on Aeroturn to deliver high performance turnstiles each and every time.
Invixium, a global provider of innovative touchless biometric solutions, has been contracted by Fine Hygienic Holding (FHH), one of the provider Wellness Groups and manufacturer of hygienic paper products, to deploy IXM TITAN devices and integrate Invixium’s workforce management solution with FHH’s Oracle HR cloud as part of its corporate digital transformation initiative. Businesses like FHH that have many operating locations require a workforce management solution where data from all facilities is readily available. Invixium’s IXM WEB is a web-based, cloud-ready biometric access control and workforce management software that the TITAN devices installed at FHH’s sites in Jordan, the UAE, Saudi Arabia, and Egypt constantly share data with. This data, including time tracking, is visualized in IXM WEB’s playful interface through interactive dashboards and intuitive reports showing employee data and the overall health of the biometric system. Payroll and employee time management FHH’s existing ORACLE Fusion time management system created a unique challenge for all stakeholders, including Invixium and their partner ElectroSec, from an implementation and support perspective to cover all FHH’s operations across the MENA region. For the TITAN installation to be effective, employee clock-ins (i.e. punches) needed to be immediately exported to ORACLE Fusion, where FHH’s Human Resources could manage payroll and employee time. Invixium’s team of experts worked with FHH and ORACLE to bridge IXM WEB with Fusion, allowing TITAN to seamlessly share data with FHH’s existing human capital cloud. After three consecutive pay periods with 100% time accuracy, Invixium and FHH share that this custom digital transformation implementation was a complete success. Zero human intervention “We had very tight timelines in 2019 to ensure we go live in 2020 for all our Phase 1 Cloud transformation programmes, where the core focus was on Human Resource processes, technology and improvements. Working with Invixium, Oracle, FHH’s technical team, supported by the HR team, we were able to implement a system that is 100% accurate on employee records for Time and Attendance and then integrated it into the Oracle platform. This leaves very little room for fraud and zero human intervention, and provides FHH with a foundation for the future for all HR related systems and processes," said FHH’s CIO Yahyah Pandor. “Invixium is very proud of what we accomplished with Fine Hygienic Holding,” said Shiraz Kapadia, President and CEO of Invixium. “Our products are made to be highly customizable, so we accepted this challenge knowing that TITAN and IXM WEB were the right fit for FHH’s unique needs. IXM WEB especially is designed with the end-user in mind; we want our customers to have the freedom to build their system around their business needs. Our engineers worked tirelessly with FHH and ORACLE to make this digital transformation happen, and the results have been incredibly positive.”
Round table discussion
Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: How is the rise in terrorism impacting the physical security market?
Employee turnover is a problem for many companies, especially among younger employees who have not developed the philosophy of employer loyalty that was common in previous generations. Nowadays, changing jobs is the norm. The idea of spending decades working for a single employer seems almost quaint in today’s economy. However, excessive employee turnover can be expensive for employers, who are looking for ways to keep their brightest and best employees happily toiling away as long as possible. We asked this week’s Expert Panel Roundtable: How can the physical security market promote better employee retention in a competitive employment environment?
In today’s global economy, goods are manufactured all over the world and shipped to customers thousands of miles away. Where goods are manufactured thus becomes a mere detail. However, in the case of “Made in China”, the location of a manufacturer has become more high-profile and possibly more urgent. The U.S. government recently banned the use in government installations of video system components from two Chinese manufacturers, presumably because of cybersecurity concerns. A simmering trade war between China and the United States also emphasizes other concerns related to Chinese manufacturing. We asked this week’s Expert Panel Roundtable: Should "Made in China" be seen as a negative in the video surveillance marketplace? Why or why not?