HiveWatch, a security fusion startup company that uses multi sensor fusion to help companies respond better and effectively to physical security threats, has emerged from stealth and announced a seed funding round led by CrossCut Ventures, with participation from Freestyle and SaaS Ventures.
Centralizing event data
HiveWatch’s platform pulls data from a company’s disparate monitoring systems and security sensors to provide operators a single-pane-of-glass to evaluate and respond to alerts.
By centralizing event data, HiveWatch reduces the security program noise that plagues operations
By centralizing event data, HiveWatch reduces the security program noise that plagues operations, using multi-sensor analysis and machine learning to only elevate events that require a human response.
With years of experience building comprehensive security programs for both unicorn startups and renowned Fortune 500 enterprises, HiveWatch’s Chief Executive Officer (CEO) and Founder, Ryan Schonfeld is addressing the biggest common challenge in building an advanced and state-of-the-art global security operations center.
Security operations platform
“We’re building a platform to make security leaders more aware, more connected, more proactive, and more informed,” said Hive Watch Chief Executive Officer and Founder, Ryan Schonfeld.
He adds, “Noise from the wide range of legacy sensors that exist within most companies’ security infrastructure is only addressed by hiring more people to process the data, resulting in a reactionary security program yielding minimal return on investment. The overarching vision of HiveWatch is to help the security leaders we talk to every day gain the intelligence needed to make their teams more effective.”
Multi-sensor analysis to reduce noise
HiveWatch reduces 90% of the noise that plagues operations centers on a daily basis and allows operators to evaluate the remaining threats as fast as possible.
Instead of operators switching between each sensors’ proprietary software to manually gather situational data, HiveWatch empowers operators by presenting all significant event feeds in one window as an alert comes in.
Vast experience in technology startup execution
HiveWatch is made up of top technical talent from Apple, Bird, Cisco, Disney, and NORAD
HiveWatch is made up of top technical talent from Apple, Bird, Cisco, Disney, and NORAD, who have a broad combined security expertise in advanced military operations knowledge with high-growth technology startup execution.
HiveWatch’s Head of Product, Jordan Hill has previously led multiple teams at Bird to develop machine learning solutions to contextualize hardware and software data for internal safety operations, sidewalk detection, and asset recovery that returned millions of dollars in capital investments and revenue globally.
Enhanced interoperability and visibility
“We were attracted to the background of this founding team, and their history and experience in scaling corporate security systems for high-growth companies like Bird,” said Brian Garrett, Co-Founder and Managing Director at Crosscut Ventures.
Brian adds, “Ryan and Jordan have figured out how to bring interoperability and visibility into an antiquated software and hardware ecosystem. Their approach will make corporate security programs more accessible for both high-growth startups and Fortune 500 enterprises as we enter a post-Covid, data-driven paradigm.”
Building scalable and efficient security programs
HiveWatch is directing their funding to expand their team with new and diverse security leaders and system engineers to accelerate feature releases and onboarding customers from their wait list.
“Interoperability has been a problem in physical security since I started my career more than 30 years ago,” said Ron Rothman, former President of Honeywell Security and a HiveWatch Advisor, adding “The nature of products available today has made scaling security cumbersome. With HiveWatch, you can build scalable and efficient programs by sense making and reducing noise across disparate security sensors.”
HiveWatch is the multi-sensor security fusion platform that brings the right people, information, and tools together to achieve higher levels of security and safety. HiveWatch provides teams with access to the data they need, when they need it by delivering fused intelligence to empower proactive security.
AlgoSec, the network security management solution vendor, has introduced enhanced application visibility and auto-discovery features, and extended its integrations with SDN and SD-WAN solutions, in the new version of its core Network Security Management Suite.
AlgoSec A32 version
AlgoSec’s new A32 version gives IT and security experts the most comprehensive visibility and control over security across their entire hybrid environment. It enables organizations to align and manage their network security from a business perspective, giving them new automation capabilities for seamless, zero-touch security management across SDN, cloud and on-premise networks from a single platform.
The key benefits that AlgoSec A32 delivers to IT, network and security experts include:
Enable secure deployment of micro-segmentation in complex hybrid networks
Built-in AutoDiscovery capability
A32 automates identifying and mapping of the attributes, flows and rules that support business-critical applications across hybrid networks with the built-in AutoDiscovery capability.
This accelerates organizations’ ability to make changes to their applications across the enterprise’s heterogeneous on-premise and cloud platforms, and to troubleshoot network or change management issues, thereby ensuring continuous security and compliance.
Align and manage all network security processes from a single platform
Risk detection and mitigation for cloud misconfigurations
AlgoSec A32 version gives organizations instant visibility, risk detection, and mitigation for network or cloud misconfigurations, and simplifies security policies with central management and clean-up capabilities.
This makes it easy to plan and implement micro-segmentation strategies to enhance security network-wide.
Seamlessly integrate with SDN and SD-WAN solutions for enhanced visibility and compliance
Seamless integration with SDN and SD-WAN solutions
A32 seamlessly integrates with SDN and SD-WAN solutions, including Cisco ACI and Cisco Meraki
A32 seamlessly integrates with SDN and SD-WAN solutions, including Cisco ACI, Cisco Meraki and VMWARE NSX-T to enhance visibility and ensure ongoing compliance with extended support for financial regulations such as SWIFT and HKMA.
“The events of 2020 have highlighted how critical it is for network security experts to be able to make changes to their organizations’ core business applications quickly, but without impacting security or compliance across complex, hybrid networks,” said Eran Shiff, Vice President, Product, of AlgoSec.
Maximising business agility and strengthening security
Eran adds, “AlgoSec A32 gives IT and security teams the holistic visibility and granular control they need over their entire network to do this, enabling them to plan, check and automatically implement changes from a single console to maximize business agility and strengthen security and compliance.”
AlgoSec A32 is the first version to run on the CentOS 7 operating system and is generally available currently in the market.
A new range of Wisenet Public View Monitors (PVMs) equipped with a built-in SSL connected 2-megapixel camera have been introduced to help retailers deter fraudsters and shoplifters. Offering a choice of 10”, 27”, and 32” monitors, the 3 new PVMs are designed to be located at store entrances, shopping aisles, till points, or self-checkout pay points.
With an SD/SDHC/SDXC slot that can facilitate up to 512GB of data storage, the PVMs provide store management with the opportunity to display a slide show which can include supplier adverts, own-brand product promotions, and special offers.
A default blinking recording in progress message is superimposed over the displayed graphics to let would be thieves know they are on camera, with operators having the option to customize the message and configure its size, color, opaqueness and positioning on the monitor.
Face and motion detection feature can be configured to switch the display to live view to make people aware they are being watched Supported by the Wisenet WAVE and SSM video management platforms as well as Wisenet NVRs, the ONVIF Conformant PVMs can be programmed so that images captured by the cameras are either continuously recorded or when prompted to do so by built-in face or motion detection video analytics.
The face and motion detection feature can also be configured to switch the display to live view to make people aware they are being watched, as they will be able to see themselves on the monitor as they enter a store or walk down a shopping aisle. The display reverts to the slide show after a specified number of seconds.
The PVMs, which can be integrated with tagging (EAS) systems to record images of people who might be leaving the store with stolen items, also provide support for the AI-Masking, AI-Bio, AI-Face-Detect, and AI-Occupancy video analytics applications, developed by Hanwha Techwin’s technology partner, A.I. Tech.
Regardless of whether they are displaying live images or a slide show, or the monitor has been turned off by someone using a remote control, the PVMs will continuously stream images to a control room where they can be viewed via video management software (VMS), as well as continue to be recorded on an on-site or remotely located NVR.
The ultra-low light capabilities of the new PVMs, together with Wide Dynamic Range (WDR) technology performing at up to 150dB, enables the built-in camera to capture clear, sharp images in strongly contrasting light conditions at, for example, store entrances where strong sunlight may be streaming in.
Power over Ethernet
All three PVMs can be powered by 12V DC, with the Wisenet SMT-1030PV also offering the option to utilize Power over Ethernet (PoE+) if there isn’t an existing power supply close to where the PVM is being installed. A single cable of up to 100m is all that is needed to provide both powers to the SMT-1030PV and for network communications.
The three new Wisenet PVMs, which can be mounted by using standard VESA brackets, are as follows:
SMT-1030PV: 10” monitor with LED backlight and 1024 x 600 display resolution.
SMT-2730PV: 27” monitor with LED backlight, HDMI input, and Full HD display.
SMT-3230PV: 32” monitor with LED backlight, HDMI input, and Full HD display.
Loss prevention strategy
“With retailers increasingly relying on PVMs to play an important role within their strategic approach to loss prevention, we have designed our new models to make it quick and easy, as well as cost-effective, to deploy them across a large number of stores,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe.
“As the only PVMs available which, for cyber security and data protection purposes, are supplied with a complete built-in SSL connected camera, they eliminate the need for system integrators to install and connect a separate supporting camera, which some other manufacturers’ PVMs require."
"By building in an intuitive user interface, we have also made it extremely easy for busy store managers to take full advantage of the PVM’s functionality, including the ability to utilize the monitor for advertisement and signage using the slide show mode.”
LenelS2 has announced the release of the OnGuard security management system version 8.0, empowering security teams with enhanced situational awareness through unified views of the security environment, as well as powerful visualization for data-based insights.
OnGuard Version 8.0
OnGuard Version 8.0 provides major updates including integration with the Magic Monitor unified client, rich interactive maps, a new modern reporting engine, cyber security enhancements and more.
The OnGuard security management system is an advanced solution in Carrier’s Healthy Buildings Program, and provides critical features like occupancy management, enhanced access control and proactive screening solutions to better protect people and assets, and optimize building health and efficiency.
LenelS2, a globally renowned company in advanced security systems and services, is a part of Carrier Global Corporation, an international provider of healthy, safe and sustainable building and cold chain solutions.
Transforming security data into actionable insights
OnGuard version 8.0 provides end users with the tools to be in complete control of their security environment
“OnGuard version 8.0 provides end users with the tools they need to be in complete control of their security environment and transform security data into actionable insights,” said Jeff Stanek, President of LenelS2.
He adds, “As the world returns to the workplace, the breadth of new features, updates and enhancements in OnGuard version 8.0 make it an ideal solution for today’s unique security challenges.”
Magic Monitor unified client
The OnGuard security management system version 8.0 system enhances security and situational awareness through integration with the Magic Monitor client, a Windows and Mac OS client, which provides a unified view of access control, video surveillance feeds and web content in a single display.
Users can view OnGuard system alarms, credentials as well as live or recorded video from the LenelS2 Network Video Recorder (LenelS2 NVR) platform, or third-party video management systems, including the Milestone XProtect system. The Magic Monitor unified client supports a single display, a command center workstation or expansive video walls.
OnGuard Reports and Dashboard features
To turn security data into actionable insights, the OnGuard version 8.0 platform now features a new OnGuard Reports browser client that provides customizable reports. An OnGuard Dashboard feature offers powerful visualization of system, cardholder and alarm data in a variety of graphical formats.
The new interactive OnGuard Maps feature offers browser-based visualization of facility layouts and provides dynamic system feedback. With OnGuard version 8.0, the Maps feature is included within the OnGuard Monitor client and is accessible from any computer, tablet or smartphone.
Usability enhancements and cyber security upgrades
OnGuard version 8.0 system also includes new usability enhancements, integrations and cyber security upgrades
The OnGuard version 8.0 system also includes new usability enhancements, integrations and cyber security upgrades to improve safety and convenience. Usability enhancements include easy-to-access language options in OnGuard Visitor Self Service mobile app version 1.5 and a richer video viewing experience across OnGuard web clients.
The improved video experience includes new audio, digital zoom, snapshot capture and Milestone XProtect video support in OnGuard Monitor and Surveillance web clients.
Enhanced security in K-12 education segment
To enhance security in the K-12 education segment, integration with the Allegion Von Duprin Remote Undogging/Remote Monitoring (RU/RM) solution enables an electronic override of mechanical undogging for facility emergency lockdown and remote door status monitoring.
‘Secure by Default’ settings, coupled with license administration security improvements, further enhance cyber security across the OnGuard system.
Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge.
However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials are increasingly enabling smart cities to improve the experience and safety of the people who reside there.
Rising scope of 5G, AI, IoT and the Cloud
The main foundations that underpin smart cities are 5G, Artificial Intelligence (AI), and the Internet of Things (IoT) and the Cloud. Each is equally important, and together, these technologies enable city officials to gather and analyze more detailed insights than ever before. For public safety in particular, having IoT and cloud systems in place will be one of the biggest factors to improving the quality of life for citizens.
Smart cities have come a long way in the last few decades, but to truly make a smart city safe, real-time situational awareness and cross-agency collaboration are key areas which must be developed as a priority.
Innovative surveillance cameras with integrated IoT
Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns
Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns. From dangerous drivers to terrorist attacks, petty crime on the streets to high profile bank robberies, innovative surveillance cameras with integrated IoT and cloud technologies can go some way to helping respond quickly to, and in some cases even prevent, the most serious incidents.
Many existing safety systems in cities rely on aging and in some places legacy technology, such as video surveillance cameras. Many of these also use on-premises systems rather than utilising the benefits of the cloud.
Smart programming to deliver greater insights
These issues, though not creating a major problem today, do make it more challenging for governments and councils to update their security. Changing every camera in a city is a huge undertaking, but in turn, doing so would enable all cameras to be connected to the cloud, and provide more detailed information which can be analyzed by smart programming to deliver greater insights.
The physical technologies that are currently present in most urban areas lack the intelligent connectivity, interoperability and integration interfaces that smart cities need. Adopting digital technologies isn’t a luxury, but a necessity.
Smart surveillance systems
It enables teams to gather data from multiple sources throughout the city in real-time, and be alerted to incidents as soon as they occur. Increased connectivity and collaboration ensures that all teams that need to be aware of a situation are informed instantly.
For example, a smart surveillance system can identify when a road accident has occurred. It can not only alert the nearest ambulance to attend the scene, but also the local police force to dispatch officers. An advanced system that can implement road diversions could also close roads around the incident immediately and divert traffic to other routes, keeping everyone moving and avoiding a build-up of vehicles.
This is just one example: without digital systems, analyzing patterns of vehicle movements to address congestion issues could be compromised, as would the ability to build real-time crime maps and deploy data analytics which make predictive policing and more effective crowd management possible.
Cloud-based technologies provide the interoperability, scalability and automation
Cloud-based technologies provide the interoperability, scalability and automation that is needed to overcome the limitations of traditional security systems. Using these, smart cities can develop a fully open systems architecture that delivers interoperation with both local and other remote open systems.
The intelligence of cloud systems can not only continue to allow for greater insights as technology develops over time, but it can do so with minimal additional infrastructure investment.
Smart surveillance in the real world
Mexico City has a population of almost 9 million people, but if you include the whole metropolitan area, this number rises sharply to over 21 million in total, making it one of the largest cities on the planet. Seven years ago, the city first introduced its Safe City initiative, and ever since has been developing newer and smarter ways to keep its citizens safe. In particular, its cloud-based security initiative is making a huge impact.
Over the past three years, Mexico City has installed 58,000 new video surveillance cameras throughout the city, in public spaces and on transport, all of which are connected to the City’s C5 (Command, Control, Computers, Communications and Citizen Contact) facility.
Smart Cities operations
The solution enables officers as well as the general public to upload videos via a mobile app to share information quickly, fixed, body-worn and vehicle cameras can also be integrated to provide exceptional insight into the city’s operations.
The cloud-based platform can easily be upgraded to include the latest technology innovations such as license plate reading, behavioral analysis software, video analytics and facial recognition software, which will all continue to bring down crime rates and boost response times to incidents.
The right cloud approach
Making the shift to cloud-based systems enables smart cities to eliminate dependence on fiber-optic connectivity and take advantage of a variety of Internet and wireless connectivity options that can significantly reduce application and communication infrastructure costs.
Smart cities need to be effective in years to come, not just in the present day, or else officials have missed one of the key aspects of a truly smart city. System designers must build technology foundations now that can be easily adapted in the future to support new infrastructure as it becomes available.
Open system architecture
An open system architecture will also be vital for smart cities to enhance their operations
For example, this could include opting for a true cloud application that can support cloud-managed local devices and automate their management. An open system architecture will also be vital for smart cities to enhance their operations and deliver additional value-add services to citizens as greater capabilities become possible in the years to come.
The advances today in cloud and IoT technologies are rapid, and city officials and authorities have more options now to develop their smart cities than ever before and crucially, to use these innovations to improve public safety.
New safety features
Though implementing these cloud-based systems now requires investment, as new safety features are designed, there will be lower costs and challenges associated with introducing these because the basic infrastructure will already exist.
Whether that’s gunshot detection or enabling the sharing of video infrastructure and data across multiple agencies in real time, smart video surveillance on cloud-based systems can bring a wealth of the new opportunities.
Several major players vigorously employ biometric recognition technologies around the globe. Governments use biometrics to control immigration, security, and create national databases of biometric profiles. Being one of the most striking examples, the Indian Aadhaar includes face photos, iris, and fingerprints of about 1.2 billion people.
Financial institutions, on their part, make use of biometrics to protect transactions by confirming a client's identity, as well as develop and provide services without clients visiting the office. Besides, biometric technology ensures security and optimizes passenger traffic at transport facilities and collects data about customers, and investigates theft and other incidents in retail stores.
Widespread use of biometrics
Business, which suddenly boosted the development of biometrics, is an active user of biometric technology
Business, which suddenly boosted the development of biometrics, is another active user of biometric technology. Industries choose biometric systems, as these systems are impossible to trick in terms of security, access control, and data protection. Being in demand in business, these three tasks are also relevant for the industry. However, the use of biometrics at industrial sites is discussed unfairly seldom.
Therefore, it is the face identification that is the most convenient there, as workers often use gloves, or their hands may be contaminated, and the palm pattern is distorted by heavy labor. All these features make it difficult to recognize people by fingerprints or veins and significantly reduce identification reliability. Therefore, industries seek facial recognition solutions. Thus, let us demonstrate the application of face recognition technology at different enterprises, regardless of the area.
Facial recognition use in incident management
Facial biometric products are known to automate and improve the efficiency of security services by enriching any VMS system. These systems provide an opportunity of instantly informing the operator about recognized or unrecognized people, and their list membership, as well as save all the detected images for further security incident investigation.
Furthermore, some sophisticated facial biometric systems even provide an opportunity to build a map of the movements of specific people around a site. Besides, it is relevant not only for conducting investigations but also in countering the spread of the COVID-19 virus.
Identifying and tracking COVID-19 positive cases
Therefore, if an employee or visitor with a positive COVID-19 test enters a facility, the system will help to track his/her movement and identify his/her specific location. It will also help to take the necessary measures for spot sanitary processing.
Thus, the introduction of biometric facial recognition at the industrial enterprise can improve and speed up the incidents’ response and investigations without spending hours watching the video archive.
Access control system to secure physical assets
The right access control system can help industries secure physical and informational assets
The right access control system can help industries secure physical and informational assets, cut personnel costs, and keep employees safe. Facial recognition systems may enrich access control systems of any company by providing more security. As biometric characteristics, by which the system assesses the compliance of a person with the available profiles in the database, cannot be faked or passed.
The human factor is also reduced to zero, due to the fact that while identity documents can be changed, the inspector can make a mistake or treat his/her task carelessly, be in collusion with an intruder, the biometric system simply compares a person in front of the camera with the biometric profiles database.
Biometric facial identification software
For example, RecFaces product Id-Gate, a specialized software product for reliable access control to the site, checks the access rights by using biometric facial identification alone or in conjunction with traditional IDs (electronic passes, access keys, etc.), which means that there is almost a zero probability of passing to the site by someone else's ID.
The access control system’s functionality allows one to strictly account the number and time of all the facility’s visitors and also track their movement. When unauthorized access is attempted or a person from the stop list is detected, Id-Gate sends an automatic notification to the access control system and operator.
Enhanced data and information security
Even despite the division of access to different industrial enterprise areas, the security service needs to provide independent information system security. Employees with the same facility access rights may have different access rights to data.
However, in that case, a personal password is not enough, as an employee may forget it, write it down and leave it as a reminder, tell a colleague to do something for him/her during the vacation, or just enter it at another person’s presence.
Password-free biometric authentication systems make the procedure user-friendly and secure
Password-free biometric authentication
Password-free biometric authentication systems make the procedure user-friendly and secure. Such systems usually provide an option of two-step verification when successful password entry is additionally confirmed by biometric recognition. Hence, it is particularly relevant due to the current lockdown in many countries.
To sum up, the application of biometric technologies solves several issues of the industry, such as:
Optimizes and partially automates the work of the security service, as it provides reliable identification and verification of visitors/employees, reduces the amount of time spent on finding a person on video and making a map of his/her movements, without spending hours on watching video archive in case of investigation.
Provides a high level of reliability and protection from unauthorized access to the enterprise and the information system.
Provides a two-step verification of the user/visitor (including password and biometric data) and almost eliminates the risk of substitution of user data/ID.
As a leader, I am a big proponent of using what’s happened in the past — and is currently happening in the present — to better prepare our business and our customers for what’s to come. Applying this mindset in the financial industry is particularly helpful. The emergence of various technologies and trends enables us to determine what we can optimize for the highest efficiency and satisfaction level.
The past few years have been focused on the Internet of Things (IoT), data and analytics, and enhancing proactivity to mitigate the increasingly significant threat of fraud and cyber risks. While each of these elements will continue to play an essential role in the industry moving forward, we’re starting to see two common threads that will rise above all in the coming years: collaboration and convergence.
When broken down in terms of its relevance for banks and credit unions, we can expect to see these trends in certain areas in the future.
Security and customer engagement
We’re starting to see two common threads that will rise above all in the coming years: collaboration and convergence
There's no overstating the importance and value of one's hard-earned money. When it comes to keeping it safe, consumers demand their relationship with a financial institution is built on one powerful characteristic: trust. Customers must feel confident in placing their funds in someone else's hands, with the comfort and understanding that the institution's primary goal is to meet their needs while safeguarding information at all times.
The digital transformation and incorporation of intelligent technology into the banking environment have undoubtedly changed how trust is defined in this industry. As customers become more tech-savvy, their idea of a trustworthy and engaging banking partner begins. We're seeing the necessity of digital services for elevating customer satisfaction, such as mobile banking, chat features, and intelligent virtual assistants, complementing in-person service, and modernising customer engagement.
Now that customers are becoming more aware of some of the risks imposed by technology, simplifying and automating programs is more critical for banks than ever before. To address and mitigate customer concerns about data security and privacy, financial organizations must prioritise deploying an integrated, end-to-end solution that considers the vulnerability of the Internet of Things (IoT) and the risks of the cyber world.
A security-led strategy
But the aspect of security must remain at the centre of this strategy. As both the financial industry and the threats it faces become more complex, the promise of secure housing and management of one of our most sensitive assets is always top-of-mind. Ensuring adequate security, surveillance, and investigative processes are the key for banks to establish superior customer engagement and develop a healthy relationship based on protection.
It’s a simple fact: Financial institutions can’t drive exceptional customer service without security having a seat at the table. In general, the customer experience is typically made up of these two elements above all else, and loyal customers place their trust in banks to demonstrate an apparent dedication to understanding how both sides impact one another — which is in more ways than one.
Financial institutions can’t drive exceptional customer service without security having a seat at the table
As we start to see the physical layouts of branches evolve to become more productive for customer engagement, it’s imperative to ensure that security is considered in these changes. For example, many bank environments are transitioning to be more liberal and free-flowing, which we will all take advantage of after the pandemic is behind us. These new environments could introduce various risks when it comes to employee and asset protection, making it paramount for security to react to this adjustment accordingly from a safety and fraud perspective.
Physical security and IT
By now, you’re probably more than familiar with the term “convergence.” The evolution of the threat landscape and the significance of risks that today’s banking and financial providers face have made the word top-of-mind. Organizations worldwide demand a more holistic approach to security to ensure they’re consistently protecting consumer data, employees, brand reputation, and infrastructure.
Though this type of convergence has already begun to occur, the integration of physical and IT security will only become more critical in the years ahead. The use of advanced networked and cloud-based technologies in financial institutions — primarily through wireless network connections — has led to IT’s increased involvement in security decisions and operations, which is the right path to follow if a bank or credit union wants to ensure its solutions are protected against cyber threats.
The collaboration between physical and IT security teams must exist at every level of the process; from procurement to installation to maintenance over time, it’s crucial that IT personnel are involved and asking the right questions. In the future, physical security groups will likely rely on IT professionals to help them solve problems regarding the technical and cyber sides of security solutions.
Collaboration is key
Whether it's due to the evolving risk landscape financial institutions face or the desire to adhere to customer demands, it’s become clear that collaboration will be the key to success for banks and credit unions in the future. A modernised customer engagement strategy must incorporate a focus on security, and that element of safety must be comprised of both physical and IT components.
A modernised customer engagement strategy must incorporate a focus on security
But while the traditional definition of convergence may seem simple to understand, we must look beyond these words to determine how exactly the practice can and should be implemented. In a more detailed sense, convergence can be defined as a marrying of cyber and physical security capabilities to form a comprehensive approach to identify potential threats and expand awareness for better event response.
This level of “converged collaboration” fuels a unified and cohesive security strategy built with all areas of security in mind and can lead to better incident management and faster response. And with the potential impact of today’s security threats on a bank’s people, property, and brand, this approach is necessary to ensure that no stone is left unturned.
An impact of the COVID-19 pandemic has been to accelerate change. In 2020, the security industry was among many others that sought to adapt to shifting norms. In the process, we grabbed onto new opportunities for change and, in many cases, re-evaluated how we have done business for decades.
If necessity is the mother of invention, perhaps crisis is the mother of acceleration. This article will reflect on how these themes impacted the physical security industry in 2020, based on content we published throughout the year, and with links back to the original articles.
Sensitive data leakage
Since the lockdown came into effect, organizations globally have undergone years' worth of transformations in a matter of months. Whether it has been to transition their operations online or moving their IT infrastructure to the cloud, there’s no denying that the face of business has changed permanently, experiencing a seismic shift, both operationally and culturally. As we enter the ‘next normal’ there remains a great deal of uncertainty around what the next 12 months holds and how organizations can navigate turbulence in the face of a possible recession.
One of the most notable and widely reported trends has been the switch to remote methods of work, or home working. With so many employees logging on from residential networks, through personal devices that may be more easily compromised, the overall attack surface has greatly increased, raising the risk of potential corporate and sensitive data leakage in their new home office settings. Security and data protection are larger issues than ever.
Good cybersecurity hygiene
Criminals will use the crisis to scam people for money, account information and more"
With a majority of the world working from home, businesses had to respond to this changing landscape. While it used to be that in-person networking events and sales pitches secured new projects or opportunities, the current landscape pushes businesses to be more creative in how they reach their customers. For example, with ISC West being postponed, many companies have turned to online resources to share new product demonstrations and other company news. Others are hosting webinars as a way to discuss the current climate and what it means for the industry.
Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.”
In a typical office with an on-premise data center, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications.
There are many benefits of working remotely with productivity right up the top of the list
There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and traveling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working.
Video conferencing platforms
Trade shows have always been a basic element of how the security industry does business - until the year 2020, that is. This year has seen the total collapse of the trade show model as a means of bringing buyers and sellers face to face. The COVID-19 pandemic has effectively made the idea of a large trade show out of the question.
The good news is that the industry has adapted well without the shows. A series of ‘on-line shows’ has emerged, driven by the business world’s increasing dependence on Zoom and other video conferencing platforms. The fact is, 2020 has provided plenty of opportunities for sellers to connect with buyers. Some of these sessions have been incredibly informative – and conveniently accessible from the comfort of a home office.
Online training courses
Online training has grown in popularity this year, and the change may become permanent
Online training has grown in popularity this year, and the change may become permanent. “We have seen unprecedented international demand for our portfolio of online training courses ranging from small installation companies to the largest organizations, across a wide range of sectors,” says Jerry Alfandari, Group Marketing Manager of Linx International Group, a UK training firm.
“More than ever, businesses are looking to ensure they have the skills in-house to coordinate their response to the changing situation. Individuals are also taking this time to upskill themselves for when we return to ‘normal’ by bringing something with them they didn’t have before. Perhaps unsurprisingly, people are still seeking to better themselves for what will be, eventually, a competitive market.”
Virtual trade show
‘Crisis and the Everyday’ was part of Genetec’s Connect’DX virtual trade show last spring. The virtual conversation – emphasizing both in form and content the topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry.
In the middle of this pandemic, there is an opportunity to help security reinvent itself
“In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security.”
As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected.
“We moved quickly to establish work-from-home protocols to protect our employees and minimize impact on our partners,” says Anne Ferguson, VP of Marketing at Alarm.com. The Customer Operations and Reseller Education (CORE) team has operated without interruption to provide support to partners. Sales teams are utilizing webinars and training resources to inform and educate partners about the latest products, tools, and solutions. Alarm.com’s partner tools are essential for remote installations and support of partner accounts.
Consolidation continued in the physical security marketplace in the turbulent year 2020. There were several mega-deals in addition to shuffling among small and medium-sized companies.
Here is a sampling of companies that changed hands this year, compiled from our archive of company news. With the changing economic climate, how much more is ahead in 2021? Stay tuned.
Wesco merges with Anixter
WESCO International, Inc., a provider of business-to-business (B2B) distribution, logistics services and supply chain solutions, announced it completed its merger with Anixter International Inc., creating a premier, global B2B distribution and supply chain solutions company. Anixter becomes a wholly owned subsidiary of WESCO International.
ACRE acquires Razberi
ACRE acquired Razberi Technologies, Farmers Branch, Texas, and the product line of intelligent video appliances, automated security software and health monitoring software will be added to and sold under the ComNet brand and portfolio of products. ComNet will now be selling Razberi products through its established channels.
Motorola acquires IndigoVision
Among the benefits is enhanced geographical reach across a wider customer base
Motorola Solutions says the IndigoVision range of products, global presence and customer base are ‘highly complementary’ to Motorola Solutions' existing presence in video security. Among the benefits is enhanced geographical reach across a wider customer base.
Motorola acquires Pelco
“Pelco’s track record of innovation, internationally recognized brand, global channel and customer installed base enable us to further expand our global footprint with enterprise and public safety customers,” said Greg Brown, Motorola Solutions’ Chairman and CEO, about the iconic brand.
Johnson Controls swallows Qolsys
Qolsys Inc., residential and commercial security and smart-home manufacturer, enhances Johnson Controls global innovation platform, delivering next generation security and smart building solutions. JCI had already owned a majority stake in the company since 2014.
ADT and Google Home partnership
The partnership will combine Nest’s award-winning hardware and services, powered by Google’s machine learning technology, with ADT’s installation, service and professional monitoring network to create a more helpful smart home and integrated experience for customers across the United States. Upon the closing of Google’s equity investment in ADT, Google will own 6.6% of ADT’s outstanding aggregate common equity.
Securitas acquires STANLEY in Five Countries
The acquisition is aligned with Securitas’ ambition to double the size of its security solutions
Securitas acquired STANLEY Security’s electronic security businesses in Germany, Portugal, Switzerland, Singapore and India. The acquisition is aligned with Securitas’ ambition to double the size of its security solutions and electronic security business and expands Securitas’ electronic security footprint and capabilities.
Allied Universal to Buy G4S
Ending the year on a high note, the boards of directors managing Allied Universal and G4S reached an agreement on the terms of a recommended cash offer. The deal brings to a close a six-month bidding war for G4S. The combined business is expected to generate approximately $18 billion in annual revenues with a global workforce of more than 750,000 people in 85 countries.
Quantum acquires Western Digital business line
Quantum Corporation entered into an agreement with Western Digital Technologies, Inc., a subsidiary of Western Digital Corp., to acquire its ActiveScale object storage business. The acquisition demonstrates Quantum’s commitment to innovation and growth, extending the company’s leadership role in storing and managing video and unstructured data using a software-defined approach.
Ava, a unified security company, announced the completion of the merger between Jazz Networks, renowned cyber security insider threat detection and response firm; and Vaion, an end-to-end video security solutions provider. Ava is now positioned to deliver unified cyber and physical security solutions to organizations worldwide.
Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in a timely fashion.
Safe work environment
Businesses have a duty of care to provide a safe working environment for their employees and contractors. It is therefore important to limit exposing drivers to risk, to put in place proper safety and security protocols, and to clearly outline them in company policies.
Whether an employee or contractor, these drivers represent the brand they work for. If they do not adhere to company-mandated safety and security rules, because the business did not make them aware or they intentionally did not comply by acting with malice, this can put the drivers, other employees, customers and the company at risk financially, legally and with regard to their reputation.
Adherence to safety protocols
Operating in haste typically results in forced errors and mistakes within the business"
“This need to hire drivers quickly resulted in many businesses lowering their standards and accepting certain risks to meet the increased demand. Operating in haste typically results in forced errors and mistakes within the business, potentially leading to harmful events and a damaged brand reputation,” stated Thomas Kopecky, Chief Strategy Officer and Co-Founder, Ontic Technologies (Ontic), a unified protective intelligence software platform.
In the conversation presented below, Kopecky outlines the safety and compliance requirements needed to manage the risks while meeting the demand for drivers.
Q: What risks do employers face as they ramp up hiring to meet higher demand for drivers?
Thomas Kopecky: There have been instances in which a transportation contractor with multiple violations has simply established the business under a new name but continues to operate dangerously. Hastily hiring such a firm without proper enhanced vetting increases the risk from a safety, as well as a business continuity standpoint. Having to terminate a contract and replace a contractor midway can also have significant financial repercussions.
In addition to problems created by executing too quickly, employers are now required both to mitigate their own general liability risks and to manage the perceived risk they may create due to the pandemic. For example, if a delivery driver tests positive for COVID-19, there is the potential they have also exposed customers. Employers must consider contactless delivery or other methods and protocols to mitigate this presumed risk of the pandemic.
Q: What are the elements of safety and compliance involved in onboarding new drivers?
Thomas Kopecky: When onboarding new drivers, corporations must think about more than clean background checks and adequate infrastructure. Whether employees or contractors, organizations must focus on what other risks the drivers bring with them. As part of this review, an open source scrub should be conducted at the outset to discover the driver’s online activity.
Through this exercise, a whole host of questions can be addressed including, for example, whether their morals and values align with those of the company. Are they involved with fringe or radical interest groups? Do their actions conflict with the culture of the organization, and could they have a negative impact? These are all questions that employers should be considering when hiring new drivers or contracting a new company.
Q: What tools are available to help companies vet their driver fleets and how can these tools make a difference?
Employers should also consider State Business Records for potential red flags
Thomas Kopecky: To vet their driver fleets, corporations can use several tools and resources that will strengthen the organization’s overall security. Ideally this is a software platform that brings all this information into one place so vetting, real-time data and concerning activities are not siloed but can be connected in order to assess potential risks and threats.
Logically, businesses should consider reviewing Department of Transportation Records, which allow organizations to check whether drivers are licensed and appropriately insured. Employers should also consider State Business Records for potential red flags, such as whether an organization is delinquent or no longer functioning in a given state.
Finally, it’s beneficial to review civil records as these can highlight any active or past cases associated with an organization. This includes fraud, bankruptcy, poor business practises, and more.
Q: What should be the standard methodology to investigate and collect data on new driver programs?
Thomas Kopecky: Corporate culture and company policies impact the level of vetting required (determined by company policy), which varies from business to business. Quite often, most valuable investigative content is associated with an actual fleet company owner and not a recently created business entity so it behooves corporations to research this information first.
Then verify the information provided is correct, and whether any other conflicting information exists. As previously noted, employers should review civil and criminal records at the state level and cases at the federal level, as it is often the fleet company or owner involved in litigation that could reflect negatively on a brand. Media coverage and consumer complaints are another critical source for negative mentions that may not always appear in public records.
You should also ask if the Department of Transportation (DOT) regulates this contract or driver; and if they were once a provider and are now re-applying, is it under a new name? If the answer is yes to either question, it will be necessary to check DOT records for adequate licensing or insurance coverage to ensure providers applying under a new name aren’t trying to circumvent the vetting process.
Q: What are the privacy concerns, and how can potential employers ensure they do not violate issues of privacy as they vet drivers (and/or other employees)?
Businesses must conduct their operations in a fair, lawful, and transparent manner
Thomas Kopecky: Businesses must conduct their operations in a fair, lawful, and transparent manner. Employers often dictate their own guidelines and requirements from company to company. Companies must ensure they follow the law and handle data used for vetting driver fleets in a manner compliant with General Data Protection Regulation (GDPR), Health Information Portability and Accountability Act (HIPAA), and the Fair Credit Reporting Act (FCRA).
When utilizing software platforms, those that aggregate public record data in real-time and efficiently to provide actionable insights will be key for protecting corporate driver fleets and businesses overall.
Q: How is addressing these issues different in the case of a contracted service versus a company employee?
Thomas Kopecky: Addressing these issues will vary from company to company, but it will be important for clients' legal counsel to help interpret the law in the respective state they operate in and make this final determination. This will help shape policy and the employer’s compliance requirements in the area of operation.
In some jurisdictions, contractors are vetted and treated like employees who are protected by FCRA. In contrast, there are more broad interpretations of what level of vetting and continuous monitoring can take place on contractors versus employees in other jurisdictions.
Q: What is at risk if companies fail to address these issues?
Thomas Kopecky: If companies fail to address security issues with managing their driver fleets, they risk major liability, business continuity and brand reputation. Every employee and contractor is in essence an ambassador of the brand, and in many instances, they are the only customer-facing representative for the enterprise.
Imagine you are a contractor driving for a major delivery service. If you were to get into an accident and tragically kill someone driving their branded truck, the repercussions of that accident would harm the brand as opposed to the small contracting company by which you are employed. This can have a disastrous impact on the enterprise, both from a reputation and financial standpoint.
When proactive steps are not taken to evaluate fleet companies or their owners, this can be viewed as negligence. Consider another example: A brand hires a driver company that has committed fraud while operating under another company’s name. What is the brand’s cost to conduct an initial onboarding assessment of this company versus the cost of investigating an issue, terminating the contract, and dealing with any potential litigation that might follow? The latter is clearly the financial burden. Corporations must proactively address risk associated with their driver fleets to mitigate risk before it occurs.
Q: What is the biggest misconception (in the industry and/or the public at large) about employee vetting requirements?
Enhanced vetting today often includes looking into a contractor’s background or its company
Thomas Kopecky: We have passed the days where everything is all about criminal background checks and instant alerts when a driver receives a DUI. We are entering a world where business continuity and resiliency are necessary. Companies are so reliant on contracted services or seasonal employee pools that if that roster of operators were found to be unsuitable, the business itself would not meet the demands of its customers.
Before the digital age, people only understood the driver vetting process to be based around a search of felony convictions. Enhanced vetting today often includes looking into a contractor’s background or its company from a different vantage point. Employers must begin to think about litigation history, negative media coverage and vocal social platforms, history of poor business practices or fraud, and more.
These are factors that need to be considered for a business to mitigate risk and maintain continuity of service in an era where timeliness and instant gratification are highly valued.
Since the beginning of the Corona pandemic, MOBOTIX thermal cameras have been increasingly used in the healthcare sector, as well as airports, train stations, public authorities, and companies, to detect temperature anomalies in people without contact and thus contain the spread of the virus. However, this aspect is only one area for which MOBOTIX technology is currently providing special services.
The MOBOTIX 7 Platform, with its intelligent and cyber secure camera systems M73 and S74, predestined MOBOTIX video technology even before the pandemic to ensure comprehensive, digital support in healthcare clinics and the care of the elderly and disabled. The reliable, high-quality video systems made in Germany reduce hospital and nursing staff's workload, provide digital care for patients and residents, and optimize care and workflow processes.
Parking lot management
Basic safety and pandemic protection in healthcare
Also, during the pandemic, a special duty of care applies to employees, patients, and residents as a risk or high-risk group. MOBOTIX video technology is used in numerous clinics, retirement, and care facilities worldwide to ensure that patients, residents, and employees have a carefree stay and can work safely. Dangers and sources of risk are detected, and the intelligent systems warn, report, or directly initiate assistance and rescue measures.
With the MOBOTIX 7 platform and the versatile apps, MOBOTIX offers exceptional application possibilities
This allows staff to concentrate on their work, while hospital patients and nursing home residents can recover more quickly and get the rest they need. MOBOTIX video technology is also used for early fire detection and access control, mainly to protect sensitive areas such as sterile rooms, operating theaters, or medication depots. MOBOTIX also offers the right solutions for intrusion and theft protection, securing outdoor spaces, or access monitoring and parking lot management.
With the MOBOTIX 7 platform and the versatile apps, MOBOTIX offers exceptional application possibilities: Temperature-sensitive people are detected as soon as they enter the facility and can be immediately sent for further examination. Crowding is avoided, and social distancing can be supported. MOBOTIX video systems detect when no mask is being worn and trigger an alarm or an information announcement.
Cybersecurity and data protection
Cybersecurity and data protection "Made in Germany”
Particularly in the healthcare sector, cybersecurity and data protection must be given the highest priority. After all, it is a matter of protecting lives. But it is also about sensitive, personal data that must not fall into the wrong hands under any circumstances. MOBOTIX video systems consist of high-quality components.
Developed, produced, and comprehensively tested at the company's German headquarters in Langmeil/Rhineland-Palatinate, the company creates products and solutions that are impressive not only because of their outstanding image quality - even in the most challenging lighting conditions. One hundred percent DSGV-compliant, the decentralized MOBOTIX systems stand for the highest possible cybersecurity and comprehensive data protection. Unauthorized persons cannot read the stored data.
Intelligent video technology
Relieving the workload of hospital and nursing staff with "digital care”
Using intelligent video technology from MOBOTIX can significantly reduce the hospital and nursing staff's workload
Hospital and nursing staff often work at the breaking point. Using intelligent video technology from MOBOTIX can significantly reduce the hospital and nursing staff's workload. For example, adequate video support can be used to carry out control rounds digitally. On the one hand, this creates free space that can be used for personal care and nursing, while on the other hand, emergencies are reported directly at the time they occur - and thus, the staff does not lose critical time.
Effective signaling and calling systems targeted alarm differentiation, and the avoidance of false alarms keep staff motivation high and reduce alarm fatigue.
Incorporating audio systems
Digital and discreet care for patients and those in need of care
MOBOTIX provides discreet video support for round-the-clock security without anyone feeling they are being watched. The video surveillance systems in healthcare facilities are discreetly and unobtrusively installed; they also detect and alert only when defined events occur to keep recordings to a minimum. At the same time, patients and residents can be sure that help will arrive quickly in an emergency.
Even at night, helpless individuals are detected immediately, ensuring their safety and preserving their independence. By incorporating audio systems, MOBOTIX video solutions for healthcare also enable patients to be addressed and communicated directly with.
license plate recognition
Optimize hospital and care processes
Smooth organization of routines helps hospitals and retirement and care facilities be efficient and profitable
Smooth organization of important routines helps hospitals and retirement and care facilities be efficient and profitable. Numerous processes can be automated and optimized with MOBOTIX video technology, from the facility's journey to check-out. For example, professional parking management with license plate recognition can ensure that only authorized vehicles can access specified areas.
In this way, ambulance access routes can be kept free, or parking fees can be billed in a straightforward, fast, and accurate manner. Queues in registration or examination areas can be avoided, and smooth administration and medical and care areas can be enabled. University hospitals or teaching institutions can use high-resolution camera systems, e.g., in operating theaters, to fulfill their teaching and training mission without disruptions.
Customers can develop further apps that enable completely individual solutions themselves or have them created by MOBOTIX and its technology partners and certified concerning cybersecurity.
Advanced video technology
Comprehensive solutions with the best return on investment
Healthcare is a market that is extremely important to MOBOTIX. The high level of solution expertise digitizes processes and work steps in everyday hospital and home life, using intelligent and future-proof video technology. Thus, simplifying work and making it safer also relieves the healthcare budgets' pressure and increases profitability (ROI).
The first phase in a pioneering smart transport project to transform security, passenger service, and operational management across Berlin’s S-Bahn rail network has officially gone live.
Teams based at S-Bahn’s ‘4S’ operational headquarters are now, via the latest developments in Synectics’ Synergy hybrid cloud software platform, able to connect, respond, and collaborate with passengers and staff on-board trains, at stations, and with field personnel working anywhere across the network.
Synergy hybrid cloud software
The new capabilities, including an innovative mobile application, mark a revolutionary step forward in the way operational command, control, and communications are carried out within urban rail environments.
The project, which went live as scheduled on 1 January, is the result of an innovative partnership between S-Bahn Berlin GmbH (a subsidiary of Deutsche Bahn) and command and control solutions expert, Synectics. The two companies’ combined ambition has led to the development of a tailored system that delivers a positive customer experience both now and well into the upcoming decade.
Integration with S-Bahn’s proprietary systems
Leveraging powerful tools to form custom API gateways, Synergy integrates to S-Bahn’s proprietary systems
Leveraging powerful tools to form custom API gateways, Synergy integrates to and interoperates with S-Bahn’s proprietary systems, as well as all third-party technologies, devices, and communication solutions vital to passenger service, safety, and security. This is achieved in real time, and continuously informed by sensor data obtained from integrated systems crucial to operating safe and efficient passenger services.
The new Synergy mobile application will enable S-Bahn’s workforce to receive automated task assignments based on their role, skills, and location, and to directly update the system on their delivery of those tasks, the sophisticated level of integration and interoperability achieved is unprecedented.
Intelligent digitization of workflows
Henning Oelze, Project Manager at S-Bahn, commented “Synergy’s powerful integrations, intelligent digitization of workflows, workforce management capabilities, and computer-aided dispatch functionality combine to deliver a hugely exciting outcome. The platform offers complete visibility of network-wide activity and the ability to coordinate and automate the right response, at the right time, to any requirement.”
Henning adds, “It was with huge pleasure that we saw our first trains and Security and Service teams utilizing the new Synergy system, especially given how challenging this last year has been. It really is a revolutionary step forward in our mission to deliver outstanding passenger service, while at the same time, making life much easier for our personnel through the advanced automation of operational processes.”
Rapid resource communication and deployment
From fulfilling a planned maintenance task to sending people with the most appropriate training to deal with an evolving security or safety issue, Synergy will facilitate the rapid communication, deployment, and appropriate action of different teams. This will equip S-Bahn to process and react to events within pre-defined response times, and to manage its workforce as effectively as possible.
The project is scheduled to continue during 2021, with the two organizations building further technical capabilities and driving ahead with continuous improvement. Key enhancements will see extensions to the workforce management functionality and more developments to improve operational efficiency within incident and task management assignments.
Smart transport systems standards
Some of the software developments driven by this project will have long term implications for the sector"
Greg Alcorn, Director, Global Sales & Customer Success at Synectics, said “S-Bahn Berlin is viewed as a technological trail-blazer and we’ve thoroughly enjoyed working with such a well-organized team to deliver the first step in their truly inspirational vision for urban transport.”
Greg adds, “Some of the software developments driven by this project will have long term implications for the sector. I have no doubt that there are new standards being set here for smart transport systems of the future.”
Future of smart transport operations
In addition to the ground-breaking technology used, the project also demonstrates the advances that can be achieved through international collaboration. Henning Oelze stated, “Having such direct access to Synectics’ product development team in the UK and knowing that they understood how agile we needed this solution to be, has made a huge difference."
He adds, “They shared our vision for the future of smart transport operations in a major European capital and worked in close partnership with the S-Bahn team, successfully navigating their way through the technical, logistical and cultural challenges of a major international project. The close nature of this collaboration is the reason we have reached this crucial go-live milestone, despite all the hurdles that 2020 put in our way.”
St Louis-headquartered insurance brokerage Crane Agency is to roll out CyberCube’s Broking Manager, the cyber risk analytics platform for insurance intermediaries.
Crane Agency is a US top 100 retail insurance broker, the oldest west of the Mississippi. Established in 1885, the business is licensed in 50 states and has four other offices in Missouri with over 250 staff.
Broking Manager is the first software-as-a-service application CyberCube has built specifically for the insurance broking community. It offers a streamlined approach to generating financial exposure impact that helps clients make informed decisions on coverages and limits.
Financial impact of cyber risk
Broking Manager will allow Crane’s team to quantify and explain to their clients the sources and financial impact of cyber risk exposure. The platform also produces reports that can be used to educate prospects and clients on potential sources of loss, recent and relevant cyber events, and peer-to-peer benchmarking.
Pascal Millaire, CEO for CyberCube, said, “Crane Agency is a forward-looking insurance business that sees much potential in the cyber market. It’s been a pleasure to work with them and we’re thrilled they’ve chosen to use Broking Manager to assist with understanding their clients’ needs.”
Beth Martin, Management Liability and Cyber Practice Leader, Crane Agency, said, “We’re very excited to be partnering with CyberCube. It’s our firm belief that Broking Manager will provide exceptional insights for our clients at a time when the cyber risk landscape is changing markedly.”
“The pandemic and the shift in working patterns it has generated mean new risks, new modes of cyber-attack, and new vulnerabilities. With businesses coming to terms with these changes, we see considerable potential for growth in the cyber insurance market.”
Portfolio Manager and Account Manager
Broking Manager complements CyberCube’s two other products, Portfolio Manager and Account Manager, which are designed for risk carriers and are used by foremost companies across the insurance ecosystem.
HID Global, the globally renowned company in trusted identity solutions, has announced that Collectors Universe, Inc. has added HID Trusted Tag Services to its Professional Coin Grading Service (PCGS) coins and banknote holders, so as to enable collectors to quickly and easily validate the authenticity, grade, and condition of their PCGS collectibles, with a tap of their NFC-enabled smartphone.
Product authentication technology
With the rare coin market exceeding US$ 3 billion, product authentication technology has swiftly become a necessity to prevent counterfeit coins and banknotes without compromising the encapsulation or condition of the collectibles.
Collectors Universe first launched HID Trusted Tag Services with approximately 100,000 coins and received overwhelmingly positive feedback from customers. The company has purchased an additional two million HID Trusted NFC Tags to embed into broader segments of the PCGS inventory.
HID Trusted Tag Services
HID Trusted NFC tags are embedded into PCGS’s coin and banknote holders using discreet wet inlays
“HID Trusted Tag Services is the single biggest leap forward for third-party grading since the inception of the collectibles market. I hope that every third-party grading service in the industry considers integrating similar technology into their product lines as well. It’s simply that important for the hobby as a whole,” said Brett Charville, President of Professional Coin Grading Service.
HID Trusted NFC tags are embedded into PCGS’s coin and banknote holders using discreet wet inlays. Collectors just tap their phone to a holder to authenticate their collectible through the HID Cloud Authentication service.
Each tap generates a unique one-time URL that automatically launches Collectors Universe’s proprietary PCGS Cert Verification app or opens a web browser to display information about the collectible’s authenticity. The single-use URLs help prevent threats such as spoofing or other attempts to circumvent the HID Trusted Tag Services.
“With the HID solution, Collectors Universe is the first in the numismatic industry and among the first in any of the collectibles fields to utilize this type of anti-counterfeiting technology at scale,” said Collectors Universe Chief Information Officer, John Nelson, adding “The technology provides peace of mind to customers who seek reassurance that their investment is going toward a verifiable collectable.”
NFC technology and cloud authentication services
“HID Trusted Tag Services was specifically designed for Internet of Things use cases that benefit from combining our trusted NFC technology and cloud authentication services to enable new, convenient experiences for customers,” said Mark Robinton, Vice President of IoT Services with HID Global.
Mark adds, “Product authentication and brand protection are some of the many applications we automate by leveraging smartphones to streamline and simplify processes that were previously manual and paper-based.”
As an industry, we often speak in buzzwords. In addition to being catchy and easy to remember, these new and trendy industry terms can also reflect the state of the security market’s technology. In short, the latest buzzwords provide a kind of shorthand description of where the industry is - and where it’s going. We asked this week’s Expert Panel Roundtable: What new buzzword(s) rose to prominence in the security industry in 2020? (And how do they reflect industry trends?)
Internet-based training has long provided a less-expensive alternative to in-person classroom time. There are even universities that provide most or all of their instruction online. However, the COVID-19 pandemic has expanded acceptance even more and increased usage of internet-based meeting and learning tools. We asked this week’s Expert Panel Roundtable: How can remote or Internet-based training benefit the physical security market?
Video storage has been a challenge since the days of VCRs and videotape. Storing images is a central need for any video systems, especially one that is focused on the forensic and investigative aspects of video. Today, digital video is stored on hard drives and even in the cloud. Increasingly, video is considered “data” that drives a variety of video analytics and even artificial intelligence (AI) applications. We asked this week’s Expert Panel Roundtable: What are the new trends and opportunities in video storage?