Device Authority, a globally renowned company in identity and access management (IAM) solutions for the Internet of Things (IoT), has announced its latest major software release, which includes KeyScaler Edge software solution.
The current global market is driving a more mature Edge computing model, with localized AI (Artificial Intelligence) and ML (Machine Learning) becoming more mainstream. However, no solution exists in the market, to address localized Edge gateway IoT security services.
Automation for efficiency in Edge IoT deployments
Organizations require automation for Edge deployments, in order to drive efficiency at IoT scale. This includes:
Security lifecycle management
Device bound identity
Leaf device authentication and authorization to edge gateways
Zero touch on-boarding and registration
Automated credential management
Security compliance and regulatory adherence
Safety, confidentiality, data theft/privacy, brand reputation, and revenue protection is important for edge deployments
Additionally, organizations still need to meet compliance and regulatory adherence, for private local network deployments. Safety, confidentiality, data theft/privacy, brand reputation, and revenue protection are important for edge deployments.
“We’re delighted to bring KeyScaler Edge to the market and help our customers, with their IoT edge deployments. Our BETA program has been a success within healthcare, retail, and transport sectors, and we’re regularly speaking with companies, who have experienced similar challenges and see KeyScaler Edge as the solution,” said Darron Antill, the Chief Executive Officer (CEO) of Device Authority.
KeyScaler Edge is the first device, identity-centric IAM (identity and access management) solution, to address the complex end-to-end challenges of IoT security lifecycle management, at the Edge. It is a lightweight version of KeyScaler, which is created specifically for Edge nodes, with the ability to register, authenticate, and provision certificates, and tokens, to devices in the local network, independent of an available internet connection.
“KeyScaler Edge gives technical, security, and operations teams, the confidence that their IoT devices won’t lose robust security when no connection to the Cloud is available,” said James Penney, the Chief Technology Officer (CTO) of Device Authority.
Central visibility of Edge
James Penney adds, “We’ve developed the functionality to support any public and private CA, as well as provide central reporting and management of all certificates, and central visibility of Edge, and Leaf Node relationships. As Edge becomes more mainstream, customers are asking for online and offline capability, and for KeyScaler to solve the associated security challenges.”
Abloy Oy announced ABLOY CUMULUS, a platform for keyless access, combining quality hardware products with secure access and management applications. It brings all the solutions together into a single ecosystem with a risk-free, integrated cloud service.
“CUMULUS is our next step in the ‘keyvolution’ — the development in which mechanical keys are transforming into digital ones. We have wrapped our more than one hundred years of security expertise into digital solutions for connected access management,” said Jussi Ahvalo, Vice President, International Sales, Abloy Oy.
The world is becoming keyless, access rights are going digital, and customers want everything to be integrative. Many property owners and managers are planning to switch to access management that is seamlessly location-independent while securing all their keyless access points.
The key to keyless access
CUMULUS ensures secure access in commercial real estate, public spaces, housing, and sites essential for the functioning of society. It offers interfaces for third-party applications and software development.
CUMULUS range of keyless, online access solutions can be administered with any software tool that best suits the needs
The CUMULUS range of keyless, online access solutions from mobile keys and padlocks to upcoming electric locks and controllers can thus be administered with any software tool that best suits the customers’ needs. By selecting ABLOY OS INCEDO, the organization can also manage other ABLOY solutions with the same tool, such as electromechanical PROTEC2 CLIQ™ and mechanical keys.
“CUMULUS minimizes management risks and provides a secure, tailored, always online and evolving access platform for our customer organizations. It is a cloud service for modern security management. With CUMULUS we provide continuously up-to-date, data-secure access management products and software,” said Jussi Ahvalo.
CUMULUS padlock and software first to market
CUMULUS is targeted at commercial and professional end-users (PEU). In the first phase, its primary vertical markets are parcel deliveries, finance (cash-in-transit), and construction. Geographically, CUMULUS will first be aimed at select markets in Europe and Southeast Asia. More markets will be added gradually.
The first CUMULUS-branded products that will be available for customers later this year include a padlock, a mobile application, a cloud-based software engine (backend), and application programming interfaces (APIs). The APIs allow integrations to third-party applications such as booking, reporting, resource management, and access control systems. New products will continuously be added to the CUMULUS range.
Cymulate, the industry pioneer in SaaS-based Continuous Security Validation (CSV) announced the next generation Extended Security Posture Management (XPSM) platform leveraging its native, Offensive Security technology and capabilities to widely support customers security and business needs.
The combination of these new capabilities follows several product launches over the last six months and provides end-to-end validation of an organization's cyber security posture.
XSPM incorporates four fundamental pillars tied together with analytics to provide meaningful security posture insights: Attack Surface Management, Continuous Automated Red Teaming, and Breach and Attack Simulation alongside an Advanced Purple Teaming framework.
Attack Surface Management (ASM)
ASM tools scan domains, sub-domains, IPs, ports, and other assets for internet-facing vulnerabilities
Helping organizations understand how hackers might get an initial foothold, ASM tools scan domains, sub-domains, IPs, ports, and other assets for internet-facing vulnerabilities. These functions alongside Open-Source Intelligence (OSINT), which could be used in a social engineering attack or a phishing campaign.
Combined with Vulnerability Prioritiation Technology (VPT), these capabilities empower security teams to efficiently prioritize vulnerabilities and mitigation steps, ensuring a shorter time to remediation.
Continuous Automated Red Teaming (CART)
Moving beyond reconnaissance to answering: "how can an adversary breach my defences?" CART tools attempt to penetrate the organization by analyzing the exposed vulnerabilities and autonomously deploying attack campaigns that penetrate the network.
After gaining the initial foothold, an attack subsequently propagates within the network in search of critical information or assets, for example by triggering a well-crafted phishing email.
BAS and Advanced Purple Teaming
BAS tools launch simulated attack scenarios out of the box, correlate findings to security controls (email and web gateways, WAF, endpoint, etc.), and provides mitigation guidance. These tools are primarily used by blue teams to perform security control optimization.
Advanced Purple Teaming Framework expands BAS into the creation of advanced and custom attack scenariosAdvanced Purple Teaming Framework expands BAS into the creation and automation of advanced and custom attack scenarios. These tools easily follow the MITRE ATT&CK framework to model a threat actor, enabling security practitioners to create complex scenarios from predefined resources to custom binaries and executions.
Customized scenarios can be used to exercise incident response playbooks, proactive threat hunting, and automate security assurance procedures and health checks.
Cymulate’s XSPM platform
"With the threat landscape evolving at such a rapid pace, Cymulate's SaaS-based Extended Security Posture Management (XSPM) is better suited to cater to customers' needs," said Eyal Wachsman, CEO, and Co-founder of Cymulate.
"We're now continuing our vision to help organizations stay in control of their security posture while minimizing resources, as well as allowing security professionals and leaders to know and control their cybersecurity posture in a dynamic environment."
The XSPM platform provides out-of-the-box, expert, and threat intelligence-led risk assessments that are simple to deploy and use for all maturity levels, and constantly updated. Deployable within minutes, Cymulate enables security professionals to continuously challenge, validate and optimize their cybersecurity posture end-to-end, across the MITRE ATT&CK framework.
Automating the issuance of all enterprise public or private trusted digital certificates through a single platform reduces the risk of certificate mismanagement and associated outages.
HID Global, a pioneer in trusted identity solutions, has simplified certificate automation for any Microsoft Active Directory-managed network devices with its PKI-as-a-Service (PKIaaS) platform.
Customers can seamlessly issue, renew, replace or revoke certificates automatically with Microsoft Autoenrollment now that any device on the network can easily be connected with HID’s cloud-based PKIaaS via the Microsoft Autoenrollment connector.
Cloud-based PKIaaS platform
HID Global, through its cloud-based, HID PKIaaS platform that delivers the industry’s broadest range of automation capabilities for managing privately issued and publicly trusted certificates.
The platform eliminates manual, risk-prone processes for tracking, installing, and renewing certificates, and provides one secure and convenient cloud-based platform for all certificate needs.
PKIaaS platform’s out-of-the-box integration and Account Certificate Manager enables customers to centrally manage certificates
HID Global has simplified how to integrate Microsoft Active Directory-managed network devices with its cloud-based PKIaaS to automate their certificate lifecycles.
The HID’s PKIaaS platform’s out-of-the-box integration and Account Certificate Manager enables customers to centrally manage all device certificates across the entire enterprise, either manually or through an active directory or a cellphone device management platform, and whether they are issued automatically or manually.
Identity and access management solutions
Microsoft Active Directory has a 44 percent share of the market for identity and access management solutions. Providing out-of-the-box integration and automation support for it in HID PKIaaS eliminates the need for agent-based certificate distribution and automation.
In addition to Microsoft Autoenrollment, HID PKIaaS supports various pre-built integrations with standards-based certificate management protocols including Simple Certificate Enrollment Protocol (SCEP), Enrollment over Secure Transport (EST), and Automated Certificate Management Environment (ACME).
It also provides robust RESTful Application Programming Interfaces (APIs) to integrate with any other third-party tools for certificate orchestration and automation.
PKIaaS’s Auto Enrollment connector acts as a proxy and connects with Microsoft Active Directory
HID PKIaaS’s Auto Enrollment connector acts as a proxy and connects with Microsoft Active Directory for any certificate request that makes an outbound connection to HID’s PKIaaS platform for certificate issuance or updates.
There is no need to update any firewall configuration for an inbound connection since it only makes an outbound connection at port 443. There is also no agent or other configuration change required at the individual device level, enabling customers to leverage existing technology deployments and infrastructure.
About digital certificate and PKIaaS offerings
HID PKIaaS offers trust for the enterprise and its computers, network devices, IoT systems, and e-commerce transactions. Use cases range from securing websites and email communications to digitizing paper-based processes using digital certificates and securing network endpoints or connected machines.
The HID PKIaaS offering with native support for the Microsoft Autoenrollment protocol is available as a low-cost subscription service with a guaranteed uptime Service Level Agreement (SLA).
Schools were never designed and built with social distancing in mind. So, it’s perhaps not surprising that as children returned to schools, for the autumn term this year, the prospect of outdoor classes and assemblies was mooted in the media and by the Government. Many in the education sector are making the case that, should there be further COVID-19 outbreaks, in the coming months, it would be better to utilize outside space, rather than resort to closing schools. In the COVID-19 era, head teachers are considering taking learning and large gatherings, such as assemblies outdoors, when possible.
Managing ‘class bubbles’, hygiene and ventilation
While Dr. Yvonne Doyle, the Medical Director of Public Health England (PHE) has publicly reassured parents that schools are not the ‘drivers’ or ‘hubs’ of COVID-19-19 infection in communities, there is a lot of pressure on school leaders to manage ‘class bubbles’, extra cleaning and hygiene, ventilation, and COVID-19 testing, to protect families and staff.
It’s a logical step to switch, in certain circumstances, to outdoor activities where fresh air is on tap, and social distancing is far easier to manage.
Specially built outdoor classrooms
Across the school and nursery sector, there’s ongoing investment in specially built outdoor classrooms
Across the school and nursery sector, there’s ongoing investment in specially built outdoor classrooms, which had been growing in popularity, even before the pandemic. These facilities offer numerous benefits as an extension of existing learning spaces and provide children the opportunity for hands-on learning, beyond a stuffy classroom.
However, if outdoor spaces are routinely called upon as part of COVID-19 contingency planning, how can schools ensure that their outdoor classrooms and wider areas are secure, robust, and fit for purpose?
When specifying outdoor classrooms and learning spaces, it’s essential to take into account the well-being of the students and staff, who will use them, noise pollution and acoustics. Most importantly, education managers need to ensure the surrounding area is secured and adequately protected from threats, including terrorism.
Perimeter security measures for schools
How can schools and nurseries secure their perimeters, so that outdoor learning is totally safe for all? A starting point is to seek out architects and suppliers, who have a good understanding of security standards.
Worryingly, Jacksons Fencing’s research recently found that only one-third of architects are seeing both LPS 1175 and the UK police initiative, Secured by Design (SBD) physical security standards, specified for schools. This highlights a lost opportunity for architects to propose solutions that are appropriate to the level of risk and needs of the school, without turning the site into an unwelcoming fortress.
Helping schools identify specific security needs
Head teachers would be wise to work with architects, who not only know the latest security standards inside and out, but are also are willing to play a more advisory role, helping the school identify exactly what is needed.
Head teachers should prioritize solutions appropriate to their site’s specific risks
It’s also vital that architects don’t simply replace existing fencing and gates, with the same security systems that have been in place for years. Instead, they will need to meet changing needs and risks. Our research finds that teachers often report issues, with the school perimeter and gates, from being climbed over (28%) and causing injury, to gates not locking properly (10%). Head teachers should prioritize solutions appropriate to their site’s specific risks, which sometimes require altering of existing measures.
School fencing is an important aspect of any education site. As well as defining its boundary and making a visual distinction between public and private property, the fencing and gates that surround and secure a school, will typically meet a wide variety of other important criteria, including preventing unauthorized entry to the grounds, protecting pupils, staff, and visitors from accidents and injury, deterring theft and anti-social behavior, and reducing the risk of malicious damage, and acts of terrorism.
Welded mesh panels for perimeter fencing
Popular options for schools include welded mesh panels for perimeter fencing or sports areas, and railing systems to act as demarcation, in order to control foot and car traffic.
Within the outlying boundary, barriers, bollards and parking posts will keep pedestrians, and vehicles safe from each other, while timber fencing and gates can be designed to control the flow of people, around the grounds and reduce the areas, where students can be hidden from view.
Automated gates and access control
Perimeter fencing must be complemented with safe entrances and exits for vehicles and pedestrians. Every school has unique entry-control requirements, determined by factors, such as size, location and the local environment. These needs influence the decisions you make, when preparing technical specifications for school security gates.
Do you require gates to be steel or timber, manual or automated, single or double leaf? Specialist suppliers will be in the best position to offer inputs on school gates, which typically need to offer solid security and durability, with a welcoming aesthetic.
Specifying access control system
When specifying a school access system, it’s important to consider the areas of the school
When specifying a school access system, it’s important to consider the areas of the school, such as sports fields, car parks, and children’s play and learning areas, and whether it requires playground segregation. Selected gates should meet the design of the fencing, to create a secure perimeter with no weak points, with automated gates conforming to all current safety regulations. .
Noise pollution can be a problem as well, including noise coming in or leaving the school in residential areas. If more teaching is to be carried out outside, it’s worth considering acoustic barriers to reduce noise in and around the school.
Timber acoustic barriers for security and privacy
Timber acoustic barriers offer security and privacy, and can reduce noise levels, by as much as 32 decibels (in laboratory conditions), so are ideal for city center schools or those located close to busy highways.
There are many ways to build an outdoor classroom. Timber products can help to create a welcoming environment, such as wooden shelters, pergolas, fencing, and decking. Always check that high quality timber, ideally guaranteed for 25 years against rot and insect attack, is being used to provide an attractive, cost-effective, safe and sustainable solution, for all weather conditions.
DBS approved installers
And of course, installers must be DBS approved, so that they can install outdoor classrooms, during school holidays, or within term time, with minimal disruption.
The COVID-19 pandemic had a huge impact on schools and learning. While nobody wants to think of fresh outbreaks of the infection, or any other virus, installing an outdoor classroom made from high-quality, long-lasting materials is a great way to future-proof school learning and ensure safety, and preparedness. Putting extra thought and care into the security angle will provide schools with decades of protection against a host of unforeseen events.
The past year has elevated consumer awareness about personal safety, from COVID-19 issues to social unrest, making safety top-of-mind and the need for personal safety solutions, even more prevalent. In addition, consumers spent more time at home, as schools closed, events were canceled and remote work increased.
This prompted two major shifts that, in my opinion, most significantly opened the need for and raised the popularity of mobile safety solutions.
Demand for grocery and food delivery apps surged
Rise in use of app-based delivery services
During the past 18 months, the use of app-based delivery services has skyrocketed
During the past 18 months, the use of app-based delivery services has skyrocketed. With more use comes more interactions among strangers in homes and businesses, and while the majority of these moments are completely safe and convenient, incidents are happening, ranging from uncomfortable situations to physical assaults.
And, with more delivery drivers on the road, there are going to be more accidents among gig-economy workers. Based on recent estimates, food and grocery delivery are expected to remain popular, even as we get back to normal life.
High popularity of mobile security apps and wearables
With more work shifting from stationary locations to working on-the-go, mobile security apps or wearables can be a lifeline in all sorts of situations. It’s important for these mobile safety products to be comprehensive, dynamic and designed to address the full range of people’s safety and security needs, from providing simple human reassurance to dispatching emergency help.
Domestic violence cases increased
According to the National Domestic Violence Hotline, due to COVID-19 lockdown restrictions, domestic violence rose as a result of many victims being stuck at home with their abusers, while sheltering in place and working from home.
Mobile safety apps, such as ADT’s SoSecure
U.S. Attorneys General and other state-elected officials have endorsed mobile safety apps, like SoSecure by ADT
These situations necessitate the need for discreet ways for victims to call for help. U.S. Attorneys General and other state-elected officials have endorsed mobile safety apps, like SoSecure by ADT, as a tool to help victims of domestic abuse, safely call for help, without alerting their abuser.
Over the past year, the mobile safety app market has seen tremendous innovation, including more user-friendly ways to make SOS calls. Today, within a single app, a person can summon help hands-free, by saying a secret phrase, by text or by swiping a button.
Extension of mobile safety into wearable devices
And, users can connect with people trained to help in unsettling situations over video, which can be an effective deterrent and provide video evidence. We’ve also seen the extension of mobile safety into wearable devices, in order to make these devices more discreet and usable.
There will always be some safety risks in our lives. However, the good news is there’s no need to live in a constant state of fear. The easiest, most direct way to be prepared and ready to ‘fight back’ is by having a personal safety tool in your pocket, a mobile safety app that is there, when you need it most.
Today’s organizations face numerous diverse threats to their people, places and property, sometimes simultaneously. Security leaders now know all too well how a pandemic can cripple a company’s ability to produce goods and services, or force production facilities to shut down, disrupting business continuity. For example, a category three hurricane barreling towards the Gulf of Mexico could disable the supplier’s facilities, disrupt the supply chain and put unexpected pressure on an unprepared local power grid.
Delivering timely critical information
Tracking such risk is hard enough, but managing it is even more difficult. A swift response depends on delivering the right information to the right people, at the right time. And, it’s not as easy as it sounds. Indeed, 61 percent of large enterprises say critical information came too late for them, in order to mitigate the impact of a crisis, according to Aberdeen Research (Aberdeen Strategy & Research).
These challenges are accelerating the hype around Artificial Intelligence (AI)
These challenges are accelerating the hype around Artificial Intelligence (AI). The technology promises to help us discover new insights, predict the future and take over tasks that are now handled by humans. Maybe even cure cancer.
Accelerating the hype around AI
But is AI really living up to all this hype? Can it really help security professionals mitigate risk? After all, there’s a serious need for technology to provide fast answers to even faster-moving issues, given the proliferation of data and the speed at which chaos can impact operations.
Risk managers face three major obstacles to ensuring business continuity and minimizing disruptions. These include:
Data fatigue - Simply put, there’s too much data for human analysts to process in a timely manner. By 2025, the infosphere is expected to produce millions of words per day. At that pace, you’d need an army of analysts to monitor, summarize and correlate the information to your impacted locations, before you can communicate instructions. It’s a herculean task, made even more difficult, when we consider that 30 percent of this global datasphere is expected to be consumed in real time, according to IDC.
Relevance and impact - Monitoring the flood of information is simply the first hurdle. Understanding its impact is the second. When a heat dome is predicted to cover the entire U.S. Pacific Northwest, risk managers must understand the specifics. Will it be more or less hot near their facilities? Do they know what steps local utilities are taking to protect the power grid? Such questions can’t be answered by a single system.
Communication - Once you know which facilities are impacted and what actions to take, you need to let your employees know. If the event is urgent, an active shooter or an earthquake, do you have a fast, effective way to reach these employees? It’s not as simple as broadcasting a company-wide alert. The real question is, do you have the ability to pinpoint the location of your employees and not just those working on various floor in the office, but also those who are working from home?
How AI and ML cut through the noise
Although Artificial Intelligence can help us automate simple tasks, such as alert us to breaking news, it requires several Machine Learning systems to deliver actionable risk intelligence. Machine Learning is a branch of AI that uses algorithms to find hidden insights in data, without being programmed where to look or what to conclude. More than 90 percent of risk intelligence problems use supervised learning, a Machine Learning approach defined by its use of labeled datasets.
The benefit of supervised learning is that it layers several pre-vetted datasets, in order to deliver context-driven AI
The benefit of supervised learning is that it layers several pre-vetted datasets, in order to deliver context-driven AI. Reading the sources, it can determine the category, time and location, and cluster this information into a single event. As a result, it can correlate verified events to the location of the people and assets, and notify in real time. It’s faster, more customized and more accurate than simple Artificial Intelligence, based on a single source of data.
Real-world actionable risk intelligence
How does this work in the real world? One telecommunications company uses AI and ML to protect a mobile workforce, dispersed across several regions.
An AI-powered risk intelligence solution provides their decision makers with real-time visibility into the security of facilities, logistics and personnel movements. Machine Learning filters out the noise of irrelevant critical event data, allowing their security teams to focus only on information specific to a defined area of interest. As a result, they’re able to make informed, proactive decisions and rapidly alert employees who are on the move.
Four must-have AI capabilities
To gain real actionable risk intelligence, an AI solution should support four key capabilities:
A focus on sourcing quality over quantity. There are tens of thousands of sources that provide information about emerging threats - news coverage, weather services, social media, FBI intelligence and so much more. Select feeds that are trusted, relevant and pertinent to your operations.
Swift delivery of relevant intelligence. To reduce the mean-time-to-recovery (MTTR), risk managers need an accurate understanding of what’s happening. Consider the different contextual meanings of the phrases ‘a flood of people in the park’ and ‘the park is at risk due to a flood’. Machine Learning continuously increases the speed of data analysis and improves interpretation.
Ability to cross-reference external events with internal data. As it scans different data sources, an AI engine can help you fine-tune your understanding of what’s happening and where. It will pick up contextual clues and map them to your facilities automatically, so you know immediately what your response should be.
Ready-to-go communications. Long before a threat emerges, you can create and store distribution, and message templates, as well as test your critical communications system. Handling these tasks well in advance means you can launch an alert at a moment’s notice.
The ability to minimize disruptions and ensure business continuity depends on speed, relevance and usability. AI and ML aren’t simply hype. Instead, they’re vital tools that make it possible for security professionals to cut through the noise faster and protect their people, places and property.
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex.
Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’.
CV5S and CV52S AI-powered SoCs
The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond.
The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing.
Faster and ubiquitous AI capabilities
Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions"
“Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm.
John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.”
Edge AI vision processors
Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive.
By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing.
4K multi-imager cameras
“However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot.
In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation.
The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022.
Reference boards for camera manufacturers
The software on these new SoCs is an evolution of our unified Linux SDK"
As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families.
“The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot.
Better crime detection
Detecting criminals in a crowd, using face recognition and/or license plate recognition, has been a daunting challenge for security, and one the new chips will help to address.
“Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot.
Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution.
4K AI processing on-camera
The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analyzed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras.
This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and license plates that are hundreds of meters away,” said Jerome Gigot.
The advent of on-camera AI at 4K changes the paradigm
Enhanced video analytics and wider coverage
“Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot.
He adds, “So, next-generation cameras will now be able to identify more criminals, faces and license plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.”
Deployment in retail applications
Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once
Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement.
The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out.
This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics.
Use in cashier-less stores
Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item.
In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking.
Updating on-camera AI networks
Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames.
So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, color, license plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle.
If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene.
Efficient traffic management
With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself
Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyze, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.).
With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control center. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server.
Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video.
On Ambarella’s CV5S and CV52S SoCs, the video can be analyzed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy.
In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualization. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level.
Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas.
“With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.”
Physical security in parking lots
With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot
One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred.
With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the license plates of all the cars going in and out, to automatically bill the owners.
If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go.
Advantages of using edge AI vision SoCs
Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.”
He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.”
He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
BIM (building information modeling) provides a process for creating and managing information during the building lifecycle and beyond. BIM is often equated with 3D modeling of construction projects, but the visual component is just part of the value of BIM.
Additional data, such as specifications and other documentation, is also part of the process, underlying the visual aspects, helping to drive decision making and providing immediate access to detailed information about all facets of the building process.
Incorporating BIM systems
For the last six years, ASSA ABLOY Opening Solutions has worked with specification writers and architects in Europe, the Middle East, and Africa (EMEA) to make it easy to incorporate ASSA ABLOY Opening Solutions doors, hardware, and security solutions into BIM systems.
Everyone on a project can work together in the interactive and information-rich BIM environment. BIM tools are also used by contractors, distributors, facility owners, and security consultants.
BIM information relating to doors, hardware, and security solutions is available in the cloud
BIM information relating to doors, hardware, and security solutions is available in the cloud with the company’s Openings Studio BIM software. This improves the process of door scheduling and visualization and enables customers to focus on the design, installation, and management of openings.
“If you have up-to-date information inside the BIM model, you can reduce mistakes and misunderstanding in the building industry,” says Marc Ameryckx, ASSA ABLOY Opening Solutions’ BIM Manager for the EMEIA region.
“It helps to eliminate mistakes before they happen or as early as possible in the building process. The earlier, the less it costs. We provide data as soon as possible in the process.” (ASSA ABLOY Opening Solutions also has comparable systems available in other regions of the global company.)
Centralized data in BIM 3D model
Expanding the data available in BIM provides additional value compared to merely providing “BIM objects” that can be incorporated into a BIM 3D model. The combination of BIM modeling and the underlying specifications boosts the quality of the project and its key to success, says Marc Ameryckx.
Even after the building is complete, the BIM model is still valuable, providing a repository of “as-built” information that can be used by building managers and security professionals tasked with operating and maintaining the building.
For example, if a lock needs to be replaced, retrofitting is simpler because all the information about the lock and existing installation is available in a centralized data file.
Revit and ArchiCAD
A widely used BIM software is Revit from Autodesk, a program that brings architecture, engineering, and construction disciplines into a unified modeling environment to drive more efficient and cost-effective projects.
Another BIM software program is ArchiCAD, developed by the Hungarian company Graphisoft. Openings Studio™ added a plugin for ArchiCAD this year, in addition to Revit.
Tailor-made information security solutions
We provide tailor-made information security solutions with various hardware on projects with more doors"
“We can provide tailor-made information security solutions with various hardware on projects with more doors, adding more flexibility,” says Marc Ameryckx. “Customers do not need to be the experts on the products because we provide expertise as part of our specifications.”
For example, how often do building mistakes occur because of a misunderstanding about the electrical needs of a lock and the wrong cabling is installed? The problem is especially expensive if it is discovered only after the walls are complete. Providing complete data about the electrical lock as part of a BIM system avoids the snafu.
Another example is the specification of a deadbolt lock on a door that operates with an electric strike. The deadbolt undermines the intended operation of the electric strike and can interfere with escape routes in case of an emergency. The mistake becomes obvious in the BIM environment and can be rectified before consequences impact the real world.
Data addition to Opening Suites site
ASSA ABLOY Opening Solutions is continuously expanding the data it provides at the Opening Suites site, covering additional functionality and more components including the door, cabling, and electrical connections.
Hardware sets are linked to specific doors in the BIM models, including all the details of various components, including article numbers, technical sheets, electrical requirements, all depending on customer expectations.
Physical equipment includes QR codes that can be scanned by a smartphone to provide information on the door (A cellphone app is in development).
More details and more data
Experienced BIM consultants work with the Openings Studio software on projects ranging from single doors to large buildings with many doors.
Data will be more and more important, and there will be more data inside BIM models
Adding more data and detail to the BIM process at the level of each door expands the usefulness of BIM, which has historically been focused on broader issues such as structural work and HVAC. “Openings Studio™ provides all the data to integrate doors and security in the BIM process,” says Marc Ameryckx.
The higher level of detail may be a new aspect even for customers who already use BIM software. “Data will be more and more important, and there will be more data inside BIM models,” says Marc Ameryckx. In the future, the use of “digital twins” could expand the capabilities even further; for example, the software could simulate escape routes in case of fire. More data makes more things possible.
When 150,000 video surveillance cameras get hacked, it’s big news. Even if the main reason for the hack was to make a point. Even if the major consequence is bad publicity for a video company (and, by extension, the entire video surveillance industry).
The target of the hack was Silicon Valley startup Verkada, which has collected a massive trove of security-camera data from its 150,000 surveillance cameras inside hospitals, companies, police departments, prisons and schools. Previously, Verkada has been known for an aggressive sales approach and its intent to disrupt the traditional video market.
The data breach was accomplished by an international hacker collective and was first reported by Bloomberg. The reported reasons for the hack were “lots of curiosity, fighting for freedom of information and against intellectual property, a huge dose of anti-capitalism, a hint of anarchism – and it’s also just too much fun not to do it,” according to Bloomberg.
Tesla amongst those impacted
The “fun” included access to a video showing the inside of a Florida hospital, where eight hospital staffers tackled a man and pinned him to the bed. Inside a Massachusetts police station, officers are seen questioning a man in handcuffsA view inside a Tesla warehouse in Shanghai, China, showed workers on an assembly line. Inside a Massachusetts police station, officers are seen questioning a man in handcuffs. There are even views from Verkada security cameras inside Sandy Hook Elementary School in Connecticut, where a gunman killed more than 20 people in 2012.
In a “security update” statement, Verkada reports: “Our internal security experts are actively investigating the matter. Out of an abundance of caution, we have implemented additional security measures to restrict account access and further protect our customers.”
Hacking was possible due to built-in feature
The hacker group was able to obtain “root” access on the cameras, meaning they could use the cameras to execute their own code, reports Bloomberg. Obtaining this degree of access to the camera did not require any additional hackingUsing that access, they could pivot and obtain access to the broader corporate network of Verkada’s customers or hijack the cameras and use them as a platform to launch future hacks, the hackers told Bloomberg. Obtaining this degree of access to the camera did not require any additional hacking, as it was a built-in feature.
Elisa Costante, VP of research for cybersecurity firm Forescout, calls the Verkada security camera hack "shocking."
"Connected cameras are supposed to provide an additional layer of security to organizations that install them,” she says. “Yet, as the Verkada security camera breach has shown, the exact opposite is often true. [It is worrisome that] the attack wasn't even very sophisticated and didn't involve exploiting a known or unknown vulnerability. The bad actors simply used valid credentials to access the data stored on a cloud server.”
Super Admin account had access to all cameras
Hackers gained access to Verkada through a “Super Admin” account, allowing them to peer into the cameras of all of its customers. They found a username and password for an administrator account publicly exposed on the internet, according to Bloomberg. The hackers lost access to the video feeds and archives after Bloomberg contacted Verkada.Hackers lost access to the video feeds and archives after Bloomberg contacted Verkada
The results could have been worse, says Costante. "In this case, the bad actors have seemingly only resorted to viewing the footage these cameras have captured. But they are likely able to cause a lot more damage if they choose to do so, as our own research team has discovered. We were able to intercept, record and replace real-time footage from smart cameras by exploiting unencrypted video streaming protocols and performing a man-in-the-middle attack. This effectively gives criminals a virtual invisibility cloak to physically access premises and wreak havoc in the real world.”
Impact on broader video surveillance industry
The impact of a well-publicised cyber-attack on the broader video surveillance industry is also a concern. “As an industry, and as manufacturers in physical security, we cannot take these hacks lightly,” says Christian Morin, CSO & Vice-President of Integrations & Cloud Services, Genetec. “The potential broad-reaching impact of these hacks on physical security systems, including providing a beachhead to facilitate lateral movement onto networks, resulting in data and privacy breaches or access to critical assets and infrastructure, cannot be overstated. It is our responsibility and duty to users of our technology to prioritise data privacy and cybersecurity in the development, distribution, and deployment of video surveillance systems.”
Widespread government and healthcare use
The Verkada cameras are in widespread use within government and healthcare, which are by far the company’s most dominant verticals. Lesser verticals for them are manufacturing, financial and retail.The Verkada website pledges to take privacy seriously
Verkada’s line of hybrid cloud security cameras combines edge-based processing with the capabilities of cloud computing. Cameras analyse events in real-time, while simultaneously leveraging computer vision technology for insights that bring speed and efficiency to incidents and investigations. Command, Verakda’s centralised web-based platform, provides users with access to footage they need. Motion detection, people analytics, and vehicle analytics enable searches across an organization to find relevant footage.
The Verkada website pledges to take privacy seriously: “We are passionate about developing products that enhance the security and privacy of organizations and individuals. We believe that well-built, user-friendly systems make it easier to manage and secure physical environments in ways that respect the privacy of individuals while simultaneously keeping them safe.”
Alcatraz AI has announced that they are bringing the Alcatraz AI Rock facial authentication solution to BrainBox AI’s offices. BrainBox AI is at the forefront of building automation and a renowned company in the green building revolution.
Identity and facemask verification solution
As BrainBox AI’s office recently re-opened with limited capacity, the company is taking proactive steps, through Alcatraz AI’s robust identity and facemask verification solution, in order to keep employees safe.
As one survey showed, two-thirds of employees have safety concerns, regarding the return of on-site operations. Considering these statistics, health and safety must be top priorities for businesses, as they re-open. BrainBox AI is keeping its employees’ safety at the top-of-mind, by installing Alcatraz AI’s Rock solution, before they return, to ensure greater safety and security.
Alcatraz AI’s Rock facial authentication solution
Alcatraz AI’s Rock facial authentication solution combines advanced AI and 3D sensing technologies
Alcatraz AI’s Rock facial authentication solution combines advanced AI and 3D sensing technologies, to provide facilities with enterprise-grade identity verification, which is needed to create secure spaces.
Rock’s state-of-the-art security features include touchless access, multi-factor authentication, video at the door and intelligent tailgating detection. Alcatraz AI’s access control solution, the Rock, effectively detects tailgating and sends ‘real-time alerts’, if an unauthorized person enters, and sends real-time notifications to ACS/VMS.
BrainBox AI, leading the green building revolution
“BrainBox AI is leading the green building revolution, and we are looking forward to bringing frictionless, multi-sensor technology and a touchless authentication feature to the office,” said Tina D’ Agostin, the Chief Executive Officer (CEO) of Alcatraz AI, adding “By utilizing the Alcatraz AI Rock, we’ve helped BrainBox AI’s offices re-open smoothly and safely.”
“BrainBox AI is excited to announce its partnership with Alcatraz AI. Our employees’ safety is always our top priority. We are confident The Rock’s touchless authentication and the frictionless security system will give each BrainBox AI employee peace of mind, when returning to the office,” said Jean-Simon Venne, the Co-Founder and Chief Technology Officer (CTO) of BrainBox AI.
ASSA ABLOY’s Code Handle door entry solution is a simple solution for keeping private rooms very private, in order to allow access only to those who require it and authorized personnel.
Code Handle door entry solution
The PIN code setting of the Code Handle access control solution allows users to keep control of who has access, particularly important when they want to keep items away from children.
In primary schools, Code Handle protects each and every room that staff and security don’t want pupils to access. This ensures that only authorized teachers and support staff, who know the code to unlock the door, can access these rooms. All they need to do is enter the code on the Code Handle‘s keypad and the door opens.
Works together with existing locking units
Code Handle, by ASSA ABLOY, works in combination with the existing locking units
Code Handle, by ASSA ABLOY, works in combination with the existing locking units, already installed in facilities. Users can keep the cylinder or lock, and just change the handle to a battery-powered Code Handle.
With Code Handle, there is no need to cable the door, connect it to the mains or install an electronic access control system. The Code Handle door entry solution is perfect for staff offices, kitchens, store rooms, staff toilets, or any other school room that is to be kept private and secure.
ASSA ABLOY’s Code Handle has various benefits, including:
Auto-lock - Staff rooms are used many times, throughout the day, With Code Handle’s auto lock feature, there is no need to remember to lock the door, when exiting.
Easy to install and retrofit - All it takes is two screws and two minutes of time, to install Code Handle on almost any interior door.
Keyless and convenient - Secure rooms with no keys, no wires, and no expensive access control system, with the Code Handle door entry solution.
A host of industry-pioneering fire protection solutions from UK manufacturer, Advanced, have been installed to protect approximately 140,000 sq ft of Grade A office space at Westferry House, Canary Wharf.
As a cornerstone office building situated at the western gateway to Europe’s largest and most successful business district, Westferry House consists of 11 storeys, complete with its retail promenade on the ground floor. At the core of the active fire protection for the building are six Advanced MxPro 5 fire alarm control panels installed alongside Apollo Soteria multi-sensors.
Installing custom-made fire panel
Responsible for all aspects of the installation, as well as the future maintenance of the system, are Advanced partners, Pacific Security Systems Ltd.
The Kent-based fire and security specialists installed the MxPro 5 fire panels alongside Advanced’s remote-control terminal and repeater panel, TouchControl, to provide a discreet and aesthetically pleasing means of viewing the fire system in the building’s recently refurbished reception area.
Advanced’s team was commissioned by Pacific Security Systems to design and manufacture a custom-built annunciator panel
Advanced’s AdSpecials team was also commissioned by Pacific Security Systems to design and manufacture a custom-built annunciator panel to control the pressurization and extraction fans and dampers on all floors of the building. The annunciator also integrates with the building’s VA/PA system to provide manual control of messages on all floors.
Reliable and user-friendly solutions
Kirk Short, Director at Pacific Security Systems, said, “As long-time installers of Advanced with many successful projects, large and small, under our belts, we know its solutions are both reliable and user friendly. The bespoke equipment we required for the fire system upgrade at Westferry House is of an excellent standard, and we found the AdSpecials team very easy to work with throughout the entire design process.”
Advanced’s AdSpecials team works with customers requiring bespoke fire panels to design and manufacture unique fire system solutions, whatever the installation challenge.
Versatile TouchControl solution
Amanda Hope, UK Fire Business Development Manager at Advanced, said, “Canary Wharf attracts some of the World’s most respected and successful companies, and it was fantastic to learn that our solutions have been installed in such a prestigious commercial office space.”
“Westferry House is just a stone’s throw from the Landmark Pinnacle – the UK’s tallest residential building – another iconic site protected by Advanced’s MxPro 5 panels. Westferry House is also a fantastic example of where our TouchControl solution comes into its own, providing additional monitoring and control in a sleek and versatile format that complements the building’s stylish reception space.”
TouchControl is a high-resolution touchscreen repeater that makes it easy to check fire system status via interactive mapsTouchControl is the low-profile, high-resolution touchscreen repeater that makes it easy to check fire system status via interactive maps and zone plans while harmonizing with a wide range of interiors. When in standby, it can be used to display branding, advertisements, and information, but will instantly revert to fire operation when a fire condition occurs.
Advanced, owned by FTSE 100 Company Halma PLC, protects a wide range of prestigious and high-profile sites across the globe – from London’s Shard to Abu Dhabi International Airport and the Hong Kong – Zhuhai – Macau Bridge
Fire protection solutions
Advanced is a world pioneer in the development and manufacture of fire protection solutions. Advanced’s reputation for performance, quality, and ease of use see its products specified in locations around the world, from single-panel installations to large, multi-site networks.
Advanced’s products include complete fire detection systems, multi-protocol fire panels, extinguishing control, fire paging, false alarm management, and reduction systems as well as emergency lighting.
Halma is a global group of life-saving technology companies with a clear purpose to grow a safer, cleaner, healthier future for everyone, every day.
Visa chooses Callsign, as their preferred behavioral biometric digital and device intelligence identity provider. Under the agreement, Visa will introduce Callsign's behavioral biometric and device fingerprinting solutions to the Visa network of financial institutions, payment service providers (PSPs), and merchants across Europe.
Callsign joins the Visa Fintech Partner Connect program giving banks, merchants, and the wider card ecosystem access to Callsign's Intelligence-driven authentication solutions which positively identify consumers using inherent behavioral biometrics while detecting and preventing fraud.
Allowing genuine access via MFA
Callsign technology helps banks, merchants, and PSPs to answer two questions; is the user who they say they are? And are they permitted to access the service they are requesting?
Callsign combines behavioral biometrics, device intelligence with MFA to help authenticate users' identities
Using machine learning techniques Callsign combines behavioral biometrics, device intelligence, and geo-location with multi-factor authentication to help authenticate users' identities.
This approach helps banks, merchants, and PSPs to secure and authenticate users' identities frictionlessly, stopping fraud early and only letting genuine customers access their service and transact safely and seamlessly.
Need for secure and accurate user experience
The agreement comes at a time of spiraling fraud, according to a recent report, every second fraudulent transaction in the finance industry was account take over.
Card, not present fraud (CNP) accounted for 79% of all card fraud across the Single European Payments Area and, figures from UK finance suggest that the money lost to Authorized Push Payment (APP) scams totaled nearly half a billion (479 million) in 2020.
"The need to accurately identify users online for digital payments and online banking is critical due to the shift to online transactions in the past 18 months. Financial services organizations are looking for the technology that provides the most secure, accurate, and seamless user experience to incorporate into their solutions. We are pleased to be joining the Visa Fintech Partner Connect to work with Europe's leading fintech," concluded Amir Nooriala, Chief Commercial Officer, Callsign.
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labor pool will need to be able to meet the host of new challenges.
We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Assembling security solutions has long been considered the role of the integrator, whose role is to pick and choose the best technology tools and then to assemble the complete system. However, more manufacturers are offering pre-integrated end-to-end solutions that include multiple elements from the same manufacturer, designed to work seamlessly together. At the end of the day, end users want to know: Whose role is it to provide security ‘solutions’ – the manufacturer or the integrator? We asked our Expert Panel Roundtable.
Since the advent of the physical security industry, access control has been synonymous with physical cards, whether 125 kHz ‘prox’ cards or the newer smart card alternatives. However, other credentials have also come on the scene, including biometrics and even smart phones. Some of these choices have distinct cost and security advantages over physical cards. We asked this week’s Expert Panel Roundtable: How soon will the access control card become extinct and why?