TE Connectivity, a renowned provider of connectivity solutions and sensors, has maintained its place for the fourth year in a row among a growing number of employers to be named a Best Place to Work for LGBTQ Equality in the United States. Corporate Equality Index (CEI) By adopting policies ensuring antidiscrimination, equal medical benefits, internal training and education and more, TE earned a perfect 100 percent ranking on the Corporate Equality Index (CEI), a national benchmar...
ETSI's new Industry Specification Group on Securing Artificial Intelligence (ISG SAI) announced that they met recently for their second meeting and appointed Alex Leadbeater (BT) as the Industry Specification Group’s new Chair. Dr. Kate Reed (NCSC) was appointed as First Vice Chair and Tieyan Li (Huawei) was appointed as Second Vice Chair. The second meeting of the ISG SAI, after the launch of the group in October 2019, was also the place to discuss work priorities and future scope of act...
Evolis, global company involved in personalization solutions and instant printing systems, has announced launching a new Card Lamination Module (CLM) for Avansia, compatible with its Avansia card printer. In a very demanding market, the Evolis Card Lamination Module reduces the risk of card fraud and increases significantly the useful life of the official identity documents or the access control badges. Avansia Lamination system The Avansia Lamination system combines the Avansia Printer with...
In a world increasingly exposed to technology-based cyber security threats, the global insurance industry is well-positioned to play a greater role in rewarding those organizations that take cyber security seriously and have standard solutions in place to counter them. This is the call from globally renowned cyber analytics company, CyberCube in a report timed for release to coincide with the World Economic Forum annual meeting in Davos, where its chief executive is participating. Cyber securit...
360 Vision Technology, a UK CCTV manufacturing company, has announced that with effect of 15th January 2020, Sales Director Ashley Knowles has retired from the company, and the Security Industry. “Ashley has been a founding director of the business since 2003, having previously worked at Video Controls Ltd, and has thoroughly enjoyed being part of the 360 Vision team,” says Mark Rees, 360 Vision’s Managing Director. “Over the years he has contributed to make the co...
Sophos, a globally renowned provider of next-generation cyber security solutions, has announced introducing Sophos Intercept X for Mobile with new security capabilities for Chrome OS devices and improved mobile threat defense for Android and iOS devices. Fleeceware applications Sophos has also published research, Fleeceware Apps Persist on the Play Store, which details new findings on Fleeceware applications that overcharge unsuspecting consumers for functionality widely available in other fre...
Genea has announced that it has acquired cloud-based physical access control company, Sequr, Inc., thereby further expanding its portfolio of commercial real estate technology solutions. Submeter billing software solutions “Sequr is an ideal fit for us,” said Michael Wong, CEO of Genea. He stated, “Almost all of our customers who use our OTHVAC and/or submeter billing software solutions have been searching for help with access control. Similar to our other offerings, Sequr’s software typically integrates directly with properties’ existing hardware which allows for major enhancements in functionality of access control systems while being significantly more cost-effective than a complete rip and replace”. Sequr shares Genea’s philosophy of providing outstanding customer experiences to its clients" Michael adds,”Sequr also shares Genea’s philosophy of providing outstanding customer experiences to its clients. Adding the best cloud-based physical access control solution to our technology suite has been a priority for us and we have found the perfect complement.” On-premise access control software Sequr addresses the limitations and pain points related to using on-premise access control software with a cloud-based offering that improves convenience, transparency, security and safety. Their combination of enterprise-level security, management portal and limitless scalability means that customers can access features normally reserved for the Fortune 500 at an affordable price. Even more, Sequr turns everyone’s phones into their access card. No more retractable badges, no more getting locked out of the office. “Since its inception in 2014, Sequr was designed to automate physical access control to reduce the cost and time associated with managing access to your facilities,” said Mike Maxsenti, co-founder of Sequr. Cloud-based physical access control Mike further states, “When we evaluated strategic alternatives to accelerate our growth, Genea immediately stood out. Our similar customer-centric values and product alignment made us confident that this partnership would best position us as a leader in the fast-growing cloud-based physical access control market. The Genea team has earned the trust of its property management and engineering customers which make it an outstanding platform for Sequr.” This acquisition marks Genea’s second in less than a year. It acquired Moylan Energy Management, Inc. in July 2019.
Synology Inc. has announced the availability of the SA3600 storage system, the latest device in the SA family of high-performance and versatile, petabyte-capable network attached storage servers. Built to tackle both existing and future data storage requirements, SA3600 provides businesses with access to faster and larger on-premises storage in a cost-effective package. "In response to the rising demand for on-premises data storage, we built the SA series to help businesses reach petabyte-scale storage," said Michael Wang, Product Manager at Synology Inc. "SA3600 provides massive storage and high performance to meet the ever-growing compute requirements and to facilitate IT transformation for large-scale businesses." Versatile architecture to accelerate workload Powered by an Intel Xeon 12-core processor, the SA3600 is scalable up to 180 drives. SA3600 provides petabyte-scale storage capacity, suitable for massive surveillance deployments, video post-production, and other business environments. Support of both 2.5" and 3.5" SAS/SATA drives increases flexibility and prevents vendor lock-in, minimizing total cost of ownership (TCO). Performance: Over 5,500 MB/s sequential throughput and 176,000 4K random write IOPS1 Scalability: Up to 1,536 TB storage capacity with 7 expansion units2 10GbE built-in: 2 x 10GbE and 4 x 1GbE Ethernet ports PCIe 3.0 expansion: 2 x PCIe slots for additional network interface card support Virtualization-ready: Certified for VMware vSphere, Microsoft Hyper-V, Citrix XenServer, and OpenStack Cinder Easy to deploy by IT departments and greatly simplifies operations with comprehensive tools designed for businesses to safeguard their data. Integrated data protection and availability VM, SaaS, and endpoint protection Centralized backup solution to protect VMware and Windows Server virtual machines, Windows endpoints, Office 365, and G Suite accounts. Manage all the backup tasks from one single console and restore data instantly with flexible recovery methods. Prevent data loss with snapshots and replication Synology Snapshot Manager integrates with VMware and Windows for application-consistent data protection. Snapshot Replication enables Shared Folder and LUN protection for all other workloads. Maximize availability Add in another SA3600 to combine two servers into a single high-availability cluster. The active/passive structure ensures smooth service transition between clustered servers in the event of hardware failure.
The Boring Labs has announced that it has achieved the designation of Gold Technology Partner by Milestone Systems. The Boring Toolbox is a series of functional tools that help enterprises and integrators more efficiently manage medium-to-large distributed video surveillance/security networks using Milestone Systems XProtect Express+, Pro+, Expert and Corporate. Managing large, complex systems In March of this year, The Boring Toolbox received accolades from Milestone as the Solution Partner of the Year, North America for being a as a key community member that allows systems integrators and self-maintaining end-users to more efficiently and effectively manage large and complex Milestone installations. “In just over a year, the Boring Lab has been integrated in to key Milestone installations all over the world. Customers include both large enterprise installation and key Milestone Channel Partners who have been able to simplify tedious camera management and reporting that previously took hours out of a system administrator’s time,” said Ronen Isaac, CEO of The Boring Lab. “Our Gold Technology Partner relationship validates our integration and ensures that our customers will get the best possible solutions that have been built and verified to Milestone’s strict standards.” Boring Toolbox, Windows-based application The Boring Toolbox is a Windows-based application that delivers more efficient password, device group, device naming and reporting functions, saving administrators of medium to large scale Milestone Systems and Siemens Building deployments hundreds of hours every year.
Steel fencing manufacturer Zaun Ltd has appointed Mat White from Highway Care Security Solutions. Zaun boasts a long-standing working relationship with White extending back over many years. For the past five years, he has been at Highway Care, initially as project manager on security and major highways contracts, and more recently as commercial manager and director for H2S2, a joint venture business between Highway Care and Hill & Smith business Hardstaff Barriers. White said, “I’m really excited to be joining the Zaun team and can’t wait to get my teeth stuck into my new role, while strengthening long term customer relationships and opening new doors to help create a sustainable future for the business. Zaun is picking up momentum thanks to the high-quality products it manufactures, and the dedicated and enthusiastic team that represent the business.” White project managed the design, program and deployment of security measures utilising the National Barrier Asset (NBA) Deployment of security measures Prior to Highway Care, White spent 12 years at Hardstaff, starting out as a plant operator and quickly progressing through the ranks to site supervisor and then operations manager overseeing highways and security projects. As the UK terrorist threat increased, he project managed the design, program and deployment of security measures utilizing the National Barrier Asset (NBA) for high-profile events including the Nuclear Security Summit in Holland, Champions League Final, G8 and NATO conferences. High security environment Zaun sales and marketing director Chris Plimley said, “Mat brings a wealth of experience to Zaun in the high security environment, having previously worked alongside us on various high profile critical projects over the years. His product and design experience is exceptional, as is his ability to communicate at all levels from the teams on the ground to the end client means, building confidence that the project gets over the line. I’m delighted to welcome Mat into the team.” White joins four other recent recruits at Zaun. Andy Holloway has joined as internal sales manager, alongside sales estimator father and son Dave and Tommy Calvin together with design and production engineer Shane Rowton. Plimley concluded, “These appointments put the Zaun sales team on a stronger footing than ever and are key to driving forward our plans for continued growth coupled with ever improved customer service.”
Ping Identity, a pioneer in Intelligent Identity solutions, has announced significant updates to the Ping Intelligent Identity platform, including improved support for DevOps, multi-cloud automated deployment, as well as secure user authentication experiences that are designed to safely eliminate the use of passwords. These new capabilities broaden Ping Identity’s solution reach across enterprise digital transformation efforts with cloud options spanning public cloud, private cloud or a multi-tenant Identity-as-a-Service. Recent platform enhancements include: Ping Intelligent Identity platform Docker Images and Kubernetes Orchestrations: Solutions within the Ping Intelligent Identity platform are now available as Docker images and Kubernetes orchestrations, allowing customers to quickly deploy multiple Ping solutions as pre-configured bundles. The automated deployments of these solutions support DevOps workflows and multi-cloud deployment across the growing list of cloud providers that support Docker and Kubernetes. These new deployment options provide extremely fast time-to-value for IT teams tasked with infrastructure management, and can enhance security and reliability by reducing the risk and cost of inconsistent configurations. PingCloud Private Tenant solution Dedicated Cloud Environment: As enterprises progress on their cloud transformation journeys, some are choosing to outsource IAM infrastructure management to improve efficiencies and lower costs. PingCloud Private Tenant provides just that through highly configurable authentication and directory tools, combined with concierge support options in a Private Cloud solution hosted and managed by Ping Identity. PingCloud Private Tenant provides customizable security and control in a Private Cloud, including data isolation to help ensure global organizations remain compliant and a step ahead of regulatory requirements. Identity-as-a-Service Cloud Service Customization: PingOne for Enterprise provides a multi-tenant cloud solution that is fast and easy to setup and manage, and now provides additional branding and customization options to present a more seamless user experience. Expanded Global Reach: As demand for PingOne for Customers grows, Ping has responded by expanding its deployment to its data center in the Asia-Pacific region to improve performance and address regional data compliance needs. Passwordless Authentication with FIDO2 Passwordless with FIDO2: Ping Identity expanded use cases for passwordless authentication with the additional support of the FIDO2 standard. FIDO2 support within the Ping Intelligent Identity platform enables passwordless authentication with Windows Hello, enhancing end user experience and reducing the chances of security attacks or passwords being compromised. “Enterprises today find themselves at various stages of digital transformation, which require flexible and agile identity solutions that satisfy cloud your way,” said Loren Russon, vice president, product management, Ping Identity. “At Ping, we’re dedicated to providing our enterprise customers the customizable cloud solutions they need to achieve their modernization initiatives.”
Hanwha Techwin, a global supplier of IP and analog video surveillance solutions, has announced its top 5 key trend predictions for the security industry in 2020. They include AI end-to-end security solutions, cybersecurity, cloud-based data insights, privacy protection and vertical specialized solutions. AI End-to-End Security Solutions As AI becomes more broadly adopted across industries, it is likely to be more widely incorporated in video surveillance in the upcoming year. Edge-based AI (which filters and processes data locally on a camera), will be more ubiquitous, enabling end-to-end AI technology. Today, most security cameras send the data they collect to servers to be analyzed. Edge-based AI (which filters and processes data on a camera) will be more ubiquitous, enabling end-to-end AI technology However, with edge-based AI, the data is analyzed by the camera first and subsequently sent to the server. This reduces the burden of transferring and storing large amounts of data to a server, thereby increasing efficiency, saving time, and reducing server costs typically required analyzing data. In 2020, Hanwha Techwin will introduce edge-based AI cameras, as well as AI-powered NVRs and VMSs, to introduce end-to-end (camera to storage server and VMS) AI security solutions. Cybersecurity Solutions With IoT devices becoming ubiquitous, the importance of cybersecurity has never been more important. Today’s cyber-attacks are more intelligent and advanced than ever, so building cyber-resilient security systems is no longer an option, but an imperative. Smart cities, factories, financial institutions and retailers today require scalable video surveillance solutions which are closely interconnected with other devices and networks, making the importance of cybersecurity paramount. Strong cybersecurity has always been Hanwha Techwin’s priority and the company has been refining the technology since the beginning. The soon-to-be released Wisenet 7, the newest version of Hanwha Techwin’s own SoC (System on Chip), has been designed with the strongest cybersecurity features including a secure booting function and signed firmware for both software and hardware. Validated by the UL Cybersecurity Assurance Program (CAP) certification, Wisenet 7 ensures that users have access to the industry’s most advanced cybersecurity features. Cloud–based Data Insight According to IDC, a provider of information technology market intelligence, there will be about 175 zettabytes of data in the world by the year 2025, with much of it stored in the cloud and data centers around the world. At the same time, video surveillance solutions will go far beyond functioning as a simple monitoring tool to become an indispensable aid to organizations by providing useful insights that improve business operations. The importance of accessible cloud-based servers that can easily store and analyze the accumulated data, will also increase. Going beyond being an efficient storage repository, sophisticated analytics will use cloud processing to analyze the stored data and provide useful insights. In 2020, Hanwha Techwin will introduce cloud-based solutions beginning with the Device Health Monitoring Cloud, which will monitor and manage video surveillance devices in real time. The company will also introduce Retail Insight Cloud designed to facilitate store management. Privacy Protection By its very nature, the video data that is collected for security purposes almost always contains private information Together with cybersecurity, Hanwha Techwin believes that the protection of personal data should be integral to the business ethics of a video surveillance company. By its very nature, the video data that is collected for security purposes almost always contains private information. Therefore, protecting surveillance data is imperative. Around the world, privacy protection laws are being introduced, such as the General Data Protection Regulation (GDPR) in Europe, and the Federal Information Security Management Act (FISMA) in the US. The California Consumer Privacy Act (CCPA), is also set to come into effect in January 2020. These laws will force the video surveillance industry to follow “privacy by design” best practices and renew their efforts to protect personal data from misuse and abuse. Organizations are increasingly aware of the dangers of private data breaches and they are becoming more discerning when choosing security products and solutions. Domestically, Hanwha Techwin provides a solution with VPM (Video Privacy Management) technology and has released its S-COP (Smart Cover of Privacy) lineup to comply with GDPR globally. Vertical Specialized Solutions Vertical markets in the security industry are increasingly requiring more specialized devices and solutions to meet their unique requirements. With the emergence of the 4th industrial revolution, the presence of smart verticals will be more prominent, and video surveillance companies must be ready to provide solutions for smart cities, factories, transportation, and retail organizations. Hanwha Techwin already provides products for these verticals and plans to expand its lineup of specialized solutions in the near future, to include asset management solutions with IoT technology. Advancement in technologies such as AI, IoT and cloud will support new use cases in conjunction with existing devices" “Advancement in technologies such as AI, IoT and cloud, will support new use cases in conjunction with existing devices and solutions to meet customers’ needs in various verticals, expanding the horizon of our industry. However, we must also be mindful of the social and ethical responsibility related to areas such as cybersecurity and private data protection. Sustained interest and investment in these areas must be regarded as an obligation to make sure our industry continues to thrive in the midst of rapid technological advancements,” said Hanwha Techwin’s President & CEO Soonhong Ahn. Total Security Solution Hanwha Techwin is a subsidiary of Hanwha Corporation, a South Korean based company. Hanwha Techwin offers total security solution which encompass network and cameras, recording solutions, video management software and compression technology. Hanwha Techwin has consolidated its leadership position in security solutions by building self-developed SoC chipsets, along with the optical, manufacturing and image-processing technology accumulated over 30 years. Hanwha Techwin is now preparing for the future by continuing to invest in AI technology and cyber security in order to provide intelligent and secure solutions to customers. Under its Wisenet brand, Hanwha Techwin will strive to deliver security solutions which customers can trust.
Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’. The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall success. Secure work environments For years the tug of war in the security industry has pitted the need for a secure environment against the desire for technology that is convenient for users. However, finding a happy medium between the two has often seemed elusive. I believe you can design and have operational convenience at the same time as achieving high security" Jeff Spivey, a security consultant and the CEO of Security Risk Management, has this to say about it, “If there is an understanding of the security-related risks and their separate and/or collective impact on the organization’s bottom line business goals, a resolution can be reached.” Jeff also does not think that convenience and high security have to be opposing each other. He says, “I believe you can design and have operational convenience at the same time as achieving high security.” Importance of secure access control The premise is that for organizations and spaces to be truly secure, they must be difficult to access. So, by its very nature, access control is designed to be restrictive, allowing only authorized staff and visitors to access a facility or other secured areas inside. This immediately puts convenience at odds with security. Most people will tolerate the restrictive nature of a controlled entrance using badge, card or biometric because they understand the need for security. When that technology gets in the way of staff traversing freely throughout the facility during the course of a business day, or hindering potential visitors or vendors from a positive experience entering the building, they become less tolerant, which often leads to negative feedback to the security staff. Enhancing corporate security Security consultants like Spivey and security directors all stress that understanding the threats and risk levels of an organization will most likely dictate its physical security infrastructure and approach. All the technology in the world is useless if it is not embraced by those who are expected to use it and it doesn’t fit the culture of the organization. Once employees and customers are educated about what security really is, they understand that they're not losing convenience, they're gaining freedom to move safely from point A to point B. Converged data and information shape new access options Migration of physical access control systems to a more network-centric platform is a game-changer for security technologies The migration of physical access control systems to a more network-centric platform has been a game-changer for emerging security technology options. The expansion of the Internet of Things (IoT), Near-Field Communication devices powered by Bluetooth technology, and the explosion of converged information systems and identity management tools that are now driving access control are making it easier than ever before for employees and visitors to apply for clearance, permissions and credentials. Wireless and proximity readers Advancements in high-performance wireless and proximity readers have enhanced the user’s access experience when presenting credentials at an entry and expediting movement throughout a facility. A user is now able to access a secured office from street-level without ever touching a key or card. Using a Bluetooth-enabled smartphone or triggering a facial recognition technology, they enter the building through a security revolving door or turnstile. A total building automation approach adds extra convenience, as well as seamless security, when access technology is integrated into other systems like elevator controls. A total building automation approach adds extra convenience and seamless security How to Meet Security Concerns at the Entry While security managers are charged with providing their facilities the maximum level of security possible, there is always the human element to consider. But does the effort to make people comfortable with their security system ecosystem come at a cost? Does all this convenience and the drive to deliver a positive security experience reduce an organization’s overall levels of security? And if so, how can we continue to deliver the same positive experience including speed of entry – while improving risk mitigation and threat prevention? Door entrances, barriers Users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through Let’s examine some of the various types of entrances being used at most facilities and the security properties of each. With some entrance types, there is the possibility for security to fall short of its intended goals in a way that can’t be addressed by access control technology alone. In particular, with many types of doors and barriers, tailgating is possible: users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through. To address this, many organizations hire security officers to supervise the entry. While this can help to reduce tailgating, it has been demonstrated that officers are not immune to social engineering and can often be “talked into” letting an unauthorized person into a facility. Deploying video cameras, sensors Some organizations have deployed video surveillance cameras or sensors to help identify tailgaters after the fact or a door left open for longer than rules allow. This approach is not uncommon where facilities have attempted to optimize throughput and maintain a positive experience for staff and visitors. Security staff monitoring the video feeds can alert management so that action can be taken – but this is at best a reactive solution. It does not keep the unauthorized persons from entering, and so is not a totally secure solution. Optical turnstiles, speedgates Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself. Not all security entrances work the same way. And, there will always be a balance between security and convenience – the more secure the entry, the less convenient it is for your personnel and visitors to enter your facility. For example, it takes more time to provide 2-factor authentication and enter through a mantrap portal than to provide only one credential and enter through an optical turnstile or speedgate. Perimeter protection So, it is an important first step to determine what is right at every entrance point within and around the perimeter. Remember that convenience does not equate to throughput. Convenience is the ease and speed of entry experienced by each individual crossing that threshold, while throughput relates to the speed at which many individuals can gain access to the facility. A more convenient entry makes a better first impression on visitors and is good for overall employee morale. Throughput is more functional; employees need to get logged in to begin their workday (and often to clock in to get paid), and they quickly become frustrated and dissatisfied when waiting in a long line to enter or exit the premises. Considering form and function when designing a security entrance can ensure that those requiring both high-security and convenience are appeased.
With so many high-end professional security companies in attendance, a security trade show is perhaps the least likely environment for criminal activity. Would criminals really choose to mess with the leaders in global security? While it may seem counter-intuitive, personal and corporate security needs to be a priority for every attendee – no matter how secure you may feel. If you are attending a security trade show where you will be surrounded by security experts, you should still not let your guard down. Use your security expertise to remain alert and vigilant to your surroundings. Use your security expertise to remain alert and vigilant to your surroundings Personal safety When it comes to security, there are two main areas where you need to focus on: your personal and your corporate security. Personal safety is self-explanatory: how you keep your person safe from physical attacks. When attending a trade show of any type, it is important that you are willing to speak to people and allow them to approach your personal space. However, it is equally important to set guidelines in order to keep your personal safety. Any location where large amounts of people are in attendance is a potential target for both individual criminal assault and terrorist attacks. Constant vigilance is your best defense here. Below are just a few examples of personal safety standards you should adhere to while attending any type of trade show: Always have a way out: as soon as you are provided a map of the facility hosting the show, commit to memory both the public entrances and exits. As a backup, take notice of the utilitarian transitways used by employees of the facility. Don’t let the most obvious exits become a “choke-point,” where you can be easily become caught in case of a crisis. Stay together: when you leave the venue make sure you do so in your group of colleagues or friends. While you may be anxious to get to your next destination, don’t breach protocol to do so. Keep a buddy system: communicate your known travel destinations with your teammates. If you have a meeting to attend with a client, let someone know when you will be there and when you plan on returning from it. Use tech to your advantage: consider installing a tracking app on the phone of everyone in your group attending the show. An app such as Life360 allows you to easily find your friends in case of an emergency. Drink responsibly: at many trade shows, alcoholic beverages are served. If you decide to partake, make sure that only people you trust are providing those beverages. Furthermore, don’t ever leave drinks unattended – it’s better to grab another than risk a spiked drink. Corporate safety Corporate security is typically a bit broader in that it includes your physical space, the materials or equipment located in your booth, and any proprietary or digital materials shared with clients or visitors. A security trade show will by nature offer a great many products and services that may be proprietary in nature. And so it’s important that everything you bring is accounted for at all times. Here are a few things to keep in mind when thinking about corporate safety: Securing privacy: if you plan on meeting with attendees in your booth, make sure you can provide privacy during your discussions. It is essential to be able to provide a safe place to discuss things. Make sure that prying eyes or sensitive ears can’t pierce your veil of confidentiality. Secure your assets: petty theft is a problem at any venue. To avoid the unexpected loss of your items, you should make sure all laptops, briefcases, backpacks, purses and anything else of value are “cabled” to hardpoints such as heavy tables to keep them from being carried off. Never leave anything important unattended. Secure delivery: if the trade show facility requires contracted employees to deliver your equipment or booth materials to your space, make sure that your materials are locked, secured, and properly labeled to mitigate pilfered or misplaced materials. Do not be afraid to take photos of your booth before it is left for the evening to document the shape it is left in. After all, it is a security trade show Keep in mind that you are there to target clients and customers who may need your products or services. Corporate espionage is a billion-dollar industry now. There are agents who attend security trade shows looking to steal the latest and greatest technology. These “professional spies” are solely there to undercut the success of your company at the show. Make their job as difficult as possible by being smart and alert.
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognize the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognize the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT Increases Threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organization recognize and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organizations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organizations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognizing and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
A larger proportion of cyberattacks in the first half of 2019 can be attributed to electronic criminals (eCrime adversaries) compared to state-sponsored or unidentified attacks. CrowdStrike, a cybersecurity company that provides the CrowdStrike Falcon endpoint protection platform, observes that 61% of targeted cybersecurity campaigns in the first half of 2019 were sourced from eCrime adversaries, compared to 39% from other sources. Technology was the top vertical market targeted by cyber-attacks in the first half of the year CrowdStrike Falcon Overwatch platform The eCrime portion more than doubled since 2018, reflecting an escalation of criminal players in search of more and larger payouts. The trend is among the information presented in CrowdStrike’s Overwatch 2019 Mid-Year Report: Observations from the Front Lines of Threat Hunting. Falcon OverWatch is the CrowdStrike-managed threat hunting service built on the CrowdStrike Falcon platform. Technology was the top vertical market targeted by cyber-attacks in the first half of the year, followed by telecommunications and non-governmental organizations (including think tanks). Other targets (in decreasing order) were retail, financial, manufacturing, transportation and logistics, gaming, entertainment and engineering. Hospitality disappeared from the list so far this year, although Crowdstrike expects an increase in intrusions aimed at the hospitality industry to put it back in the top 10 by the end of the year. Intrusion adversaries In terms of intrusion adversaries, the top players so far in 2019 are Spiders (eCrime) and Pandas (China). Regarding initial access techniques, the most common remain, in order of prevalence, valid accounts, spear-phishing and exploitation of public-facing applications. 2009 is proving to be an active year with a significant increase in eCrime and the inter-relationships occurring across different groups as they strengthen their organizations, forge alliances and expand their footprint. Need for a proactive security posture Basic hygiene form the foundation for a strong cybersecurity program Many of the techniques used by eCrime actors are easily defensible through strong security products and a proactive security posture, says CrowdStrike, which recommends the following measures to help maintain strong defense in 2019: Be attentive to basic hygiene such as user awareness, asset and vulnerability management, and secure configurations, which form the foundation for a strong cybersecurity program. User awareness programs can combat the continued threat of phishing and related social engineering techniques. Asset management and software inventory ensures that an organization understands it footprint and exposure. Vulnerability and patch management can verify that known vulnerabilities and insecure configurations are identified, prioritized and remediated. Multifactor authentication (MFA) should be established for all users because today's attackers are adept at accessing and using valid credentials. A robust privilege access management process will limit the damage adversaries can do if they get in and reduce the likelihood of later movement. Implementing password protection prevents disabling or uninstalling endpoint protection that provides critical prevention and visibility for defenders. Countering sophisticated cyber attacks As sophisticated attacks continue to evolve, enterprises face more than a "malware problem" As sophisticated attacks continue to evolve, enterprises face more than a "malware problem." Defenders should look for early warning signs that an attack may be underway, such as code execution, persistence, stealth, command control and lateral movement within a network. Contextual and behavioral analysis, when delivered in real time via machine learning and artificial intelligence, effectively detects and prevents attacks that conventional "defense-in-depth" technologies cannot address. "1-10-60 rule" in combating advanced cyber threats CrowdStrike recommends that organizations pursue a "1-10-60 rule" in order to effectively combat sophisticated cyberthreats. That is, they should seek to detect intrusions in under one minute; to perform a full investigation in under 10 minutes, and to eradicate the adversary from the environment in under 60 minutes. A source at CrowdStrike said "Meeting this challenge requires investment in deep visibility, as well as automated analysis and remediation tools across the enterprise, reducing friction and enabling responders to understand threats and take fast, decisive action."
Private video systems are offering new sources of evidence for police investigations. Growing popularity of private camera registration schemes are facilitating police department access to video captured by cameras in homes and businesses for use in their investigations. Camera registration programs are organized locally by individual police departments but have common features and operation. By registering their camera systems, citizens and business people provide information to a confidential database listing any cameras police can quickly access in the event of a crime. Knowing which cameras may be near a crime scene avoids police having to go door-to-door in search of possible video footage. Because perpetrators are more careful and aware of possible video coverage in and around a crime scene, video to solve a crime may also come from a camera several blocks away. The best evidence may not be of the crime scene itself but video of nearby pathways and streets. Today’s camera systems also provide information such as location, date and time that can help an investigation Ability to record and retain video Access to cameras can also provide additional viewing angles to provide police new leads such as type of car, clothing, etc. Another benefit is possible use of a camera’s view to help locate lost children, elderly or disabled persons. In addition to actual video, today’s camera systems also provide information such as location, date and time that can help an investigation or be used as evidence in court. Basic requirements for participating video systems are exterior-facing cameras and the ability to record and retain video. It is important to note that registering a camera system with a local police department does not provide active surveillance or a “live feed” of video. Video is only shared after a crime has been committed and when the police request specific video as possible evidence. Registration of camera systems is voluntary Registration merely enables a police department to know where accessible cameras are located. Police then arrange viewing of video footage after the fact by communicating with the camera owners; if a police visit to a residence might pose an additional risk for any reason, camera video today can often be accessed remotely. Registration of camera systems is voluntary; a state-wide proposal in New Jersey in 2015 calling for mandatory camera registration faced privacy backlash and was later amended to make registration voluntary. Collected information is typically the name of the camera owner, contact information, an address where the cameras are located; how many cameras are at the location, the area recorded by the cameras and how the footage is saved. Police arrange viewing of video footage by communicating with the camera owners Residential security camera Portland, Oregon, launched its CrimeReports camera registration program in 2017, part of its wider effort to get residents involved in fighting crime. In Philadelphia, the police department has been registering cameras since 2011 under its SafeCam program. The Philadelphia Department of Commerce offers a payment, up to $3,000, to reimburse business owners who install cameras and register them with the police. Camera registration is yielding results. Baltimore’s Citiwatch camera registration system has had a direct impact on criminal apprehension. The San Luis Obispo, California, Police Department reports a high success rate identifying suspects in cases where additional video evidence exists because of the camera registration program. In Fort Worth, Texas, last May, a residential security camera played a role in capturing a kidnapping suspect. Privacy concerns and community feedback Many of the camera registration schemes have localized branding or acronyms, such as the S.C.R.A.M. (Security Camera Registration and Mapping) program of Milton, Georgia; the C.A.P.T.U.R.E. (Community and Police Team Up to Record Evidence) program of New Braunfels, Texas; or the RockView program of Rockville, Maryland. The idea is based on willing participation of public citizens in helping law enforcement do their jobs Privacy concerns and community feedback prompted Vancouver, Washington, to suspend a camera registration program for weeks until it could be re-launched earlier this year. Although cities seek to protect information about the locations of cameras, it might be subject to disclosure because of public records laws. Law enforcement and crime prevention Registration of cameras is another aspect of involving the community in law enforcement and crime prevention, not unlike the commonplace Neighborhood Watch programs. The idea is based on willing participation of public citizens in helping law enforcement do their jobs. Making video footage available provides important evidence in much the same way a witness to a crime would hopefully testify if asked. By multiplying the availability of cameras that could view elements of a possible crime, the idea is also akin to the modern concept of “crowdsourcing” – the practice of obtaining information or input by enlisting a large number of people. Local jurisdictions stipulate that registrants in the program should not be construed as agents and/or employees of the police department. There is also a crime prevention element to the programs, in addition to helping police do their jobs better and more efficiently. Some camera registration programmes provide stickers or yard signs to let the neighborhood know that their security cameras are helping to fight local crime.
Allot Ltd., globally renowned provider of innovative network intelligence and security-as-a-service solutions for communication service providers and enterprises, has announced that Altice Portugal’s MEO, the country’s largest fixed broadband and mobile service provider, has chosen Allot Secure, a unified Security-as-a-Service (SECaaS) solution to protect the company’s mobile users against a broad range of cyber threats and to provide parental control both on and off-network. Allot NetworkSecure security platform Allot Secure solution is a first-of-its-kind multi-layered platform that integrates network-based and endpoint security The Allot Secure solution is a first-of-its-kind multi-layered platform that integrates network-based and endpoint security. The Allot Secure solution to be implemented by MEO includes the Allot NetworkSecure mass-market network security platform, coupled with endpoint security provided by Allot EndpointSecure. The combined solution enables rapid mass-market user onboarding for cyber security that will protect MEO users anytime and on any network. Subscribers to the Allot cyber security solution will pay a monthly fee which is shared between Altice MEO and Allot. Protection against cyber security threats Enabled by the unified Allot Secure solution, Altice MEO will offer its customers a security service to protect them against emerging cyber security threats, including malware, phishing, ransomware and crypto-mining. Traditional security add-on solutions offered by operators never gained much traction because they rely on customers to install the protection themselves. Allot unified network-based and endpoint cyber security delivers effortless, device-independent end-user security, making it easy for operators like Altice MEO to deliver these security services directly to customers. Allot has reported that other telecom customers have achieved double-digit penetration rates with Allot Secure. Network and data security NetworkSecure, part of the Allot Secure solution suite, is a globally renowned company in the growing network-based, mass-market cyber security category, protecting more than 23M subscribers globally. Coupled with Allot consumer marketing services, the NetworkSecure solution has been proven to achieve penetration rates up to 50%. “Our millions of mobile users are in need of a proven and hassle-free security solution,” said Tiago Silva Lopes, Director Consumer Products at Altice Portugal/MEO. “With this in mind, we selected Allot to offer a mobile service that cannot be bypassed and removes the burden from our customers by protecting them wherever they are. This solution also enables parents to be worry-free about how their children are using their devices.” Unified Allot Secure solution “Altice MEO required a mature, unified solution that combined network and endpoint cyber security for their customers,” said Hagay Katz, VP Strategic Accounts, Cyber Security at Allot. “Our unified Allot Secure solution is a perfect fit. With our revenue sharing partnership, MEO can maximize their ARPU while strengthening their brand and increasing loyalty.”
HID Global, global provider of trusted identity solutions, has enabled BigWise, a global provider of wise solutions worldwide, to bring the security and convenience of biometrics to its retail and restaurant customers. BigWise went from concept to a pilot of its new biometric-enabled Stellar POS platform at a major customer within 30 days using the HID DigitalPersona fingerprint biometric solution. HID DigitalPersona fingerprint biometric solution HID’s fingerprint biometric solution significantly shortened our path for secure fingerprint biometric authentication" “HID’s fingerprint biometric solution significantly shortened our path for adding secure fingerprint biometric authentication services to our Stellar POS platform,” said Jose Rivas, founder and CEO, BigWise Corporation. He adds, “We were able to move very quickly to give our customers valuable new capabilities for stopping internal theft and fraud while simplifying employee access to the Point of Sale (POS) terminal. We expect our lead customer to roll out this new biometric-enabled Stellar POS solution in their operations in the very near future and are excited about the product’s broader market opportunities for us.” EikonTouch fingerprint biometric readers Taking advantage of DigitalPersona’s intuitive biometric software development tools, BigWise added fingerprint biometrics to their POS offering in a matter of weeks. The new solution allows customers the flexibility of choosing the HID Fingerprint biometric reader that meets their requirements, including the DigitalPersona 4500 and EikonTouch fingerprint readers. With the addition of fingerprint biometrics, Stellar POS gives organizations not only a more convenient way to login to their POS terminals but also allows them an effective way to stop labor hour fraud as well as POS theft due to unauthorized manager overrides and approvals. Stellar POS end-to-end solution “We are pleased to have helped BigWise complete this biometric authentication pilot and shorten time to market for its exciting new offering,” said Wladimir Alvarez, senior director of Sales LAM, Extended Access Technology Business Unit with HID Global. “In addition to securing their POS systems DigitalPersona fingerprint biometrics finally allows Bigwise customers to eliminate their dependence on insecure and costly passwords and swipe cards.” Stellar POS provides an end-to-end solution from the store floor or restaurant counter Stellar POS provides an end-to-end solution from the store floor or restaurant counterStellar POS provides an end-to-end solution from the store floor or restaurant counter through the full range of inventory, logistics and production processes and makes it easier to manage offers and promotions, loyalty programs, and accounting and treasury operations. BigWise sells the Stellar POS solution primarily in Colombia, Chile, Argentina and Peru. Identity management HID DigitalPersona biometric readers along with the DigitalPersona software development kit (SDK) solves security and identity management challenges for hundreds of millions of users around the world. To get developers off to a quick start, HID’s DigitalPersona developer kit includes hardware samples, downloadable royalty-free SDKs, sample code, documentation and membership in HID Global’s Crossmatch Developer WebPortal.
Following a competitive tender process Corps Security has been awarded a three-year contract to provide security services to Registers of Scotland at Meadowbank House, in Edinburgh. A team of 10 officers will provide guarding services with a focus on front-of-house, customer service, CCTV monitoring and patrols. Like-Minded organization Registers of Scotland is the public body responsible for compiling and maintaining registers relating to property and other legal documents in Scotland. Mike Bullock, Chief Executive of Corps Security, said: “We are delighted to be working with such a like-minded organization. Corps Security is a trust which was set up to provide employment for ex-servicemen returning from the Crimea. We share values with Registers of Scotland and look forward to working closely together.”
Delfina Chain, Sr Associate Customer Engagement & Development at Flashpoint, discusses what resources defenders must access to in order to keep a finger on the pulse of the cybercriminal underground. Artificial intelligence (AI) is already being applied to diverse use cases, from consumer-oriented devices - such as voice-controlled personal assistants and self-directed vacuum cleaners - to ground-breaking business applications that optimize everything from drug discovery to financial portfolio management. So naturally, there is growing interest within the information security community around how we can leverage AI - which encompasses the concepts of machine learning (ML) and deep learning (DL) - to combat cyber threats. AI-enhanced cyber security The effectiveness and scalability of cybersecurity-related tasks has already been enhanced by AI The effectiveness and scalability of cybersecurity-related tasks, such as malware and spam detection, has already been enhanced by AI, and many expect ongoing AI innovations to have a transformative impact on cyber defence capabilities. However, security practitioners must also recognize that the rise of AI presents a potent opportunity for cybercriminals to optimize their malicious activities. Much like the rise of cybercrime-as-a-service offerings in the underground economy, threat-actor adoption of AI technology is expected to lower barriers to entry for lower-skilled actors seeking to conduct advanced malicious operations. A report from the Future of Humanity Institute emphasizes the potential for AI to be used toward beneficial and harmful ends within the cyber realm, which is amplified by its efficiency, scalability, diffusibility, and potential to exceed human capabilities. Encrypted chat services Potential uses of AI among cybercriminals could include the development of highly evasive malware, the ability for automated systems to exhibit human-like behaviour during denial-of-service attacks, and the optimization of activities such as vulnerability discovery and target prioritization. Fortunately, defenders have a leg up over adversaries in this arms race to harness the power of AI technology, largely due to the time- and resource-intensive nature of deploying AI at its current stage in development. The purpose of intelligence is to inform a course of action. For defenders, this course of action should be guided by the level of risk (likelihood x potential impact) posed by a threat. The best way to evaluate how likely a threat is to manifest is by monitoring threat-actor activity on the deep-and-dark-web (DDW) forums, underground marketplaces, and encrypted chat services on which they exchange resources and discuss their tactics, techniques, and procedures (TTPs). Cobalt Strike threat-emulation software Flashpoint analysts often observe cybercriminals abusing legitimate technologies in a number of way Cybercriminal abuse of technology is nothing new, and by gaining visibility into adversaries’ ongoing efforts to develop more advanced TTPs, defenders can better anticipate and defend against evolving attack methods. Flashpoint analysts often observe cybercriminals abusing legitimate technologies in a number of ways, ranging from the use of pirated versions of the Cobalt Strike threat-emulation software to elude server fingerprinting to the use of tools designed to aid visually impaired or dyslexic individuals to bypass CAPTCHA in order to deliver automated spam. EMV-chip technology Flashpoint analysts also observe adversaries adapting their TTPs in response to evolving security technologies, such as the rise of ATM shimmers in response to EMV-chip technology. In all of these instances, Flashpoint analysts provided customers with the technical and contextual details needed take proactive action in defending their networks against these TTPs. When adversaries’ abuse of AI technology begins to escalate, their activity within DDW and encrypted channels will be one of the earliest and most telling indicators. So by establishing access to the resources needed to keep a finger on the pulse of the cybercriminal underground, defenders can rest easy knowing they’re laying the groundwork needed to be among the first to know when threat actors develop new ways of abusing AI and other emerging technologies.
Amthal Fire & Security has installed a bespoke designed Keyzapp management system at its head offices, to ensure the safekeeping and accountability of client keys at all times. Electronic Fire and security company Amthal required a system to improve key management processes, especially as the business has seen significant growth with an increased number of customer keys being kept on site for property protection, maintenance and monitoring services. Audit control capability for key transactions Keyzapp was selected due to its flexible design. This enabled Amthal to create a system that was easy for authorised engineers to operate, whilst management could rely on audit control capability for all key transactions, without the need for a dedicated member of staff 24/7 manually issuing and recording them. It’s really automated our complete process and has proven to save the engineering team valuable time and resource" Says Simon Kendall, Amthal Supply Chain Leader: “Amthal has a growing network of dedicated engineers that work across the country, with varying access requirements for customer’s keys that are all kept at Amthal offices. Completing manual audits for keys taken had become increasingly time consuming to ensure awareness of allocations and traceability. “The implementation of Keyzapp’s system has made such a difference. It’s really automated our complete process and has proven to save the engineering team valuable time and resource, which they can dedicate to better serving our customers. It runs itself in the background and if there is an issue, it can be resolved quickly and efficiently.” Control to key access with smart credentials Keyzapp’s simple management solutions are designed using latest technology to decrease downtime and improve work efficiencies. The ability to further add control to key access with smart credentials and audit capability ensures full visibility of keys at any time. Tim Hill, Keyzapp Director added: “What Amthal demonstrates is the importance of attention to key control. We worked with the team to tailor our system around the business requirements for asset management, including allowing 24 / 7 access with no need for dedicated staff issuing keys. “The management side has also been scaled around ensuring instant traceability to ensure growing number of keys held on site are accounted for at all times. It’s great to see it’s made such a positive impact on a leading fire and security specialist, who prides itself on ‘protecting what’s precious,’ which includes its key customer assets!” Traceability and visibility for valuable equipment Our engineers find it simple to use, and we’ve even recorded improved site attendance times" So impressed with Keyzapp, Amthal is now working on a bespoke system to manage the specialist loan equipment being booked in and out of its office stores and warehouse, to reflect the same level of traceability and visibility for valuable equipment. Jamie Allam, Commercial Director Amthal Fire & Security concluded: “Keyzapp had an instant impact on the whole team, with improved time and operational savings. Our engineers find it simple to use, and we’ve even recorded improved site attendance times. Plus the management capability is great from our perspective to help towards the efficient, operational running of our business.” User needs for security safety and convenience Independently owned, Amthal Fire & Security is dedicated to satisfying end user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire & security solutions, including intruder, Fire, Access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE.)
Traka has launched a new downloadable white paper to open a discussion on the changing nature of retail banking in the UK, using latest case examples to consider branch management and shifting customer expectations. The white paper, titled ‘Shaping the retail banking industry’ looks at several factors influencing the sector, including the increasing expectations and values of customers demanding a more personalized branch experience. Key and equipment management Incorporating analysis from globally renowned financial services, including PwC, Accenture and Deloitte, the paper highlights the opportunities for innovation, together with collaboration and adoption of new operational processes. This incorporates key and equipment management to enable retail banks to deliver on top quality service. The future for retail banking could arguably also be cited as bleak and in a state of industry disruption" Says Mike Hills, Traka UK Market Development Manager and Author of the white paper: “Against a backdrop of negative press concerning the state of UK high streets, the future for retail banking could arguably also be cited as bleak and in a state of industry disruption, as customers move towards a more mobile-connected lifestyle.” Staff and customer security “However, our research in putting together this white paper tells a different story. That actually, the sector has a real chance to embrace the changes occurring and entice their customers, meeting demands for personal service. We found that brands riding the storm are taking small yet significant steps to tailor their services and make operational differences that are proving key to their success.” The white paper focusses on Traka’s experience with Nationwide Building Society to demonstrate how supporting operational efficiency can benefit banking staff and ensure they can focus on serving their customers, without compromising on security. Retail Banking security Mike concluded, “We have brought this white paper together using the latest research and intrinsic market reports, together with case evidence on the future of the retail banking industry and the issues faced by the sector to ensure long term success.” “Within this, we wish to stimulate debate and encourage views and contributions from as many different voices as possible. We look forward to your opinion, experience or comment on this matter of growing importance so together, we can look to support and shape the future of retail banking.”
Round table discussion
Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: How is the rise in terrorism impacting the physical security market?
Employee turnover is a problem for many companies, especially among younger employees who have not developed the philosophy of employer loyalty that was common in previous generations. Nowadays, changing jobs is the norm. The idea of spending decades working for a single employer seems almost quaint in today’s economy. However, excessive employee turnover can be expensive for employers, who are looking for ways to keep their brightest and best employees happily toiling away as long as possible. We asked this week’s Expert Panel Roundtable: How can the physical security market promote better employee retention in a competitive employment environment?
In today’s global economy, goods are manufactured all over the world and shipped to customers thousands of miles away. Where goods are manufactured thus becomes a mere detail. However, in the case of “Made in China”, the location of a manufacturer has become more high-profile and possibly more urgent. The U.S. government recently banned the use in government installations of video system components from two Chinese manufacturers, presumably because of cybersecurity concerns. A simmering trade war between China and the United States also emphasizes other concerns related to Chinese manufacturing. We asked this week’s Expert Panel Roundtable: Should "Made in China" be seen as a negative in the video surveillance marketplace? Why or why not?