Cyber security







News
Sectigo, a globally renowned company in digital identity management and web security solutions, has announced the launch of its new Secure Partner Program, furthering Sectigo’s commitment to the company’s base of more than 1,200 partners worldwide. Partners in the program gain myriad benefits, including access to the new Sectigo Connect Partner Portal, advancing their ability to build new capabilities, deliver more value to customers, drive higher profits, and accelerate growth in today’s dynamic cyber security market. Secure Partner Program In the new Secure Partner Program, partners are tiered based on engagement level In the new Secure Partner Program, partners are tiered based on engagement level, so that organizations’ tier within the program aligns with their own business goals. All partners registered in the new program also receive access to advanced training and accreditation programs to help them improve their sales and support effectiveness. Sectigo has added financial incentives, such as a new partner pricing model and dedicated Marketing Development Funds (MDF), to the new program. Accredited partners who grow their sales with Sectigo are rewarded with more incentives for their business and employees. “Partners play a crucial role in Sectigo's growth and success. The new Secure Partner Program enables partners to grow with us and to build a rewarding business around our suite of industry-leading web security products. We've designed our program to enable success and provide the opportunity for better profitability,” said Michael Fowler, President of Channel Partners, Sectigo. Sectigo Connect Partner Portal Timed with its Secure Partner Program's debut, the company has introduced the Sectigo Connect Partner Portal. The easy-to-use platform provides quick, direct access to essential tools and resources that enable partners to engage with Sectigo to successfully introduce new Sectigo products to their customers. Central to the Secure Partner Program, the portal provides access to: Marketing Development Funds (MDF) to support the growth of the Sectigo brand, demand generation, training and other relevant activities. Available to certain tiers of partners. Partner Resource Center, a self-serve repository of sales collateral, technical product documents, marketing tools and guides. Sectigo University, with 70+ training courses for earning sales and technical accreditations. Webinars & events hosted by Sectigo experts, exclusively available to Secure Partners. Program onboarding training to guide partners through the first 90 days, ensuring success. Countering rise in cyber-attacks in COVID-19 period Our new Secure Partner Program aims to tackle the obstacles in the world of web security" The COVID-19 global pandemic and increasing number of cyber-attacks has led to a substantial increase in web security issues for our partners’ customers,” said Michele Campbell, Vice President of Global Channel Programs, Sectigo. Michele adds, “Our new Secure Partner Program aims to tackle the obstacles in the world of web security while helping our partners expand their portfolio beyond the CA market and increase their average deal size. Partners can unlock their full potential with Sectigo and the Secure Partner Program benefits when they include Sectigo’s Web Security Platform solutions in their portfolio.” Sectigo University Easily accessed through the Connect Partner Portal, the Sectigo University online learning and enablement platform for Sectigo Secure Partners enables partners to gain new cyber security expertise, learn about Sectigo’s digital identity and website security products, build new capabilities, deliver greater customer value, and accelerate growth. Available on-demand 24/7 to partners worldwide, the platform offers role-based curricula derived from 70 training courses for sales and technical individuals, delivered through interactive learning modules, with testing. Sectigo provides partners with automated tracking of each student’s progress as they work toward accreditation. Sectigo Secure Sales and Technical Accreditations “The free training within Sectigo University provides pathways for partners to earn their Sectigo Secure Sales and Technical Accreditations. By achieving an accreditation, Secure Partners will maximize their investment in Sectigo solutions by standing out as a true web security expert,” added Michael Fowler.
HENSOLDT UK are pleased to announce the launch of SPEXER 600 multi-mission, X-Band ground-based surveillance radar utilizing SharpEye solid-state transceiver technology. Building upon the excellent pedigree of well-established HENSOLDT products and technologies, SPEXER 600 complements the SPEXER family of Active Electronically Scanned Array or AESA radars, offering a cost-effective and truly crew portable field deployable solution. Design and function Designed to meet user requirements to detect multiple threats in the modern battlefield or security environment, it offers a number of modes allowing multiple functions to be carried out by a single radar sensor. The built-in tracker reduces the need for additional electronic units, making it a lightweight, crew portable unit that can be set up in a few minutes. In fixed installations, the low weight allows it to be installed without any specialist masts or structures. Controlled either locally or remotely from a command center, SPEXER 600 can be easily networked with other sensors. Authority comments “SPEXER 600 from HENSOLDT UK is the solution for today’s complex operational needs on the battlefield, or in securing the nation's critical infrastructure against multiple threats,” stated Adrian Pilbeam, Head of Sales, Ground and Maritime Surveillance Radar.
Globally renowned IP video surveillance integrator, NW Security (NW Systems Group) has signed a partnership agreement with the major unified, intelligent security-as-a-service solutions provider, Arcules. Arcules VSaaS platform The Arcules Video Surveillance as a Service (VSaaS) platform provides organizations with an underlying cloud infrastructure, which offers features such as compatibility between sites, low video latency, data encryption, redundancy, streamlined maintenance, automatic firmware updates and easy onboarding, all built on the Google Cloud Platform. Google Cloud offers several major advantages for those exploring the option of migrating their CCTV system into the Cloud. Firstly, Google has invested in building its own data centers around Europe which can ensure new data privacy requirements under EU Data Protection Regulation (GDPR) are met, while simultaneously minimizing data latency to a few microseconds, something that is crucial in live monitoring of CCTV for example. Google Cloud Google Cloud also offers considerable strength in harnessing Artificial Intelligence (AI) and Internet of Things (IoT) Google Cloud also offers considerable strength in harnessing Artificial Intelligence (AI) and Internet of Things (IoT). This capability can help users match CCTV camera data with data from other connected sensors to add richness to users’ understanding of incidents. This, in turn, helps firms to become more proactive and predictive in their security operations. It also makes it easier to extract business intelligence which can be put to work to find efficiencies and improve profitability for businesses. Fully open platform with support for IP cameras Arcules offers a fully open platform including support for over 3,000 IP camera models available in the market. This enables customers to migrate their existing surveillance cameras to an Arcules Cloud account without the need to buy new cameras. Arcules, which was spun out of Milestone Systems three years ago, also benefits from tight integration with the Video Management Software (VMS) solutions company. This allows Milestone XProtect customers to make smaller remote sites live quickly and with minimal IT resources and downtime using the award-winning Arcules-XProtect Hybrid VMS Solution. Arcules remains a Canon Group company together with both Milestone and Axis. Migration of CCTV systems into the cloud Frank Crouwel, Managing Director of NW Security (NW Systems Group), commented “We are right on the cusp of an acceleration in the migration of CCTV systems into the cloud. Over two thirds (71 per cent) of England-based medium and large-sized firms in the private sector and 43 per cent of public sector organizations we surveyed in September 20201, are planning to migrate CCTV systems into the cloud within the next 12 months.” It’s important to have well developed services for helping firms to migrate CCTV into the cloud" Frank adds, “It’s important to have well developed services for helping firms to migrate CCTV into the cloud. Arcules now offers the right combination of highly secure, yet open and flexible cloud CCTV platform with easy onboarding paths for customers. We are very pleased to be Arcules’ first integrator partner for the United Kingdom.” Open and flexible cloud CCTV platform Michael Hyglid, Sales Director EMEA at Arcules, said “NW Security is set to be a key partner for us in the United Kingdom. Unusually, it has a broad base of customers who prefer to buy equipment direct, often via its specialist IP CCTV online store - Network webcams. NW Security then helps many of these companies to integrate and configure this equipment, so it works optimally.” He adds, “They also understand that some customers are likely to favor buying surveillance capabilities via OPEX rather than incurring considerable CAPEX, which is where Arcules has a lot to offer. I’ve also been impressed by their knowledge of other cloud providers.” ‘Cloud first’ platform Michael further stated, “They understood right away that we are not just a software solution that’s been ported into the cloud but are a 100 per cent ‘cloud first’ platform built on leading cloud tools and principles. They also understand where we are today and the strength of our technology roadmap.”
Bosch Security Systems (Bosch) has introduced the AUTODOME IP starlight 5100i with enhanced image quality and built-in Artificial Intelligence (AI) to help operators react before a potential situation occurs. Designed for outdoor surveillance applications when light levels vary, the AUTODOME IP starlight 5100i has a new ½ inch camera sensor offering 4MP resolution and 20x optical zoom to detect people or objects at a maximum distance up to 1,676 meters (5,498 feet). AUTODOME IP starlight 5100i The AUTODOME IP starlight 5100i camera is equipped with advanced motion optimized High Dynamic Range (HDR-X) at 133dB and starlight technology, which allows the camera to provide exceptional image quality during daytime and at lower light levels, such as dusk and dawn, without blurring of moving objects. The camera is weatherproof with vandal-resistant housing expanding its use to demanding city surveillance situations. Predictive insights The new AUTODOME IP starlight 5100i camera comes with built-in Essential Video Analytics Built-in AI, like Video Analytics, uses metadata to add sense and structure to video footage, enabling cameras to understand what they are seeing and gives customers a smart choice to know what is next. Because situations fluctuate, it is necessary to capture vital information under any circumstance. The new AUTODOME IP starlight 5100i camera comes with built-in Essential Video Analytics to deliver actionable insights that help operators react before a possible threat or unwanted situation occurs. Built-in Artificial Intelligence (AI) This built-in Artificial Intelligence (AI) captures relevant data for uses such as enforcing traffic regulations, detecting vehicles driving in the wrong direction, and delivering occupancy data, such as the number of vehicles entering and leaving a parking garage for smarter, more efficient parking. When idle, the camera can provide relevant and usable statistics like the number of people entering a specific area, and also analyze behavior or assist in enforcing health and safety regulations, such as raising awareness of a blocked emergency exit. Exceptional image quality in outdoor applications Higher resolutions and frame rates, improved dynamic range, and enhanced light sensitivity are considered essential to capturing images that can distinguish individuals or objects for identification or proof. A unique feature of the AUTODOME IP starlight 5100i is the new ½ inch camera sensor offering 4MP resolution, 20x optical zoom, and durable housing to meet demanding applications, especially outdoors. Built-in starlight technology and HDR-X technology The AUTODOME’s built-in starlight technology and HDR-X technology make an ideal combination for this mid-range moving camera. Starlight technology enables the camera to capture color detail when light levels drop to nearly zero and maximize low light performance in around-the-clock city surveillance, especially to increase the visibility of pedestrians at night. HDR-X eliminates shadows and balances uneven exposure with a dynamic range of 133 dB. Operators can quickly and accurately locate a person or object in motion at a distance up to 1,676 meters (5,498 feet). They can manually track individuals of interest as they move, regardless of speed, far beyond a fixed camera’s field of view. Bosch cloud for remote maintenance integration All Bosch video security cameras offer built-in AI as standard and connect to the secure Bosch cloud Everything Bosch does is designed around the customers’ needs, built on trust, and supports sustainable business practices. All Bosch video security cameras offer built-in AI as standard and connect to the secure Bosch cloud for remote maintenance and device management. System integrators can work with customers remotely to perform service when they cannot meet face to face, which is especially important during the current pandemic. With the Bosch Project Assistant, free software, system integrators are supported in the planning, pre-configuration, commissioning, and reporting for video security projects without the need to be physically near the cameras. Bosch Remote Portal The Bosch Remote Portal offers secure device management, set up, and health monitoring via the secure Bosch cloud from anywhere, removing the need to travel. Because video data is often highly critical and sensitive, Bosch has a systematic approach to maximizing data security centered on a built-in Trusted Platform Module to keep video data secure. With remote configuration, management, and planning, system integrators can reduce installation and set-up time and minimize the number of commutes, resulting in sustainable business practices that are economically viable, socially responsible, and environmentally friendly. Combining rich contextual and behavioral information The new AUTODOME IP starlight 5100i supports predictive analytics for outdoor surveillance applications by bringing together rich contextual and behavioral information to help customers respond before a potential situation occurs and deliver business intelligence that goes beyond security.
Expert commentary
Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials are increasingly enabling smart cities to improve the experience and safety of the people who reside there. Rising scope of 5G, AI, IoT and the Cloud The main foundations that underpin smart cities are 5G, Artificial Intelligence (AI), and the Internet of Things (IoT) and the Cloud. Each is equally important, and together, these technologies enable city officials to gather and analyze more detailed insights than ever before. For public safety in particular, having IoT and cloud systems in place will be one of the biggest factors to improving the quality of life for citizens. Smart cities have come a long way in the last few decades, but to truly make a smart city safe, real-time situational awareness and cross-agency collaboration are key areas which must be developed as a priority. Innovative surveillance cameras with integrated IoT Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns. From dangerous drivers to terrorist attacks, petty crime on the streets to high profile bank robberies, innovative surveillance cameras with integrated IoT and cloud technologies can go some way to helping respond quickly to, and in some cases even prevent, the most serious incidents. Many existing safety systems in cities rely on aging and in some places legacy technology, such as video surveillance cameras. Many of these also use on-premises systems rather than utilising the benefits of the cloud. Smart programming to deliver greater insights These issues, though not creating a major problem today, do make it more challenging for governments and councils to update their security. Changing every camera in a city is a huge undertaking, but in turn, doing so would enable all cameras to be connected to the cloud, and provide more detailed information which can be analyzed by smart programming to deliver greater insights. The physical technologies that are currently present in most urban areas lack the intelligent connectivity, interoperability and integration interfaces that smart cities need. Adopting digital technologies isn’t a luxury, but a necessity. Smart surveillance systems It enables teams to gather data from multiple sources throughout the city in real-time, and be alerted to incidents as soon as they occur. Increased connectivity and collaboration ensures that all teams that need to be aware of a situation are informed instantly. For example, a smart surveillance system can identify when a road accident has occurred. It can not only alert the nearest ambulance to attend the scene, but also the local police force to dispatch officers. An advanced system that can implement road diversions could also close roads around the incident immediately and divert traffic to other routes, keeping everyone moving and avoiding a build-up of vehicles. This is just one example: without digital systems, analyzing patterns of vehicle movements to address congestion issues could be compromised, as would the ability to build real-time crime maps and deploy data analytics which make predictive policing and more effective crowd management possible. Cloud-based technologies Cloud-based technologies provide the interoperability, scalability and automation Cloud-based technologies provide the interoperability, scalability and automation that is needed to overcome the limitations of traditional security systems. Using these, smart cities can develop a fully open systems architecture that delivers interoperation with both local and other remote open systems. The intelligence of cloud systems can not only continue to allow for greater insights as technology develops over time, but it can do so with minimal additional infrastructure investment. Smart surveillance in the real world Mexico City has a population of almost 9 million people, but if you include the whole metropolitan area, this number rises sharply to over 21 million in total, making it one of the largest cities on the planet. Seven years ago, the city first introduced its Safe City initiative, and ever since has been developing newer and smarter ways to keep its citizens safe. In particular, its cloud-based security initiative is making a huge impact. Over the past three years, Mexico City has installed 58,000 new video surveillance cameras throughout the city, in public spaces and on transport, all of which are connected to the City’s C5 (Command, Control, Computers, Communications and Citizen Contact) facility. Smart Cities operations The solution enables officers as well as the general public to upload videos via a mobile app to share information quickly, fixed, body-worn and vehicle cameras can also be integrated to provide exceptional insight into the city’s operations. The cloud-based platform can easily be upgraded to include the latest technology innovations such as license plate reading, behavioral analysis software, video analytics and facial recognition software, which will all continue to bring down crime rates and boost response times to incidents. The right cloud approach Making the shift to cloud-based systems enables smart cities to eliminate dependence on fiber-optic connectivity and take advantage of a variety of Internet and wireless connectivity options that can significantly reduce application and communication infrastructure costs. Smart cities need to be effective in years to come, not just in the present day, or else officials have missed one of the key aspects of a truly smart city. System designers must build technology foundations now that can be easily adapted in the future to support new infrastructure as it becomes available. Open system architecture An open system architecture will also be vital for smart cities to enhance their operations For example, this could include opting for a true cloud application that can support cloud-managed local devices and automate their management. An open system architecture will also be vital for smart cities to enhance their operations and deliver additional value-add services to citizens as greater capabilities become possible in the years to come. The advances today in cloud and IoT technologies are rapid, and city officials and authorities have more options now to develop their smart cities than ever before and crucially, to use these innovations to improve public safety. New safety features Though implementing these cloud-based systems now requires investment, as new safety features are designed, there will be lower costs and challenges associated with introducing these because the basic infrastructure will already exist. Whether that’s gunshot detection or enabling the sharing of video infrastructure and data across multiple agencies in real time, smart video surveillance on cloud-based systems can bring a wealth of the new opportunities.
Several major players vigorously employ biometric recognition technologies around the globe. Governments use biometrics to control immigration, security, and create national databases of biometric profiles. Being one of the most striking examples, the Indian Aadhaar includes face photos, iris, and fingerprints of about 1.2 billion people. Financial institutions, on their part, make use of biometrics to protect transactions by confirming a client's identity, as well as develop and provide services without clients visiting the office. Besides, biometric technology ensures security and optimizes passenger traffic at transport facilities and collects data about customers, and investigates theft and other incidents in retail stores. Widespread use of biometrics Business, which suddenly boosted the development of biometrics, is an active user of biometric technology Business, which suddenly boosted the development of biometrics, is another active user of biometric technology. Industries choose biometric systems, as these systems are impossible to trick in terms of security, access control, and data protection. Being in demand in business, these three tasks are also relevant for the industry. However, the use of biometrics at industrial sites is discussed unfairly seldom. Therefore, it is the face identification that is the most convenient there, as workers often use gloves, or their hands may be contaminated, and the palm pattern is distorted by heavy labor. All these features make it difficult to recognize people by fingerprints or veins and significantly reduce identification reliability. Therefore, industries seek facial recognition solutions. Thus, let us demonstrate the application of face recognition technology at different enterprises, regardless of the area. Facial recognition use in incident management Facial biometric products are known to automate and improve the efficiency of security services by enriching any VMS system. These systems provide an opportunity of instantly informing the operator about recognized or unrecognized people, and their list membership, as well as save all the detected images for further security incident investigation. Furthermore, some sophisticated facial biometric systems even provide an opportunity to build a map of the movements of specific people around a site. Besides, it is relevant not only for conducting investigations but also in countering the spread of the COVID-19 virus. Identifying and tracking COVID-19 positive cases Therefore, if an employee or visitor with a positive COVID-19 test enters a facility, the system will help to track his/her movement and identify his/her specific location. It will also help to take the necessary measures for spot sanitary processing. Thus, the introduction of biometric facial recognition at the industrial enterprise can improve and speed up the incidents’ response and investigations without spending hours watching the video archive. Access control system to secure physical assets The right access control system can help industries secure physical and informational assets The right access control system can help industries secure physical and informational assets, cut personnel costs, and keep employees safe. Facial recognition systems may enrich access control systems of any company by providing more security. As biometric characteristics, by which the system assesses the compliance of a person with the available profiles in the database, cannot be faked or passed. The human factor is also reduced to zero, due to the fact that while identity documents can be changed, the inspector can make a mistake or treat his/her task carelessly, be in collusion with an intruder, the biometric system simply compares a person in front of the camera with the biometric profiles database. Biometric facial identification software For example, RecFaces product Id-Gate, a specialized software product for reliable access control to the site, checks the access rights by using biometric facial identification alone or in conjunction with traditional IDs (electronic passes, access keys, etc.), which means that there is almost a zero probability of passing to the site by someone else's ID. The access control system’s functionality allows one to strictly account the number and time of all the facility’s visitors and also track their movement. When unauthorized access is attempted or a person from the stop list is detected, Id-Gate sends an automatic notification to the access control system and operator. Enhanced data and information security Even despite the division of access to different industrial enterprise areas, the security service needs to provide independent information system security. Employees with the same facility access rights may have different access rights to data. However, in that case, a personal password is not enough, as an employee may forget it, write it down and leave it as a reminder, tell a colleague to do something for him/her during the vacation, or just enter it at another person’s presence. Password-free biometric authentication systems make the procedure user-friendly and secure Password-free biometric authentication Password-free biometric authentication systems make the procedure user-friendly and secure. Such systems usually provide an option of two-step verification when successful password entry is additionally confirmed by biometric recognition. Hence, it is particularly relevant due to the current lockdown in many countries. To sum up, the application of biometric technologies solves several issues of the industry, such as: Optimizes and partially automates the work of the security service, as it provides reliable identification and verification of visitors/employees, reduces the amount of time spent on finding a person on video and making a map of his/her movements, without spending hours on watching video archive in case of investigation. Provides a high level of reliability and protection from unauthorized access to the enterprise and the information system. Provides a two-step verification of the user/visitor (including password and biometric data) and almost eliminates the risk of substitution of user data/ID.
As a leader, I am a big proponent of using what’s happened in the past — and is currently happening in the present — to better prepare our business and our customers for what’s to come. Applying this mindset in the financial industry is particularly helpful. The emergence of various technologies and trends enables us to determine what we can optimize for the highest efficiency and satisfaction level. The past few years have been focused on the Internet of Things (IoT), data and analytics, and enhancing proactivity to mitigate the increasingly significant threat of fraud and cyber risks. While each of these elements will continue to play an essential role in the industry moving forward, we’re starting to see two common threads that will rise above all in the coming years: collaboration and convergence. When broken down in terms of its relevance for banks and credit unions, we can expect to see these trends in certain areas in the future. Security and customer engagement We’re starting to see two common threads that will rise above all in the coming years: collaboration and convergence There's no overstating the importance and value of one's hard-earned money. When it comes to keeping it safe, consumers demand their relationship with a financial institution is built on one powerful characteristic: trust. Customers must feel confident in placing their funds in someone else's hands, with the comfort and understanding that the institution's primary goal is to meet their needs while safeguarding information at all times. The digital transformation and incorporation of intelligent technology into the banking environment have undoubtedly changed how trust is defined in this industry. As customers become more tech-savvy, their idea of a trustworthy and engaging banking partner begins. We're seeing the necessity of digital services for elevating customer satisfaction, such as mobile banking, chat features, and intelligent virtual assistants, complementing in-person service, and modernising customer engagement. Now that customers are becoming more aware of some of the risks imposed by technology, simplifying and automating programs is more critical for banks than ever before. To address and mitigate customer concerns about data security and privacy, financial organizations must prioritise deploying an integrated, end-to-end solution that considers the vulnerability of the Internet of Things (IoT) and the risks of the cyber world. A security-led strategy But the aspect of security must remain at the centre of this strategy. As both the financial industry and the threats it faces become more complex, the promise of secure housing and management of one of our most sensitive assets is always top-of-mind. Ensuring adequate security, surveillance, and investigative processes are the key for banks to establish superior customer engagement and develop a healthy relationship based on protection. It’s a simple fact: Financial institutions can’t drive exceptional customer service without security having a seat at the table. In general, the customer experience is typically made up of these two elements above all else, and loyal customers place their trust in banks to demonstrate an apparent dedication to understanding how both sides impact one another — which is in more ways than one. Financial institutions can’t drive exceptional customer service without security having a seat at the table As we start to see the physical layouts of branches evolve to become more productive for customer engagement, it’s imperative to ensure that security is considered in these changes. For example, many bank environments are transitioning to be more liberal and free-flowing, which we will all take advantage of after the pandemic is behind us. These new environments could introduce various risks when it comes to employee and asset protection, making it paramount for security to react to this adjustment accordingly from a safety and fraud perspective. Physical security and IT By now, you’re probably more than familiar with the term “convergence.” The evolution of the threat landscape and the significance of risks that today’s banking and financial providers face have made the word top-of-mind. Organizations worldwide demand a more holistic approach to security to ensure they’re consistently protecting consumer data, employees, brand reputation, and infrastructure. Though this type of convergence has already begun to occur, the integration of physical and IT security will only become more critical in the years ahead. The use of advanced networked and cloud-based technologies in financial institutions — primarily through wireless network connections — has led to IT’s increased involvement in security decisions and operations, which is the right path to follow if a bank or credit union wants to ensure its solutions are protected against cyber threats. The collaboration between physical and IT security teams must exist at every level of the process; from procurement to installation to maintenance over time, it’s crucial that IT personnel are involved and asking the right questions. In the future, physical security groups will likely rely on IT professionals to help them solve problems regarding the technical and cyber sides of security solutions. Collaboration is key Whether it's due to the evolving risk landscape financial institutions face or the desire to adhere to customer demands, it’s become clear that collaboration will be the key to success for banks and credit unions in the future. A modernised customer engagement strategy must incorporate a focus on security, and that element of safety must be comprised of both physical and IT components. A modernised customer engagement strategy must incorporate a focus on security But while the traditional definition of convergence may seem simple to understand, we must look beyond these words to determine how exactly the practice can and should be implemented. In a more detailed sense, convergence can be defined as a marrying of cyber and physical security capabilities to form a comprehensive approach to identify potential threats and expand awareness for better event response. This level of “converged collaboration” fuels a unified and cohesive security strategy built with all areas of security in mind and can lead to better incident management and faster response. And with the potential impact of today’s security threats on a bank’s people, property, and brand, this approach is necessary to ensure that no stone is left unturned.
Security beat
An impact of the COVID-19 pandemic has been to accelerate change. In 2020, the security industry was among many others that sought to adapt to shifting norms. In the process, we grabbed onto new opportunities for change and, in many cases, re-evaluated how we have done business for decades. If necessity is the mother of invention, perhaps crisis is the mother of acceleration. This article will reflect on how these themes impacted the physical security industry in 2020, based on content we published throughout the year, and with links back to the original articles. Sensitive data leakage Since the lockdown came into effect, organizations globally have undergone years' worth of transformations in a matter of months. Whether it has been to transition their operations online or moving their IT infrastructure to the cloud, there’s no denying that the face of business has changed permanently, experiencing a seismic shift, both operationally and culturally. As we enter the ‘next normal’ there remains a great deal of uncertainty around what the next 12 months holds and how organizations can navigate turbulence in the face of a possible recession. One of the most notable and widely reported trends has been the switch to remote methods of work, or home working. With so many employees logging on from residential networks, through personal devices that may be more easily compromised, the overall attack surface has greatly increased, raising the risk of potential corporate and sensitive data leakage in their new home office settings. Security and data protection are larger issues than ever. Good cybersecurity hygiene Criminals will use the crisis to scam people for money, account information and more" With a majority of the world working from home, businesses had to respond to this changing landscape. While it used to be that in-person networking events and sales pitches secured new projects or opportunities, the current landscape pushes businesses to be more creative in how they reach their customers. For example, with ISC West being postponed, many companies have turned to online resources to share new product demonstrations and other company news. Others are hosting webinars as a way to discuss the current climate and what it means for the industry. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Work-Life balance In a typical office with an on-premise data center, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. There are many benefits of working remotely with productivity right up the top of the list There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and traveling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working. Video conferencing platforms Trade shows have always been a basic element of how the security industry does business - until the year 2020, that is. This year has seen the total collapse of the trade show model as a means of bringing buyers and sellers face to face. The COVID-19 pandemic has effectively made the idea of a large trade show out of the question. The good news is that the industry has adapted well without the shows. A series of ‘on-line shows’ has emerged, driven by the business world’s increasing dependence on Zoom and other video conferencing platforms. The fact is, 2020 has provided plenty of opportunities for sellers to connect with buyers. Some of these sessions have been incredibly informative – and conveniently accessible from the comfort of a home office. Online training courses Online training has grown in popularity this year, and the change may become permanent Online training has grown in popularity this year, and the change may become permanent. “We have seen unprecedented international demand for our portfolio of online training courses ranging from small installation companies to the largest organizations, across a wide range of sectors,” says Jerry Alfandari, Group Marketing Manager of Linx International Group, a UK training firm. “More than ever, businesses are looking to ensure they have the skills in-house to coordinate their response to the changing situation. Individuals are also taking this time to upskill themselves for when we return to ‘normal’ by bringing something with them they didn’t have before. Perhaps unsurprisingly, people are still seeking to better themselves for what will be, eventually, a competitive market.” Virtual trade show ‘Crisis and the Everyday’ was part of Genetec’s Connect’DX virtual trade show last spring. The virtual conversation – emphasizing both in form and content the topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry. In the middle of this pandemic, there is an opportunity to help security reinvent itself “In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security.” Cloud-Based platform As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected. “We moved quickly to establish work-from-home protocols to protect our employees and minimize impact on our partners,” says Anne Ferguson, VP of Marketing at Alarm.com. The Customer Operations and Reseller Education (CORE) team has operated without interruption to provide support to partners. Sales teams are utilizing webinars and training resources to inform and educate partners about the latest products, tools, and solutions. Alarm.com’s partner tools are essential for remote installations and support of partner accounts.
Consolidation continued in the physical security marketplace in the turbulent year 2020. There were several mega-deals in addition to shuffling among small and medium-sized companies. Here is a sampling of M&A from this year, compiled from our archive of company news. With the changing economic climate, how much more is ahead in 2021? Stay tuned. Wesco merges with Anixter WESCO International, Inc., a provider of business-to-business (B2B) distribution, logistics services and supply chain solutions, announced it completed its merger with Anixter International Inc., creating a premier, global B2B distribution and supply chain solutions company. Anixter becomes a wholly owned subsidiary of WESCO International. ACRE acquires Razberi ACRE acquired Razberi Technologies, Farmers Branch, Texas, and the product line of intelligent video appliances, automated security software and health monitoring software will be added to and sold under the ComNet brand and portfolio of products. ComNet will now be selling Razberi products through its established channels. Motorola acquires IndigoVision Among the benefits is enhanced geographical reach across a wider customer base Motorola Solutions says the IndigoVision range of products, global presence and customer base are ‘highly complementary’ to Motorola Solutions' existing presence in video security. Among the benefits is enhanced geographical reach across a wider customer base. Motorola acquires Pelco “Pelco’s track record of innovation, internationally recognized brand, global channel and customer installed base enable us to further expand our global footprint with enterprise and public safety customers,” said Greg Brown, Motorola Solutions’ Chairman and CEO, about the iconic brand. Johnson Controls swallows Qolsys Qolsys Inc., residential and commercial security and smart-home manufacturer, enhances Johnson Controls global innovation platform, delivering next generation security and smart building solutions. JCI had already owned a majority stake in the company since 2014. ADT and Google Home partnership The partnership will combine Nest’s award-winning hardware and services, powered by Google’s machine learning technology, with ADT’s installation, service and professional monitoring network to create a more helpful smart home and integrated experience for customers across the United States. Upon the closing of Google’s equity investment in ADT, Google will own 6.6% of ADT’s outstanding aggregate common equity. Securitas acquires STANLEY in Five Countries The acquisition is aligned with Securitas’ ambition to double the size of its security solutions Securitas acquired STANLEY Security’s electronic security businesses in Germany, Portugal, Switzerland, Singapore and India. The acquisition is aligned with Securitas’ ambition to double the size of its security solutions and electronic security business and expands Securitas’ electronic security footprint and capabilities. Allied Universal to Buy G4S Ending the year on a high note, the boards of directors managing Allied Universal and G4S reached an agreement on the terms of a recommended cash offer. The deal brings to a close a six-month bidding war for G4S. The combined business is expected to generate approximately $18 billion in annual revenues with a global workforce of more than 750,000 people in 85 countries. Quantum acquires Western Digital business line Quantum Corporation entered into an agreement with Western Digital Technologies, Inc., a subsidiary of Western Digital Corp., to acquire its ActiveScale object storage business. The acquisition demonstrates Quantum’s commitment to innovation and growth, extending the company’s leadership role in storing and managing video and unstructured data using a software-defined approach. AVA/Vaion/Jazz Networks Ava, a unified security company, announced the completion of the merger between Jazz Networks, renowned cyber security insider threat detection and response firm; and Vaion, an end-to-end video security solutions provider. Ava is now positioned to deliver unified cyber and physical security solutions to organizations worldwide.
Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in a timely fashion. Safe work environment Businesses have a duty of care to provide a safe working environment for their employees and contractors. It is therefore important to limit exposing drivers to risk, to put in place proper safety and security protocols, and to clearly outline them in company policies. Whether an employee or contractor, these drivers represent the brand they work for. If they do not adhere to company-mandated safety and security rules, because the business did not make them aware or they intentionally did not comply by acting with malice, this can put the drivers, other employees, customers and the company at risk financially, legally and with regard to their reputation. Adherence to safety protocols Operating in haste typically results in forced errors and mistakes within the business" “This need to hire drivers quickly resulted in many businesses lowering their standards and accepting certain risks to meet the increased demand. Operating in haste typically results in forced errors and mistakes within the business, potentially leading to harmful events and a damaged brand reputation,” stated Thomas Kopecky, Chief Strategy Officer and Co-Founder, Ontic Technologies (Ontic), a unified protective intelligence software platform. In the conversation presented below, Kopecky outlines the safety and compliance requirements needed to manage the risks while meeting the demand for drivers. Q: What risks do employers face as they ramp up hiring to meet higher demand for drivers? Thomas Kopecky: There have been instances in which a transportation contractor with multiple violations has simply established the business under a new name but continues to operate dangerously. Hastily hiring such a firm without proper enhanced vetting increases the risk from a safety, as well as a business continuity standpoint. Having to terminate a contract and replace a contractor midway can also have significant financial repercussions. In addition to problems created by executing too quickly, employers are now required both to mitigate their own general liability risks and to manage the perceived risk they may create due to the pandemic. For example, if a delivery driver tests positive for COVID-19, there is the potential they have also exposed customers. Employers must consider contactless delivery or other methods and protocols to mitigate this presumed risk of the pandemic. Q: What are the elements of safety and compliance involved in onboarding new drivers? Thomas Kopecky: When onboarding new drivers, corporations must think about more than clean background checks and adequate infrastructure. Whether employees or contractors, organizations must focus on what other risks the drivers bring with them. As part of this review, an open source scrub should be conducted at the outset to discover the driver’s online activity. Through this exercise, a whole host of questions can be addressed including, for example, whether their morals and values align with those of the company. Are they involved with fringe or radical interest groups? Do their actions conflict with the culture of the organization, and could they have a negative impact? These are all questions that employers should be considering when hiring new drivers or contracting a new company. Q: What tools are available to help companies vet their driver fleets and how can these tools make a difference? Employers should also consider State Business Records for potential red flags Thomas Kopecky: To vet their driver fleets, corporations can use several tools and resources that will strengthen the organization’s overall security. Ideally this is a software platform that brings all this information into one place so vetting, real-time data and concerning activities are not siloed but can be connected in order to assess potential risks and threats. Logically, businesses should consider reviewing Department of Transportation Records, which allow organizations to check whether drivers are licensed and appropriately insured. Employers should also consider State Business Records for potential red flags, such as whether an organization is delinquent or no longer functioning in a given state. Finally, it’s beneficial to review civil records as these can highlight any active or past cases associated with an organization. This includes fraud, bankruptcy, poor business practises, and more. Q: What should be the standard methodology to investigate and collect data on new driver programs? Thomas Kopecky: Corporate culture and company policies impact the level of vetting required (determined by company policy), which varies from business to business. Quite often, most valuable investigative content is associated with an actual fleet company owner and not a recently created business entity so it behooves corporations to research this information first. Then verify the information provided is correct, and whether any other conflicting information exists. As previously noted, employers should review civil and criminal records at the state level and cases at the federal level, as it is often the fleet company or owner involved in litigation that could reflect negatively on a brand. Media coverage and consumer complaints are another critical source for negative mentions that may not always appear in public records. You should also ask if the Department of Transportation (DOT) regulates this contract or driver; and if they were once a provider and are now re-applying, is it under a new name? If the answer is yes to either question, it will be necessary to check DOT records for adequate licensing or insurance coverage to ensure providers applying under a new name aren’t trying to circumvent the vetting process. Q: What are the privacy concerns, and how can potential employers ensure they do not violate issues of privacy as they vet drivers (and/or other employees)? Businesses must conduct their operations in a fair, lawful, and transparent manner Thomas Kopecky: Businesses must conduct their operations in a fair, lawful, and transparent manner. Employers often dictate their own guidelines and requirements from company to company. Companies must ensure they follow the law and handle data used for vetting driver fleets in a manner compliant with General Data Protection Regulation (GDPR), Health Information Portability and Accountability Act (HIPAA), and the Fair Credit Reporting Act (FCRA). When utilizing software platforms, those that aggregate public record data in real-time and efficiently to provide actionable insights will be key for protecting corporate driver fleets and businesses overall. Q: How is addressing these issues different in the case of a contracted service versus a company employee? Thomas Kopecky: Addressing these issues will vary from company to company, but it will be important for clients' legal counsel to help interpret the law in the respective state they operate in and make this final determination. This will help shape policy and the employer’s compliance requirements in the area of operation. In some jurisdictions, contractors are vetted and treated like employees who are protected by FCRA. In contrast, there are more broad interpretations of what level of vetting and continuous monitoring can take place on contractors versus employees in other jurisdictions. Q: What is at risk if companies fail to address these issues? Thomas Kopecky: If companies fail to address security issues with managing their driver fleets, they risk major liability, business continuity and brand reputation. Every employee and contractor is in essence an ambassador of the brand, and in many instances, they are the only customer-facing representative for the enterprise. Imagine you are a contractor driving for a major delivery service. If you were to get into an accident and tragically kill someone driving their branded truck, the repercussions of that accident would harm the brand as opposed to the small contracting company by which you are employed. This can have a disastrous impact on the enterprise, both from a reputation and financial standpoint. When proactive steps are not taken to evaluate fleet companies or their owners, this can be viewed as negligence. Consider another example: A brand hires a driver company that has committed fraud while operating under another company’s name. What is the brand’s cost to conduct an initial onboarding assessment of this company versus the cost of investigating an issue, terminating the contract, and dealing with any potential litigation that might follow? The latter is clearly the financial burden. Corporations must proactively address risk associated with their driver fleets to mitigate risk before it occurs. Q: What is the biggest misconception (in the industry and/or the public at large) about employee vetting requirements? Enhanced vetting today often includes looking into a contractor’s background or its company Thomas Kopecky: We have passed the days where everything is all about criminal background checks and instant alerts when a driver receives a DUI. We are entering a world where business continuity and resiliency are necessary. Companies are so reliant on contracted services or seasonal employee pools that if that roster of operators were found to be unsuitable, the business itself would not meet the demands of its customers. Before the digital age, people only understood the driver vetting process to be based around a search of felony convictions. Enhanced vetting today often includes looking into a contractor’s background or its company from a different vantage point. Employers must begin to think about litigation history, negative media coverage and vocal social platforms, history of poor business practices or fraud, and more. These are factors that need to be considered for a business to mitigate risk and maintain continuity of service in an era where timeliness and instant gratification are highly valued.
Case studies
Synectics, a globally renowned company in the design, integration and support of advanced security and surveillance systems, announced that the company has won a new contract with Irish Rail (Iarnród Éireann) to upgrade all InterCity Mark 4 rolling stock on the Dublin to Cork route to an IP-based video surveillance solution, following a competitive bid process. The IP video security system contract will see Synectics develops and installs an innovative safety-critical IP video surveillance system that enables full connectivity from trains to the control room, there by replacing the existing CCTV approach. Safety-critical IP video surveillance system installation Each eight-coach train set, using Synectics’ T2000 platform, will help utilize a suite of IP 360-degree ‘fish-eye’ cameras Each eight-coach train set, using Synectics’ T2000 platform, will help utilize a suite of IP 360-degree ‘fish-eye’ cameras, in the vestibules and saloon areas, to provide high-quality surveillance information. Installation is expected to commence in September 2021, to be followed by an additional support contract to provide a five-year in-territory maintenance program. IP video security technology Iain Stringer, Managing Director of Synectics, commented “We are delighted that Irish Rail has chosen our IP video security technology, alongside our design, program management and installation capabilities, to upgrade surveillance on one of their premier InterCity routes.” Iain adds, “This win with Irish Rail represents a further step into on-vehicle heavy rail solutions for our Synectics Security business, building on our deep experience across light-rail markets.” Smart technology developments He further stated, “Irish Rail is our second public transport win in Ireland over the last few months and reflects our growing reputation for smart technology developments that meet next generation operator requirements. Our approach is opening up new opportunities for all rail operators to transition their video management capability to the cloud and improve operational effectiveness.”
Since the beginning of the Corona pandemic, MOBOTIX thermal cameras have been increasingly used in the healthcare sector, as well as airports, train stations, public authorities, and companies, to detect temperature anomalies in people without contact and thus contain the spread of the virus. However, this aspect is only one area for which MOBOTIX technology is currently providing special services. The MOBOTIX 7 Platform, with its intelligent and cyber secure camera systems M73 and S74, predestined MOBOTIX video technology even before the pandemic to ensure comprehensive, digital support in healthcare clinics and the care of the elderly and disabled. The reliable, high-quality video systems made in Germany reduce hospital and nursing staff's workload, provide digital care for patients and residents, and optimize care and workflow processes. Parking lot management Basic safety and pandemic protection in healthcare Also, during the pandemic, a special duty of care applies to employees, patients, and residents as a risk or high-risk group. MOBOTIX video technology is used in numerous clinics, retirement, and care facilities worldwide to ensure that patients, residents, and employees have a carefree stay and can work safely. Dangers and sources of risk are detected, and the intelligent systems warn, report, or directly initiate assistance and rescue measures. With the MOBOTIX 7 platform and the versatile apps, MOBOTIX offers exceptional application possibilities This allows staff to concentrate on their work, while hospital patients and nursing home residents can recover more quickly and get the rest they need. MOBOTIX video technology is also used for early fire detection and access control, mainly to protect sensitive areas such as sterile rooms, operating theaters, or medication depots. MOBOTIX also offers the right solutions for intrusion and theft protection, securing outdoor spaces, or access monitoring and parking lot management. With the MOBOTIX 7 platform and the versatile apps, MOBOTIX offers exceptional application possibilities: Temperature-sensitive people are detected as soon as they enter the facility and can be immediately sent for further examination. Crowding is avoided, and social distancing can be supported. MOBOTIX video systems detect when no mask is being worn and trigger an alarm or an information announcement. Cybersecurity and data protection Cybersecurity and data protection "Made in Germany” Particularly in the healthcare sector, cybersecurity and data protection must be given the highest priority. After all, it is a matter of protecting lives. But it is also about sensitive, personal data that must not fall into the wrong hands under any circumstances. MOBOTIX video systems consist of high-quality components. Developed, produced, and comprehensively tested at the company's German headquarters in Langmeil/Rhineland-Palatinate, the company creates products and solutions that are impressive not only because of their outstanding image quality - even in the most challenging lighting conditions. One hundred percent DSGV-compliant, the decentralized MOBOTIX systems stand for the highest possible cybersecurity and comprehensive data protection. Unauthorized persons cannot read the stored data. Intelligent video technology Relieving the workload of hospital and nursing staff with "digital care” Using intelligent video technology from MOBOTIX can significantly reduce the hospital and nursing staff's workload Hospital and nursing staff often work at the breaking point. Using intelligent video technology from MOBOTIX can significantly reduce the hospital and nursing staff's workload. For example, adequate video support can be used to carry out control rounds digitally. On the one hand, this creates free space that can be used for personal care and nursing, while on the other hand, emergencies are reported directly at the time they occur - and thus, the staff does not lose critical time. Effective signaling and calling systems targeted alarm differentiation, and the avoidance of false alarms keep staff motivation high and reduce alarm fatigue. Incorporating audio systems Digital and discreet care for patients and those in need of care MOBOTIX provides discreet video support for round-the-clock security without anyone feeling they are being watched. The video surveillance systems in healthcare facilities are discreetly and unobtrusively installed; they also detect and alert only when defined events occur to keep recordings to a minimum. At the same time, patients and residents can be sure that help will arrive quickly in an emergency. Even at night, helpless individuals are detected immediately, ensuring their safety and preserving their independence. By incorporating audio systems, MOBOTIX video solutions for healthcare also enable patients to be addressed and communicated directly with. license plate recognition Optimize hospital and care processes Smooth organization of routines helps hospitals and retirement and care facilities be efficient and profitable Smooth organization of important routines helps hospitals and retirement and care facilities be efficient and profitable. Numerous processes can be automated and optimized with MOBOTIX video technology, from the facility's journey to check-out. For example, professional parking management with license plate recognition can ensure that only authorized vehicles can access specified areas. In this way, ambulance access routes can be kept free, or parking fees can be billed in a straightforward, fast, and accurate manner. Queues in registration or examination areas can be avoided, and smooth administration and medical and care areas can be enabled. University hospitals or teaching institutions can use high-resolution camera systems, e.g., in operating theaters, to fulfill their teaching and training mission without disruptions. Customers can develop further apps that enable completely individual solutions themselves or have them created by MOBOTIX and its technology partners and certified concerning cybersecurity. Advanced video technology Comprehensive solutions with the best return on investment Healthcare is a market that is extremely important to MOBOTIX. The high level of solution expertise digitizes processes and work steps in everyday hospital and home life, using intelligent and future-proof video technology. Thus, simplifying work and making it safer also relieves the healthcare budgets' pressure and increases profitability (ROI).
The first phase in a pioneering smart transport project to transform security, passenger service, and operational management across Berlin’s S-Bahn rail network has officially gone live. Teams based at S-Bahn’s ‘4S’ operational headquarters are now, via the latest developments in Synectics’ Synergy hybrid cloud software platform, able to connect, respond, and collaborate with passengers and staff on-board trains, at stations, and with field personnel working anywhere across the network. Synergy hybrid cloud software The new capabilities, including an innovative mobile application, mark a revolutionary step forward in the way operational command, control, and communications are carried out within urban rail environments. The project, which went live as scheduled on 1 January, is the result of an innovative partnership between S-Bahn Berlin GmbH (a subsidiary of Deutsche Bahn) and command and control solutions expert, Synectics. The two companies’ combined ambition has led to the development of a tailored system that delivers a positive customer experience both now and well into the upcoming decade. Integration with S-Bahn’s proprietary systems Leveraging powerful tools to form custom API gateways, Synergy integrates to S-Bahn’s proprietary systems Leveraging powerful tools to form custom API gateways, Synergy integrates to and interoperates with S-Bahn’s proprietary systems, as well as all third-party technologies, devices, and communication solutions vital to passenger service, safety, and security. This is achieved in real time, and continuously informed by sensor data obtained from integrated systems crucial to operating safe and efficient passenger services. The new Synergy mobile application will enable S-Bahn’s workforce to receive automated task assignments based on their role, skills, and location, and to directly update the system on their delivery of those tasks, the sophisticated level of integration and interoperability achieved is unprecedented. Intelligent digitization of workflows Henning Oelze, Project Manager at S-Bahn, commented “Synergy’s powerful integrations, intelligent digitization of workflows, workforce management capabilities, and computer-aided dispatch functionality combine to deliver a hugely exciting outcome. The platform offers complete visibility of network-wide activity and the ability to coordinate and automate the right response, at the right time, to any requirement.” Henning adds, “It was with huge pleasure that we saw our first trains and Security and Service teams utilizing the new Synergy system, especially given how challenging this last year has been. It really is a revolutionary step forward in our mission to deliver outstanding passenger service, while at the same time, making life much easier for our personnel through the advanced automation of operational processes.” Rapid resource communication and deployment From fulfilling a planned maintenance task to sending people with the most appropriate training to deal with an evolving security or safety issue, Synergy will facilitate the rapid communication, deployment, and appropriate action of different teams. This will equip S-Bahn to process and react to events within pre-defined response times, and to manage its workforce as effectively as possible. The project is scheduled to continue during 2021, with the two organizations building further technical capabilities and driving ahead with continuous improvement. Key enhancements will see extensions to the workforce management functionality and more developments to improve operational efficiency within incident and task management assignments. Smart transport systems standards Some of the software developments driven by this project will have long term implications for the sector" Greg Alcorn, Director, Global Sales & Customer Success at Synectics, said “S-Bahn Berlin is viewed as a technological trail-blazer and we’ve thoroughly enjoyed working with such a well-organized team to deliver the first step in their truly inspirational vision for urban transport.” Greg adds, “Some of the software developments driven by this project will have long term implications for the sector. I have no doubt that there are new standards being set here for smart transport systems of the future.” Future of smart transport operations In addition to the ground-breaking technology used, the project also demonstrates the advances that can be achieved through international collaboration. Henning Oelze stated, “Having such direct access to Synectics’ product development team in the UK and knowing that they understood how agile we needed this solution to be, has made a huge difference." He adds, “They shared our vision for the future of smart transport operations in a major European capital and worked in close partnership with the S-Bahn team, successfully navigating their way through the technical, logistical and cultural challenges of a major international project. The close nature of this collaboration is the reason we have reached this crucial go-live milestone, despite all the hurdles that 2020 put in our way.”
St Louis-headquartered insurance brokerage Crane Agency is to roll out CyberCube’s Broking Manager, the cyber risk analytics platform for insurance intermediaries. Crane Agency is a US top 100 retail insurance broker, the oldest west of the Mississippi. Established in 1885, the business is licensed in 50 states and has four other offices in Missouri with over 250 staff. Broking Manager is the first software-as-a-service application CyberCube has built specifically for the insurance broking community. It offers a streamlined approach to generating financial exposure impact that helps clients make informed decisions on coverages and limits. Financial impact of cyber risk Broking Manager will allow Crane’s team to quantify and explain to their clients the sources and financial impact of cyber risk exposure. The platform also produces reports that can be used to educate prospects and clients on potential sources of loss, recent and relevant cyber events, and peer-to-peer benchmarking. Authority comments Pascal Millaire, CEO for CyberCube, said, “Crane Agency is a forward-looking insurance business that sees much potential in the cyber market. It’s been a pleasure to work with them and we’re thrilled they’ve chosen to use Broking Manager to assist with understanding their clients’ needs.” Beth Martin, Management Liability and Cyber Practice Leader, Crane Agency, said, “We’re very excited to be partnering with CyberCube. It’s our firm belief that Broking Manager will provide exceptional insights for our clients at a time when the cyber risk landscape is changing markedly.” “The pandemic and the shift in working patterns it has generated mean new risks, new modes of cyber-attack, and new vulnerabilities. With businesses coming to terms with these changes, we see considerable potential for growth in the cyber insurance market.” Portfolio Manager and Account Manager Broking Manager complements CyberCube’s two other products, Portfolio Manager and Account Manager, which are designed for risk carriers and are used by foremost companies across the insurance ecosystem.
Round table discussion
As an industry, we often speak in buzzwords. In addition to being catchy and easy to remember, these new and trendy industry terms can also reflect the state of the security market’s technology. In short, the latest buzzwords provide a kind of shorthand description of where the industry is - and where it’s going. We asked this week’s Expert Panel Roundtable: What new buzzword(s) rose to prominence in the security industry in 2020? (And how do they reflect industry trends?)
Internet-based training has long provided a less-expensive alternative to in-person classroom time. There are even universities that provide most or all of their instruction online. However, the COVID-19 pandemic has expanded acceptance even more and increased usage of internet-based meeting and learning tools. We asked this week’s Expert Panel Roundtable: How can remote or Internet-based training benefit the physical security market?
Video storage has been a challenge since the days of VCRs and videotape. Storing images is a central need for any video systems, especially one that is focused on the forensic and investigative aspects of video. Today, digital video is stored on hard drives and even in the cloud. Increasingly, video is considered “data” that drives a variety of video analytics and even artificial intelligence (AI) applications. We asked this week’s Expert Panel Roundtable: What are the new trends and opportunities in video storage?
Products


White papers

2021 Trends in Video Surveillance
Download
Cloud Video and Smart Cities
Download
Security Investments Retailers Should Consider For Their 2021 Budget
Download
Cyber Security and High Security in a Business Integrated World
Download
The Security Behind Financial Security
Download
Financial Institutions Require Future-Ready Physical Security Technologies
Download
How To Overcome The Storage Challenges Of Adopting Surveillance AI
Download
Physical Security Supports A Future-Proof Cyber Security Strategy
Download
The Role Of IT In Physical Access Control
Download
Making Your Surveillance Cyber Secure
Download
Convergence Of Physical And Logical Access
Download
Is Access Control In The Cloud More Cost Effective?
Download
How Do You Know Access Control In The Cloud Is Secure?
Download
Three Reasons To Upgrade Your Access Control Technology
Download
What Do I Need To Know To Successfully Deploy Mobile Access?
Download
